Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends
Recent advances in machine-to-machine (M2M) communications, mini-hardware
manufacturing, and micro computing have led to the development of the Internet of Things …
manufacturing, and micro computing have led to the development of the Internet of Things …
Building a intrusion detection system for IoT environment using machine learning techniques
KS Kiran, RNK Devisetty, NP Kalyan… - Procedia Computer …, 2020 - Elsevier
The most basic feature of every smart device or endpoint device in IoT is to collect the large
amount of data that is being generated and direct it to a destination server via the Internet …
amount of data that is being generated and direct it to a destination server via the Internet …
A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networks
J Zhou, T Hai, DNA Jawawi, D Wang… - Sustainable Energy …, 2023 - Elsevier
The potential for significant damage to an enterprise network by an intruder or cybercriminal
wielding a botnet is substantial. Such malicious actors actively scan vulnerable connected …
wielding a botnet is substantial. Such malicious actors actively scan vulnerable connected …
Information Security threats and attacks with conceivable counteraction
P Sinha, A kumar Rai, B Bhushan - 2019 2nd International …, 2019 - ieeexplore.ieee.org
In the world of Information security, a target system is attacked by the attacker considering
three important paradigms behind it. First one is “Motive or Objective” which defines …
three important paradigms behind it. First one is “Motive or Objective” which defines …
P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing
P Zhao, H Huang, X Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mobile-edge computing (MEC) has emerged to enable users to offload their location data
into the MEC server, and at the same time, the MEC server executes the location-aware data …
into the MEC server, and at the same time, the MEC server executes the location-aware data …
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks
Nowadays, the growth of internet users has led to a significant increase in identity fraud
security risks. One of the common forms of identity fraud is the Address Resolution Protocol …
security risks. One of the common forms of identity fraud is the Address Resolution Protocol …
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment
Abstract Mobile Edge Computing (MEC) has become increasingly popular due to its ability
to provide real-time data processing and improved user experience. However, it also …
to provide real-time data processing and improved user experience. However, it also …
Protection schemes for DDoS, ARP spoofing, and IP fragmentation attacks in smart factory
TU Chai, HG Goh, SY Liew, V Ponnusamy - Systems, 2023 - mdpi.com
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach
Abstract The Address Resolution Protocol (ARP) spoofing is a form of attack typically used
by attackers to cause a denial of service or man-in-the-middle attacks. This attack comes …
by attackers to cause a denial of service or man-in-the-middle attacks. This attack comes …
Least Square Support Vector Machine based Intrusion Detection System in IoT
P Akhther, A Maryposonia… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The IoT (Internet of Things) is an ever-expanding system of interconnected computing
devices. It'sa term for when real-world items can communicate with one another via data …
devices. It'sa term for when real-world items can communicate with one another via data …