Neighbor attack detection in internet of things

A Thomas, T Gireesh Kumar, AK Mohan - Advanced Computational and …, 2018 - Springer
I nternet of T hings (IoT) hegemonies all other technological development the world has
seen so far. 6LoWPAN is emerging as the next generation protocol of IoT. 6LoWPAN …

Intrusion detection model for IoT using recurrent kernel convolutional neural network

CU Om Kumar, S Marappan, B Murugeshan… - Wireless Personal …, 2023 - Springer
In communication and information technology, the Internet of Things (IoT) creates an
enormous amount of data traffic that permits data analysis to expose and detect unusual …

Implementation of intrusion detection system for internet of things using machine learning techniques

J Manhas, S Kotwal - Multimedia Security: Algorithm Development …, 2021 - Springer
In recent times, Internet brought revolution by connecting the whole world to share the
information at one platform. Since data is the most valuable asset, every organization is …

Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

PS Nandhini, S Kuppuswami, S Malliga… - The Journal of …, 2023 - Springer
Abstract Internet of Things (IoT) is becoming a crucial requirement for linking numerous
physical devices or gadgets to the web. Due to large volume of data exchanged, security in …

[PDF][PDF] Multiple intrusion detection in RPL based networks

MC Belavagi, B Muniyal - International Journal of Electrical and …, 2020 - core.ac.uk
Routing Protocol for Low Power and Lossy Networks based networks consists of large
number of tiny sensor nodes with limited resources. These nodes are directly connected to …

A survey on miscellaneous attacks and countermeasures for RPL routing protocol in IoT

A Jain, S Jain - Emerging Technologies in Data Mining and Information …, 2019 - Springer
The Internet of things is a worldview, where everyday objects can be equipped with
distinguishing, detecting, networking, systems administration, and handling capacities that …

Survey of rank attack detection algorithms in Internet of Things

S Kalyani, D Vydeki - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
This paper addresses one of the RPL routing attacks-Rank attack, which is a fundamental
security attack on the routing of in IoT networks. Today, most devices, which are used for …

A review on the security of IoT networks: From network layer's perspective

A Jahangeer, SU Bazai, S Aslam, S Marjan… - IEEE …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) has revolutionized the world in the last decade. Today millions of
devices are connected to each other utilizing IoT technology in one way or the other. With …

[PDF][PDF] Cybersecurity Attack Detection Model, Using Machine Learning Techniques

İ Avcı, M Koca - Acta Polytechnica Hungarica, 2023 - acta.uni-obuda.hu
Millions of people use the web every day, in this age of technology and the internet.
Protecting the privacy and security of these users is a significant challenge for cybersecurity …

A comprehensive survey on detection of sinkhole attack in routing over low power and Lossy network for internet of things

AARA Omar, B Soudan - Internet of Things, 2023 - Elsevier
Abstract The Internet of things (IoT) is a developing technology that has produced
remarkable advancements and contributions in numerous applications. IoT refers to a …