FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning DOI Creative Commons

Rabia Khan,

Noshina Tariq, Muhammad Imran Ashraf

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(17), P. 5834 - 5834

Published: Sept. 8, 2024

The Internet of Things (IoT) is a significant technological advancement that allows for seamless device integration and data flow. development the IoT has led to emergence several solutions in various sectors. However, rapid popularization also its challenges, one most serious challenges security IoT. Security major concern, particularly routing attacks core network, which may cause severe damage due information loss. Routing Protocol Low-Power Lossy Networks (RPL), protocol used devices, faced with selective forwarding attacks. In this paper, we present federated learning-based detection technique detecting attacks, termed FL-DSFA. A lightweight model involving Attack Dataset (IRAD), comprises Hello Flood (HF), Decreased Rank (DR), Version Number (VN), increase efficiency. on threaten system since they mainly focus essential elements RPL. components include control messages, topologies, repair procedures, resources within sensor networks. Binary classification approaches have been assess training efficiency proposed model. step includes implementation machine learning algorithms, including logistic regression (LR), K-nearest neighbors (KNN), support vector (SVM), naive Bayes (NB). comparative analysis illustrates study, SVM KNN classifiers, exhibits highest accuracy during achieves efficient runtime performance. demonstrates exceptional performance, achieving prediction precision 97.50%, an 95%, recall rate 98.33%, F1 score 97.01%. It outperforms current leading research field, results, scalability, enhanced privacy.

Language: Английский

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey DOI Creative Commons
Mamoona Humayun, Noshina Tariq,

Majed Alfayad

et al.

IEEE Access, Journal Year: 2024, Volume and Issue: 12, P. 25469 - 25490

Published: Jan. 1, 2024

The Internet of Things (IoT) has revolutionized various domains, enabling interconnected devices to communicate and exchange data. integration Artificial Intelligence (AI) in IoT systems further enhances their capabilities potential benefits. Unfortunately, the era AI, ensuring privacy security faces novel specific challenges. is imperative, necessitating comprehensive strategies, including comprehension challenges, implementation AI methodologies, adoption resilient frameworks, handling ethical concerns construct dependable secure systems. It vital note that term 'security' encompasses a more view than cyberattacks alone. Therefore, with an emphasis on securing against cyberattacks, this survey also includes physical threats IoT. investigates complexities solutions for systems, placing particular AI-based techniques. paper undertakes categorization challenges associated security, utilization presents frameworks underscores considerations, provides insights derived from practical case studies. Furthermore, sheds light emerging trends concerning era. This significant contributions understanding establishing through exhaustive examination present condition ramifications it.

Language: Английский

Citations

17

Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles DOI Creative Commons
Guma Ali, Maad M. Mijwil

Deleted Journal, Journal Year: 2024, Volume and Issue: 4(2), P. 20 - 62

Published: May 23, 2024

Cutting-edge technologies have been widely employed in healthcare delivery, resulting transformative advances and promising enhanced patient care, operational efficiency, resource usage. However, the proliferation of networked devices data-driven systems has created new cybersecurity threats that jeopardize integrity, confidentiality, availability critical data. This review paper offers a comprehensive evaluation current state context smart healthcare, presenting structured taxonomy its existing cyber threats, mechanisms essential roles. study explored (SHSs). It identified discussed most pressing attacks SHSs face, including fake base stations, medjacking, Sybil attacks. examined security measures deployed to combat SHSs. These include cryptographic-based techniques, digital watermarking, steganography, many others. Patient data protection, prevention breaches, maintenance SHS integrity are some roles ensuring sustainable healthcare. The long-term viability depends on constant assessment risks harm providers, patients, professionals. aims inform policymakers, practitioners, technology stakeholders about imperatives best practices for fostering secure resilient ecosystem by synthesizing insights from multidisciplinary perspectives, such as cybersecurity, management, sustainability research. Understanding recent is controlling escalating networks encouraging intelligent delivery.

Language: Английский

Citations

8

RPL-based attack detection approaches in IoT networks: review and taxonomy DOI Creative Commons

Nadia A. Alfriehat,

Mohammed Anbar, Mohammad Adnan Aladaileh

et al.

Artificial Intelligence Review, Journal Year: 2024, Volume and Issue: 57(9)

Published: Aug. 12, 2024

The Routing Protocol for Low-Power and Lossy Networks (RPL) plays a crucial role in the Internet of Things (IoT) Wireless Sensor Networks. However, ensuring RPL protocol's security is paramount due to its susceptibility various attacks. These attacks disrupt data transmission can substantially damage network topology by depleting critical resources. This paper presents comprehensive survey addressing several key components response this challenge. Firstly, it categorizes potential targeting protocol based on their impact performance explores effective mechanisms secure against them. study identifies most destructive problematic threats affecting functionality. Furthermore, provides valuable insights into challenges discusses real-world implications deploying maintaining IoT sensor networks. To underscore uniqueness survey, we offer qualitative comparison with other surveys same field. While acknowledges certain limitations, such as intentionally focusing only reviewing RPL-specific attacks, reference future researchers seeking comprehend mitigate RPL. It also suggests areas further research domain.

Language: Английский

Citations

6

Graph attention layer-based WideResNet for efficient adversarial attack detection in wireless body area networks DOI

Anil Kumar Pipal,

R. Jagadeesh Kannan

Information Security Journal A Global Perspective, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 15

Published: April 21, 2025

Language: Английский

Citations

0

LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks DOI Creative Commons

Jawad Hassan,

Adnan Sohail, Ali Ismail Awad

et al.

Ad Hoc Networks, Journal Year: 2024, Volume and Issue: 163, P. 103576 - 103576

Published: June 13, 2024

The Internet of Things (IoT) has recently gained significance as a means connecting various physical devices to the Internet, enabling innovative applications. However, security IoT networks is significant concern due large volume data generated and transmitted over them. limited resources devices, along with their mobility diverse characteristics, pose challenges for maintaining in routing protocols, such Routing Protocol Low-Power Lossy Networks (RPL). This lacks effective defense mechanisms against attacks, including Sybil rank attacks. Various techniques have been proposed address this issue, cryptography intrusion-detection systems. use these on nodes by low power lossy nature, primarily computational overhead they involve. In addition, conventional trust-management systems addressing concerns need be improved high computation, memory, energy costs. Therefore, paper presents novel, Lightweight, Efficient Trust-based Mechanism (LETM-IoT) resource-limited mitigate We conducted extensive simulations Cooja, Contiki OS simulator, assess efficacy LETM-IoT three types attack (A, B, C). A comparison was also made standard RPL state-of-the-art approaches. experimental findings show that outperforms both terms average packet-delivery ratio 0.20 percentage points, true-positive 1.34 consumption 2.5%, memory utilization 19.42%. obtained results consumes increased storage 5.02% compared existence an embedded module.

Language: Английский

Citations

3

Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks DOI Creative Commons
Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(6), P. 1775 - 1775

Published: March 9, 2024

The Internet of Things (IoT) is empowering various sectors and aspects daily life. Green IoT systems typically involve Low-Power Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for (RPL), are increasingly being applied efficient communication in LLNs. However, RPL susceptible to attacks, black hole attack, which compromises network security. existing attack detection methods rely on static thresholds unreliable metrics compute trust scores. This results increasing false positive rates, especially environments. To overcome these limitations, we propose a delta-threshold-based model called Optimized Reporting Module (ORM) mitigate attacks systems. proposed scheme comprises both direct indirect utilizes forgetting curve. Direct derived from performance metrics, including honesty, dishonesty, energy, unselfishness. Indirect requires use similarity. curve provides mechanism consider most significant recent feedback trust. assess efficacy scheme, compare it well-known trust-based scheme. Simulation demonstrate that has higher rate low alarms compared confirming applicability green

Language: Английский

Citations

1

Enhancing IoT Network Security: ML and Blockchain for Intrusion Detection DOI Open Access

N. Sunanda,

K. Shailaja,

Prabhakar Kandukuri

et al.

International Journal of Advanced Computer Science and Applications, Journal Year: 2024, Volume and Issue: 15(4)

Published: Jan. 1, 2024

Given the proliferation of connected devices and evolving threat landscape, intrusion detection plays a pivotal role in safeguarding IoT networks. However, traditional methodologies struggle to adapt dynamic diverse settings environments. To address these challenges, this study proposes an innovative framework that leverages machine learning, specifically Red Fox Optimization (RFO) for feature selection, Attention-based Bidirectional Long Short-Term Memory (Bi-LSTM). Additionally, integration blockchain technology is explored provide immutable tamper-proof logs detected intrusions, bolstering overall security system. Previous research has highlighted limitations conventional techniques networks, particularly accommodating data sources rapidly attack strategies. The attention mechanism enables model concentrate on pertinent features, enhancing accuracy efficiency anomaly malicious activity traffic. Furthermore, utilization RFO selection aims reduce dimensionality enhance scalability Moreover, inclusion enhances by ensuring integrity immutability logs. proposed implemented using Python learning tasks Solidity development. Experimental findings demonstrate efficacy approach, achieving approximately 98.9% real-world datasets. These results underscore significance advancing practices. By amalgamating optimization techniques, technology, provides robust scalable solution fostering improved interconnected

Language: Английский

Citations

1

Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids DOI

S. Shafi,

Noshina Tariq, Farrukh Aslam Khan

et al.

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 692 - 703

Published: Jan. 1, 2024

Language: Английский

Citations

1

Security of Unmanned Aerial Vehicles DOI

Rawish Butt,

Tayyab Rehman, Noshina Tariq

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 291 - 309

Published: Jan. 26, 2024

The use of drones, also known as unmanned aerial vehicles (UAVs), has significantly transformed multiple industries by providing innovative solutions. capability drones to operate above restricted areas and potentially perform malicious activities generated apprehension regarding the potential risks they may pose. It is essential for governments organizations establish robust laws protocols guarantee safety responsible drones. advancement drone technology should prioritize integration measures, such secure communication geo-fencing, mitigate unauthorized access possible exploitation these devices. This research seeks investigate benefits challenges collaborations between governments, companies, security agencies in addressing concerns. advantages disadvantages collaboration order ascertain most efficient approach creating a safe favorable atmosphere have been deliberated.

Language: Английский

Citations

0

Blockchain Sensor Network Based CPS Analysis in Healthcare System for Real Time Applications Using 6G IoT Model and Deep Learning Techniques DOI

Shubin Liao

Wireless Personal Communications, Journal Year: 2024, Volume and Issue: unknown

Published: May 22, 2024

Language: Английский

Citations

0