2019
DOI: 10.1109/access.2019.2907965
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Lightweight Intrusion Detection System for the Internet of Things

Abstract: Integration of the Internet into the entities of the different domains of human society (such as smart homes, health care, smart grids, manufacturing processes, product supply chains, and environmental monitoring) is emerging as a new paradigm called the Internet of Things (IoT). However, the ubiquitous and wide-range IoT networks make them prone to cyberattacks. One of the main types of attack is a denial of service (DoS), where the attacker floods the network with a large volume of data to prevent nodes from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
76
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 200 publications
(77 citation statements)
references
References 55 publications
0
76
0
1
Order By: Relevance
“…IoT is developed in [59]. The proposed IDS is capable of detecting Denial of Service (DoS) attacks successfully.…”
Section: A Lightweight Machine Learning-based Intrusion Detection Sysmentioning
confidence: 99%
“…IoT is developed in [59]. The proposed IDS is capable of detecting Denial of Service (DoS) attacks successfully.…”
Section: A Lightweight Machine Learning-based Intrusion Detection Sysmentioning
confidence: 99%
“…With the growth of IoT networks, several researchers have proposed anomaly mitigation schemes to protect the IoT from malicious users. As mentioned earlier, the IDS schemes can largely be classified into signature-based [27][28][29], anomaly-based [30][31][32][33][34][35][36], and hybrid-based [22,36]. Additionally, some of the anomaly mitigations' schemes [35][36][37][38] utilize the fog computing paradigm for deployment.…”
Section: Related Workmentioning
confidence: 99%
“…A lightweight IDS scheme [31] is proposed for IoT. This scheme consists of a training level and evaluation level.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The generated passageway is known as wormhole threat. This may be the serious kind of attack to routing protocols that may affect route investigation method of delaying the investigation of any path other than worm-hole [14]. As given in fig 3, an unnecessary connection is made from B to C by attacker hop Y.…”
Section: Fig 2 Black Hole Attack (Ii) Wormhole Attackmentioning
confidence: 99%