INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for s...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Ročník 8; číslo 1; s. 23 - 30
Hlavní autoři: Sadikin, Fal, Wiranda, Nuruddin
Médium: Journal Article
Jazyk:angličtina
Vydáno: 30.04.2023
ISSN:2527-5399, 2528-2514
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.
AbstractList The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.
Author Wiranda, Nuruddin
Sadikin, Fal
Author_xml – sequence: 1
  givenname: Fal
  surname: Sadikin
  fullname: Sadikin, Fal
– sequence: 2
  givenname: Nuruddin
  orcidid: 0000-0001-7830-0431
  surname: Wiranda
  fullname: Wiranda, Nuruddin
BookMark eNotkMtOg0AARSemJtbavcv5Aeq8gSWFKU6CkDDTRd2QYTokmD4MqIl_L21d3ZPcm7s4j2B2Op88AM8YrQjiJHz5-Oq_D8fVT9TjFeb0DswJJ1FAOGazK4cBp3H8AJbj2LeIsZAJiugcKFWaeqtVVcJMGpmaC-mdNvINbqoavqt8LWWwTrTMoKoMnLZlDrPEJDApk2KnlYb1tpD6Cdx39jD65X8ugNlIk74GRZWrNCkCF1EatLb1glOGhPCE2HBvQ966iEWxRdYJ0nmBCEYOORe3iPg98dh1LReW2qnFdAHQ7dYN53EcfNd8Dv3RDr8NRs1VRnOT0VxkNJMM-gdzC1Bx
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.20527/jtiulm.v8i1.153
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
EISSN 2528-2514
EndPage 30
ExternalDocumentID 10_20527_jtiulm_v8i1_153
GroupedDBID AAYXX
CITATION
M~E
ID FETCH-LOGICAL-c833-babe6534066e22a7da75bc8489a0ac62fe60210c0cc9b02ed2e1cfb56a3a62f13
ISSN 2527-5399
IngestDate Sat Nov 29 05:54:25 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 1
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c833-babe6534066e22a7da75bc8489a0ac62fe60210c0cc9b02ed2e1cfb56a3a62f13
ORCID 0000-0001-7830-0431
OpenAccessLink http://jtiulm.ti.ft.ulm.ac.id/index.php/jtiulm/article/download/153/90
PageCount 8
ParticipantIDs crossref_primary_10_20527_jtiulm_v8i1_153
PublicationCentury 2000
PublicationDate 2023-04-30
PublicationDateYYYYMMDD 2023-04-30
PublicationDate_xml – month: 04
  year: 2023
  text: 2023-04-30
  day: 30
PublicationDecade 2020
PublicationTitle Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)
PublicationYear 2023
SSID ssib044746303
Score 1.8302795
Snippet The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow...
SourceID crossref
SourceType Index Database
StartPage 23
Title INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2528-2514
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044746303
  issn: 2527-5399
  databaseCode: M~E
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELaWwoELAgGC8pAPXJCVknWc1zFl0xK0XVCThZbLyq-gqO1S7Us98QP41Yydx0aLkOiBS2Q50ST2fPk8tsczCL0BC0S4DP5vEWnlsFJpR7CIOUMupcsE07ENX_xlHE4m0dlZ_Hkw-NWehdlchvN5dHMTX_9XVUMdKNscnb2FujuhUAFlUDpcQe1w_SfFZ5PidGookozSIrU-IiQ_z4v0hMCMj3zLjg_T1DlM8nREsk8FMYk3jskoKRKSTJLxeZ7l5HQ6bqzE1m6tzdZCX9h1-Io0x5iW1da1gy_JmF8JYA_jVPP9Yg3gMgbsxyKbjk96Sw45V1WTBeyIdx4eX6uFWdWw8Fwv1ko1McGbJQnq9XZXLHNRn4aOCXlbDzJtHejJr0-MttQb_YGwhka93oBcS96leurCSwzXr6r15dXBJqqGB0Pf2w5r7Vb-zmjX-SDC7MfKmNUSZkbCDCTcQXdp6MeG5E9-pi03MRaywLOJtrvW1bveVsi7nc_oWTk9c6V4iB408wyc1Ph4hAZ6_hhlHTZwhw1cYwMDNnAfGxiwgS02sMEGbrGBLTaeoOIoLd5_cJpcGo6MPM8RXOjA98B6CzSlPFQ89IWMWBRzl8uAljowk3_pShkLl2pF9VCWwg-4x-Hu0HuK9uY_5voZwl7MaSkV9IgoGZRjKlQcMRUEquSBDJ-jt23TZ9d1xJTZ3_p6_xbPvkD3t1h7ifZWi7V-he7JzapaLl5bZf0GUytcDQ
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=INTRUSION+DETECTION+SYSTEM+FOR+ZIGBEE-BASED+IOT+USING+DATA+ANALYSIS+RULES&rft.jtitle=Jurnal+Teknologi+Informasi+Universitas+Lambung+Mangkurat+%28JTIULM%29&rft.au=Sadikin%2C+Fal&rft.au=Wiranda%2C+Nuruddin&rft.date=2023-04-30&rft.issn=2527-5399&rft.eissn=2528-2514&rft.volume=8&rft.issue=1&rft.spage=23&rft.epage=30&rft_id=info:doi/10.20527%2Fjtiulm.v8i1.153&rft.externalDBID=n%2Fa&rft.externalDocID=10_20527_jtiulm_v8i1_153
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2527-5399&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2527-5399&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2527-5399&client=summon