A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications (original) (raw)
References
Subramani, S., & Selvi, M. (2023). Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks. Optik,273, 170419. Google Scholar
Sharma, A., Bhatia, T., Katyar, A., et al. (2021). Wireless security-an introduction to wireless security protocols and their security flaws. Annals of the Romanian Society for Cell Biology,25(6), 11805–11812. Google Scholar
Abdullah, A., Hamad, R., Abdulrahman, M., Moala, H., & Elkhediri, S. (2019). Cybersecurity: A review of internet of things (IoT) security issues, challenges and techniques. In 2019 2nd International conference on computer applications & information security (ICCAIS) (pp. 1–6).
Sajid, M., Harris, A., & Habib, S. (2021). Internet of everything: Applications, and security challenges. In 2021 International conference on innovative computing (ICIC) (pp. 1–9).
Hameed, A., & Alomary, A. (2019). Security issues in IoT: A survey. In 2019 International conference on innovation and intelligence for informatics, computing, and technologies (3ICT) (pp. 1–5).
Mohanty, J., Mishra, S., Patra, S., Pati, B., & Panigrahi, C. R. (2021). Iot security, challenges, and solutions: A review. In C. R. Panigrahi, B. Pati, P. Mohapatra, R. Buyya, and K.-C. Li (Eds.), Progress in advanced computing and intelligent engineering (pp. 493–504). Singapore: Springer.
Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications,60, 19–31. Google Scholar
Liao, S., Zhou, C., Zhao, Y., Zhang, Z., Zhang, C., Gao, Y., & Zhong, G. (2020). A comprehensive detection approach of Nmap: Principles, rules and experiments. In 2020 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC) (pp. 64–71).
Shaker, A. M. N. F., & Mohamed, A. M. (2021). Zero click attack. In The international undergraduate research conference (vol. 5, pp. 46–49). The Military Technical College.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2017). Practical tools for attackers and defenders. In Network traffic anomaly detection and prevention (pp. 201–242). Springer.
Barik, K., Konar, K., Banerjee, A., Das, S., & Abirami, A. (2022). An exploration of attack patterns and protection approaches using penetration testing. In Intelligent data communication technologies and internet of things (pp. 491–503). Springer.
Basu, K., Krishnamurthy, P., Khorrami, F., & Karri, R. (2020). A theoretical study of hardware performance counters-based malware detection. IEEE Transactions on Information Forensics and Security,15, 512–525. Google Scholar
Singh, A. S. B., Yusof, Y., & Nathan, Y. (2021). Eagle: GUI-based penetration testing tool for scanning and enumeration. In 2021 14th International conference on developments in eSystems engineering (DeSE) (pp. 97–101).
Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications,40, 307–324. Google Scholar
Uçtu, G., Alkan, M., Doğru, İA., & Dörterler, M. (2021). A suggested testbed to evaluate multicast network and threat prevention performance of next generation firewalls. Future Generation Computer Systems,124, 56–67. Google Scholar
Noorallahzadeh, M. H., Alimoradi, R., & Gholami, A. (2022). Searchable encryption taxonomy: Survey. Journal of Applied Security Research, 18(4), 1–45.
Kumar, M., Jindal, M. K., & Kumar, M. (2022). A systematic survey on captcha recognition: Types, creation and breaking techniques. Archives of Computational Methods in Engineering,29(2), 1107–1136. Google Scholar
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering,2, 222–232. Google Scholar
Sharma, S., Nand, P., & Sharma, P. (2022). Intrusion detection and prevention systems using snort. In Advances in data science and management (pp. 473–486). Springer.
Porras, P. A., & Neumann, P. G. (1997). Emerald: Event monitoring enabling response to anomalous live disturbances. In Proceedings of the 20th national information systems security conference (vol. 3, pp. 353–365).
Nazir, R., Kumar, K., David, S., Ali, M., et al. (2021). Survey on wireless network security. Archives of computational methods in engineering (pp. 1–20).
Das, A., et al. (2022). Design and development of an efficient network intrusion detection system using ensemble machine learning techniques for WiFi environments. International Journal of Advanced Computer Science and Applications, 13(4), 856–866.
Ponnusamy, V., Humayun, M., Jhanjhi, N. Z., Yichiet, A., & Almufareh, M. F. (2022). Intrusion detection systems in internet of things and mobile ad-hoc networks. Computer Systems Science & Engineering,40(3), 1199–1215. Google Scholar
Zhang, Y., Pan, M., Song, L., Dawy, Z., & Han, Z. (2017). A survey of contract theory-based incentive mechanism design in wireless networks. IEEE Wireless Communications,24(3), 80–85. Google Scholar
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,16(1), 266–282. Google Scholar
Mitchell, R., & Chen, R. (2014). A survey of intrusion detection in wireless network applications. Computer Communications,42, 1–23. Google Scholar
Can, O., Sahingoz, O. K. (2015). A survey of intrusion detection systems in wireless sensor networks. In 2015 6th International conference on modeling, simulation, and applied optimization (ICMSAO) (pp. 1–6).
Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE,104(9), 1727–1765. Google Scholar
Al Waleed, S. (2017). A survey on security in wireless sensor networks. International Journal of Network Security & Its Applications (IJNSA),9(1), 25–32. Google Scholar
Ramotsoela, D., Abu-Mahfouz, A., & Hancke, G. (2018). A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study. Sensors,18(8), 2491. Google Scholar
Rakesh, S., & Vijay, A. A. (2019). Survey of intrusion detection techniques and architectures in wireless sensor networks. International Journal of Advanced Networking and Applications,10(4), 3925–3937. Google Scholar
Khan, K., Mehmood, A., Khan, S., Khan, M. A., Iqbal, Z., & Mashwani, W. K. (2020). A survey on intrusion detection and prevention in wireless ad-hoc networks. Journal of Systems Architecture,105, 101701. Google Scholar
Agrawal, S., Sarkar, S., Aouedi, O., Yenduri, G., Piamrat, K., Alazab, M., Bhattacharya, S., Maddikunta, P. K. R. & thippa R. G. (2022). Federated learning for intrusion detection system: Concepts, challenges and future directions. Computer Communications, 195, 346–361.
Shah, A. F. M. S., Qasim, A. N., Karabulut, M. A., Ilhan, H., & Islam, M. B. (2021). Survey and performance evaluation of multiple access schemes for next-generation wireless communication systems. IEEE Access,9, 113428–113442. Google Scholar
Olaby, O., Hamadache, M., Soper, D., Winship, P., & Dixon, R. (2022). Development of a novel railway positioning system using RFID technology. Sensors,22(6), 2401. Google Scholar
Lone, S. A., & Mir, A. H. (2021). A novel OTP based tripartite authentication scheme. International Journal of Pervasive Computing and Communications, 18(4), 437–459.
Peeters, C., Patton, C., Munyaka, I. N. S., Olszewski, D., Shrimpton, T., & Traynor, P. (2022). SMS OTP security (SoS) hardening SMS-based two factor authentication. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (pp. 2–16).
Khowfa, W., & Silasai, O. (2019). The efficiency of using salt against password attacking. Journal of Southern Technology,12(1), 217–227. Google Scholar
Shah, S. W., & Kanhere, S. S. (2019). Recent trends in user authentication—a survey. IEEE Access,7, 112505–112519. Google Scholar
Zhang, Y., Xu, C., Li, H., Yang, K., Cheng, N., & Shen, X. S. (2020). Protect: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage. IEEE Transactions on Mobile Computing, 20(6), 2297–2312.
Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2020). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications,110, 1637–1658. Google Scholar
Velásquez, I., Caro, A., & Rodríguez, A. (2018). Authentication schemes and methods: A systematic literature review. Information and Software Technology,94, 30–37. Google Scholar
Jeyaraman, S., & Topkara, U. (2005). Have the cake and eat it too-infusing usability into text-password based authentication systems. In 21st Annual computer security applications conference (ACSAC’05) (pp. 10–482).
Kumar, Y., & Subba, B. (2021). A lightweight machine learning based security framework for detecting phishing attacks. In 2021 International conference on communication systems & networkS (COMSNETS) (pp. 184–188). IEEE.
Subbalakshmi, C., Pareek, P. K., & Sayal, R. (2022). A study on social engineering attacks in cybersecurity. In Innovations in computer science and engineering (pp. 59–71). Springer.
Abdel Ouahab, I. B., Bouhorma, M., El Aachak, L., & Boudhir, A. A. (2022). Towards a new cyberdefense generation: Proposition of an intelligent cybersecurity framework for malware attacks. Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science),15(8), 1026–1042. Google Scholar
Fahrnberger, G. (2022). Realtime risk monitoring of SSH brute force attacks. In International conference on innovations for community services (pp. 75–95). Springer.
Kaur, M., Singh, S., Kaur, M., Singh, A., & Singh, D. (2021). A systematic review of metaheuristic-based image encryption techniques. Archives of computational methods in engineering (pp. 1–15).
Rathore, M. S., Poongodi, M., Saurabh, P., Lilhore, U. K., Bourouis, S., Alhakami, W., Osamor, J., & Hamdi, M. (2022). A novel trust-based security and privacy model for internet of vehicles using encryption and steganography. Computers and Electrical Engineering,102, 108205. Google Scholar
Oppitz, M., & Tomsu, P. (2018). Security and privacy challenges. In Inventing the cloud century (pp. 377–410). Springer.
Thu, K. M., Hlaing, K. S., & Aung, N. A. (2019). Time performance analysis of RSA and Elgamal public-key cryptosystems. International Journal of Trend in Scientific Research and Development (IJTSRD), 3(6), 2456–6470.
Bhatnagar, G. (2017). Robust covert communication using high capacity watermarking. Multimedia Tools and Applications,76(3), 3783–3807. Google Scholar
Hasan, M. K., Islam, S., Sulaiman, R., Khan, S., Hashim, A.-H.A., Habib, S., Islam, M., Alyahya, S., Ahmed, M. M., Kamil, S., & Hassan, M. A. (2021). Lightweight encryption technique to enhance medical image security on internet of medical things applications. IEEE Access,9, 47731–47742. Google Scholar
Gupta, S., Kaur, N., & Sizariya, P. (2014). Image steganography based on DFrFT. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE),9, 31–37. Google Scholar
Alsaqour, R., Motmi, A., & Abdelhaq, M. (2021). A systematic study of network firewall and its implementation. International Journal of Computer Science & Network Security,21(4), 199–208. Google Scholar
Jufri, M., & Heryanto, H. (2022). Improving wireless network security by applying security policy to firewall. In CoMBInES-conference on management, business, innovation, education and social sciences (vol. 2, p. 452).
Seno, L., Cheminod, M., Bertolotti, I. C., Durante, L., & Valenzano, A. (2022). Improving performance and cyber-attack resilience in multi-firewall industrial networks. In 2022 IEEE 18th international conference on factory communication systems (WFCS) (pp. 1–8).
SenthilKumar, P., & Muthukumar, M. (2018). A study on firewall system, scheduling and routing using pfsense scheme. In 2018 International conference on intelligent computing and communication for smart world (I2C2SW) (pp. 14–17).
Cheng, Y., Wang, W., Wang, J., & Wang, H. (2019). FPC: A new approach to firewall policies compression. Tsinghua Science and Technology,24(1), 65–76. Google Scholar
Kizza, J. M. (2009). Guide to computer network security. Berlin: Springer. Google Scholar
Roselin, A. G., Nanda, P., Nepal, S., He, X., & Wright, J. (2019). Exploiting the remote server access support of CoAP protocol. IEEE Internet of Things Journal,6(6), 9338–9349. Google Scholar
Ahmed, Z., Askari, S., & Md. S. (2018). Firewall rule anomaly detection: A survey. International Journal of Computational Intelligence & IoT, 2(4), 722–727.
Pradhan, M., Nayak, C. K., & Pradhan, S. K. (2020). Intrusion detection system (ids) and their types. In Securing the Internet of Things: Concepts, methodologies, tools, and applications (pp. 481–497). IGI Global.
Klein, D. (2021). Relying on firewalls? Here’s why you’ll be hacked. Network Security,2021(1), 9–12. Google Scholar
Prithi, S., & Sumathi, S. (2021). Automata based hybrid PSO–GWO algorithm for secured energy efficient optimal routing in wireless sensor network. Wireless Personal Communications,117, 545–559. Google Scholar
Ekpenyong, M. E., Asuquo, D. E., Udo, I. J., Robinson, S. A., & Ijebu, F. F. (2022). IPv6 routing protocol enhancements over low-power and lossy networks for IoT applications: A systematic review. New Review of Information Networking,27(1), 30–68. Google Scholar
Selvi, M., Logambigai, R., Ganapathy, S., Ramesh, L. S., Nehemiah, H. K., & Arputharaj, K. (2016). Fuzzy temporal approach for energy efficient routing in WSN. In Proceedings of the international conference on informatics and analytics (pp. 1–5).
Simoglou, G., Violettas, G., Petridou, S., & Mamatas, L. (2021). Intrusion detection systems for RPL security: A comparative analysis. Computers & Security,104, 102219. Google Scholar
Verma, A., & Ranga, V. (2020). Security of RPL based 6lowpan networks in the internet of things: A review. IEEE Sensors Journal,20(11), 5666–5690. Google Scholar
Thakkar, A., & Lohiya, R. (2021). A review on machine learning and deep learning perspectives of ids for IoT: Recent updates, security issues, and challenges. Archives of Computational Methods in Engineering,28(4), 3211–3243. Google Scholar
Masdari, M., & Khezri, H. (2020). A survey and taxonomy of the fuzzy signature-based intrusion detection systems. Applied Soft Computing,92, 106301. Google Scholar
Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity,2(1), 20. Google Scholar
Rahman, M. A., & Hossain, M. S. (2022). A deep learning assisted software defined security architecture for 6G wireless networks: IoT perspective. IEEE Wireless Communications,29(2), 52–59. Google Scholar
Badotra, S., & Panda, S. N. (2021). Snort based early DDOS detection system using opendaylight and open networking operating system in software defined networking. Cluster Computing,24(1), 501–513. Google Scholar
Gupta, A., & Sharma, L. S. (2019). Mitigation of dos and port scan attacks using snort. International Journal of Computer Sciences and Engineering, 7, 248–258.
Alaidaros, H., & Mahmuddin, M. (2017). Flow-based approach on bro intrusion detection. Journal of Telecommunication, Electronic and Computer Engineering JTEC,9(2–2), 139–145. Google Scholar
Ariyaluran Habeeb, R. A., Nasaruddin, F., Gani, A., Amanullah, M. A., Hashem, I. A. T., Ahmed, E., & Imran, M. (2019). Clustering-based real-time anomaly detection—a breakthrough in big data technologies. Transactions on Emerging Telecommunications Technologies, 33(8), e3647.
Teixeira, D., Assunção, L., Pereira, T., Malta, S., & Pinto, P. (2019). Ossec ids extension to improve log analysis and override false positive or negative detections. Journal of Sensor and Actuator Networks,8(3), 46. Google Scholar
Waleed, A., Jamali, A. F., & Masood, A. (2022). Which open-source ids? Snort, suricata or zeek. Computer Networks,213, 109116. Google Scholar
Gupta, A., & Sharma, L. S. (2020). Performance evaluation of snort and suricata intrusion detection systems on ubuntu server. In Proceedings of ICRIC 2019 (pp. 811–821). Springer.
Mikail, A., & Pranggono, B. (2019). Securing infrastructure-as-a-service public clouds using security onion. Applied System Innovation,2(1), 6. Google Scholar
Haider, W., Hu, J., Slay, J., Turnbull, B. P., & Xie, Y. (2017). Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. Journal of Network and Computer Applications,87, 185–192. Google Scholar
Joshi, P. S., & Dinesha, H. A. (2018). Study report of existing forensic tools and technologies to identify darknet. International Journal of Computer Sciences and Engineering, 6(10), 797–800.
Keerthika, M., & Shanmugapriya, D. (2021). Wireless sensor networks: Active and passive attacks-vulnerabilities and countermeasures. Global Transitions Proceedings,2(2), 362–367. Google Scholar
Ahamed, U., & Fernando, S. (2021). Identifying the impacts of node mobility on network layer based active and passive attacks in mobile ad hoc networks: A simulation perspective. In International conference on computing science, communication and security (pp. 262–275). Springer.
Uma, M., & Padmavathi, G. (2013). A survey on various cyber attacks and their classification. IJ Network Security,15(5), 390–396. Google Scholar
Shahzad, F., Pasha, M., & Ahmad, A. (2017). A survey of active attacks on wireless sensor networks and their countermeasures. arXiv preprint: arXiv:1702.07136.
Subramani, S., & Svn, S. K. (2023). Review of security methods based on classical cryptography and quantum cryptography. Cybernetics and Systems, 54, 1–19.
Ping, Y., Xinghao, J., Yue, W., & Ning, L. (2008). Distributed intrusion detection for mobile ad hoc networks. Journal of Systems Engineering and Electronics,19(4), 851–859. Google Scholar
Mazhar, N., & Farooq, M. (2011). A hybrid artificial immune system (AIS) model for power aware secure mobile ad hoc networks (manets) routing protocols. Applied Soft Computing,11(8), 5695–5714. Google Scholar
Estiri, M., & Khademzadeh, A. (2010). A game-theoretical model for intrusion detection in wireless sensor networks. In CCECE,2010, 1–5. Google Scholar
Liang, J., Chen, J., Zhu, Y., & Richard, Y. (2019). A novel intrusion detection system for vehicular ad hoc networks (VANETs) based on differences of traffic flow and position. Applied Soft Computing,75, 712–727. Google Scholar
Maleh, Y., & Ezzati, A. (2015). Lightweight intrusion detection scheme for wireless sensor networks. IAENG International Journal of Computer Science, 42(4), 1–8.
Ozcelik, M. M., Irmak, E., & Ozdemir, S. (2017). A hybrid trust based intrusion detection system for wireless sensor networks. In 2017 International symposium on networks, computers and communications (ISNCC) (pp. 1–6).
Choi, H., Kim, M., Lee, G., & Kim, W. (2019). Unsupervised learning approach for network intrusion detection system using autoencoders. The Journal of Supercomputing,75(9), 5597–5621. Google Scholar
Elshafie, H. M., Mahmoud, T. M., & Ali, A. A. (2019). Improving the performance of the snort intrusion detection using clonal selection. In 2019 International conference on innovative trends in computer engineering (ITCE) (pp. 104–110).
Li, L., & Liu, R. (2010). Securing cluster-based ad hoc networks with distributed authorities. IEEE Transactions on Wireless Communications,9(10), 3072–3081. Google Scholar
Nadeem, A., & Howarth, M. P. (2013). A survey of manet intrusion detection prevention approaches for network layer attacks. IEEE Communications Surveys Tutorials,15(4), 2027–2045. Google Scholar
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., & Rajarajan, Muttukrishnan. (2013). A survey of intrusion detection techniques in cloud. Journal of Network and Computer Applications,36(1), 42–57. Google Scholar
Vigna, G., & Kemmerer, R. A. (1999). Netstat: A network-based intrusion detection system. Journal of Computer Security,7(1), 37–71. Google Scholar
Rajeswari, A. R., Kulothungan, K., Ganapathy, S., & Kannan, A. (2019). A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks. Peer-to-Peer Networking and Applications,12, 1076–1096. Google Scholar
Milenkoski, A., Vieira, M., Kounev, S., Avritzer, A., & Payne, B. D. (2015). Evaluating computer intrusion detection systems: A survey of common practices. ACM Computing Surveys (CSUR),48(1), 1–41. Google Scholar
Kumar, Y., & Subba, B. (2023). Stacking ensemble-based HIDS framework for detecting anomalous system processes in windows based operating systems using multiple word embedding. Computers & Security,125, 102961. Google Scholar
Sworna, Z. T., Mousavi, Z., & Babar, M. A. (2022). NLP methods in host-based intrusion detection systems: A systematic review and future directions. arXiv preprint: arXiv:2201.08066.
Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access,7, 41525–41550. Google Scholar
Liu, M., Xue, Z., Xianghua, X., Zhong, C., & Chen, J. (2018). Host-based intrusion detection system with system calls: Review and future trends. ACM Computing Surveys (CSUR),51(5), 1–36. Google Scholar
Marteau, P. (2019). Sequence covering for efficient host-based intrusion detection. IEEE Transactions on Information Forensics and Security,14(4), 994–1006. Google Scholar
Ribeiro, J., Saghezchi, F. B., Mantas, G., Rodriguez, J., Shepherd, S. J., Abd-Alhameed, R. A. (2019). An autonomous host-based intrusion detection system for android mobile devices. Mobile Networks and Applications, 25, 164–172.
Creech, G., & Hu, J. (2014). A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Transactions on Computers,63(4), 807–819. MathSciNet Google Scholar
Ali, F. A. Bin H., & Len, Y. Y. (2011). Development of host based intrusion detection system for log files. In 2011 IEEE symposium on business, engineering and industrial applications (ISBEIA) (pp. 281–285).
Subba, B., Biswas, S., & Karmakar, S. (2017). Host based intrusion detection system using frequency analysis of n-gram terms. In TENCON 2017—2017 IEEE region 10 conference (pp. 2006–2011).
Chari, S. N., & Cheng, P.-C. (2003). Bluebox: A policy-driven, host-based intrusion detection system. ACM Transactions on Information and System Security (TISSEC),6(2), 173–200. Google Scholar
Deshpande, P., Sharma, S. C., Peddoju, S. K., & Junaid, S. (2018). HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management,9(3), 567–576. Google Scholar
Senthilnayaki, B., Venkatalakshmi, K., & Kannan, A. (2019). Intrusion detection system using fuzzy rough set feature selection and modified KNN classifier. The International Arab Journal of Information Technology,16(4), 746–753. Google Scholar
Wang, Y., Meng, W., Li, W., Li, J., Liu, W.-X., & Xiang, Y. . (2018). A fog-based privacy-preserving approach for distributed signature-based intrusion detection. Journal of Parallel and Distributed Computing,122, 26–35. Google Scholar
Rieck, K., Schwenk, G., Limmer, T., Holz, T., & Laskov, P. (2010). Botzilla: Detecting the“phoning home” of malicious software. In Proceedings of the 2010 ACM symposium on applied computing (pp. 1978–1984).
Vert, G., Gonen, B., & Brown, J. (2014). A theoretical model for detection of advanced persistent threat in networks and systems using a finite angular state velocity machine (fast-vm). International Journal of Computer Science and Application,3(2), 63. Google Scholar
Othman, Z. A., Bakar, A. A., & Etubal, I. (2010). Improving signature detection classification model using features selection based on customized features. In 2010 10th International conference on intelligent systems design and applications (pp. 1026–1031).
Artan, N. S., & Jonathan, C. H. (2007). Design and analysis of a multipacket signature detection system. International Journal of Security and Networks,2(1–2), 122–136. Google Scholar
Kim, H.-A., & Karp, B. (2004). Autograph: Toward automated, distributed worm signature detection. In USENIX security symposium (vol. 286). San Diego, CA.
Vinoth, K., & Om, P. S. (2012). Signature based intrusion detection system using snort. International Journal of Computer Applications & Information Technology,1(3), 35–41. Google Scholar
Bronte, R., Shahriar, H., & Haddad, H. M. (2016). A signature-based intrusion detection system for web applications based on genetic algorithm. In Proceedings of the 9th international conference on security of information and networks (pp. 32–39).
Mishra, P., Varadharajan, V., Tupakula, U., & Pilli, E. S. (2018). A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Communications Surveys & Tutorials,21(1), 686–728. Google Scholar
Mudzingwa, D., & Agrawal, R. (2012). A study of methodologies used in intrusion detection and prevention systems (IDPS). In 2012 Proceedings of IEEE southeastcon (pp. 1–6).
Subramani, S., & Selvi, M. (2023). Intrusion detection system using RBPSO and fuzzy neuro-genetic classification algorithms in wireless sensor networks. International Journal of Information and Computer Security,20(3–4), 439–461. Google Scholar
Garcia-Teodoro, P., Diaz-Verdejo, J., Maciá-Fernández, G., & Vázquez, E. (2009). Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security,28(1–2), 18–28. Google Scholar
Jyothsna, V. V. R. P. V., Prasad, R., & Prasadd, K. M. (2011). A review of anomaly based intrusion detection systems. International Journal of Computer Applications,28(7), 26–35. Google Scholar
Wang, W., Guyet, T., Quiniou, R., Cordier, M.-O., Masseglia, F., & Zhang, X. (2014). Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks. Knowledge-Based Systems,70, 103–117. Google Scholar
Harish, B. S., & Aruna Kumar, S. V. (2017). Anomaly based intrusion detection using modified fuzzy clustering. IJIMAI,4(6), 54–59. Google Scholar
Bitton, R., & Shabtai, A. (2019). A machine learning-based intrusion detection system for securing remote desktop connections to electronic flight bag servers. IEEE Transactions on Dependable and Secure Computing, 18(3), 164–1181.
Johnson Singh, K., Thongam, K., & De, T. (2016). Entropy-based application layer DDOS attack detection using artificial neural networks. Entropy,18(10), 350. Google Scholar
Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach for intrusion detection using recurrent neural networks. IEEE Access,5, 21954–21961. Google Scholar
Gothawal, D. B., & Nagaraj, S. V. (2020). Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment. Wireless Personal Communications,110(3), 1323–1344. Google Scholar
El Mrabet, Z., Ezzari, M., Elghazi, H., & El Majd, B. A. (2019). Deep learning-based intrusion detection system for advanced metering infrastructure. In Proceedings of the 2nd international conference on networking, information systems & security (pp. 1–7).
Aljawarneh, S. A., & Vangipuram, R. (2018). Garuda: Gaussian dissimilarity measure for feature representation and anomaly detection in internet of things. The Journal of Supercomputing, 76(6), 4376–4413.
Barbhuiya, S., Kilpatrick, P., & Nikolopoulos, Dimitrios S. (2020). Droidlight: Lightweight anomaly-based intrusion detection system for smartphone devices. In Proceedings of the 21st international conference on distributed computing and networking (pp. 1–10).
Gao, F., Sun, J., & Wei, Z. (2003). The prediction role of hidden Markov model in intrusion detection. In CCECE 2003—Canadian conference on electrical and computer engineering. Toward a caring and humane technology (Cat. No.03CH37436) (vol. 2, pp. 893–896).
Ganapathy, S., Kulothungan, K., Muthurajkumar, S., Vijayalakshmi, M., Yogesh, P., & Kannan, A. (2013). Intelligent feature selection and classification techniques for intrusion detection in networks: A survey. EURASIP Journal on Wireless Communications and Networking,1–16, 2013. Google Scholar
Nancy, P., Muthurajkumar, S., Ganapathy, S., Santhosh Kumar, S. V. N., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications,14(5), 888–895. Google Scholar
Sedjelmaci, H., & Feham, M. (2011). Novel hybrid intrusion detection system for clustered wireless sensor network. arXiv preprint: arXiv:1108.2656.
Wang, S.-S., Yan, K.-Q., Wang, S.-C., & Liu, C.-W. (2011). An integrated intrusion detection system for cluster-based wireless sensor networks. Expert Systems with Applications,38(12), 15234–15243. Google Scholar
Selvakumar, K., Sairamesh, L., & Kannan, A. (2019). Wise intrusion detection system using fuzzy rough set-based feature extraction and classification algorithms. International Journal of Operational Research,35(1), 87–107. Google Scholar
Hwang, K., Cai, M., Chen, Y., & Qin, M. (2007). Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Transactions on Dependable and Secure Computing,4(1), 41–55. Google Scholar
Balan, E. V., Priyan, M. K., Gokulnath, C., & Usha Devi, G. (2015). Hybrid architecture with misuse and anomaly detection techniques for wireless networks. In 2015 International conference on communications and signal processing (ICCSP) (pp. 0185–0189).
Rani, S., & Jain, S. (2018). Hybrid approach to detect network based intrusion. In 2018 Fourth international conference on computing communication control and automation (ICCUBEA) (pp. 1–5).
Ahmim, A., Derdour, M., & Ferrag, M. A. (2018). An intrusion detection system based on combining probability predictions of a tree of classifiers. International Journal of Communication Systems,31(9), e3547. Google Scholar
Sree, P. K., Babu, I. R., Murty, J. V. R., Ramachandran, R., & Devi, N. U. (2008). Power-aware hybrid intrusion detection system (PHIDS) using cellular automata in wireless ad hoc networks. WSEAS Transactions on Computers,7(11), 1848–1874. Google Scholar
Xiang, C., Yong, P. C., & Meng, L. S. (2008). Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees. Pattern Recognition Letters,29(7), 918–924. Google Scholar
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 275–283).
Li, W., Yi, P., Wu, Y., Pan, L., & Li, J. (2014). A new intrusion detection system based on KNN classification algorithm in wireless sensor network. Journal of Electrical and Computer Engineering, 2014, 1–8.
El-Khatib, K. (2010). Impact of feature reduction on the efficiency of wireless intrusion detection systems. IEEE Transactions on Parallel and Distributed Systems,21(8), 1143–1149. Google Scholar
Kasongo, S. M., & Sun, Y. (2019). A deep learning method with filter based feature engineering for wireless intrusion detection system. IEEE Access,7, 38597–38607. Google Scholar
Abdulhammed, R., Faezipour, M., Abuzneid, A., & Alessa, A. (2018). Effective features selection and machine learning classifiers for improved wireless intrusion detection. In 2018 International symposium on networks, computers and communications (ISNCC) (pp. 1–6).
Sindhu, S. S. S., Geetha, S., & Kannan, A. (2012). Decision tree based light weight intrusion detection using a wrapper approach. Expert Systems with Applications,39(1), 129–141. Google Scholar
Otoum, S., Kantarci, B., & Mouftah, H. T. (2019). On the feasibility of deep learning in sensor network intrusion detection. IEEE Networking Letters,1(2), 68–71. Google Scholar
Alipour, H., Al-Nashif, Y. B., Satam, P., & Hariri, S. (2015). Wireless anomaly detection based on IEEE 802.11 behavior analysis. IEEE Transactions on Information Forensics and Security,10(10), 2158–2170. Google Scholar
Shamshirband, S., Patel, A., Anuar, N. B., Kiah, M. L. M., & Abraham, A. (2014). Cooperative game theoretic approach using fuzzy q-learning for detecting and preventing intrusions in wireless sensor networks. Engineering Applications of Artificial Intelligence,32, 228–241. Google Scholar
Ashutosh, S., Gupta, S. K., Mohd, N., Nitesh, S., Geetika, A., & Mazumdar, B. D. (2021). DSSAM: Digitally signed secure acknowledgement method for mobile ad hoc network. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1–29.
Bhushan, B., & Sahoo, G. (2019).E2SR2: An acknowledgement-based mobile sink routing protocol with rechargeable sensors for wireless sensor networks. Wireless Networks,25, 2697–2721. Google Scholar
Kumar, Y., Chouhan, L., & Subba, B. (2021). Deep learning techniques for anomaly based intrusion detection system: A survey. In 2021 International conference on computational performance evaluation (ComPE) (pp. 915–920). IEEE.
Ullah, F., Ullah, S., Srivastava, G., & Lin, J. C.-W. (2023). IDS-INT: Intrusion detection system using transformer-based transfer learning for imbalanced network traffic. Digital Communications and Networks, 9, 1–19.
Kanna, P. R., & Santhi, P. (2021). Unified deep learning approach for efficient intrusion detection system using integrated spatial-temporal features. Knowledge-Based Systems,226, 107132. Google Scholar
Elmasry, W., Akbulut, A., & Zaim, A. H. (2020). Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Computer Networks,168, 107042. Google Scholar
Liu, Y., Comaniciu, C., & Man, H. (2006). A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceeding from the 2006 workshop on game theory for communications and networks (pp. 4–es).
Moosavi, H., & Bui, F. M. (2014). A game-theoretic framework for robust optimal intrusion detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security,9(9), 1367–1379. Google Scholar
Subba, B., Biswas, S., & Karmakar, S. (2018). A game theory based multi layered intrusion detection framework for wireless sensor networks. International Journal of Wireless Information Networks,25(4), 399–421. Google Scholar
Chen, L., & Leneutre, J. (2009). A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Transactions on Information Forensics and Security,4(2), 165–178. Google Scholar
Marchang, N., Datta, R., & Das, S. K. (2017). A novel approach for efficient usage of intrusion detection system in mobile ad hoc networks. IEEE Transactions on Vehicular Technology,66(2), 1684–1695. Google Scholar
Gupta, A., Jha, R. K., Gandotra, P., & Jain, S. (2018). Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network. IEEE Transactions on Vehicular Technology,67(1), 618–632. Google Scholar
Ghafir, I., Kyriakopoulos, K. G., Aparicio-Navarro, F. J., Lambotharan, S., Assadhan, B., & Binsalleeh, H. (2018). A basic probability assignment methodology for unsupervised wireless intrusion detection. IEEE Access,6, 40008–40023. Google Scholar
Huang, J.-Y., Liao, I.-E., Chung, Y.-F., & Chen, K.-T. (2013). Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Information Sciences,231, 32–44. MathSciNet Google Scholar
Kiennert, C., Ismail, Z., Debar, H., & Leneutre, J. (2018). A survey on game-theoretic approaches for intrusion detection and response optimization. ACM Computing Surveys (CSUR),51(5), 1–31. Google Scholar
Abdalzaher, M. S., Seddik, K., Elsabrouty, M., Muta, O., Furukawa, H., & Abdel-Rahman, A. (2016). Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors,16(7), 1003. Google Scholar
Xiao, Y., Shan, X., & Ren, Y. (2005). Game theory models for IEEE 802.11 DCF in wireless ad hoc networks. IEEE Communications Magazine,43(3), S22–S26. Google Scholar
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE Communications Surveys & Tutorials,16(1), 266–282. Google Scholar
Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys Tutorials,15(1), 472–486. Google Scholar
Soosahabi, R., Naraghi-Pour, M., Perkins, D., & Bayoumi, M. A. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security,9(3), 375–385. Google Scholar
Murugan, K., & Suresh, P. (2018). Efficient anomaly intrusion detection using hybrid probabilistic techniques in wireless ad hoc network. IJ Network Security,20(4), 730–737. Google Scholar
Yang, Q., He, S., Li, J., Chen, J., & Sun, Y. (2015). Energy-efficient probabilistic area coverage in wireless sensor networks. IEEE Transactions on Vehicular Technology,64(1), 367–377. Google Scholar
Jin, R., Wang, B., Wei, W., Zhang, X., Chen, X., Bar-Shalom, Y., & Willett, P. (2016). Detecting node failures in mobile wireless networks: A probabilistic approach. IEEE Transactions on Mobile Computing,15(7), 1647–1660. Google Scholar
Dai, H., Wang, H., Xiao, H., Li, X., & Wang, Q. (2016). On eavesdropping attacks in wireless networks. In 2016 IEEE Intl conference on computational science and e(CSE) and IEEE Intl conference on embedded and ubiquitous computing (EUC) and 15th Intl symposium on distributed computing and applications for business engineering (DCABES) (pp. 138–141).
Zou, Y., Zhu, J., Li, X., & Hanzo, L. (2016). Relay selection for wireless communications against eavesdropping: A security–reliability trade-off perspective. IEEE Network,30(5), 74–79. Google Scholar
Tugnait, J. K. (2016). Detection of active eavesdropping attack by spoofing relay in multiple antenna systems. IEEE Wireless Communications Letters,5(5), 460–463. Google Scholar
Zeng, Y., & Zhang, R. (2016). Active eavesdropping via spoofing relay attack. In 2016 IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2159–2163).
Menezes, A. J., Katz, J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. Boca Raton: CRC Press. Google Scholar
Saad, W., Han, Z., Basar, T., Debbah, M., & Hjorungnes, A. (2009). Physical layer security: Coalitional games for distributed cooperation. In 2009 7th International symposium on modeling and optimization in mobile, Ad Hoc, and wireless networks (pp. 1–8).
Li, X., Xu, J., Dai, H.-N., Zhao, Q., Cheang, C. F., & Wang, Q. (2015). On modeling eavesdropping attacks in wireless networks. Journal of Computational Science,11, 196–204. MathSciNet Google Scholar
Hoang, T. M., Nguyen, N. M., & Duong, T. Q. (2020). Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and K-means clustering. IEEE Wireless Communications Letters,9(2), 139–142. Google Scholar
Pelechrinis, K., Iliofotou, M., & Krishnamurthy, S. V. (2011). Denial of service attacks in wireless networks: The case of jammers. IEEE Communications Surveys Tutorials,13(2), 245–257. Google Scholar
Vadlamani, S., Eksioglu, B., Medal, H., & Nandi, A. (2016). Jamming attacks on wireless networks: A taxonomic survey. International Journal of Production Economics,172, 76–94. Google Scholar
Grover, K., Lim, A., & Yang, Q. (2014). Jamming and anti-jamming techniques in wireless networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing,17(4), 197–215. Google Scholar
Basar, T. U. (1982). Robust linear coding in continuous-time communication systems in the presence of jamming and with noisy side information at the decoder, Conference on Information Sciences and Systems, 323–326.
Richa, A., Scheideler, C., Schmid, S., & Zhang, J. (2013). Competitive throughput in multi-hop wireless networks despite adaptive jamming. Distributed Computing,26(3), 159–171. Google Scholar
Anwar, A. H., Atia, G., & Guirguis, M. (2018). Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach. Journal of Network and Computer Applications,121, 44–58. Google Scholar
Jia, L., Xu, Y., Sun, Y., Feng, S., & Anpalagan, A. (2018). Stackelberg game approaches for anti-jamming defence in wireless networks. IEEE Wireless Communications,25(6), 120–128. Google Scholar
Heo, J., Kim, J., Paek, J., & Bahk, S. (2018). Mitigating stealthy jamming attacks in low-power and lossy wireless networks. Journal of Communications and Networks,20(2), 219–230. Google Scholar
Osanaiye, O., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors,18(6), 1691. Google Scholar
Singh, R. S., Prasad, A., Moven, R. M., & Deva Sarma, H. K. (2017). Denial of service attack in wireless data network: A survey. In 2017 Devices for Integrated Circuit (DevIC), pp. 354–359.
Zhang, Y.-y, Li, X.-z, & Liu, Y.-a. (2012). The detection and defence of DoS attack for wireless sensor network. The Journal of China Universities of Posts and Telecommunications,19, 52–56. Google Scholar
Gupta, P., & Bansal, P. (2016). A survey of attacks and countermeasures for denial of services (DoS) in wireless ad hoc networks. In Proceedings of the second international conference on information and communication technology for competitive strategies (pp. 1–5).
Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2017). SINR-based DoS attack on remote state estimation: A game-theoretic approach. IEEE Transactions on Control of Network Systems,4(3), 632–642. MathSciNet Google Scholar
Agarwal, M., Pasumarthi, D., Biswas, S., & Nandi, S. (2016). Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization. International Journal of Machine Learning and Cybernetics,7(6), 1035–1051. Google Scholar
Faizi, A. H. N., Priambodo, D. F., & Rahmawati, F. D. (2022). Comparison of machine learning techniques on snort for predicting realtime DoS and probe attack. In 2022 International conference on informatics, multimedia, cyber and information system (ICIMCIS) (pp. 224–229). IEEE.
Almazyad, A., Halman, L., & Alsaeed, A. (2023). Probe attack detection using an improved intrusion detection system. Computers, Materials & Continua, 74(3), 4769–4784.
Subramani, S., & Selvi, M. (2023). Intelligent ids in wireless sensor networks using deep fuzzy convolutional neural network. Neural Computing and Applications, 35, 1–20.
Sreerag, V., Aswin, S., Menon, Akash A., & Namboothiri, Leena Vishnu. (2022). Reinforce NIDS using GAN to detect U2R and R2L attacks. In Ubiquitous intelligent systems: Proceedings of ICUIS 2021 (pp. 357–369). Springer.
Santhosh Kumar, S. V. N., Selvi, M., Kannan, A, et al. (2023). A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things. Computational Intelligence and Neuroscience, 2023, 1–24.
Beulah, J. R., Nalini, M., Irene, D. S., & Punithavathani, D. S. (2022). Enhancing detection of R2L attacks by multistage clustering based outlier detection. Wireless Personal Communications,124(3), 2637–2659. Google Scholar
Zyad, E., Taha, A., & Mohammed, B. (2019). Improve R2L attack detection using trimmed PCA. In 2019 International conference on advanced communication technologies and networking (CommNet) (pp. 1–5). IEEE.
Kumar Dwivedi, R., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In 2018 8th International conference on cloud computing, data science engineering (Confluence) (pp. 727–732).
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications,24(2), 370–380. Google Scholar
Amish, P., & Vaghela, V. B. (2016). Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Computer Science,79, 700–707. Google Scholar
Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences (p. 10). IEEE.
Tseng, Fan-Hsun., Chou, Li-Der., & Chao, Han-Chieh. (2011). A survey of black hole attacks in wireless mobile ad hoc networks. Human-centric Computing and Information Sciences,1(1), 4. Google Scholar
Kaur, Jaspreet. (2019). Black hole attack in manets: Defending and detecting techniques. International Journal of Information Security Science,8(4), 65–76. Google Scholar
Kaur, G., & Singh, M. (2014). Detection of black hole in wireless sensor network based on data mining. In 2014 5th International conference—confluence the next generation information technology Summit (Confluence) (pp. 457–461).
Abdel-Azim, M., El-Din Salah, H., & Ibrahim, M. (2017). Black hole attack detection using fuzzy based ids. International Journal of Communication Networks and Information Security,9(2), 187. Google Scholar
Chhabra, A., Vashishth, V., & Sharma, D. K. (2017). A game theory based secure model against black hole attacks in opportunistic networks. In 2017 51st Annual conference on information dciences and systems (CISS) (pp. 1–6).
Kalkha, H., Satori, H., & Satori, K. (2019). Preventing black hole attack in wireless sensor network using HMM. Procedia Computer Science,148, 552–561. Google Scholar
Al-issa, A. I., Al-Akhras, M., ALsahli, M. S., & Alawairdhi, M. (2019). Using machine learning to detect dos attacks in wireless sensor networks. In 2019 IEEE Jordan international joint conference on electrical engineering and information technology (JEEIT) (pp. 107–112).
Liu, Q., Yin, J., Leung, V. C. M., & Cai, Z. (2013). Fade: Forwarding assessment based detection of collaborative grey hole attacks in WMNS. IEEE Transactions on Wireless Communications,12(10), 5124–5137. Google Scholar
Ye, Q., Wang, Y., Xi, M., & Tang, Y. (2020). Recognition of grey hole attacks in wireless sensor networks using fuzzy logic in IoT. Transactions on Emerging Telecommunications Technologies, 31(12), e3873.
Thakur, S., & Dalwal, S. (2019). Mitigating gray hole attack in mobile ad hoc network using artificial intelligence mechanism, International Journal of Advanced Computronics and Management Studies (IJACMS), 3(5), 1–13.
Yao, Y., Xiao, B., Yang, G., Hu, Y., Wang, L., & Zhou, X. (2019). Power control identification: A novel sybil attack detection scheme in VANETs using RSSI. IEEE Journal on Selected Areas in Communications,37(11), 2588–2602. Google Scholar
Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., & Zhou, X. (2019). Multi-channel based sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Transactions on Mobile Computing,18(2), 362–375. Google Scholar
Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., & Zhou, X. (2017). Voiceprint: A novel sybil attack detection method based on RSSI for VANETs. In 2017 47th Annual IEEE/IFIP international conference on dependable systems and networks (DSN) (pp. 591–602).
Gu, P., Khatoun, R., Begriche, Y., & Serhrouchni, A. (2017). Support vector machine (SVM) based sybil attack detection in vehicular networks. In 2017 IEEE wireless communications and networking conference (WCNC) (pp. 1–6).
Murali, S., & Jamalipour, A. (2020). A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal,7(1), 379–388. Google Scholar
Bu, K., Xu, M., Liu, X., Luo, J., Zhang, S., & Weng, M. (2015). Deterministic detection of cloning attacks for anonymous RFIS systems. IEEE Transactions on Industrial Informatics,11(6), 1255–1266. Google Scholar
Zheng, Z., Liu, A., Cai, L. X., Chen, Z., & Sherman Shen, X. (2013). ERCD: An energy-efficient clone detection protocol in WSNs. In 2013 Proceedings IEEE INFOCOM (pp. 2436–2444).
Pan, F., Pang, Z., Xiao, M., Wen, H., & Liao, R. (2019). Clone detection based on physical layer reputation for proximity service. IEEE Access,7, 3948–3957. Google Scholar
Geete, K., Shukla, P. K., & Deen, A. J. (2014). A survey on grey hole attack in wireless mesh networks. International Journal of Computer Applications,975, 8887. Google Scholar
Vasudeva, A., & Sood, M. (2018). Survey on sybil attack defense mechanisms in wireless ad hoc networks. Journal of Network and Computer Applications,120, 78–118. Google Scholar
Patel, S. T., & Mistry, N. H. (2017). A review: Sybil attack detection techniques in WSN. In 2017 4th International conference on electronics and communication systems (ICECS) (pp. 184–188).
Conti, M., Di Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing,8(5), 685–698. Google Scholar
Shaukat, H. R., Hashim, F., Sali, A., & Abdul Rasid, M. F. (2014). Node replication attacks in mobile wireless sensor network: A survey. International Journal of Distributed Sensor Networks,10(12), 402541. Google Scholar
Kumar, Y., & Kumar, V. (2023). Security in IoT systems using natural language processing: Future challenges and directions. Internet Technology Letters,6(4), e411. Google Scholar
Ali, A., Mateen, A., Hanan, A., & Amin, F. (2022). Advanced security framework for internet of things (IoT). Technologies,10(3), 60. Google Scholar
Kiran, U. (2022). IDS to detect worst parent selection attack in RPL-based IoT network. In 2022 14th International conference on communication systems & NETworkS (COMSNETS) (pp. 769–773).
Shamshirband, S., Fathi, M., Chronopoulos, A. T., Montieri, A., Palumbo, F., & Pescapè, A. (2020). Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications,55, 102582. Google Scholar
Teshome, A, Rilling, L, & Morin, C. (2018). Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS. In NOMS 2018—2018 IEEE/IFIP network operations and management symposium (pp. 1–7).
Hasan, M. G. M. M., & Rahman, M. A. (2020). A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment. Journal of Information Security and Applications,50, 102397. Google Scholar
Tao, X., Wang, L., Xu, Z., & Xie, R. (2021). Scams: A novel side-channel attack mitigation system in IaaS cloud. In MILCOM 2021—2021 IEEE military communications conference (MILCOM) (pp. 329–334).
Jinisha, J. J., et al. (2021). Survey on various attacks and intrusion detection mechanisms in wireless sensor networks. Turkish Journal of Computer and Mathematics Education (TURCOMAT),12(11), 3694–3704. Google Scholar
Logesswari, S., Jayanthi, S., KalaiSelvi, D., Muthusundari, S., & Aswin, V. (2020). A study on cloud computing challenges and its mitigations. Materials Today: Proceedings, 33, 1–5.
Yassin, M., Ould-Slimane, H., Talhi, C., & Boucheneb, H. (2021). Multi-tenant intrusion detection framework as a service for SAAS. IEEE Transactions on Services Computing, 15(5), 1.
Agarwal, N., & Hussain, S. Z. (2018). A closer look at intrusion detection system for web applications. Security and Communication Networks, 2018, 1–27.
Ahmed, N., Amin, R., Aldabbas, H., Koundal, D., Alouffi, B., & Shah, T. (2022). Machine learning techniques for spam detection in email and IoT platforms: Analysis and research challenges. Security and Communication Networks, 2022, 1–19.
Pandiyaraju, V., Logambigai, R., Ganapathy, S., & Kannan, A. (2020). An energy efficient routing algorithm for WSNs using intelligent fuzzy rules in precision agriculture. Wireless Personal Communications,112, 243–259. Google Scholar
Shaukat, K., Alam, T. M., Hameed, I. A., Khan, W. A., Abbas, N., & Luo, S. (2021). A review on security challenges in internet of things (IoT). In 2021 26th International conference on automation and computing (ICAC) (pp. 1–6).