Search Results - ZigBee IoT Intrusion Detection System
-
1
A ZigBee Intrusion Detection System for IoT using Secure and Efficient Data Collection
ISSN: 2542-6605, 2542-6605Published: Elsevier B.V 01.12.2020Published in Internet of things (Amsterdam. Online) (01.12.2020)“… This paper outlines various techniques to detect known attacks and new types of attacks particularly on ZigBee-based IoT systems…”
Get full text
Journal Article -
2
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,306
ISSN: 2542-6605, 2542-6605Published: Elsevier B.V 01.08.2022Published in Internet of things (Amsterdam. Online) (01.08.2022)Get full text
Journal Article -
3
INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES
ISSN: 2527-5399, 2528-2514Published: 30.04.2023Published in Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems…”
Get full text
Journal Article -
4
ZBDS2023: A multi location Zigbee dataset to build innovative IoT Intrusion Detection Systems
ISSN: 2160-4894Published: IEEE 21.06.2023Published in IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications (Print) (21.06.2023)“… Indeed, they need to build and evaluate dedicated monitoring tools and Intrusion Detection Systems (IDSs…”
Get full text
Conference Proceeding -
5
Modeling and Fault Tolerance Analysis of ZigBee Protocol in IoT Networks
ISSN: 1996-1073, 1996-1073Published: Basel MDPI AG 01.12.2021Published in Energies (Basel) (01.12.2021)“…) has become a key issue for IoT systems. A properly applied routing algorithm has a direct impact on the power consumption of sensors, which in extreme cases is the reason why nodes shut down due to battery degradation…”
Get full text
Journal Article -
6
INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS
ISSN: 2527-5399, 2528-2514Published: 30.04.2023Published in Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“… This article outlines various techniques to carry out attacks on ZigBee-based IoT systems. We conducted penetration experiments on various possible attacks on Zigbee-based IoT…”
Get full text
Journal Article -
7
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…), which is an important network type of the Internet of Things (IoT). The novel LDoS attack to the routing protocol is proposed to evaluate the security and trust mechanism in the WSN…”
Get full text
Journal Article -
8
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION
ISSN: 2527-5399, 2528-2514Published: 30.04.2023Published in Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) (30.04.2023)“…This article outlines various techniques for detecting types of attacks that may arise in ZigBee-based IoT system…”
Get full text
Journal Article -
9
Living in the Dark: MQTT-Based Exploitation of IoT Security Vulnerabilities in ZigBee Networks for Smart Lighting Control
ISSN: 2624-831X, 2624-831XPublished: Montreal MDPI AG 01.12.2022Published in IoT (01.12.2022)“… However, the main challenge for such control systems is how to maximize security under limited resources such as low-processing power, low memory, low data rate, and low-bandwidth IoT networks…”
Get full text
Journal Article -
10
Distributed Machine Learning Based Intrusion Detection in IoT
Published: IEEE 08.10.2024Published in 2024 International Conference on Power, Energy, Control and Transmission Systems (ICPECTS) (08.10.2024)“… To effectively counter these threats in real- time, intrusion detection algorithms must be both energy-efficient and compatible with the constrained computational capabilities of IoT devices…”
Get full text
Conference Proceeding -
11
Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning
Published: IEEE 01.06.2019Published in 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) (01.06.2019)“… in order to uniquely identify each device. In this study, a novel intrusion detection method is proposed to detect unauthorized IoT devices using deep learning…”
Get full text
Conference Proceeding -
12
IoT based intrusion detection system using PIR sensor
Published: IEEE 01.05.2017Published in RTEICT 2017 : proceedings : 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology : 19-20 May 2017 (01.05.2017)“…Nowadays the need to build an affordable and effective intrusion detection system is a necessity with the events of intrusion or burglary on the rise and as we are approaching towards making our house…”
Get full text
Conference Proceeding -
13
Towards the Development of a Realistic Multidimensional IoT Profiling Dataset
Published: IEEE 01.01.2022Published in 2022 19th Annual International Conference on Privacy, Security & Trust (PST) (01.01.2022)“… Thus, it is essential to develop intelligent IoT identification/profiling and intrusion detection components that are tailored to IoT applications…”
Get full text
Conference Proceeding -
14
Computational intelligence techniques for automatic detection of Wi-Fi attacks in wireless IoT networks
ISSN: 1022-0038, 1572-8196Published: New York Springer US 01.05.2021Published in Wireless networks (01.05.2021)“… In order to identify these assaults, an intrusion detection system (IDS) with a prominent precision and low identification time is required…”
Get full text
Journal Article -
15
Scalable Wi-Fi Intrusion Detection for IoT Systems
ISSN: 2157-4960Published: IEEE 19.04.2021Published in International Conference on New Technologies, Mobility, and Security (Print) (19.04.2021)“… Therefore, monitoring IoT networks using intrusion detection systems is one of the major countermeasures against such threats…”
Get full text
Conference Proceeding -
16
Identifying Distinct Features based on Received Samples for Interference Detection in Wireless Sensor Network Edge Devices
Published: IEEE 01.04.2020Published in 2020 Wireless Telecommunications Symposium (WTS) (01.04.2020)“… As deployments diverge into safety-critical areas, attack incentives intensify, leading to persistent malicious intrusion challenges, which are ever-changing as interference techniques evolve…”
Get full text
Conference Proceeding -
17
Detecting Interference in Wireless Sensor Network Received Samples: A Machine Learning Approach
Published: IEEE 01.06.2020Published in 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) (01.06.2020)“… The expanding Internet of Things (IoT) sector is becoming an ever more important aspect of modern technology and a key motivator for improving security and privacy in WSNs…”
Get full text
Conference Proceeding -
18
Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2023Published in IEEE access (2023)“…The Healthcare Internet-of-Things (H-IoT), commonly known as Digital Healthcare, is a data-driven infrastructure that highly relies on smart sensing devices (i.e…”
Get full text
Journal Article -
19
RSS based multistage statistical method for attack detection and localization in IoT networks
ISSN: 1574-1192Published: 01.09.2022Published in Pervasive and mobile computing (01.09.2022)Get full text
Journal Article -
20
Blacksite: A Deep Neural Network-Powered Artificial Immune System for Internet of Things Intrusion Detection
ISBN: 9798819380468Published: ProQuest Dissertations & Theses 01.01.2022“…The Internet of Things (IoT) is a rapidly growing field of interconnected devices, technologies, and systems which can be implemented in small, tightly connected environments or can span large geographic areas, such as Smart Cities…”
Get full text
Dissertation

