Given a scale expansion of Internet of Things for sustainable resource management in smart cities, proper design of an intrusion detection system (IDS) is critical to safeguard the future network infrastructure from intruders. With the growth of connected things, the most-widely used centralized (cloud-based) IDS often suffers from high latency and network overhead, thereby resulting in unresponsiveness to attacks and slow detection of malicious users. In this paper, we address the limitation of centralized IDS for resource-constrained devices by proposing two methods, namely semi-distributed and distributed, that combine well-performing feature extraction and selection and exploit potential fog-edge coordinated analytics. In order to distr...
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gat...
Internet of things (IoT) has been playing an important role in many sectors, such as smart cities, s...
The rise in popularity of Internet of Things (IoT) devices has attracted hackers to develop IoT-spec...
The Internet of Things (IoT) system’s ever-expanding attack surface calls for a new intrusion detect...
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless senso...
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of...
The rapid advancement of technologies has enabled businesses to carryout their activities seamlessly...
International audienceIoT devices have been the target of 100 million attacks in the first half of 2...
Recently, connected objects have been the subject of cyber-attacks at an alarming rate. These device...
The ever-increasing number of IoT applications and cyber–physical services is introducing significan...
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the...
Intrusion detection systems play a vital role in traffic flow monitoring on Internet of Things netwo...
As IoT devices’ adoption grows rapidly, security plays an important role in our daily lives. As part...
With the advancement of technology, IoT systems have been widely used in all sectors from smart home...
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an ex...
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gat...
Internet of things (IoT) has been playing an important role in many sectors, such as smart cities, s...
The rise in popularity of Internet of Things (IoT) devices has attracted hackers to develop IoT-spec...
The Internet of Things (IoT) system’s ever-expanding attack surface calls for a new intrusion detect...
Smart cities are a rapidly growing IoT application. These smart cities mainly rely on wireless senso...
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of...
The rapid advancement of technologies has enabled businesses to carryout their activities seamlessly...
International audienceIoT devices have been the target of 100 million attacks in the first half of 2...
Recently, connected objects have been the subject of cyber-attacks at an alarming rate. These device...
The ever-increasing number of IoT applications and cyber–physical services is introducing significan...
The Internet of Things (IoT) refers to the collection of all those devices that could connect to the...
Intrusion detection systems play a vital role in traffic flow monitoring on Internet of Things netwo...
As IoT devices’ adoption grows rapidly, security plays an important role in our daily lives. As part...
With the advancement of technology, IoT systems have been widely used in all sectors from smart home...
Internet of Things (IoT) is a concept adopted in nearly every aspect of human life, leading to an ex...
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gat...
Internet of things (IoT) has been playing an important role in many sectors, such as smart cities, s...
The rise in popularity of Internet of Things (IoT) devices has attracted hackers to develop IoT-spec...