[HTML][HTML] Incremental hybrid intrusion detection for 6LoWPAN

AM Pasikhan, JA Clark, P Gope - Computers & Security, 2023 - Elsevier
Abstract IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) has grown
in importance in recent years, with the Routing Protocol for Low Power and Lossy Networks …

OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things

TA Al-Amiedy, M Anbar, B Belaton - Cluster Computing, 2024 - Springer
Abstract The Internet of Things represents a rapidly evolving networking paradigm that
brings numerous benefits through its diverse applications. Advances in embedded system …

GD3N: Adaptive Clustering-Based Detection of Selective Forwarding Attacks in WSNs under Variable Harsh Environments

H Wang, X Huang, Y Wu - Information Sciences, 2024 - Elsevier
Wireless sensor networks (WSNs) are susceptible to numerous security threats due to their
reliance on open environments and broadcast communication methods. Among these, the …

Securing smart home against sinkhole attack using weight‐based IDS placement strategy

MS Islam, M Tasnim, U Kabir… - IET Wireless Sensor …, 2023 - Wiley Online Library
Extensive use of the Internet of Things (IoT) in smart homes makes users' lives easy and
comfortable. Yet, these resource‐constrained devices are prone to manifold security attacks …

Intelligent fuzzy logic based intrusion detection system for effective detection of black hole attack in WSN

S Ravindran - Peer-to-Peer Networking and Applications, 2024 - Springer
A wireless sensor network (WSN) is a distributed collection of tiny, low-power, wireless
devices which are deployed in a physical environment to monitor the various environmental …

[PDF][PDF] Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model

R Udayakumar, M Anuradha, YM Gajmal… - J Internet Services Inform …, 2023 - jisis.org
Abstract The mushrooming of IoTs (Internet of Things) and decentralised paradigm in cyber
security have attracted a lot of interest from the government, academic, and business sectors …

An intrusion detection system for securing iot based sensor networks from routing attacks

S Subramani, M Selvi, SVNS Kumar… - … , and Signal Processing, 2023 - Springer
Internet of Things is made up of sensor nodes that can sense the given environment, gather
the data from environment and then communicates the data to the sink node and the internet …

Machine Learning Based Intelligent RPL Attack Detection System for IoT Networks

A Kannan, M Selvi, SVN Santhosh Kumar… - … Machine Learning with …, 2024 - Springer
Abstract Routing Protocol for Low-Power and Lossy Networks (RPL) has been used in the
Internet of Things (IoT) with Wireless Sensor Networks (WSNs), but it is does not give much …

Surveying Strategies: Detecting Sinkhole Attacks in IoT Networks

SH Shanthini, C Sheeba Joice - International Conference on …, 2023 - Springer
In the IoT sphere, sinkhole attacks pose serious threats to the network layer, risking both its
integrity and security. These attacks reroute network traffic to an unauthorized node …

[PDF][PDF] IoBTSec-RPL: A Novel RPL Attack Detecting Mechanism Using Hybrid Deep Learning Over Battlefield IoT Environment

K Kowsalyadevi, NV Balaji - International Journal of Computer Networks …, 2023 - ijcna.org
The emerging digital world has recently utilized the massive power of the emerging Internet
of Things (IoT) technology that fuels the growth of many intelligent applications. The Internet …