Intrusion detection for Adhoc networks in IOT

IoT leads to the vision of connected world of physical and virtual processes, services and objects which are capable of providing a way on how to link them to internet. IoT is a major part of future internet that mainly integrates and enables numerous communication solutions and technologies and therefore, it is a notable interest to define how standard communication protocols could support the vision of IoT. In this context we present a comparative analysis on networks based on Ad Hoc On-Demand Distance Vector (AODV) network under various attacks like skin hole, black hole and worm hole.

[1]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[2]  Paolo Bellavista,et al.  Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.

[3]  Mohamed A. Abdelshafy,et al.  Resisting Flooding Attacks on AODV , 2014, SECURWARE 2014.

[4]  Muhammad Ali Imran,et al.  Anomaly Detection in Wireless Sensor Networks in a Non-Stationary Environment , 2014, IEEE Communications Surveys & Tutorials.

[5]  Mansaf Alam,et al.  Dengue disease prediction using weka data mining tool , 2015, ArXiv.

[6]  Sidi-Mohammed Senouci,et al.  A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology , 2016, 2016 IEEE International Conference on Communications (ICC).

[7]  Albert C. Esterline,et al.  Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[8]  Samyak Shah,et al.  Performance Evaluation of Ad Hoc Routing Protocols Using NS 2 Simulation 1 Performance Evaluation of Ad Hoc Routing Protocols Using NS 2 Simulation , 2008 .

[9]  Daniel Gutiérrez-Reina,et al.  The Role of Ad Hoc Networks in the Internet of Things: A Case Scenario for Smart Environments , 2013, Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence.

[10]  Kangfeng Zheng,et al.  An intrusion detection scheme based on anomaly mining in Internet of Things , 2011 .

[11]  Jian Ma,et al.  Simulation Study of AODV Performance over IEEE 802.15.4 MAC in WSN with Mobile Sinks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).