Abstract
AbstractAs we enter the new age of the Internet of Things (IoT) and wearable gadgets, sensors, and embedded devices are extensively used for data aggregation and its transmission. The extent of the data processed by IoT networks makes it vulnerable to outside attacks. Therefore, it is important to design an intrusion detection system (IDS) that ensures the security, integrity, and confidentiality of IoT networks and their data. State-of-the-art IDSs have poor detection capabilities and incur high communication and device overhead, which is not ideal for IoT applications requiring secured and real-time processing. This research presents a teaching-learning-based optimization enabled intrusion detection system (TLBO-IDS) which effectively protects IoT networks from intrusion attacks and also ensures low overhead at the same time. The proposed TLBO-IDS can detect analysis attacks, fuzzing attacks, shellcode attacks, worms, denial of service (Dos) attacks, exploits, and backdoor intrusion attacks. TLBO-IDS is extensively tested and its performance is compared with state-of-the-art algorithms. In particular, TLBO-IDS outperforms the bat algorithm and genetic algorithm (GA) by 22.2% and 40% respectively.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference44 articles.
1. Mahamat, M., Jaber, G., & Bouabdallah, A. (2023). Achieving efficient energy-aware security in IoT networks: A survey of recent solutions and research challenges. Wireless Networks, 29(2), 787–808.
2. Janabi, S. M. A., & Kurnaz, S. (2023). A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm. Wireless Networks. https://doi.org/10.1007/s11276-023-03247-2
3. Kaushik, A., Goswami, M., Manuja, M., Indu, S., & Gupta, D. (2020). A binary PSO approach for improving the performance of wireless sensor networks. Wireless Personal Communications, 113, 263–297.
4. Cvitić, I., Peraković, D., Periša, M., & Botica, M. (2021). Novel approach for detection of IoT generated DDoS traffic. Wireless Networks, 27(3), 1573–1586.
5. Bodkhe, U., & Tanwar, S. (2021). Secure data dissemination techniques for IoT applications: Research challenges and opportunities. Software: Practice and Experience, 51(12), 2469–2491.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献