A time-efficient approach toward DDoS attack detection in IoT network using SDN

J Bhayo, R Jafaq, A Ahmed, S Hameed… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
As the usability of Internet of Things (IoT) devices increases, the security threats and
vulnerabilities associated with these resource-constrained IoT devices also rise. One of the …

A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

A comprehensive survey of anomaly detection in banking, wireless sensor networks, social networks, and healthcare

M Zamini, SMH Hasheminejad - Intelligent Decision …, 2019 - content.iospress.com
Anomaly detection is an important issue, which has been investigated in various research
fields and application domains. Many anomaly detection techniques have been developed …

Centralized routing protocol for detecting wormhole attacks in wireless sensor networks

OR Ahutu, H El-Ocla - IEEE Access, 2020 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because
they are generally batteries powered and therefore have limited computational capability …

RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks

K Haseeb, IU Din, A Almogren, N Islam… - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless mesh networks consist of various mesh clients that are organized in an unfixed
infrastructure and packets are forwarded using a multi-hop model. Routing protocols have a …

CREDND: A novel secure neighbor discovery algorithm for wormhole attack

X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …

An enhanced detection system against routing attacks in mobile ad-hoc network

M Prasad, S Tripathi, K Dahal - Wireless Networks, 2022 - Springer
Mobile ad-hoc network is a dynamic wireless network that transfers information through
neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to …

An Effective Intrusion Detection in Mobile Ad-hoc Network Using Deep Belief Networks and Long Short-Term Memory.

AS Hanafi, YK Saheed… - International Journal of …, 2023 - search.ebscohost.com
Abstract A Mobile Ad-hoc Network (MANET) is a self-organizing collection of mobile devices
communicating in a distributed fashion across numerous hops. MANETs are an appealing …

A game theory based secure model against black hole attacks in opportunistic networks

A Chhabra, V Vashishth… - 2017 51st Annual …, 2017 - ieeexplore.ieee.org
Opportunistic Networks, a subset of Delay Tolerant Networks (DTNs), do not have a
predefined source to destination end-to-end path and hence, offer a multitude of challenges …

Anomaly detection for controller area networks using long short-term memory

V Tanksale - IEEE Open Journal of Intelligent Transportation …, 2020 - ieeexplore.ieee.org
The rapid expansion of intra-vehicle networks has increased the number of threats to such
networks. Most modern vehicles implement various physical and data-link layer …