A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey
A Jamalipour, S Murali - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that has earned a lot of research
attention and technical revolution in recent years. Significantly, IoT connects and integrates …
attention and technical revolution in recent years. Significantly, IoT connects and integrates …
A hybrid wormhole attack detection in mobile ad-hoc network (MANET)
M Tahboush, M Agoyi - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …
Centralized routing protocol for detecting wormhole attacks in wireless sensor networks
OR Ahutu, H El-Ocla - IEEE Access, 2020 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because
they are generally batteries powered and therefore have limited computational capability …
they are generally batteries powered and therefore have limited computational capability …
Intrusion detection in smart meters data using machine learning algorithms: A research report
M Ravinder, V Kulkarni - Frontiers in Energy Research, 2023 - frontiersin.org
The intrusion detection in network traffic for crucial smart metering applications based on
radio sensor networks is becoming very important in the Smart Grid area. The network's …
radio sensor networks is becoming very important in the Smart Grid area. The network's …
Attacks and countermeasures in the internet of vehicles
Y Sun, L Wu, S Wu, S Li, T Zhang, L Zhang, J Xu… - Annals of …, 2017 - Springer
As a typical application of Internet of Things (IoT) in the field of transportation, Internet of
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …
Security and Privacy in the Internet of Vehicles
Y Sun, L Wu, S Wu, S Li, T Zhang… - … , and knowledge in …, 2015 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of Internet of things in the field of
transportation, which aims at achieving an integrated intelligent transportation system to …
transportation, which aims at achieving an integrated intelligent transportation system to …
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …
communicate without pre-existing infrastructure. Owning to utilization of open medium …
WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …
disrupting most of the routing protocols as this attack can be triggered in different modes. In …
CREDND: A novel secure neighbor discovery algorithm for wormhole attack
X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …
networks (WSNs) face potential threats due to various attacks, among which the most …
FedACS: Federated skewness analytics in heterogeneous decentralized data environments
The emerging federated optimization paradigm performs data mining or artificial intelligence
techniques locally on the edge devices, enabling scientists and engineers to utilize the …
techniques locally on the edge devices, enabling scientists and engineers to utilize the …