Security and Privacy Enhancing in Blockchain-based IoT Environments via Anonym Auditing

P Khordadpour, S Ahmadi - arXiv preprint arXiv:2403.01356, 2024 - arxiv.org
The integration of blockchain technology in Internet of Things (IoT) environments is a
revolutionary step towards ensuring robust security and enhanced privacy. This paper …

An IoT-based low-cost architecture for smart libraries using SDN

H Xu, W Liu, L Li, Q Zhou - Scientific Reports, 2024 - nature.com
In the evolving landscape of smart libraries, this research pioneers an IoT-based low-cost
architecture utilizing Software-Defined Networking (SDN). The increasing demand for more …

Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network

B Swathi, SS Kolisetty, GV Sivanarayana, SR Battula - Cluster Computing, 2024 - Springer
Traditional network administration required manual programming of routing policies and
related parameters on specific routers and switches, which was expensive. Therefore …

An adaptive multistage intrusion detection and prevention system in software defined networking environment

N Maheswaran, S Bose, B Natarajan - Automatika, 2024 - Taylor & Francis
The advancements made in Software-Defined Networking (SDN) technology seem quite
promising, with potential wide application in managing and controlling the latest network …

Modeling of Intrusion Detection System Using Double Adaptive Weighting Arithmetic Optimization Algorithm with Deep Learning on Internet of Things Environment

VK Kalimuthu, R Velumani - Brazilian Archives of Biology and …, 2024 - SciELO Brasil
Abstract The Internet of Things (IoT) has experienced rapid development in area-specific
applications, including smart transportation systems, healthcare, industries, and smart …

Black Hole Attack Detection in Adhoc Networks Using KNN Algorithm with Reputation Calculation

RB Ramesh, SJJ Thangaraj - 2023 4th International …, 2023 - ieeexplore.ieee.org
The “black hole” attack is one of many security issues that can affect ad hoc networks. A
black hole attack occurs when a hostile node drops incoming packets on purpose, causing a …

Optimizing Intrusion Detection Mechanisms for IoT Network Security.

A Aziz, S Mirzaliev - Journal of Cybersecurity & Information …, 2024 - search.ebscohost.com
The ubiquity of interconnected devices within the Internet of Things (IoT) paradigm has
revolutionized modern connectivity, simultaneously amplifying the susceptibility of networks …

A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks

M Ramaiah, A Padma, R Vishnukumar… - … For Internet of …, 2024 - ieeexplore.ieee.org
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices
increases, the amount of data they generate also increases, which in turn leads to security …

[PDF][PDF] A Direct Collaborative Network Intrusion Detection System for IoT Networks Integration

C Pedroso, A Batista, S Brisio, R SR, A Santos - researchgate.net
Integrating thousands of smart devices over the various IoT domains will require the devices
to deliver services free of threats. Although intrusion detection systems (IDS) offer a multi …