2023
DOI: 10.3390/s24010127
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Intrusion Detection Using an Ensemble Voting Classifier for Internet of Things

Ashfaq Hussain Farooqi,
Shahzaib Akhtar,
Hameedur Rahman
et al.

Abstract: In the context of 6G technology, the Internet of Everything aims to create a vast network that connects both humans and devices across multiple dimensions. The integration of smart healthcare, agriculture, transportation, and homes is incredibly appealing, as it allows people to effortlessly control their environment through touch or voice commands. Consequently, with the increase in Internet connectivity, the security risk also rises. However, the future is centered on a six-fold increase in connectivity, nec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 62 publications
0
6
0
Order By: Relevance
“…Furthermore, we compared the performance and security properties of our proposed protocol with those of existing protocols. Our results demonstrate that our protocol offers better security while maintaining lower computational costs, making it suitable for practical IoT-based smart-home environments [47]. The primary goal of IoT security is to safeguard privacy, confidentiality, and the overall security of users, infrastructure, data, and devices within the IoT network, while also ensuring the availability of services offered by the IoT ecosystem.…”
Section: Literature Reviewmentioning
confidence: 90%
“…Furthermore, we compared the performance and security properties of our proposed protocol with those of existing protocols. Our results demonstrate that our protocol offers better security while maintaining lower computational costs, making it suitable for practical IoT-based smart-home environments [47]. The primary goal of IoT security is to safeguard privacy, confidentiality, and the overall security of users, infrastructure, data, and devices within the IoT network, while also ensuring the availability of services offered by the IoT ecosystem.…”
Section: Literature Reviewmentioning
confidence: 90%
“…The transformation stage of the KDD method can be run as a model representation, this model representation is made from data that is still in the form of sentences that are still arranged in the form of words into numbers so that they can be processed and calculated (Farooqi et al, 2023). Each review will be assigned a sentiment label based on the sentiment score that has been obtained.…”
Section: Transformationmentioning
confidence: 99%
“…They applied the SMOTE technique to address the class imbalance issue in basic data. This ensemble voting classifier significantly enhances the accuracy and precision of network intrusion detection systems [27].…”
Section: Application Of Data Sampling Techniquesmentioning
confidence: 99%