2021
DOI: 10.11591/ijece.v11i4.pp3255-3266
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative intrusion detection networks with multi-hop clustering for internet of things

Abstract: <p>Internet of things (IoT) is an emerging topic in so many aspects nowadays. The integration between devices and human itself is currently in large scale development. With the continuous applications of the IoT, the hidden problems such as security threats become one of the key considerations. Furthermore, limited power and computational capability of the devices in the system make it more challenging.Therefore, the needs of reliable and effective security system throughout the networks are highly neede… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…By understanding the evolving strategies of cyber threats and developing advanced detection mechanisms, it can safeguard critical information and infrastructure. This research will empower organizations to proactively counter cyberattacks, ensuring data confidentiality, integrity, and availability, in an interconnected digital world [19], [20]. The objectives of this study are to explore the limitations of existing techniques in detecting attacks in network systems, specifically those reliant on periodic models and extensive training data by using classification methods.…”
Section: Introductionmentioning
confidence: 99%
“…By understanding the evolving strategies of cyber threats and developing advanced detection mechanisms, it can safeguard critical information and infrastructure. This research will empower organizations to proactively counter cyberattacks, ensuring data confidentiality, integrity, and availability, in an interconnected digital world [19], [20]. The objectives of this study are to explore the limitations of existing techniques in detecting attacks in network systems, specifically those reliant on periodic models and extensive training data by using classification methods.…”
Section: Introductionmentioning
confidence: 99%