scholarly journals Assorted Attack Detection for IoT

Author(s):  
Mareeswari Govindaraj

While IoT has huge social impact, it comes with a number of key security Challenges. Smart devices are vulnerable to variety of attacks. In this project, we propose the solution to detect all types of attacks in an IoT environment. For this, we initially create the wireless network and then implement mobility and energy in every node of the network. Later we intentionally create some malicious in the network for detecting the attacks. Then, we Perform data transmission between the nodes as a regular manner. For data transmission we used AODV protocol. Finally, we identified the malicious behavior and perform analysis on that collected data and then detected the attacks. It also detected the types of attack occurred.

Author(s):  
Abidullha Adel ◽  
◽  
Md. Sohel Rana ◽  
Jayastree. J ◽  
◽  
...  

Wireless Sensor Network (WSN) subjected various challenges during data transmission between nodes deployed in a network. To withstand those security challenges Intrusion Detection System (IDS) is designed. IDS is involved in attack detection and classification but is subjected to a lack of effective classification techniques for attack prevention. To overcome those challenges associated with security this research presented an effective clustering technique known as Centred-Order Node Clustering (CONC). Also, Cluster Head (CH) is elected based on the Improved Flower Pollination Algorithm (IFPA) with multi-objective characteristics. By this proposed method lifetime of the network is improved. Additionally, a supervised classification technique called AdaBoost Regression Classifier (ABRC) is developed with the Intrusion Detection System (IDS). The developed ABRC is constructed for malicious node detection with the prediction of several attacks using IDS. Through improved security mechanisms sensor nodes are involved in effective data transmission between sensor nodes. The simulation analysis stated that the proposed mechanism provides better results rather than the existing technique.


2021 ◽  
Author(s):  
◽  
Arnis Ancāns

Global development trends such as the increase in the number of cars, an increased number of smart devices with wireless network connections, and the rapid increase in the amount of transmitted information promote the demand for higher data exchange speed, mobility, and higher level of connectivity. Consequently, data transmission services are also required when users travel by vehicle. As the number of vehicles increases, the problems related to road safety and traffic flow management need to be addressed as well. These problems underline the need for modern, technically, and economically justified communication solutions for Intelligent Transport Systems (ITS). One of the wireless network technologies that can be used for ITS needs, in particular for providing car passengers with access to the data transmission network, is WLAN IEEE 802.11n/ac. The implementation of such WLAN-based automotive wireless access networks requires several issues to be addressed, mainly related to fast-moving objects. In practice, a two-rank wireless network is used, which can provide access to the Internet. Several testbeds of a two-rank road transport communication network using WLAN IEEE 802.11n and LTE technologies were created and studied in the developed Doctoral Thesis. The change in the traffic characteristics of a two-rank communication network was experimentally assessed using LTE hardware from various manufacturers. The performance of such hybrid communication channels was studied depending on the velocity of mobile customers, the number of customers, and the traffic scenarios used. New relationships characterising the performance of the integrated IEEE 802.11n and LTE road transport networks and describing the dependence of network throughput on the velocity of mobile client movement were obtained. A single-rank IEEE 802.11ac technology-based automotive communications testbed has also been developed and studied within the Doctoral Thesis. An improved handover algorithm based on the IEEE 802.11v protocol has been developed and implemented during the research. The relationships describing the performance of such single-rank automotive communication network were theoretically evaluated.


2011 ◽  
Vol 121-126 ◽  
pp. 1259-1263
Author(s):  
Zhong Min Yao ◽  
Xi Guang Liu ◽  
Ya Zhen Wang

With the application scale and area of the building PV power station continuous extension, data transmission and monitoring management of the building PV power station have become increasingly important.This paper introduces a kind of data delivering and distributed monitoring management system of the building PV power station based on ZigBee wireless network,this system has information transmission modules based on ZigBee wireless network, region monitoring and magement module and remote access module. ZigBee wireless network could deliver datas of the building PV power station to the center of region monitoring and management system,ultimately,the datas were deposited in the database of region monitoring and management system,The Electricity Regulatory Office and The Power Company used remote transmission and monitoring system by remote access system on the Internet, to access data reports of the building PV power station in the database of region monitoring and magement system.System test results can carry out the building PV power station’s data transmission, monitoring system’s data management and remote access by the Internet.


2012 ◽  
Vol 263-266 ◽  
pp. 3012-3016
Author(s):  
Yuan Yuan Zhang ◽  
Chuang Bai Xiao ◽  
Jian Wang

Under the circumstance of heterogeneous wireless network, the new characteristic of heterogeneous wireless network makes great challenge to the network security. In this paper, we proposed the active defense model based on trust evaluation, introduced sensitive factors and assigned the weight to reflect the trust, through aggregation method, detect the feedback (or recommendation), select the related information, make the model can be dynamic and objective to network status. The simulation result shows that, the proposed model function well, compared with the good and malicious behavior environment.


Sign in / Sign up

Export Citation Format

Share Document