Towards a secure and sustainable internet of medical things (iomt): Requirements, design challenges, security techniques, and future trends

B Bhushan, A Kumar, AK Agarwal, A Kumar… - Sustainability, 2023 - mdpi.com
Recent advances in machine-to-machine (M2M) communications, mini-hardware
manufacturing, and micro computing have led to the development of the Internet of Things …

Building a intrusion detection system for IoT environment using machine learning techniques

KS Kiran, RNK Devisetty, NP Kalyan… - Procedia Computer …, 2020 - Elsevier
The most basic feature of every smart device or endpoint device in IoT is to collect the large
amount of data that is being generated and direct it to a destination server via the Internet …

A lightweight energy consumption ensemble-based botnet detection model for IoT/6G networks

J Zhou, T Hai, DNA Jawawi, D Wang… - Sustainable Energy …, 2023 - Elsevier
The potential for significant damage to an enterprise network by an intruder or cybercriminal
wielding a botnet is substantial. Such malicious actors actively scan vulnerable connected …

Information Security threats and attacks with conceivable counteraction

P Sinha, A kumar Rai, B Bhushan - 2019 2nd International …, 2019 - ieeexplore.ieee.org
In the world of Information security, a target system is attacked by the attacker considering
three important paradigms behind it. First one is “Motive or Objective” which defines …

P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

P Zhao, H Huang, X Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mobile-edge computing (MEC) has emerged to enable users to offload their location data
into the MEC server, and at the same time, the MEC server executes the location-aware data …

GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks

F Mvah, V Kengne Tchendji, C Tayou Djamegni… - International Journal of …, 2024 - Springer
Nowadays, the growth of internet users has led to a significant increase in identity fraud
security risks. One of the common forms of identity fraud is the Address Resolution Protocol …

A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment

J Kabdjou, EF Tagne, DB Rawat, J Acosta, C Kamhoua - Ad Hoc Networks, 2024 - Elsevier
Abstract Mobile Edge Computing (MEC) has become increasingly popular due to its ability
to provide real-time data processing and improved user experience. However, it also …

Protection schemes for DDoS, ARP spoofing, and IP fragmentation attacks in smart factory

TU Chai, HG Goh, SY Liew, V Ponnusamy - Systems, 2023 - mdpi.com
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to
Smart Factory solutions and delivers insights. As a result, a complex and dynamic network …

Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach

F Mvah, VK Tchendji, CT Djamegni, AH Anwar… - Computers & …, 2024 - Elsevier
Abstract The Address Resolution Protocol (ARP) spoofing is a form of attack typically used
by attackers to cause a denial of service or man-in-the-middle attacks. This attack comes …

Least Square Support Vector Machine based Intrusion Detection System in IoT

P Akhther, A Maryposonia… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The IoT (Internet of Things) is an ever-expanding system of interconnected computing
devices. It'sa term for when real-world items can communicate with one another via data …