A comprehensive survey for IoT security datasets taxonomy, classification and machine learning mechanisms

C Alex, G Creado, W Almobaideen, OA Alghanam… - Computers & …, 2023 - Elsevier
This survey paper compares existing IoT related datasets found in the literature with three
main objectives. The first one is to highlight the characteristics of these datasets such as the …

An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning

OA Alghanam, W Almobaideen, M Saadeh… - Expert Systems with …, 2023 - Elsevier
With the rapid growth of the number of connected devices that exchange personal, sensitive,
and important data through the IoT based global network, attacks that are targeting security …

[HTML][HTML] A new blockchain-based authentication framework for secure IoT networks

AK Al Hwaitat, MA Almaiah, A Ali, S Al-Otaibi… - Electronics, 2023 - mdpi.com
Most current research on decentralized IoT applications focuses on a specific vulnerability.
However, for IoT applications, only a limited number of techniques are dedicated to handling …

Fusion-based anomaly detection system using modified isolation forest for internet of things

O AbuAlghanam, H Alazzam, E Alhenawi… - Journal of Ambient …, 2023 - Springer
In recent years, advanced threat and zero day attacks are increasing significantly, but the
traditional network intrusion detection system based on feature filtering or based on a well …

A robust and efficient vector-based key management scheme for IoT networks

S Bettayeb, ML Messai, SM Hemam - Ad Hoc Networks, 2023 - Elsevier
Abstract Information and communication security is a critical concern in the rapid growth of
Internet of Things (IoT) networks that need to exchange sensitive data. Therefore, key …

[HTML][HTML] Real-time detection system for data exfiltration over DNS tunneling using machine learning

O Abualghanam, H Alazzam, B Elshqeirat… - Electronics, 2023 - mdpi.com
The domain name system (DNS) plays a vital role in network services for name resolution.
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …

A lightweight hierarchical key management approach for internet of things

Z Najafi, S Babaie - Journal of Information Security and Applications, 2023 - Elsevier
Abstract Internet of Things (IoT) as an emerging technology connects a wide range of
various elements that have a unique identifier to create an intelligent computing system …

IFKMS: inverse function-based key management scheme for IoT networks

M Nafi, ML Messai, S Bouzefrane, M Omar - Journal of information security …, 2022 - Elsevier
Due to the rapid growth of the Internet of Things (IoT), secure communication is becoming a
significant concern. Nodes that compose such a dynamic network need to exchange …

Hybrid feature selection method for intrusion detection systems based on an improved intelligent water drop algorithm

E Alhenawi, H Alazzam, R Al-Sayyed… - Cybernetics and …, 2022 - sciendo.com
A critical task and a competitive research area is to secure networks against attacks. One of
the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning …

A blockchain-enabled framework for securing connected consumer electronics against wireless attacks

A Razaque, Y Jararweh, A Alotaibi, F Amsaad… - … Modelling Practice and …, 2022 - Elsevier
The rapid development of the emerging Internet of things (IoT) regime and of smart
applications has given rise to many new wireless security vulnerabilities in consumer …