Smart City Gnosys

Smart city article details

Title Machine Learning-Based Attacks Detection In Lot Networks Routing Protocols
ID_Doc 36037
Authors Kumar V.; Malik N.
Year 2024
Published 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024
DOI http://dx.doi.org/10.1109/ICRITO61523.2024.10522321
Abstract loT Devices and Sensors are increasingly being used in various sectors, including industrial architecture and smart cities. The security of sensor networks has gotten much attention recently. Introducing new loT networks has shifted the paradigm to vast Internet of Things (loT) networks. loT networks provide new applications and opportunities for WSN networks and open up new possibilities. However, the security of these networks must be taken carefully, and a new approach to loT network security must be proposed. The new options give way to new types of attacks, and the security of these networks becomes very critical. Routing in loT networks uses a different protocol for communication for low-power and lossy networks (RPL). These loT routing protocols are vulnerable to various attacks, such as rank attacks, hello flood attacks, and wormhole attacks. There are many techniques to prevent these attacks, but implementing security techniques in these networks may degrade the network's performance. Traditional security services such as secrecy, authentication, integrity, authorization, non-reputation, and availability make it harder to provide security in low-energy devices. This paper proposes a new machine-learning model for attack detection in loT networks based on parameters like packet received ratio, number of messages between nodes, and packet length or duration. Data is collected by a simulation network and analyzed using the proposed model, which gives good accuracy. © 2024 IEEE.
Author Keywords loT Attacks; Machine Learning; Network Security; Sensor Networks


Similar Articles


Id Similarity Authors Title Published
33860 View0.869Tyagi K.; Ahlawat A.; Chaudhary H.Iot Network Security: Netflow Traffic Analysis And Attack Classification Using Machine Learning Techniques2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions), ICRITO 2024 (2024)
47090 View0.866Sahay R.; Nayyar A.; Shrivastava R.K.; Bilal M.; Singh S.P.; Pack S.Routing Attack Induced Anomaly Detection In Iot Network Using Rbm-LstmICT Express, 10, 3 (2024)
30308 View0.861Kaveh A.; Rohner C.; Johnsson A.Impact Of Attack Variations And Topology On Iot Intrusion Detection Model GeneralizabilityProceedings - 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems, MASS 2024 (2024)
5644 View0.861Ahmadi K.; Javidan R.A Trust Based Anomaly Detection Scheme Using A Hybrid Deep Learning Model For Iot Routing Attacks MitigationIET Information Security, 2024, 1 (2024)