Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

Author:

Pamarthi SatyanarayanaORCID,Narmadha R.

Abstract

PurposeNowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.Design/methodology/approachThis paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.FindingsIt observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.Originality/valueThis paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Publisher

Emerald

Reference75 articles.

1. Impact of denial of service attacks on ad hoc networks;IEEE/ACM Transactions on Networking,2008

2. Masquerading attacks detection in mobile ad hoc networks;IEEE Access,2018

3. Fog-based attack detection framework for internet of things using deep learning;IEEE Access,2020

4. A survey on wireless sensor networks;IEEE Communications Magazine,2002

5. A profitable and energy-efficient cooperative fog solution for IoT services;IEEE Transactions on Industrial Informatics,2019

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Cognitive Differences in Network Security Based on Mathematical Modeling Based on Ensemble Learning Algorithm;2024 Second International Conference on Data Science and Information System (ICDSIS);2024-05-17

2. Empirical Analysis of Developing EC Based Algorithms for Various WSN Network Applications;2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE);2024-05-14

3. A Novel Android Software for Comprehensive Ability Testing Based on HCI and Data Interaction Algorithm;2024 3rd International Conference on Sentiment Analysis and Deep Learning (ICSADL);2024-03-13

4. RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm;EURASIP Journal on Information Security;2024-02-24

5. FL-IDS: Federated Learning-Based Intrusion Detection System Using Edge Devices for Transportation IoT;IEEE Access;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3