[HTML][HTML] A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions

J Asharf, N Moustafa, H Khurshid, E Debie, W Haider… - Electronics, 2020 - mdpi.com
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …

A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

Voltage over-scaling-based lightweight authentication for IoT security

J Zhang, C Shen, H Su, MT Arafin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT
applications. A hardware-oriented lightweight authentication protocol based on device …

Machine learning for advanced wireless sensor networks: A review

T Kim, LF Vecchietti, K Choi, S Lee… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are typically used with dynamic conditions of task-related
environments for sensing (monitoring) and gathering of raw sensor data for subsequent …

Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

An intrusion detection system for wireless sensor networks using deep neural network

V Gowdhaman, R Dhanapal - Soft Computing, 2022 - Springer
Wireless sensor network comprises of a large number of sensor nodes to acquire and
transmit data to the central location. However, due to resource constrained nodes …

[HTML][HTML] Session-Dependent Token-Based Payload Enciphering Scheme for Integrity Enhancements in Wireless Networks

ZA Abduljabbar, V Omollo Nyangaresi… - Journal of Sensor and …, 2022 - mdpi.com
Wireless networks have continued to evolve to offer connectivity between users and smart
devices such as drones and wireless sensor nodes. In this environment, insecure public …

A survey on machine learning software-defined wireless sensor networks (ml-SDWSNS): Current status and major challenges

FF Jurado-Lasso, L Marchegiani, JF Jurado… - IEEE …, 2022 - ieeexplore.ieee.org
Wireless Sensor Network (WSN), which are enablers of the Internet of Things (IoT)
technology, are typically used en-masse in widely physically distributed applications to …

CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review

M Amin, FFM El-Sousy, GAA Aziz, K Gaber… - Ieee …, 2021 - ieeexplore.ieee.org
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities,
mitigation approaches on the power electronics and the security challenges for the smart …

Network resource management mechanisms in SDN enabled WSNs: A comprehensive review

V Tyagi, S Singh - Computer Science Review, 2023 - Elsevier
Wireless technologies usually have very limited computing, memory, and battery power that
require the optimal management of network resources to increase network performance …