A systematic literature review for network intrusion detection system (IDS)

OH Abdulganiyu, T Ait Tchakoucht… - International journal of …, 2023 - Springer
With the recent increase in internet usage, the number of important, sensitive, confidential
individual and corporate data passing through internet has increasingly grown. With gaps in …

A review of intrusion detection systems using machine and deep learning in internet of things: Challenges, solutions and future directions

J Asharf, N Moustafa, H Khurshid, E Debie, W Haider… - Electronics, 2020 - mdpi.com
The Internet of Things (IoT) is poised to impact several aspects of our lives with its fast
proliferation in many areas such as wearable devices, smart sensors and home appliances …

Towards an efficient model for network intrusion detection system (IDS): systematic literature review

OH Abdulganiyu, TA Tchakoucht, YK Saheed - Wireless Networks, 2024 - Springer
With the recent rise in internet usage, the volume of crucial, private, and confidential data
traveling online has increased. Attackers have made attempts to break into the network due …

Machine learning for advanced wireless sensor networks: A review

T Kim, LF Vecchietti, K Choi, S Lee… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are typically used with dynamic conditions of task-related
environments for sensing (monitoring) and gathering of raw sensor data for subsequent …

An intrusion detection system for wireless sensor networks using deep neural network

V Gowdhaman, R Dhanapal - Soft Computing, 2022 - Springer
Wireless sensor network comprises of a large number of sensor nodes to acquire and
transmit data to the central location. However, due to resource constrained nodes …

Voltage over-scaling-based lightweight authentication for IoT security

J Zhang, C Shen, H Su, MT Arafin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT
applications. A hardware-oriented lightweight authentication protocol based on device …

Intrusion detection and prevention in fog based IoT environments: A systematic literature review

CA de Souza, CB Westphall, RB Machado, L Loffi… - Computer Networks, 2022 - Elsevier
Abstract Currently, the Internet of Things is spreading in all areas that apply computing
resources. An important ally of the IoT is fog computing. It extends cloud computing and …

CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review

M Amin, FFM El-Sousy, GAA Aziz, K Gaber… - Ieee …, 2021 - ieeexplore.ieee.org
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities,
mitigation approaches on the power electronics and the security challenges for the smart …

Network resource management mechanisms in SDN enabled WSNs: A comprehensive review

V Tyagi, S Singh - Computer Science Review, 2023 - Elsevier
Wireless technologies usually have very limited computing, memory, and battery power that
require the optimal management of network resources to increase network performance …

A survey on machine learning software-defined wireless sensor networks (ml-SDWSNS): Current status and major challenges

FF Jurado-Lasso, L Marchegiani, JF Jurado… - IEEE …, 2022 - ieeexplore.ieee.org
Wireless Sensor Network (WSN), which are enablers of the Internet of Things (IoT)
technology, are typically used en-masse in widely physically distributed applications to …