Journal of Electrical and Computer Engineering Innovations (JECEI)
دوره 12، شماره 2 ، مهر 2024، صفحه 449-474 اصل مقاله (2.37 M )
نوع مقاله: Review paper
شناسه دیجیتال (DOI): 10.22061/jecei.2024.10148.683
نویسندگان
M. Hosseini Shirvani* 1 ؛ A. Akbarifar 2
1 Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran .
2 Department of Computer Engineering, Sari Branch, Islamic Azad University, Sari, Iran.
تاریخ دریافت : 23 بهمن 1402 ،
تاریخ بازنگری : 28 اردیبهشت 1403 ،
تاریخ پذیرش : 06 خرداد 1403
چکیده
Background and Objectives: Wireless sensor networks (WSNs) are ad-hoc technologies that have various applications in different industries such as in healthcare systems, environment and military surveillance, manufacturing, and IoT context in general. Expanding the scope of sensor network applications has led researchers to develop solutions to provide sustainable communications and networks for distributed environments, as well as how to secure these methods with limited resources.Methods: The lack of infrastructure space and the vulnerable nature of these networks make it difficult to design security models and algorithms for them. So, to run the sensor network in safe mode, any type of attack must be detected before any security breach is materialized. According to the importance of the network and also the nature of the sensor networks along with the critical challenge of energy consumption, solutions and defensive lines such as intrusion prevention and intrusion detection systems will be selected.Results: This paper surveys subjectively the intrusion and anomaly detection system in WSNs to determine potentials and challenges for further processing. Therefore, designing an efficient and optimal intrusion detection solution applicable to wireless sensor networks, IoT, and other ad-hoc networks has been a major challenge that will help the researcher to design or choose the best approach for their future research.Conclusion: This research also pave the way of interested researchers to find existing challenges and shortcomings for further processing.
کلیدواژهها
Intrusion Detection System ؛ Security Architecture ؛ Anomaly based Detection ؛ Misuse based Detection ؛ Specification based Detection
مراجع
[1] F. Liu, J. Xu, L. Zhang et al., “DESNN algorithm for communication network intrusion detection,” Wireless Pers. Commun., 126: 1705-1720, 2022.
[2] F. Junior, N. Silva, A. Guelfi, S. Takeo Kofuji, “IoT6Sec: reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis,” Wireless Netw., 25: 1533-1556, 2019.
[3] T. Do-Dac, K. Ho-Van, “Energy harvesting cognitive radio networks: security analysis for Nakagami-m fading,” Wireless Netw., 27: 1561-1572, 2021.
[4] U. Ghugar, J. Pradhan, "NL-IDS: Trust based intrusion detection system for network layer in wireless sensor networks," in Proc. 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC): 512-516, 2018.
[5] B. J. Santhosh Kumar, S. Sinha, "An intrusion detection and prevention system against DOS attacks for internet-integrated WSN," in Proc. 2022 7th International Conference on Communication and Electronics Systems (ICCES): 793-797, 2022.
[6] A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, H. C. Wong, “Decentralized intrusion detection in wireless sensor networks,” in Proc. 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks (Q2SWinet ’05), ACM Press: 16-23, 2005 .
[7] M. Meisel, V. Pappas, L. Zhang, “A taxonomy of biologically inspired research in computer networking,” Comput. Network, 54(6): 901-916, 2010.
[8] K. Chaitanya, A. Ghosh, “Analysis of Denial-of-Service attacks on Wireless Sensor networks using simulation, IT Security for the Next Generation - European Cup 2011: 1-13 , 2010.
[9] R. C. Chen, C. F. Hsieh, Y. F. Huang, “A new method for intrusion detection on hierarchical wireless sensor networks”, in Proc. ACM ICUIMC-09, 2009.
[10] S. Otoum, B. Kantarci, H. T. Mouftah “A novel ensemble method for advanced intrusion detection in wireless sensor networks,” in Proc. 2020 IEEE International Conference on Communications (ICC 2020): 1-6, 2020.
[11] M. Aloqaily, S. Otoum, I. Al Ridhawi, Y. Jararweh, “An intrusion detection system for connected vehicles in smart cities,” Ad Hoc Networks, 90: 101842, 2019.
[12] S. Otoum, B. Kantarci, H. T. Mouftah, “On the feasibility of deep learning in sensor network intrusion detection, “IEEE Networking Lett., 1(2): 68-71, 2019.
[13] I. Butun, , S. D. Morgera, R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surv. Tutorials, 16(1): 266-282, 2014.
[14] M. Hosseini Shirvani, A. Akbarifar, “Anomaly-based detection of blackhole attacks in WSN and MANET utilizing quantum-metaheuristic algorithms,” J.Commun. Eng., 9(1): 77-92, 2020.
[15] Y. Maleh, A. Ezzati, “A review of security attacks and intrusion detection schemes in wireless sensor networks,” arXiv preprint arXiv:1401.1982, 2014.
[16] S. Binitha, S. S. Sathya, “A survey of bio inspired optimization algorithms,” Int. J. Soft Comput. Eng., 2(2): 137-151, 2012.
[17] R. Fu et al., “Biologically inspired anomaly detection for hierarchical wireless sensor networks,” J. Networks 7(8): 1214-1219, 2012.
[18] M. Hosseini Shirvani, A. Akbarifar, “A comparative study on anonymizing networks: TOR, I2P, and riffle networks comparison, J. Electr. Comput. Eng. Innovations (JECEI), 10(2): 259-272, 2022.
[19] E. Baraneetharan, “Role of machine learning algorithms intrusion detection in WSNs: a survey,” J. Inf. Technol., 2(03): 161-173, 2020.
[20] I. Butun, S. D. Morgera, R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Commun. Surv. Tutorials, 16(1): 266-282, 2013.
[21] X. Tan, S. Su, Z. Huang, X. Guo, Z. Zuo, X. Sun, L. Li, “Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm,” Sensors, 19(1): 203, 2019.
[22] C. C. Su, K. M. Chang, Y. H. Kuo, M. F. Horng, “The new intrusion prevention and detection approaches for clustering-based sensor networks,” in Proc. IEEE Wireless Communications and Networking Conference, 2005.
[23] A. A. Strikos, “A full approach for intrusion detection in wireless sensor networks,” School of Information and Communication Technology, KTH, Stockholm, Sweden 16453, 2007.
[24] Y. Otoum, D. Liu, , A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Trans. Emerg. Telecommun. Technol., 33(3): e3803, 2022.
[25] N. Moustafa, B.Turnbull, K. K. R. Choo, “An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things,” IEEE Internet Things J., 6(3): 4815-4830, 2018.
[26] M. Hosseini Shirvani, A. Akbarifar, A. Nazokkar, “Reliability non-functional requirement evaluation in mission-critical systems with an architectural strategy for future systems,” Int. J. Comput. Appl., 46(4): 227-251, 2024.
[27] A. Aldweesh, A. Derhab, A. Z. Emam, "Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Syst., 189: 105124 2020.
[28] G. Marín, P. Casas, G. Capdehourat, “Rawpower: Deep learning based anomaly detection from raw network traffic measurements,” in Proc. the ACM SIGCOMM 2018 Conference on Posters and Demos: 75-77, 2018.
[29] R. Sharma, V. A. Athavale, “Survey of intrusion detection techniques and architectures in wireless sensor networks,” Int. J. Adv. Networking Appl., 10(4): 3925-3937, 2019.
[30] K. Haseeb, I. Ud Din, A. Almogren, N. Islam, “An energy efficient and secure IoT-based WSN framework: An application to smart agriculture,” Sensors, 20(7): 2081, 2020.
[31] W. Zhang, D. Han, K. C. Li, F. Massetto, “Wireless sensor network intrusion detection system based on MK-ELM,” Soft Comput., 24(16): 12361-12374, 2020.
[32] S. Shen, G. Yue, Q. Cao, F. Yu, “A survey of game theory in wireless sensor networks security,” J. Networks, 6(3): 521, 2011.
[33] G. Zhang, T. Wang, G. Wang, A. Liu, W. Jia, “Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system,” Concurrency Comput. Pract. Exper., 33(7): 1-1, 2021.
[34] A. Agah, K. Basu, , S. K. Das, “Preventing DoS attack in sensor networks: a game theoretic approach,” in Proc. IEEE International Conference on Communications (ICC 2005), 5: 3218-3222, 2005.
[35] L. Yang, D. Mu, X. Cai, “Preventing dropping packets attack in sensor networks: A game theory approach,” Wuhan Univ. J. Nat. Sci., 13(5): 631-635, 2008.
[36] M. A. Khan, S. U. Jan, J. Ahmad., S. S. Jamal, A. A. Shah, N. Pitropakis, W. J. Buchanan, “A Deep learning-based intrusion detection system for mqtt enabled iot,” Sensors, 21: 7016, 2021.
[37] S. Rajasegarar, C. Leckie, M. Palaniswami, J. C. Bezdek, “Distributed anomaly detection in wireless sensor networks”, in Proc. 10th IEEE Singapore International Conference on Communication systems, 2006.
[38] V. Kelli, V. Argyriou, T. Lagkas, G. Fragulis, E. Grigoriou, , & P. Sarigiannidis, P. IDS for industrial applications: a federated learning approach with active personalization. Sensors, 21(20), 6743 (2021)
[39] M. A Almaiah, “A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology,” in Artificial Intelligence and Blockchain for Future Cybersecurity Applications: 217-234. Springer, Cham 2021.
[40] M. Khudadad, Z. Huang, “Novel intrusion detection methods for security of wireless sensor network, “J. Fundam. Appl. Sci., 10(2S): 173-189, 2018.
[41] I. Almomani, A. Alromi, “Integrating software engineering processes in the development of efficient intrusion detection systems in wireless sensor networks,” Sensors, 20(5): 1375, 2020 .
[42] S. Subbiah , K. S. M. Anbananthen, S. Thangaraj, S. Kannan, D. Chelliah, “Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm,” J. Commun. Networks, 24(2): 264-273, 2022.
[43] W. Wang, M. Chatterjee, K. Kwiat, “Coexistence with malicious nodes: A game theoretic approach,” in Proc. 2009 International Conference on Game Theory for Networks: 277-286, 2009.
[44] T. Sherasiya, H. Upadhyay, H. B. Patel, “A survey: Intrusion detection system for internet of things,” Int. J. Comput. Sci. Eng. (IJCSE), 5(2): 91-98, 2016 .
[45] X. Jia, Q. Feng,T. Fan, Q. Lei, “Rfid Technology And Its Applications In Internet Of Things (Iot),” In Proc. IEEE 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet): 1282-1285, 2012.
[46] C. Jun, C. Chi, “Design of complex event-processing IDS in internet of things,” in Proc. IEEE 2014 sixth International Conference on Measuring Technology and Mechatronics Automation: 226-229, 2014.
[47] A. Alsadhan, N. Khan, “A proposed optimized and efficient intrusion detection system for wireless sensor network,” Int. J. Comput. Inf. Eng., 7(12): 1621-1624, 2013.
[48] Y. El Mourabit, A. Toumanari, A. Bouirden, H. Zougagh, R. Latif, “Intrusion detection system in Wireless Sensor Network based on mobile agent,” in Proc. Second World Conference on Complex Systems (WCCS): 248-251, 2014 .
[49] G. Sandhya, A. Julian, “Intrusion detection in wireless sensor network using genetic K-means algorithm,” in Proc. 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies: 1791-1794, 2014.
[50] S. Athmani, D. E. Boubiche, A. Bilami, "Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs," in Proc. 2013 World Congress on Computer and Information Technology (WCCIT): 1-5, 2013.
[51] A. B. Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram, S. Pathan, “A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks,” in proc. 2014 3rd International Conference on Eco-friendly Computing and Communication Systems: 95-98, 2014.
[52] D. Harini, N. Balakrishnan, A. P. Renold, “Distributed detection of flooding and gray hole attacks in wireless sensor network,” in Proc. 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM): 178-184, 2015.
[53] F. Fazlic, S. A.Hashemi, A. Aletic, A. Abd Almisreb, S. M. Norzeli, N. M. Din, “A survey on security in wireless sensor network,” Southeast Eur. J. Soft Comput., 8(1), 2019.
[54] L. Arnaboldi, C. Morisset, “A review of intrusion detection systems and their evaluation in the IoT,” arXiv preprint arXiv:2105.08096, 2021 .
[55] A. Le, J. Loo, Y. Luo, A. Lasebae, “Specification-based IDS for securing RPL from topology attacks,” in Proc. 2011 IFIP Wireless Days (WD): 1-3, 2011.
[56] I. Krontiris, T. Dimitriou F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. 13th European Wireless Conference, 2007.
[57] H. Esquivel-Vargas, M. Caselli, A. Peter, “Automatic deployment of specification-based intrusion detection in the BACnet protocol,” in Proc. the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy: 25-36, 2017.
[58] H. Bostani, M. Sheikhan, “Hybrid of anomaly-based and specification-based ids for internet of things using unsupervised opf based on mapreduce approach,” Comput. Commun., 98: 52-71 2017.
[59] Y. Otoum, D. Liu, A. Nayak, “DL‐IDS: a deep learning–based intrusion detection framework for securing IoT,” Trans. Emerg. Telecommun. Technol., 33(3): 3803, 2022.
[60] E. Ngai, J. Liu, M. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in Proc. 2006 IEEE International Conference on Communications , 2006.
[61] S. S. Doumit, D. P. Agrawal, “Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks,” in Proc. IEEE Military Communications Conference (MILCOM’03), 2003.
[62] J. P. Amaral, L. M. Oliveira, J. J. P. C. Rodrigues, G. Han, L. Shu, “Policy and network-based intrusion detection system for IPv6-enabled wireless sensor networks,” in Proc. IEEE International Conference on Communications (ICC): 1796-1801, 2014.
[63] J. M. R. Danda, C. Hota, “Attack identification framework for IoT devices,” in Advances in Intelligent Systems and Computing, 434: 505-513, Information Systems Design and Intelligent Applications, Springer, 2016.
[64] H. Sedjelmaci, S. M. Senouci, "Efficient and lightweight intrusion detection based on nodes' behaviors in wireless sensor networks," in Proc. Global Information Infrastructure Symposium - GIIS 2013: 1-6, 2013.
[65] K. M. J. Haataja, New efficient intrusion detection and prevention system for Bluetooth networks,” in Proc. the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, 2010.
[66] T. Oconnor, D. Reeves, “Bluetooth network-based misuse detection,” in Proc. Annual Computer Security Applications Conference (ACSAC): 377-391, 2008.
[67] L. Wallgren, S. Raza, T. Voigt, “Routing attacks and countermeasures in the RPL-Based internet of things,” Int. J. Distrib. Sens. Netw., 9(8), 2013.
[68] V. Garcia-Font, C. Garrigues, H. Rifà-Pous, “Attack classification schema for smart city WSNs,” Sensors, 17(4):771, 2017.
[69] T. K. Buennemeyer, T. M. Nelson, L. M. Clagett, J. P. Dunning, R. C. Marchany, J. G. Tront, "Mobile device profiling and intrusion detection using smart batteries," in Proc. 41st Annual Hawaii International Conference on System Sciences (HICSS 2008) :296-296, 2008.
[70] I. Onat, A. Miri, “A real-time node-based traffic anomaly detection algorithm for wireless sensor networks,” in Proc. 2005 Systems Communications, 2005.
[71] D. Midi, A. Rullo, A. Mudgerikar, E. Bertino, “Kalis—A system for knowledge-driven adaptable intrusion detection for the Internet of Things,” in Proc. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS): 656-666, 2017.
[72] T. Lee, C. Wen, L. Chang, H. Chiang, M. Hsieh, “A lightweight intrusion detection schemebased on energy consumption analysis in 6LowPAN,” in Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 1205-1213 2014.
[73] S. Raza, L. Wallgren, T. Voigt, “SVELTE: Real-time intrusion detection in the Internet of Things,” Ad Hoc Networks, 11(8): 2661-2674, 2013.
[74] T. Matsunaga, K. Toyoda, L. Sasase, “Low false alarm rate RPL network monitoring system by considering timing inconstancy between the rank measurements,” in Proc. 2014 11th International Symposium on Wireless Communications Systems (ISWCS): 427-431, 2014.
[75] G. Han, J. Jiang, W. Shen, L. Shu, J. Rodrigues, “IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks,” IET Inf. Secur., 7(2):97-105, 2013.
[76] S. Wu Kim, “Physical integrity check in cooperative relay communications,” IEEE Trans. Wireless Commun., 14(11): 6401-6413, 2015.
[77] R. Ahmad, I. Alsmadi, W. Alhamdani, L. Tawalbeh, “A comprehensive deep learning benchmark for IoT IDS,” Comput. Secur., 114: 102588, 2022.
[78] L. Besson, P. Leleu, "A distributed intrusion detection system for ad-hoc wireless sensor networks: The AWISSENET distributed intrusion detection system," in Proc. 2009 16th International Conference on Systems, Signals and Image Processing: 1-3, 2009.
[79] D. Summerville, K. M Zach, Y. Chen, “Ultra-lightweight deep packet anomaly detection for internet of things devices,” in Proc. 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC): 1-8, 2015 .
[80] M. Talukder, S. Sharmin, S. Uddin et al., “MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs,” Int. J. Inf. Secur., 2024.
[81] E. Cho, J. Kim, C. Hong, “Attack model and detection scheme for botnet on 6LoWPAN,” in Proc. Asia-Pacific Network Operations and Management Symposium, 515-518, 2009.
[82] D. Shreenivas, S. Raza, T. Voigt, “Intrusion detection in the RPL-connected 6LoWPAN Networks,” in Proc. 3rd ACM International Workshop on IoT Privacy, Trust, and Security: 31-38 2017.
[83] Z. Banković, José M. Moya, A. Araujo, J. Goyeneche, “Intrusion detection in sensor networks using clustering and immune systems,” in Proc. 10th international conference on Intelligent data engineering and automated learning (IDEAL'09): 408-415, 2009.
[84] D. Hadžiosmanović, R. Sommer, E. Zambon, P. Hartel, “Through the eye of the PLC: semantic security monitoring for industrial processes,” in Proc. 30th Annual Computer Security Applications Conference: 126-135, 2014.
[85] D. Oh, D. Kim, W. Ro, “A malicious pattern detection engine for embedded security systems in the Internet of Things,” Sensors, 14(12): 24188-24211, 2014.
[86] H. Sedjelmaci, S. Mohammed Senouci, M. Al-Bahri, “A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology,” in Proc. 2016 IEEE International Conference on Communications (ICC): 1-6, 2016.
[87] X. Song, G. Chen, X. Li, “A weak hidden Markov Model based intrusion detection method for wireless sensor networks,” in Proc. 2010 International Conference on Intelligent Computing and Integrated Systems: 887-889, 2010.
[88] L. Deng, D. Li, X. Yao, D. Cox, H. Wang, “Mobile network intrusion detection for IoT system based on transfer learning algorithm,” Cluster Comput., 1-16, 2018.
[89] L. Liu, B. Xu, X. Zhang, X. Wu, “An intrusion detection method for internet of things based on suppressed fuzzy clustering,” EURASIP J. Wireless Commun. Networking, 113, 2018.
[90] A. Agah, S. K. Das, K. Basu, M. Asadi, “Intrusion detection in sensor networks: A non-cooperative game approach,” in Proc. 3rd IEEE International Symposium on Network Computing and Applications (NCA’04): 343-346, 2004.
[91] A. Agah, S. K. Das, “Preventing DoS attacks in wireless sensor networks: A repeated game theory approach,” Int. J. Network Secur., 5(2): 145-153, 2007.
[92] K. Yadav, A. Srinivasan, “iTrust: an integrated trust framework for wireless sensor networks,” in Proc. the 2010 ACM Symposium on Applied Computing: 1466-1471, 2010.
[93] C. Cervantes, D. Poplade, M. Nogueira, A. Santos, “Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things,” in Proc. 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM): 606-611, 2015.
[94] A. Khan, Z. Herrmann, “A trust based distributed intrusion detection mechanism for internet of things,” in Proc. 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA): 1169-1176, 2017 .
[95] T. Jiang, G. Wang, H. Yu, “A dynamic intrusion detection scheme for cluster-based wireless sensor networks,” in Proc. World Automation Congress 2012: 259-261, 2012.
[96] A. Arrington, L. Barnett, R. Rufus, A. Esterline, “Behavioral modeling intrusion detection system (bmids) using internet of things (iot) behavior-based anomaly detection via immunity-inspired algorithms,” in Proc. 2016 25th International Conference on Computer Communication and Networks (ICCCN): 1-6, 2016.
[97] C. Liu, J. Yang, R. Chen, Y. Zhang, J. Zeng, “Research on immunity-based intrusion detection technology for the internet of things,” in Proc. 2011 Seventh International Conference on Natural Computation, 1: 212-216, 2011.
[98] V. Bhuse, A. Gupta, “Anomaly intrusion detection in wireless sensor networks,” J. High Speed Networks, 15(1): 33-51, 2006.
[99] H. Arolkar, S. Sheth, V. Tamhane, “Ant colony based approach for intrusion detection on cluster heads in WSN,” in Proc. ICCCS: 523-526, 2011.
[100] A. Hassanzadeh, R. Stoleru, “Towards optimal monitoring in cooperative ids for resource constrained wireless networks,” in Proc. 20th International Conference on Computer Communications and Networks (ICCCN): 1-8, 2011.
[101] I. Onat, A. Miri, “An intrusion detection system for wireless sensor networks,” in Proc. IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2005.
[102] B. Stelte, G Rodosek, “Thwarting attacks on zigbee-removal of the killerbee stinger,” in Proc. the 9th International Conference on Network and Service Management (CNSM): 219-226, 2013.
[103] N. Kumar, E. Nigussie, R. K. Kanth, S. Virtanen, J. Isoaho, “Distributed internal anomaly detection system for internet-of-things,” in Proc. 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC): 319-320, 2016.
[104] T. Luo, S. Nagarajan, “Distributed anomaly detection using autoencoder neural networks in wsn for iot,” in Proc. 2018 IEEE International Conference on Communications (ICC): 1-6, 2018.
[105] O. Can, O. K. Sahingoz, “A survey of intrusion detection systems in wireless sensor networks,” in Proc. 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO): 1-6, 2015.
[106] A. Amouri, V. Alaparthy, S. Morgera, “Cross layer-based intrusion detection based on network behavior for IoT,” in Proc. 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON): 1-4, 2018.
[107] L. Coppolino, S. D. Antonio, A. Garofalo, L. Romano, “Applying data mining techniques to intrusion detection in wireless sensor networks,” in Proc. 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing: 247-254, 2013.
[108] N. Abhishek, T. Lim, B. Sikdar, A. Tandon, “An intrusion detection system for detecting compromised gateways in clustered IoT networks,” in Proc. 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR): 1-6, 2018.
[109] S. Rajasegarar, C. Leckie, M. Palaniswami, J. C. Bezdek, “Quarter sphere based distributed anomaly detection in wireless sensor networks,” in Proc. IEEE ICC ’07, 2007.
[110] S. Misra, P. Venkata, H. Agarwal, A. Saxena, M. S. Obaidat, “A learning automata based solution for preventing distributed denial of service in Internet of things,” in Proc. 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing: 114-122, 2011.
[111] Y. Fu, Z. Yan, J. Cao, O. Koné, X. Cao, “An automata based intrusion detection method for internet of things,” Mobile Inf. Syst., 2017.
[112] C. Wang, T. Feng, J. Kim, G. Wang, W. Zhang, “Catching packet droppers and modifiers in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., 23(5): 835-843, 2012.
[113] F. Bao, R. Chen, M. J. Chang, J. H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trustbased routing and intrusion detection,” IEEE Trans. Netw. Serv. Manag., 9(2): 169-183, 2012.
[114] S. Etalle, “Network monitoring of industrial control systems: The lessons of security matters, in Proc. ACM Workshop on Cyber-Physical Systems Security & Privacy: 1–1, 2019.
[115] N. Kaur, P. Rattan, “A critical review of intrusion detection systems in WSN: challenges & future directions,” Ann. Rom. Soc. Cell Biol., 25(4): 3020-3028, 2021.
[116] T. Wang, Z. Liang, C. Zhao, “A detection method for routing attacks of wireless sensor network based on fuzzy C-means clustering,” in Proc. 6th International Conference on Fuzzy Systems and Knowledge Discovery: 445-449, 2009 .
[117] K. Q. Yan, S. C. Wang, C. W. Liu, “A hybrid intrusion detection system of cluster-based wireless sensor networks,” in Proc. International Multi Conference of Engineers and Computer Scientists: 1, 2009.
[118] N. Chitradevi, V. Palanisamy, K. Baskaran, S. Prabeela, “Efficient distributed clustering-based anomaly detection algorithm for sensor stream in clustered wireless sensor networks,” Eur. J. Sci. Res., 54(4):484-498, 2011.
[119] M. Chauhan, M. Agarwal, “Study of various intrusion detection systems: A Survey,” in Smart and Sustainable Intelligent Systems: 355-372, 2021.
[120] Z. Ahmad, A. Shahid Khan, , C. Shiang, J. Abdullah, F. Ahmad, “Network intrusion detection system: A systematic study of machine learning and deep learning approaches,” Trans. Emerg. Telecommun. Technol., 32(1): e4150, 2021.
[121] A. A. Anitha, L. Arockiam, “A review on intrusion detection systems to secure IoT networks, “Int. J. Comput. Networks Appl., 9(1): 38-50, 2022.
[122] Y. Farooq, H. Beenish, M. Fahad, “Intrusion detection system in wireless sensor networks-a comprehensive survey,” in Proc. 2019 Second International Conference on Latest trends in Electrical Engineering and Computing Technologies (INTELLECT): 1-6, 2019.
[123] N. Singh, D. Virmani, X. Z Gao,”A fuzzy logic-based method to avert intrusions in wireless sensor networks using WSN-DS dataset,” Int. J. Comput. Intell. Appl., 19(03): 2050018, 2020.
[124] M. Wazid, A. K. Das, S. Kumari, M. K. Khan, “Design of sinkhole node detection mechanism for hierarchical wireless sensor networks,” Secur. Commun. Networks, 9(17): 4596-4614, 2016.
[125] G. Liu, H. Zhao, F. Fan, , Liu, G, Q. Xu, , S. Nazir, “An enhanced intrusion detection model based on improved kNN in WSNs,” Sensors, 22(4): 1407, 2022 .
[126] B. Hasan, S. Alani, M. A. Saad, “Secured node detection technique based on artificial neural network for wireless sensor network,” Int. J. Electr. Comput. Eng., 11(1): 2088-8708, 2021.
[127] W. Huai-bin, Y. Zheng, W. Chun-dong, “Intrusion detection for wireless sensor networks based on multi-agent and refined clustering,” in Proc. International Conference on Communications and Mobile Computing: 450-454, 2009 .
[128] S. Siripanadorn, W. Hattagam, N. Teaumroong, “Anomaly detection in wireless sensor networks using self-organizing map and wavelets,” Int. J. Common. 4(3):74-83, 2010.
[129] M. Sa, M. R. Nayak, A. K. Rath, “A simple agent based model for detecting abnormal event patterns in a distributed wireless sensor networks,” Int. J. Comput. Sci. Secur., 4(6):580-588, 2011.
[130] H. Sedjelmaci, M. Feham, “Novel hybrid intrusion detection system for clustered wireless sensor network,” Int. J. Netw. Secur. Appl., 3(4):1-14, 2011.
[131] C. Henry Tseng, Y. Chang, “EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network,” Comput. Secur., 133: 103419, 2023.
[132] M. Hosseini Shirvani, M. Masdari, “A survey study on trust-based security in internet of things: challenges and issues, Internet Things, 100640, 2022.
[133] D. Jayanayudu, A. C. Sudhir, “Shuffled frog leap and ant lion optimization for intrusion detection in iot-based WSN,” in Proc. Fourth International Conference on Computer and Communication Technologies, 606, 2023.
[134] M. Hosseini Shirvani, A. M. Rahmani, A. Sahafi, “An iterative mathematical decision model for cloud migration: A cost and security risk approach,” Softw. Pract. Exper., 2017: 1-37, 2017.
[135] M. Saied, S. Guirguis, M. Madbouly, “Review of artificial intelligence for enhancing intrusion detection in the internet of things,” Eng. Appl. Artif. Intell., 127(A): 107231, 2024.
[136] L. Webber, A. Arafa, A. Mehbodniya, S. Karupusamy, B. Sha, A. Dahiya, P. Kanani, “An efficient intrusion detection framework for mitigating blackhole and sinkhole attacks in healthcare wireless sensor networks,” Comput. Electr. Eng., 111: 108964, 2023.
[137] M. S. Korium, M. Saber, A. Beattie, A. Narayanan, S. Sahoo, P. H. J. Nardelli, “Intrusion detection system for cyberattacks in the Internet of Vehicles environment,” Ad Hoc Networks, 153: 103330, 2024.
[138] E. Ntizikira, L. Wang, J. Chen, K. Saleem, “Honey-block: Edge assisted ensemble learning model for intrusion detection and prevention using defense mechanism in IoT,” Comput. Commun., 214: 1-17, 2024.
[139] V. Sivagaminathan, M. Sharm, S. Henge, “Intrusion detection systems for wireless sensor networks using computational intelligence techniques,” Cybersecurity, 6: 27, 2023.
آمار
تعداد مشاهده مقاله: 197
تعداد دریافت فایل اصل مقاله: 152