2020
DOI: 10.1007/s11036-019-01483-5
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System for IoT Heterogeneous Perceptual Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82]. Additionally, most strategies incorporate techniques to minimize energy consumption, such as in [38,56,72,93,99], while others employed ByzantineMedia and ByzantineKrum [45] to ensure the reliability of the deployed IDS model. With these approaches, the finding further revealed that while the TL and ensemble techniques aimed to speed up model training and detection accuracy, as well as boost data security, the FL strategies were geared towards improving accuracy, efficiency, data imbalances, reliability as well as preserve security and privacy of the data [37,51,52,82].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82]. Additionally, most strategies incorporate techniques to minimize energy consumption, such as in [38,56,72,93,99], while others employed ByzantineMedia and ByzantineKrum [45] to ensure the reliability of the deployed IDS model. With these approaches, the finding further revealed that while the TL and ensemble techniques aimed to speed up model training and detection accuracy, as well as boost data security, the FL strategies were geared towards improving accuracy, efficiency, data imbalances, reliability as well as preserve security and privacy of the data [37,51,52,82].…”
Section: Discussionmentioning
confidence: 99%
“…This solution proved effective in detecting sinkholes and selective-forwarding attacks, with a 76.19% True Positive Rate TPR and a 5.92% FPR for concurrent wormhole attacks. In addition, Zhou et al [93] addressed security and energy issues in heterogeneous IoT networks by devising a dynamic IDS placement strategy using the ULEACH clustering algorithm. This approach optimizes node threshold computation, enhancing node utilization and network performance while conserving energy.…”
Section: Unsupervised Learning Basedmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, they cannot be applied directly to most resource-constrained devices such as IoT devices or sensors. Thus, it is a challenging task to develop lightweight, fast, and efficient secure cryptographic mechanisms for the IoT that can verify the identity of the sender and prevent the revelation of sensitive information by unauthorized attackers [11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…As for the perception layer of the IoT, due to its heterogeneity and complexity. It is very vulnerable to be attacked by criminals, resulting in security threats to the source of the perceptual data [4,5]. Ensuring the credibility of the perception nodes and the source of perception data is the cornerstone of ensuring the safe operation of the perception layer.…”
mentioning
confidence: 99%