A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET

R Baiad, O Alhussein, H Otrok, S Muhaidat - Vehicular Communications, 2016 - Elsevier
In this paper, we propose novel cross-layer cooperative schemes for detecting blackhole
attack that commonly targets the quality of service secure optimized link state routing …

Dimensions of cybersecurity risk management

KE Nygard, A Rastogi, M Ahsan, R Satyal - Advances in Cybersecurity …, 2021 - Springer
Risk analysis and management are of fundamental importance in cybersecurity. The core
elements of risk are threat, vulnerability, and impact. Risk management has a basis in …

Cooperative cross layer detection for blackhole attack in VANET-OLSR

R Baiad, H Otrok, S Muhaidat… - … and Mobile Computing …, 2014 - ieeexplore.ieee.org
In this paper, we address the problem of detecting blackhole attack targeting the Multi Point
Relays (MPRs), using Vehicular Ad hoc networks-Secure Optimized Link State Routing …

A machine learning approach for backoff manipulation attack detection in cognitive radio

WF Fihri, H El Ghazi, B Abou El Majd… - IEEE Access, 2020 - ieeexplore.ieee.org
Cognitive radio (CR) is a promising paradigm that comes to address the scarcity of the radio
spectrum by providing opportunistic utilization of the underutilized licensed channels to …

Detect DDoS flooding attacks in mobile ad hoc networks

Y Guo, S Perreau - International Journal of Security and …, 2010 - inderscienceonline.com
Mobile Ad hoc NETworks (MANETs) are vulnerable to the Denial of Service (DoS) attack. In
this work, we focus on one specific DoS attack, Distributed DoS (DDoS) flooding attack. First …

Real time detection of MAC layer DoS attacks in IEEE 802.11 wireless networks

M Dasari - 2017 14th IEEE annual consumer communications …, 2017 - ieeexplore.ieee.org
In this paper, a real time detection of Medium Access Control (MAC) layer attacks in IEEE
802.11 wireless networks is proposed. There can be different kinds of Denial of Service …

A novel intrusion detection algorithm: An AODV routing protocol case study

G Vaseer, G Ghai, PS Patheja - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Mobile ad-hoc network (MANET) is a collection of movable nodes capable of self-routing,
constraining energy and decentralized handling of nodes. It faces many challenges due to …

A Centralized Mechanism for Preventing DDOS Attack in Wireless Sensor Networks

USR Dhamodharan, S Rajendran… - Wireless Personal …, 2022 - Springer
Wireless sensor networks face numerous limitations. Security and Privacy are the two most
essential parameters that require consideration in wireless sensor networks for conveying …

Cross-layer IDS for rushing attack in wireless mesh networks

KG Reddy, PS Thilagam, BN Rao - Proceedings of the Second …, 2012 - dl.acm.org
Wireless Mesh Networks (WMNs) are a promising technology to provide the wireless
internet connectivity. WMNs are becoming a popular choice for wireless internet service …