2023
DOI: 10.1016/j.iot.2023.100684
|View full text |Cite
|
Sign up to set email alerts
|

An extended evaluation on machine learning techniques for Denial-of-Service detection in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0
5

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 25 publications
0
5
0
5
Order By: Relevance
“…Datasets should be expanded to include these types of attacks to better train ML algorithms [98]; -Benchmarking and Comparative Studies: A comprehensive evaluation and comparison of ML algorithms for IoT security, possibly facilitated by a unified benchmarking framework, could offer valuable insights into the strengths and weaknesses of different approaches [113,100,102]; -Lightweight Security Algorithms: As IoT devices are often constrained in terms of computational power and memory, there is a pressing need for security algorithms that are both effective and lightweight. Traditional security algorithms are generally not well-suited for these devices due to their high computational and memory demands [99,4].…”
Section: Research Opportunitiesmentioning
confidence: 99%
“…Datasets should be expanded to include these types of attacks to better train ML algorithms [98]; -Benchmarking and Comparative Studies: A comprehensive evaluation and comparison of ML algorithms for IoT security, possibly facilitated by a unified benchmarking framework, could offer valuable insights into the strengths and weaknesses of different approaches [113,100,102]; -Lightweight Security Algorithms: As IoT devices are often constrained in terms of computational power and memory, there is a pressing need for security algorithms that are both effective and lightweight. Traditional security algorithms are generally not well-suited for these devices due to their high computational and memory demands [99,4].…”
Section: Research Opportunitiesmentioning
confidence: 99%
“…O ataque Grayhole consiste em uma categoria específica de ataques, sendo classificado como um tipo de ataque DoS [Quincozes et al 2023]. No Grayhole, o invasor obtém controle sobre um ou mais dispositivos na rede e, em seguida, descarta seletivamente os pacotes que trafegam por eles, em vez de encaminhá-los adequadamente.…”
Section: Ataque Grayholeunclassified
“…Dessa forma, o nó publicador atacante descarta deliberadamente uma parte dos pacotes de dados, sem enviá-los aos dispositivos assinantes. Como resultado, os dispositivos que assinaram o publicador não receberão todos os pacotes esperados [Quincozes et al 2023]. Outra possibilidade consiste no comprometimento de um nó assinante, o impedindo de processar todas as mensagens recebidas.…”
Section: Ataque Grayholeunclassified
See 1 more Smart Citation
“…. The assessment of Denial-of-Service identification in WSNs that are using machine learning strategies is explained in Ref 164…”
mentioning
confidence: 99%