Challenges, threats, security issues and new trends of underwater wireless sensor networks

G Yang, L Dai, Z Wei - Sensors, 2018 - mdpi.com
With the advances in technology, there has been an increasing interest from researchers
and industrial institutions in the use of underwater wireless sensor networks (UWSNs) …

Analysis of security attacks and taxonomy in underwater wireless sensor networks

I Ahmad, T Rahman, A Zeb, I Khan… - Wireless …, 2021 - Wiley Online Library
Underwater Wireless Sensor Networks (UWSN) have gained more attention from
researchers in recent years due to their advancement in marine monitoring, deployment of …

Anomaly-based intrusion detection system for IoT application

M Bhavsar, K Roy, J Kelly, O Olusola - Discover Internet of things, 2023 - Springer
Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it
has a wide application, such as in transportation, military, healthcare, agriculture, and many …

[HTML][HTML] A methodology for security classification applied to smart grid infrastructures

M Shrestha, C Johansen, J Noll, D Roverso - International Journal of …, 2020 - Elsevier
The electricity grid is an important critical infrastructure that is undergoing major changes,
due to the Internet of Things (IoT) and renewable energy, heading towards the smart grid …

Network attack classification in IoT using support vector machines

C Ioannou, V Vassiliou - Journal of sensor and actuator networks, 2021 - mdpi.com
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in
the network define what is expected of the network's operation. It is for this reason that ML …

Classifying security attacks in IoT networks using supervised learning

C Ioannou, V Vassiliou - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
Machine learning models have long be proposed to detect the presence of unauthorized
activity within computer networks. They are used as anomaly detection techniques to detect …

A systematic review of routing attacks detection in wireless sensor networks

Z Alansari, NB Anuar, A Kamsin, MR Belgaum - PeerJ Computer Science, 2022 - peerj.com
Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes
distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many …

An intrusion detection system for constrained WSN and IoT nodes based on binary logistic regression

C Ioannou, V Vassiliou - Proceedings of the 21st ACM International …, 2018 - dl.acm.org
In this paper we evaluate the feasibility of running a lightweight Intrusion Detection System
within a constrained sensor or IoT node. We propose mIDS, which monitors and detects …

An intrusion detection system for wireless sensor networks

C Ioannou, V Vassiliou… - 2017 24th International …, 2017 - ieeexplore.ieee.org
Attacks in Wireless Sensor Networks (WSNs) aim in limiting or even eliminating the ability of
the network to perform its expected function. WSNs are networks with limited resources and …

Sensor-cloud architecture: A taxonomy of security issues in cloud-assisted sensor networks

R Alturki, HJ Alyamani, MA Ikram, MA Rahman… - IEEE …, 2021 - ieeexplore.ieee.org
The orchestration of cloud computing with wireless sensor network (WSN), termed as sensor-
cloud, has recently gained remarkable attention from both academia and industry. It …