2020
DOI: 10.3390/s20020461
|View full text |Cite
|
Sign up to set email alerts
|

A Machine Learning Based Intrusion Detection System for Mobile Internet of Things

Abstract: Intrusion detection systems plays a pivotal role in detecting malicious activities that denigrate the performance of the network. Mobile adhoc networks (MANETs) and wireless sensor networks (WSNs) are a form of wireless network that can transfer data without any need of infrastructure for their operation. A more novel paradigm of networking, namely Internet of Things (IoT) has emerged recently which can be considered as a superset to the afore mentioned paradigms. Their distributed nature and the limited resou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(45 citation statements)
references
References 28 publications
0
37
0
Order By: Relevance
“…This method can be defined using Eqn. ((2), where the dependency between the dependent variable Y and independent variable X is shown 39 . In the proposed model, the linear regression method is developed without regulation.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This method can be defined using Eqn. ((2), where the dependency between the dependent variable Y and independent variable X is shown 39 . In the proposed model, the linear regression method is developed without regulation.…”
Section: Methodsmentioning
confidence: 99%
“…((2), where the dependency between the dependent variable Y and independent variable X is shown. 39 In the proposed model, the linear regression method is developed without regulation. Linear regression supervised machine learning has been used previously in energy modeling investigations such as power (1) systems reliability analysis, 40 battery energy storage systems, 41 and solar photovoltaic predictions.…”
Section: Stochastic Gradient Descent (Sgd) Machinelearning Approachmentioning
confidence: 99%
“…Amar et al [12] proposed a cross-layer-based IDS with two layers of detection aiming at the limited resources and distributed characteristics of the IoT. It uses a heuristic approach in which the IDS composes of two stages.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed Denial of Service attacks are one of the most important security threats nowadays. In a DDoS attack, a large volume of traffic is sent through the network, exhausting the network resources, as well as the overall bandwidth and individual node resources [ 15 ]. Consequently, the victim is forced to slow down, crash or shut down due to multiple connection requests during a period of time [ 16 ].…”
Section: Theoretical Backgroundmentioning
confidence: 99%