Design of intrusion detection system for internet of things based on improved BP neural network

A Yang, Y Zhuansun, C Liu, J Li, C Zhang - Ieee Access, 2019 - ieeexplore.ieee.org
With the advent of global 5G networks, the Internet of Things will no longer be limited by
network speed and traffic. With the large-scale application of the Internet of Things, people …

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

K Mabodi, M Yusefi, S Zandiyan, L Irankhah… - The journal of …, 2020 - Springer
The internet of things (IoT) is able to provide a prediction of linked, universal, and smart
nodes that have autonomous interaction when they present services. Because of wide …

Toward a full exploitation of IoT in smart cities: A review of IoT anomaly detection techniques

R Al-Amri, RK Murugesan, EM Alshari… - … Conference on Emerging …, 2022 - Springer
The world is currently progressing towards a new connectivity era where billions of sensors
are connected over a network called the Internet of Things (IoT). IoT enables a wide range of …

SoS-RPL: securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism

M Zaminkar, R Fotohi - Wireless Personal Communications, 2020 - Springer
Abstract Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A physical thing can …

Privacy and security for resource-constrained IoT devices and networks: research challenges and opportunities

S Li, H Song, M Iqbal - Sensors, 2019 - mdpi.com
With the exponential growth of the Internet of Things (IoT) and cyber-physical systems
(CPS), a wide range of IoT applications have been developed and deployed in recent years …

Secured mobile IOT ecosystem using enhanced multi-level intelligent trust scheme

R Sharma, R Arya - Computers and Electrical Engineering, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a collection of heterogeneous, interconnected mobile
ad-hoc networks (MANETs) devices. High-level security is always required to protect …

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

S Hajj, R El Sibai, J Bou Abdo… - Transactions on …, 2021 - Wiley Online Library
With the Internet's unprecedented growth and nations' reliance on computer networks, new
cyber‐attacks are created every day as means for achieving financial gain, imposing …

An adaptive deep-ensemble anomaly-based intrusion detection system for the internet of things

K Albulayhi, FT Sheldon - 2021 IEEE World AI IoT Congress …, 2021 - ieeexplore.ieee.org
Nowadays, IoT technology has become an essential part of many aspects of life and
business. Nevertheless, such widespread application has come at the cost of many security …

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

B Seyedi, R Fotohi - The Journal of Supercomputing, 2020 - Springer
Abstract Internet of Things (IoTs) is a new concept in computer science that connects the
objects with limited resources to unreliable internet through different technologies. The …

Security analysis of network anomalies mitigation schemes in IoT networks

MA Lawal, RA Shaikh, SR Hassan - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is on the rise and it is giving a new shape to several fields such
as smart cities, smart homes, smart health, etc. as it facilitates the connection of physical …