2018 13th Iberian Conference on Information Systems and Technologies (CISTI) 2018
DOI: 10.23919/cisti.2018.8399291
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection systems in Internet of Things: A literature review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 83 publications
(49 citation statements)
references
References 43 publications
0
45
0
Order By: Relevance
“…owever, it has only been tested to detect spoofed or altered information, sinkhole, and selective-forwarding attacks. Shreenivas et al [20], [21] extended SVELTE by adding another intrusion detection module that uses an Expected Transmission (ETX) metric to identify malicious activity on the network. They also proposed a geographic hint to detect malicious nodes that conduct attacks against ETX-based networks.…”
Section: A Signature/event/rule Based Idssmentioning
confidence: 99%
See 1 more Smart Citation
“…owever, it has only been tested to detect spoofed or altered information, sinkhole, and selective-forwarding attacks. Shreenivas et al [20], [21] extended SVELTE by adding another intrusion detection module that uses an Expected Transmission (ETX) metric to identify malicious activity on the network. They also proposed a geographic hint to detect malicious nodes that conduct attacks against ETX-based networks.…”
Section: A Signature/event/rule Based Idssmentioning
confidence: 99%
“…The network payloads are treated as a sequence of bytes called bit-pattern, and the feature selection operates as an overlapping tuple of bytes called n-grams. When the corresponding bits matches all positions, a match between the bit-pattern and n-grams occurs [21]. The system is evaluated by deploying four attacks and demonstrates a very low false-positive rate.…”
Section: A Signature/event/rule Based Idssmentioning
confidence: 99%
“…On the other hand, the evolution of intrusion detection systems for the Internet of Things (IoT) is also an emerging research problem because the network traffic in real-time IoT-enabled devices is more pervasive and they are vulnerable to newer cybersecurity attacks [41]. Thus, researchers have focused on practical aspects such as mitigating the interference imposed by intruders in passive RFID networks [42].…”
Section: Related Workmentioning
confidence: 99%
“…The cost function is then computing utilizing equation (4) and depends on its value the algorithm may stop, whether it is under certain value or the improvement from the past iteration is less than specific threshold. If there is a way for improvement, U is then evaluated utilizing equation (6) and the algorithm is repeated again.…”
Section: (4)mentioning
confidence: 99%