A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation

BA Tama, S Lim - Computer Science Review, 2021 - Elsevier
Intrusion detection systems (IDSs) are intrinsically linked to a comprehensive solution of
cyberattacks prevention instruments. To achieve a higher detection rate, the ability to design …

Machine learning based intrusion detection systems for IoT applications

A Verma, V Ranga - Wireless Personal Communications, 2020 - Springer
Abstract Internet of Things (IoT) and its applications are the most popular research areas at
present. The characteristics of IoT on one side make it easily applicable to real-life …

[PDF][PDF] Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection.

DS Khafaga, FK Karim, AA Abdelhamid… - … , Materials & Continua, 2023 - academia.edu
Managing physical objects in the network's periphery is made possible by the Internet of
Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible …

[PDF][PDF] Hybrid Grey Wolf and Dipper Throated Optimization inNetwork Intrusion Detection Systems

R Alkanhel, DS Khafaga, ESM El-kenawy… - CMC-COMPUTERS …, 2023 - researchgate.net
The Internet of Things (IoT) is a modern approach that enables connection with a wide
variety of devices remotely. Due to the resource constraints and open nature of IoT nodes …

Security threats and artificial intelligence based countermeasures for internet of things networks: a comprehensive survey

S Zaman, K Alhazmi, MA Aseeri, MR Ahmed… - Ieee …, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) has emerged as a technology capable of connecting
heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily …

Machine and deep learning solutions for intrusion detection and prevention in IoTs: A survey

PLS Jayalaxmi, R Saha, G Kumar, M Conti… - IEEE Access, 2022 - ieeexplore.ieee.org
The increasing number of connected devices in the era of Internet of Thing (IoT) has also
increased the number intrusions. Intrusion Detection System (IDS) is a secondary intelligent …

A systematic literature review on machine and deep learning approaches for detecting attacks in RPL-based 6LoWPAN of internet of things

TA Al-Amiedy, M Anbar, B Belaton, AHH Kabla… - Sensors, 2022 - mdpi.com
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6
Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in …

Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review

A Verma, V Ranga - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is one of the fastest emerging networking paradigms enabling a large
number of applications for the benefit of mankind. Advancements in embedded system …

An SDN perspective IoT-Fog security: A survey

S Javanmardi, M Shojafar, R Mohammadi, M Alazab… - Computer Networks, 2023 - Elsevier
The utilization of the Internet of Things (IoT) has burst in recent years. Fog computing is a
notion that solves cloud computing's limitations by offering low latency to IoT network user …