A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

Intrusion detection systems in the Internet of things: A comprehensive investigation

S Hajiheidari, K Wakil, M Badri, NJ Navimipour - Computer Networks, 2019 - Elsevier
Recently, a new dimension of intelligent objects has been provided by reducing the power
consumption of electrical appliances. Daily physical objects have been upgraded by …

[HTML][HTML] IoT intrusion detection taxonomy, reference architecture, and analyses

K Albulayhi, AA Smadi, FT Sheldon, RK Abercrombie - Sensors, 2021 - mdpi.com
This paper surveys the deep learning (DL) approaches for intrusion-detection systems
(IDSs) in Internet of Things (IoT) and the associated datasets toward identifying gaps …

[HTML][HTML] A survey of outlier detection techniques in IoT: Review and classification

MA Samara, I Bennis, A Abouaissa… - Journal of Sensor and …, 2022 - mdpi.com
The Internet of Things (IoT) is a fact today where a high number of nodes are used for
various applications. From small home networks to large-scale networks, the aim is the …

Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering

L Lyu, J Jin, S Rajasegarar, X He… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Anomaly detection is important for time-critical Internet of Things (IoT) applications, such as
healthcare and emergency management. The recent introduction of Fog computing …

A hybrid approach to clustering in big data

D Kumar, JC Bezdek, M Palaniswami… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Clustering of big data has received much attention recently. In this paper, we present a new
clusiVAT algorithm and compare it with four other popular data clustering algorithms. Three …

Internet of things: an overview

F Khodadadi, AV Dastjerdi, R Buyya - Internet of things, 2016 - Elsevier
As technology proceeds and the number of smart devices continues to grow substantially,
the need for ubiquitous context-aware platforms that support an interconnected …

Real-time urban microclimate analysis using internet of things

P Rathore, AS Rao, S Rajasegarar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
Real-time environment monitoring and analysis is an important research area of Internet of
Things (IoT). Understanding the behavior of the complex ecosystem requires analysis of …

Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept

H Bostani, M Sheikhan - Pattern Recognition, 2017 - Elsevier
Optimum-path forest (OPF) is a graph-based machine learning method that can overcome
some limitations of the traditional machine learning algorithms that have been used in …

A novel insider attack and machine learning based detection for the internet of things

M Chowdhury, B Ray, S Chowdhury… - ACM Transactions on …, 2021 - dl.acm.org
Due to the widespread functional benefits, such as supporting internet connectivity, having
high visibility and enabling easy connectivity between sensors, the Internet of Things (IoT) …