Routing attacks detection in 6lowpan-based internet of things
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities
for applications in various domains. However, the IoT also poses security challenges due to …
for applications in various domains. However, the IoT also poses security challenges due to …
Network attack classification in IoT using support vector machines
C Ioannou, V Vassiliou - Journal of sensor and actuator networks, 2021 - mdpi.com
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in
the network define what is expected of the network's operation. It is for this reason that ML …
the network define what is expected of the network's operation. It is for this reason that ML …
Fuzzy-logic based IDS for detecting jamming attacks in wireless mesh IoT networks
The investigation in this paper targets the design and the evaluation of jamming intrusion
detection based on Fuzzy Logic in wireless mesh IoT Networks in a distributed manner. Our …
detection based on Fuzzy Logic in wireless mesh IoT Networks in a distributed manner. Our …
Security challenges and solutions in IoT networks for the smart cities
A Procopiou, TM Chen - Internet of Things, 2022 - taylorfrancis.com
It is estimated that by 2030, more than 60% of the population is going to live in cities.
Overpopulation in urban cities causes numerous problems including environmental …
Overpopulation in urban cities causes numerous problems including environmental …
Network Security System in Mobile Edge Computing-to-IoMT Networks Using Distributed Approach
Abstract Internet of Things (IoT) has progressively grown in its use cases ranging from the
day-to-day lives of both individuals to industries. The growing rate on the Internet of …
day-to-day lives of both individuals to industries. The growing rate on the Internet of …
System for operational technology attack detection in industrial IoT
C Charilaou, CIC Ioannou… - 2022 20th Mediterranean …, 2022 - ieeexplore.ieee.org
Industrial Control Systems (ICS) can be remotely controlled allowing easy access for better
management and increasing productivity, but with the cost of becoming susceptible to …
management and increasing productivity, but with the cost of becoming susceptible to …
Decentralized Dedicated Intrusion Detection Security Agents for IoT Networks
C Ioannou, A Charalambus… - 2021 17th International …, 2021 - ieeexplore.ieee.org
Security breaches are an imminent threat in the Internet of Things (IoT) as smart diversified
devices are now interconnected to serve a specific application. General security guidelines …
devices are now interconnected to serve a specific application. General security guidelines …
Detecting multiple jammers using Fuzzy-Logic Intrusion Detection System (FLIDS)
This research paper aims to evaluate the efficiency and effectiveness of FLIDS in detecting
multiple jamming attacks. The study conducted experiments by placing two jammers at …
multiple jamming attacks. The study conducted experiments by placing two jammers at …
Sinkhole detection and prediction using watermarking (SNDW)
D Ramachandran, J Venkatesh… - Journal of Intelligent …, 2023 - content.iospress.com
Since there is no central controller, preserving the security and energy efficiency of wireless
sensor networks (WSN) is challenging. They also have a flexible configuration. A network of …
sensor networks (WSN) is challenging. They also have a flexible configuration. A network of …
Aquaculture IoT Security Landscape: A Comprehensive Analysis of Threats and Mitigation Strategies
A Bhushan, SA Fathima… - 2024 5th International …, 2024 - ieeexplore.ieee.org
The use of Internet of Things (IoT) technologies in aquaculture has transformed the
management of aquatic resources by providing formerly unknown opportunities for …
management of aquatic resources by providing formerly unknown opportunities for …