2022
DOI: 10.32604/cmc.2022.023399
|View full text |Cite
|
Sign up to set email alerts
|

An IoT-Based Intrusion Detection System Approach for TCP SYN Attacks

Abstract: The success of Internet of Things (IoT) deployment has emerged important smart applications. These applications are running independently on different platforms, almost everywhere in the world. Internet of Medical Things (IoMT), also referred as the healthcare Internet of Things, is the most widely deployed application against COVID-19 and offering extensive healthcare services that are connected to the healthcare information technologies systems. Indeed, with the impact of the COVID-19 pandemic, a large numbe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Such terminals are privileged users. Since wireless terminals are bound to user identities, privileged users will authorize signatures to other terminals in order to complete the signatures together more efficiently [6]. How to protect the privacy of the wireless terminal's identity while completing the data transmission between the wireless terminal and the MEC, which has essential research significance [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…Such terminals are privileged users. Since wireless terminals are bound to user identities, privileged users will authorize signatures to other terminals in order to complete the signatures together more efficiently [6]. How to protect the privacy of the wireless terminal's identity while completing the data transmission between the wireless terminal and the MEC, which has essential research significance [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…In [16], Yang et al presented a survey on smart farming and discussed the security challenges. They considered the following security and privacy solutions: privacy preserving [15], authentication, access control, data integrity (using blockchain [16]), cryptography (as example elliptic curve cryptography in [17]), key management, intrusion detection system [18], etc. Additionally, other supplementary experiments based on solar insecticidal lamps IoT were done.…”
Section: Addressing Security Issues In Iot Systemsmentioning
confidence: 99%
“…Therefore, protecting the IoT systems from cyber-attacks is a very important issue that was widely considered by researchers in many existing works (see for example [12,15,16] and references therein). In these studies, many security and privacy solutions were proposed, such as privacy preserving [15], authentication, access control, data integrity (using blockchain [16]), cryptography (as example elliptic curve cryptography in [17]), key management, intrusion detection system (IDS) [18], etc. Nevertheless, these proposed security schemes require high computational complexity, while dealing with limited resources devices (in terms of energy, memory, storage, and computing capability).…”
Section: Introductionmentioning
confidence: 99%
“…Number of companies and developers turning to cloud service has been growing rapidly in recent years [1,2]. Other than individual users, these enterprise and corporate customers usually work in groups, sharing data with each other.…”
Section: Introductionmentioning
confidence: 99%