[HTML][HTML] A novel hybrid optimization enabled robust CNN algorithm for an IoT network intrusion detection approach

A Bahaa, A Sayed, L Elfangary, H Fahmy - Plos one, 2022 - journals.plos.org
Due to the huge number of connected Internet of Things (IoT) devices within a network,
denial of service and flooding attacks on networks are on the rise. IoT devices are disrupted …

IoT-AD: A Framework To Detect Anomalies Among Interconnected IoT Devices

H Zahan, MW Al Azad, I Ali… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In an Internet of Things (IoT) environment (eg, smart home), several IoT devices may be
available that are interconnected with each other. In such interconnected environments, a …

[HTML][HTML] Enhancing IoT Security through a Green and Sustainable Federated Learning Platform: Leveraging Efficient Encryption and the Quondam Signature …

T Aljrees, A Kumar, KU Singh, T Singh - Sensors, 2023 - mdpi.com
This research paper introduces a novel paradigm that synergizes innovative algorithms,
namely efficient data encryption, the Quondam Signature Algorithm (QSA), and federated …

Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications

N Fathima, R Banu, GFA Ahammed - Wireless Personal Communications, 2023 - Springer
There is a consistent rise in the usage of sensory devices while framing up the Internet-of-
Things (IoT), which generates a large portion of data and increases exponential security …

Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based On Stochastic Games and Double Deep Q-Networks

S Yu, X Wang, Y Shen, G Wu, S Yu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) has experienced rapid growth in recent years, with an
increasing number of interconnected devices, thereby expanding the attack surface …

[PDF][PDF] Optimizing QoS and security in agriculture IoT deployments: A bioinspired Q-learning model with customized shards

SM Sonavane, GR Prashantha, PD Nikam, AVR Mayuri… - Heliyon, 2024 - cell.com
Abstract Agriculture Internet of Things (AIoTs) deployments require design of high-efficiency
Quality of Service (QoS) & security models that can provide stable network performance …

[HTML][HTML] An automated system of intrusion detection by IoT-aided MQTT using improved heuristic-aided autoencoder and LSTM-based Deep Belief Network

PM Vijayan, S Sundar - Plos one, 2023 - journals.plos.org
The IoT offered an enormous number of services with the help of multiple applications so it
faces various security-related problems and also heavy malicious attacks. Initially, the IoT …

Semi-supervised Transformer Network for Anomaly Detection in Cellular Internet of Things

W Abd Elkhalik, I Elhenawy - … Journal of Wireless and Ad Hoc …, 2023 - americaspg.com
Because of the lightning-fast expansion of the Internet of Things (IoT) technologies, an
enormous amount of data has been produced. This traffic can be mined for information that …

idam: A distributed mud framework for mitigation of volumetric attacks in iot networks

S Datta, A Bhattacharya, R Rana… - … , Networks and Digital …, 2022 - ieeexplore.ieee.org
The rapid popularity of IoT devices has led to an escalating number of sophisticated
cybersecurity attacks. Prior security mechanisms are inaccurate and incur high …

Review of Security Threats and Attacks on IoT-based New Age Ecosystems

A Bhardwaj, S Rahman - 2024 7th International Conference on …, 2024 - ieeexplore.ieee.org
Devices connected to the Internet of Things (IoT) are pervasive in our daily lives, with uses
ranging from consumer systems to business and industrial ones. The rapid expansion and …