2018
DOI: 10.1109/mwc.2017.1800079
|View full text |Cite
|
Sign up to set email alerts
|

Active Learning for Wireless IoT Intrusion Detection

Abstract: Internet of Things (IoT) is becoming truly ubiquitous in our everyday life, but it also faces unique security challenges. Intrusion detection is critical for the security and safety of a wireless IoT network. This paper discusses the human-in-the-loop active learning approach for wireless intrusion detection. We first present the fundamental challenges against the design of a successful Intrusion Detection System (IDS) for wireless IoT network. We then briefly review the rudimentary concepts of active learning… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
3

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 100 publications
(46 citation statements)
references
References 14 publications
0
43
0
3
Order By: Relevance
“…Indeed, when an anomaly occurs, there is no need to send non-trusted or faulty data. Instead, the ADS logs locally all information about the anomaly and only alarms are reported remotely [ 27 , 58 , 59 ].…”
Section: Ads For Smart Hospital Iot Systemsmentioning
confidence: 99%
“…Indeed, when an anomaly occurs, there is no need to send non-trusted or faulty data. Instead, the ADS logs locally all information about the anomaly and only alarms are reported remotely [ 27 , 58 , 59 ].…”
Section: Ads For Smart Hospital Iot Systemsmentioning
confidence: 99%
“…With the enormous success of machine learning, many studies have been able to successfully apply machine learning at the network level to detect attacks in IoT-EDs. Yang et al in [48], investigate the active learning method for intrusion detection of wireless IoT device networks. It is seen that the active learning method can efficiently improve the performance over the traditional supervised learning methods for intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…Also, such solutions rely on good network traces for the training of ML models. The collection and labeling of real network traces are considered as a big problem in the case of resource‐constrained networks . Also, the real‐time efficiency of RPL specific ML‐based IDS solutions is yet to be realized on test beds or real networks.…”
Section: Related Workmentioning
confidence: 99%