A taxonomy of machine-learning-based intrusion detection systems for the internet of things: A survey

A Jamalipour, S Murali - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology that has earned a lot of research
attention and technical revolution in recent years. Significantly, IoT connects and integrates …

A hybrid wormhole attack detection in mobile ad-hoc network (MANET)

M Tahboush, M Agoyi - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …

Centralized routing protocol for detecting wormhole attacks in wireless sensor networks

OR Ahutu, H El-Ocla - IEEE Access, 2020 - ieeexplore.ieee.org
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because
they are generally batteries powered and therefore have limited computational capability …

Intrusion detection in smart meters data using machine learning algorithms: A research report

M Ravinder, V Kulkarni - Frontiers in Energy Research, 2023 - frontiersin.org
The intrusion detection in network traffic for crucial smart metering applications based on
radio sensor networks is becoming very important in the Smart Grid area. The network's …

Attacks and countermeasures in the internet of vehicles

Y Sun, L Wu, S Wu, S Li, T Zhang, L Zhang, J Xu… - Annals of …, 2017 - Springer
As a typical application of Internet of Things (IoT) in the field of transportation, Internet of
Vehicles (IoV) aims at achieving an integrated intelligent transportation system to enhance …

Security and Privacy in the Internet of Vehicles

Y Sun, L Wu, S Wu, S Li, T Zhang… - … , and knowledge in …, 2015 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of Internet of things in the field of
transportation, which aims at achieving an integrated intelligent transportation system to …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks

R Singh, J Singh, R Singh - Mobile Information Systems, 2016 - Wiley Online Library
Wormhole attack is a challenging security threat to wireless sensor networks which results in
disrupting most of the routing protocols as this attack can be triggered in different modes. In …

CREDND: A novel secure neighbor discovery algorithm for wormhole attack

X Luo, Y Chen, M Li, Q Luo, K Xue, S Liu… - IEEE Access, 2019 - ieeexplore.ieee.org
As nodes' characteristics that they are self-governed and resource-limited, wireless sensor
networks (WSNs) face potential threats due to various attacks, among which the most …

FedACS: Federated skewness analytics in heterogeneous decentralized data environments

Z Wang, Y Zhu, D Wang, Z Han - 2021 IEEE/ACM 29th …, 2021 - ieeexplore.ieee.org
The emerging federated optimization paradigm performs data mining or artificial intelligence
techniques locally on the edge devices, enabling scientists and engineers to utilize the …