A review of intrusion detection systems and their evaluation in the IoT

L Arnaboldi, C Morisset - arxiv preprint arxiv:2105.08096, 2021 - arxiv.org
Intrusion Detection Systems (IDS) are key components for securing critical infrastructures,
capable of detecting malicious activities on networks or hosts. The procedure of …

An intrusion detection system for detecting compromised gateways in clustered IoT networks

NV Abhishek, TJ Lim, B Sikdar… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
It is well known that clustering IoT devices will help to alleviate the network scalability
problem in IoT networks. However, clustering also provides an opportunity for an adversary …

An In-Depth Examination of Artificial Intelligence-Enhanced Cybersecurity in Robotics, Autonomous Systems, and Critical Infrastructures

F Santoso, A Finn - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Recent developments in cutting-edge robotics constantly face increased cyber threats, not
only in terms of quantity and frequency of attacks, but also when it comes to quality and …

Pilot spoofing detection for massive MIMO mmWave communication systems with a cooperative relay

S Wang, X Fu, R Ruby, Z Li - Computer Communications, 2023 - Elsevier
In massive millimeter-wave (mmWave) multiple-input–multiple-output (MIMO) systems,
eavesdroppers may transmit the identical pilot sequences as legitimate users to manipulate …

A survey study on intrusion detection system in wireless sensor network: Challenges and considerations

M Hosseini Shirvani, A Akbarifar - Journal of Electrical and Computer …, 2024 - jecei.sru.ac.ir
Background and Objectives: Wireless sensor networks (WSNs) are ad-hoc technologies that
have various applications in different industries such as in healthcare systems, environment …

A novel data-driven time-delay attack evaluation method for wide-area cyber–physical smart grid systems

G Zhang, J Li, O Bamisile, D Cai, Q Huang - Sustainable Energy, Grids and …, 2022 - Elsevier
One of the main challenges in information and communication technology, as well as wide-
area power system researches, is the inability to stabilize the voltage and frequency for …

Sentinel based malicious relay detection in wireless IoT networks

A Tandon, TJ Lim, U Tefek - Journal of Communications and …, 2019 - ieeexplore.ieee.org
Increased device connectivity and information sharing in wireless IoT networks increases
the risk of cyber attack by malicious nodes. In this paper, we present an effective and …

Bayesian test for detecting false data injection in wireless relay networks

X Liu, Y Guan, SW Kim - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
We develop the Bayesian test for detecting the relay misbehavior (false data injection) at the
packet level in lossy one-way wireless relay networks. The proposed approach exploits …

Physical detection of misbehavior in relay systems with unreliable channel state information

T Lv, Y Yin, Y Lu, S Yang, E Liu… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
We study the detection of misbehavior in a Gaussian relay system, where the source
transmits information to the destination with the assistance of an amplify-and-forward relay …

Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …