Routing attacks detection in 6lowpan-based internet of things

A Alazab, A Khraisat, S Singh, S Bevinakoppa… - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …

Network attack classification in IoT using support vector machines

C Ioannou, V Vassiliou - Journal of sensor and actuator networks, 2021 - mdpi.com
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in
the network define what is expected of the network's operation. It is for this reason that ML …

Fuzzy-logic based IDS for detecting jamming attacks in wireless mesh IoT networks

M Savva, I Ioannou, V Vassiliou - 2022 20th Mediterranean …, 2022 - ieeexplore.ieee.org
The investigation in this paper targets the design and the evaluation of jamming intrusion
detection based on Fuzzy Logic in wireless mesh IoT Networks in a distributed manner. Our …

Security challenges and solutions in IoT networks for the smart cities

A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …

Network Security System in Mobile Edge Computing-to-IoMT Networks Using Distributed Approach

E Gyamfi, JA Ansere, M Kamal - Security and Risk Analysis for Intelligent …, 2023 - Springer
Abstract Internet of Things (IoT) has progressively grown in its use cases ranging from the
day-to-day lives of both individuals to industries. The growing rate on the Internet of …

System for operational technology attack detection in industrial IoT

C Charilaou, CIC Ioannou… - 2022 20th Mediterranean …, 2022 - ieeexplore.ieee.org
Industrial Control Systems (ICS) can be remotely controlled allowing easy access for better
management and increasing productivity, but with the cost of becoming susceptible to …

Decentralized Dedicated Intrusion Detection Security Agents for IoT Networks

C Ioannou, A Charalambus… - 2021 17th International …, 2021 - ieeexplore.ieee.org
Security breaches are an imminent threat in the Internet of Things (IoT) as smart diversified
devices are now interconnected to serve a specific application. General security guidelines …

Detecting multiple jammers using Fuzzy-Logic Intrusion Detection System (FLIDS)

M Savva, I Ioannou, V Vassiliou - 2024 20th International …, 2024 - ieeexplore.ieee.org
This research paper aims to evaluate the efficiency and effectiveness of FLIDS in detecting
multiple jamming attacks. The study conducted experiments by placing two jammers at …

Sinkhole detection and prediction using watermarking (SNDW)

D Ramachandran, J Venkatesh… - Journal of Intelligent …, 2023 - content.iospress.com
Since there is no central controller, preserving the security and energy efficiency of wireless
sensor networks (WSN) is challenging. They also have a flexible configuration. A network of …

Aquaculture IoT Security Landscape: A Comprehensive Analysis of Threats and Mitigation Strategies

A Bhushan, SA Fathima… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The use of Internet of Things (IoT) technologies in aquaculture has transformed the
management of aquatic resources by providing formerly unknown opportunities for …