Sensors,
Journal Year:
2024,
Volume and Issue:
24(17), P. 5834 - 5834
Published: Sept. 8, 2024
The
Internet
of
Things
(IoT)
is
a
significant
technological
advancement
that
allows
for
seamless
device
integration
and
data
flow.
development
the
IoT
has
led
to
emergence
several
solutions
in
various
sectors.
However,
rapid
popularization
also
its
challenges,
one
most
serious
challenges
security
IoT.
Security
major
concern,
particularly
routing
attacks
core
network,
which
may
cause
severe
damage
due
information
loss.
Routing
Protocol
Low-Power
Lossy
Networks
(RPL),
protocol
used
devices,
faced
with
selective
forwarding
attacks.
In
this
paper,
we
present
federated
learning-based
detection
technique
detecting
attacks,
termed
FL-DSFA.
A
lightweight
model
involving
Attack
Dataset
(IRAD),
comprises
Hello
Flood
(HF),
Decreased
Rank
(DR),
Version
Number
(VN),
increase
efficiency.
on
threaten
system
since
they
mainly
focus
essential
elements
RPL.
components
include
control
messages,
topologies,
repair
procedures,
resources
within
sensor
networks.
Binary
classification
approaches
have
been
assess
training
efficiency
proposed
model.
step
includes
implementation
machine
learning
algorithms,
including
logistic
regression
(LR),
K-nearest
neighbors
(KNN),
support
vector
(SVM),
naive
Bayes
(NB).
comparative
analysis
illustrates
study,
SVM
KNN
classifiers,
exhibits
highest
accuracy
during
achieves
efficient
runtime
performance.
demonstrates
exceptional
performance,
achieving
prediction
precision
97.50%,
an
95%,
recall
rate
98.33%,
F1
score
97.01%.
It
outperforms
current
leading
research
field,
results,
scalability,
enhanced
privacy.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 25469 - 25490
Published: Jan. 1, 2024
The
Internet
of
Things
(IoT)
has
revolutionized
various
domains,
enabling
interconnected
devices
to
communicate
and
exchange
data.
integration
Artificial
Intelligence
(AI)
in
IoT
systems
further
enhances
their
capabilities
potential
benefits.
Unfortunately,
the
era
AI,
ensuring
privacy
security
faces
novel
specific
challenges.
is
imperative,
necessitating
comprehensive
strategies,
including
comprehension
challenges,
implementation
AI
methodologies,
adoption
resilient
frameworks,
handling
ethical
concerns
construct
dependable
secure
systems.
It
vital
note
that
term
'security'
encompasses
a
more
view
than
cyberattacks
alone.
Therefore,
with
an
emphasis
on
securing
against
cyberattacks,
this
survey
also
includes
physical
threats
IoT.
investigates
complexities
solutions
for
systems,
placing
particular
AI-based
techniques.
paper
undertakes
categorization
challenges
associated
security,
utilization
presents
frameworks
underscores
considerations,
provides
insights
derived
from
practical
case
studies.
Furthermore,
sheds
light
emerging
trends
concerning
era.
This
significant
contributions
understanding
establishing
through
exhaustive
examination
present
condition
ramifications
it.
Deleted Journal,
Journal Year:
2024,
Volume and Issue:
4(2), P. 20 - 62
Published: May 23, 2024
Cutting-edge
technologies
have
been
widely
employed
in
healthcare
delivery,
resulting
transformative
advances
and
promising
enhanced
patient
care,
operational
efficiency,
resource
usage.
However,
the
proliferation
of
networked
devices
data-driven
systems
has
created
new
cybersecurity
threats
that
jeopardize
integrity,
confidentiality,
availability
critical
data.
This
review
paper
offers
a
comprehensive
evaluation
current
state
context
smart
healthcare,
presenting
structured
taxonomy
its
existing
cyber
threats,
mechanisms
essential
roles.
study
explored
(SHSs).
It
identified
discussed
most
pressing
attacks
SHSs
face,
including
fake
base
stations,
medjacking,
Sybil
attacks.
examined
security
measures
deployed
to
combat
SHSs.
These
include
cryptographic-based
techniques,
digital
watermarking,
steganography,
many
others.
Patient
data
protection,
prevention
breaches,
maintenance
SHS
integrity
are
some
roles
ensuring
sustainable
healthcare.
The
long-term
viability
depends
on
constant
assessment
risks
harm
providers,
patients,
professionals.
aims
inform
policymakers,
practitioners,
technology
stakeholders
about
imperatives
best
practices
for
fostering
secure
resilient
ecosystem
by
synthesizing
insights
from
multidisciplinary
perspectives,
such
as
cybersecurity,
management,
sustainability
research.
Understanding
recent
is
controlling
escalating
networks
encouraging
intelligent
delivery.
Artificial Intelligence Review,
Journal Year:
2024,
Volume and Issue:
57(9)
Published: Aug. 12, 2024
The
Routing
Protocol
for
Low-Power
and
Lossy
Networks
(RPL)
plays
a
crucial
role
in
the
Internet
of
Things
(IoT)
Wireless
Sensor
Networks.
However,
ensuring
RPL
protocol's
security
is
paramount
due
to
its
susceptibility
various
attacks.
These
attacks
disrupt
data
transmission
can
substantially
damage
network
topology
by
depleting
critical
resources.
This
paper
presents
comprehensive
survey
addressing
several
key
components
response
this
challenge.
Firstly,
it
categorizes
potential
targeting
protocol
based
on
their
impact
performance
explores
effective
mechanisms
secure
against
them.
study
identifies
most
destructive
problematic
threats
affecting
functionality.
Furthermore,
provides
valuable
insights
into
challenges
discusses
real-world
implications
deploying
maintaining
IoT
sensor
networks.
To
underscore
uniqueness
survey,
we
offer
qualitative
comparison
with
other
surveys
same
field.
While
acknowledges
certain
limitations,
such
as
intentionally
focusing
only
reviewing
RPL-specific
attacks,
reference
future
researchers
seeking
comprehend
mitigate
RPL.
It
also
suggests
areas
further
research
domain.
Ad Hoc Networks,
Journal Year:
2024,
Volume and Issue:
163, P. 103576 - 103576
Published: June 13, 2024
The
Internet
of
Things
(IoT)
has
recently
gained
significance
as
a
means
connecting
various
physical
devices
to
the
Internet,
enabling
innovative
applications.
However,
security
IoT
networks
is
significant
concern
due
large
volume
data
generated
and
transmitted
over
them.
limited
resources
devices,
along
with
their
mobility
diverse
characteristics,
pose
challenges
for
maintaining
in
routing
protocols,
such
Routing
Protocol
Low-Power
Lossy
Networks
(RPL).
This
lacks
effective
defense
mechanisms
against
attacks,
including
Sybil
rank
attacks.
Various
techniques
have
been
proposed
address
this
issue,
cryptography
intrusion-detection
systems.
use
these
on
nodes
by
low
power
lossy
nature,
primarily
computational
overhead
they
involve.
In
addition,
conventional
trust-management
systems
addressing
concerns
need
be
improved
high
computation,
memory,
energy
costs.
Therefore,
paper
presents
novel,
Lightweight,
Efficient
Trust-based
Mechanism
(LETM-IoT)
resource-limited
mitigate
We
conducted
extensive
simulations
Cooja,
Contiki
OS
simulator,
assess
efficacy
LETM-IoT
three
types
attack
(A,
B,
C).
A
comparison
was
also
made
standard
RPL
state-of-the-art
approaches.
experimental
findings
show
that
outperforms
both
terms
average
packet-delivery
ratio
0.20
percentage
points,
true-positive
1.34
consumption
2.5%,
memory
utilization
19.42%.
obtained
results
consumes
increased
storage
5.02%
compared
existence
an
embedded
module.
Sensors,
Journal Year:
2024,
Volume and Issue:
24(6), P. 1775 - 1775
Published: March 9, 2024
The
Internet
of
Things
(IoT)
is
empowering
various
sectors
and
aspects
daily
life.
Green
IoT
systems
typically
involve
Low-Power
Lossy
Networks
(LLNs)
with
resource-constrained
nodes.
Lightweight
routing
protocols,
such
as
the
Routing
Protocol
for
(RPL),
are
increasingly
being
applied
efficient
communication
in
LLNs.
However,
RPL
susceptible
to
attacks,
black
hole
attack,
which
compromises
network
security.
existing
attack
detection
methods
rely
on
static
thresholds
unreliable
metrics
compute
trust
scores.
This
results
increasing
false
positive
rates,
especially
environments.
To
overcome
these
limitations,
we
propose
a
delta-threshold-based
model
called
Optimized
Reporting
Module
(ORM)
mitigate
attacks
systems.
proposed
scheme
comprises
both
direct
indirect
utilizes
forgetting
curve.
Direct
derived
from
performance
metrics,
including
honesty,
dishonesty,
energy,
unselfishness.
Indirect
requires
use
similarity.
curve
provides
mechanism
consider
most
significant
recent
feedback
trust.
assess
efficacy
scheme,
compare
it
well-known
trust-based
scheme.
Simulation
demonstrate
that
has
higher
rate
low
alarms
compared
confirming
applicability
green
International Journal of Advanced Computer Science and Applications,
Journal Year:
2024,
Volume and Issue:
15(4)
Published: Jan. 1, 2024
Given
the
proliferation
of
connected
devices
and
evolving
threat
landscape,
intrusion
detection
plays
a
pivotal
role
in
safeguarding
IoT
networks.
However,
traditional
methodologies
struggle
to
adapt
dynamic
diverse
settings
environments.
To
address
these
challenges,
this
study
proposes
an
innovative
framework
that
leverages
machine
learning,
specifically
Red
Fox
Optimization
(RFO)
for
feature
selection,
Attention-based
Bidirectional
Long
Short-Term
Memory
(Bi-LSTM).
Additionally,
integration
blockchain
technology
is
explored
provide
immutable
tamper-proof
logs
detected
intrusions,
bolstering
overall
security
system.
Previous
research
has
highlighted
limitations
conventional
techniques
networks,
particularly
accommodating
data
sources
rapidly
attack
strategies.
The
attention
mechanism
enables
model
concentrate
on
pertinent
features,
enhancing
accuracy
efficiency
anomaly
malicious
activity
traffic.
Furthermore,
utilization
RFO
selection
aims
reduce
dimensionality
enhance
scalability
Moreover,
inclusion
enhances
by
ensuring
integrity
immutability
logs.
proposed
implemented
using
Python
learning
tasks
Solidity
development.
Experimental
findings
demonstrate
efficacy
approach,
achieving
approximately
98.9%
real-world
datasets.
These
results
underscore
significance
advancing
practices.
By
amalgamating
optimization
techniques,
technology,
provides
robust
scalable
solution
fostering
improved
interconnected
Advances in information security, privacy, and ethics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 291 - 309
Published: Jan. 26, 2024
The
use
of
drones,
also
known
as
unmanned
aerial
vehicles
(UAVs),
has
significantly
transformed
multiple
industries
by
providing
innovative
solutions.
capability
drones
to
operate
above
restricted
areas
and
potentially
perform
malicious
activities
generated
apprehension
regarding
the
potential
risks
they
may
pose.
It
is
essential
for
governments
organizations
establish
robust
laws
protocols
guarantee
safety
responsible
drones.
advancement
drone
technology
should
prioritize
integration
measures,
such
secure
communication
geo-fencing,
mitigate
unauthorized
access
possible
exploitation
these
devices.
This
research
seeks
investigate
benefits
challenges
collaborations
between
governments,
companies,
security
agencies
in
addressing
concerns.
advantages
disadvantages
collaboration
order
ascertain
most
efficient
approach
creating
a
safe
favorable
atmosphere
have
been
deliberated.