A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions

J Asharf, N Moustafa, H Khurshid, E Debie, W Haider… - Electronics, 2020 - mdpi.com
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …

Intrusion detection in 802.11 networks: Empirical evaluation of threats and a public dataset

C Kolias, G Kambourakis, A Stavrou… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Wi-Fi has become the de facto wireless technology for achieving short-to medium-range
device connectivity. While early attempts to secure this technology have been proved …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd

M Vanhoef, E Ronen - 2020 IEEE Symposium on Security and …, 2020 - ieeexplore.ieee.org
The WPA3 certification aims to secure home networks, while EAP-pwd is used by certain
enterprise Wi-Fi networks to authenticate users. Both use the Dragonfly handshake to …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

S Shamshirband, A Patel, NB Anuar, MLM Kiah… - … Applications of Artificial …, 2014 - Elsevier
Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to
detect such malicious behavior using traditional intrusion detection systems in Wireless …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

[HTML][HTML] Intrusion detection based on machine learning in the internet of things, attacks and counter measures

E Rehman, M Haseeb-ud-Din, AJ Malik… - The Journal of …, 2022 - Springer
Globally, data security and privacy over the Internet of Things (IoT) are necessary due to its
emergence in daily life. As the IoT will soon invade each part of our lives, attention to IoT …

Touch well before use: Intuitive and secure authentication for iot devices

X Li, F Yan, F Zuo, Q Zeng, L Luo - The 25th annual international …, 2019 - dl.acm.org
Internet of Things (IoT) are densely deployed in smart environments, such as homes,
factories and laboratories, where many people have physical access to IoT devices. How to …

Wireless anomaly detection based on IEEE 802.11 behavior analysis

H Alipour, YB Al-Nashif, P Satam… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Wireless communication networks are pervading every aspect of our lives due to their fast,
easy, and inexpensive deployment. They are becoming ubiquitous and have been widely …