An Intelligent RPL attack detection using Machine Learning-Based Intrusion Detection System for Internet of Things

[1]  S. K. Dhurandher,et al.  Mitigation of black hole attacks in 6LoWPAN RPL-based Wireless sensor network for cyber physical systems , 2022, Comput. Commun..

[2]  Arputharaj Kannan,et al.  Smart Prediction and Monitoring of Waste Disposal System Using IoT and Cloud for IoT Based Smart Cities , 2021, Wirel. Pers. Commun..

[3]  Subarna Shakya,et al.  Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection , 2021 .

[4]  Arputharaj Kannan,et al.  Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks , 2021, Wireless Networks.

[5]  John A. Clark,et al.  Intrusion Detection Systems in RPL-Based 6LoWPAN: A Systematic Literature Review , 2021, IEEE Sensors Journal.

[6]  Sivaganesan D,et al.  A Data Driven Trust Mechanism Based on Blockchain in IoT Sensor Networks for Detection and Mitigation of Attacks , 2021, March 2021.

[7]  Imed Romdhani,et al.  Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things , 2021, Int. J. Crit. Infrastructure Prot..

[8]  Yousaf Bin Zikria,et al.  Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network , 2020, EURASIP J. Wirel. Commun. Netw..

[9]  Kannan Arputharaj,et al.  Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks , 2020, IET Commun..

[10]  Security Attacks in S-WBANs on IoT based Healthcare Applications , 2019, International Journal of Innovative Technology and Exploring Engineering.

[11]  K. Sundarakantham,et al.  Machine Learning Based Intrusion Detection System , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[12]  Sannasi Ganapathy,et al.  Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT , 2019, Comput. Networks.

[13]  Xiaojie Su,et al.  Hybrid-Augmented Device Fingerprinting for Intrusion Detection in Industrial Control System Networks , 2018, IEEE Wireless Communications.

[14]  Reazul Kabir,et al.  A Network Intrusion Detection Framework based on Bayesian Network using Wrapper Approach , 2017 .

[15]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[16]  Jonathan Loo,et al.  A Specification-Based IDS for Detecting Attacks on RPL-Based Network Topology , 2016, Inf..

[17]  Yang Xiang,et al.  Towards Designing Privacy-Preserving Signature-Based IDS as a Service: A Study and Practice , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[18]  J. Thangakumar,et al.  A cloud-based intrusion detection system for Android smartphones , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[19]  Miguel Correia,et al.  Anomaly-based intrusion detection in software as a service , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[20]  Ricardo Staciarini Puttini,et al.  A fully distributed IDS for MANET , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).