Article
Computer Science, Theory & Methods
George Violettas, George Simoglou, Sophia Petridou, Lefteris Mamatas
Summary: The IoT plays a pivotal role in Industry 4.0 but security issues arise due to vulnerabilities in the RPL protocol. ASSET, a novel IDS system, can mitigate at least 13 attacks and offers advantages in terms of overhead and accuracy compared to other solutions.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Article
Computer Science, Information Systems
Mohsen Sheibani, Behrang Barekatain, Erfan Arvan
Summary: This study introduces a new attack called DDAO and proposes a new IDS to counter this attack in the RPL protocol. The proposed IDS can detect DDAO attacks with high accuracy and low false positive rate, and it improves the packet delivery rate when countering attacks.
PERVASIVE AND MOBILE COMPUTING
(2022)
Article
Chemistry, Analytical
Umer Farooq, Muhammad Asim, Noshina Tariq, Thar Baker, Ali Ismail Awad
Summary: The Internet of Things (IoT) is an important way to connect physical devices to the internet, enabling new cutting-edge applications. However, the security of IoT networks remains a critical concern due to the massive amount of data generated and transmitted. This article proposes an energy-efficient multi-mobile agent-based trust framework (MMTM-RPL) to enhance the security of routing protocols, specifically RPL, in IoT-based wireless sensor networks. MMTM-RPL mitigates routing attacks while minimizing energy and message overheads through the use of mobile agents and dynamic itineraries.
Article
Computer Science, Information Systems
Eric Garcia Ribera, Brian Martinez Alvarez, Charisma Samuel, Philokypros P. Ioulianou, Vassilios G. Vassilakis
Summary: This paper proposes an intrusion detection system (IDS) based on RPL for IoT, which aims to accurately and efficiently detect various types of routing and DoS attacks. By combining different detection strategies, the system achieves high detection accuracy with negligible overhead in terms of CPU usage and power consumption.
Article
Computer Science, Hardware & Architecture
A. O. Bang, Udai Pratap Rao
Summary: Research on routing attacks in the Internet of Things led to the proposal of a decentralized countermeasure based on geographical location and trust value. Experimental results validated the feasibility of the proposed countermeasure.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Hardware & Architecture
Erfan Arvan, Mahshad Koohi Habibi Dehkordi, Saeed Jalili
Summary: The Internet of Things (IoT) faces challenges in terms of mobility management and security. This study proposes a novel extension called SLM-RPL for routing in IoT, which greatly improves mobility management and addresses security concerns. Extensive evaluations show that SLM-RPL reduces hand-off delay and packet loss rate, making it the best option for loss-sensitive IoT applications.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Review
Computer Science, Artificial Intelligence
Zainab Alansari, Nor Badrul Anuar, Amirrudin Kamsin, Mohammad Riyaz Belgaum
Summary: This article examines the detection techniques for routing attacks in wireless sensor networks, providing a taxonomy of current and emerging detection techniques through a systematic review of 87 articles. The review also evaluates the metrics and criteria used for performance evaluation.
PEERJ COMPUTER SCIENCE
(2022)
Article
Computer Science, Information Systems
Cut Alna Fadhilla, Muhammad Dany Alfikri, Rafael Kaliski
Summary: Modern society heavily relies on IoT devices, but IoT security remains a challenge. Existing network intrusion detection systems play a role in protecting network security. This research evaluates the capability of a single-board system in addressing cyber-attack threats by deploying meta-learning ensemble botnet detection models.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Artificial Intelligence
Zhendong Wang, Jingfei Li, Shuxin Yang, Xiao Luo, Dahai Li, Soroosh Mahmoodi
Summary: This study proposes a knowledge-distillation-based IoT intrusion detection model named BT-TPF, which is capable of detecting network attacks encountered by IoT devices in a resource-constrained IoT environment. The model leverages two networks for dimensionality reduction of complex high-dimensional network traffic data and significantly reduces the number of parameters through knowledge distillation while maintaining high accuracy.
EXPERT SYSTEMS WITH APPLICATIONS
(2024)
Article
Chemistry, Analytical
F. Zahra, N. Z. Jhanjhi, Sarfraz Nawaz Brohi, Navid Ali Khan, Mehedi Masud, Mohammed A. AlZain
Summary: The proliferation of IoT technology has led to challenges in various domains, with security being a critical issue. This paper proposes a lightweight multiclass classification-based model for detecting attacks in IoT networks.
Article
Computer Science, Information Systems
Rong-Guei Tsai, Pei-Hsuan Tsai, Guan-Rong Shih, Jingxuan Tu
Summary: This study proposes an emergency RPL (EMRPL) that can effectively predict the trajectory of fire and transmit sensing data in real-time during fire incidents.
Article
Chemistry, Analytical
Abdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif
Summary: The paper proposes an Anomaly Detection System (ADS) in a smart hospital IoT system to detect events related to patients' health and environment as well as network intrusions, showing a high detection accuracy for both types of events.
Article
Multidisciplinary Sciences
Ankur Bang, Udai Pratap Rao
Summary: In this paper, we conducted a thorough investigation on the routing protocol for low power and lossy networks (RPL), focusing on the rank attack and its impact on network performance. Experimental studies on four different RPL network topologies were performed, and potential solutions to mitigate this attack were suggested.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Information Systems
Jae-Dong Kim, Minseok Ko, Jong-Moon Chung
Summary: This paper proposes a physical identification based trust path routing (PITrust) scheme to enhance the detection capability of Sybil nodes in RPL protocol in wireless IoT networks, and improve the packet delivery ratio.
IEEE WIRELESS COMMUNICATIONS LETTERS
(2022)
Article
Computer Science, Information Systems
Faiza Medjek, Djamel Tandjaoui, Nabil Djedjig, Imed Romdhani
Summary: The RPL protocol is standardized for IoT routing issues and constructs DODAG topology using DIO messages. However, the DIS attack can significantly impact network performance by increasing control overhead and power consumption.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Shu Fu, Liuguo Yin, Chunxiao Jiang, Abbas Jamalipour
IEEE VEHICULAR TECHNOLOGY MAGAZINE
(2022)
Article
Chemistry, Analytical
Mohamed Abdel-Basset, Abduallah Gamal, Karam M. Sallam, Ibrahim Elgendi, Kumudu Munasinghe, Abbas Jamalipour
Summary: As cyber-attacks become more complex, resolving the functional concerns of intrusion-detection systems (IDSs) becomes difficult, which risks compromising the credibility of security services. Different organizations employ various strategies and technologies to safeguard system credibility, but the effectiveness of IDSs is still not fully recognized.
Article
Computer Science, Information Systems
Komal S. Khan, Adeena Naeem, Abbas Jamalipour
Summary: This article introduces edge caching and incentive mechanisms for D2D communication. By clustering users with similar interests and optimizing cache hit probability, the performance of D2D communication can be improved. Additionally, a monetary incentive-based mechanism is proposed to increase user participation.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Electrical & Electronic
Weijing Qi, Qingyang Song, Lei Guo, Abbas Jamalipour
Summary: Vehicular networks play a crucial role in the era of autonomous driving, with UAVs showing potential to assist in service provision while facing challenges of energy consumption and QoS. Joint optimization of factors such as content placement and spectrum allocation can enhance UAVs' energy efficiency and meet user demands.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Xiang Li, Lingyun Lu, Wei Ni, Abbas Jamalipour, Dalin Zhang, Haifeng Du
Summary: This paper investigates a novel approach for resource allocation in vehicle-to-vehicle (V2V) communications, utilizing federated multi-agent deep reinforcement learning and federated learning. The proposed method optimizes both channel selection and power control, ensuring reliability and delay requirements of V2V communication while maximizing the transmit rates of cellular links.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Mahrokh Abdollahi, Sepehr Ashtari, Mehran Abolhasan, Negin Shariati, Justin Lipman, Abbas Jamalipour, Wei Ni
Summary: This paper proposes a multi-protocol framework for the dynamic deployment and switching of multiple MD2D routing protocols in mobile wireless networks. The performance of two multi-hop routing protocols is studied in different network conditions, and a multiple-criteria decision-making approach is developed to choose the most suitable protocol.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2022)
Article
Engineering, Electrical & Electronic
Nguyen Quang Hieu, Dinh Thai Hoang, Dusit Niyato, Diep N. Nguyen, Dong In Kim, Abbas Jamalipour
Summary: Rate Splitting Multiple Access (RSMA) is a new technique to enhance transmission rate in multiple access networks by splitting and transmitting messages at different rates. This paper proposes a stochastic optimization framework for adaptively adjusting power and transmission rates, maximizing system sum-rate and fairness in the presence of an adversary. Additionally, a highly effective learning algorithm is developed to find the optimal policy without complete information about the environment. Simulation results demonstrate the effectiveness of the proposed scheme in achieving non-saturated transmission rates and positive covert transmission rates.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Automation & Control Systems
Jing Song, Ya Kang, Qingyang Song, Lei Guo, Abbas Jamalipour
Summary: Virtual reality-embedded digital twin (VR-DT) service combines digital twin with virtual reality to visualize the digital representation of real-world production, enhancing the digital transformation of the manufacturing industry in the Industrial Internet of Things (IIoT). To address the data-driven, computing-intensive, and security-sensitive challenges of the VR-DT service, we propose a blockchain-based distributed resource allocation scheme to improve the average Quality of Service (QoS) concerning service delay and transaction throughput. We formulate the joint optimization problem of channel assignment, subframe configuration, computing capacity allocation, and block size adjustment and develop a decentralized multiagent compound-action actor-critic algorithm to solve it. Simulation results demonstrate the effectiveness of our scheme in improving the average QoS of the VR-DT services.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Editorial Material
Engineering, Electrical & Electronic
Abbas Jamalipour
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Information Systems
Mohamed Abdel-Basset, Hossam Hawash, Karam M. Sallam, Ibrahim Elgendi, Kumudu Munasinghe, Abbas Jamalipour
Summary: In this study, a new federated malware detection paradigm called FED-MAL is introduced to collaboratively train multiple distributed edge devices to detect malware. FED-MAL transforms malware binaries into an image format and uses a compact convolutional model named AM-NET to learn malware patterns. Experimental evaluation shows that FED-MAL is efficacious, reliable, expandable, generalizable, and communication efficient on publicly available malware datasets.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Rabbia Saleem, Wei Ni, Muhammad Ikram, Abbas Jamalipour
Summary: In order to meet the higher bandwidth and massive connectivity demands of the sixth-generation (6G) wireless communication, intelligent reflecting surface (IRS) has become an efficient solution to improve data rates, coverage range, and signal blockages. This article proposes an IRS-based model to address network security issues in the presence of trusted-untrusted device diversity, maximizing secrecy rates for trusted devices while maintaining Quality of Service (QoS) for all legitimate devices. A deep deterministic policy gradient (DDPG) algorithm is utilized for joint optimization of active and passive beamforming matrices. Experimental results demonstrate a significant improvement in secrecy rates and throughput performance compared to benchmark cases, validating the effectiveness of the proposed model.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Engineering, Electrical & Electronic
Shuyan Hu, Xin Yuan, Wei Ni, Xin Wang, Abbas Jamalipour
Summary: The applications of UAV-enabled visual monitoring include public security, nature resilience, and disaster rescue. This article discusses the types and technical challenges of visual camouflage for UAV-based surveillance, and presents a new control framework for planning and refining the trajectory of the UAV monitor online. Simulations validate the merits of the new framework over the benchmark approach with no camouflage.
IEEE VEHICULAR TECHNOLOGY MAGAZINE
(2023)
Article
Computer Science, Information Systems
Rafid Umayer Murshed, Zulqarnain Bin Ashraf, Abu Horaira Hridhon, Kumudu Munasinghe, Abbas Jamalipour, Md. Farhad Hossain
Summary: In this study, we investigate the use of deep neural networks (DNN) to tackle complex beamforming challenges in the sixth-generation (6G) cellular networks. By designing a sophisticated 1D CNN-LSTM fusion-separation scheme, we achieve beamforming performance comparable to the Alt-Min algorithm while significantly reducing computational cost.
Article
Computer Science, Information Systems
Forough Shirin Abkenar, Parisa Ramezani, Saeid Iranmanesh, Sarumathi Murali, Donpiti Chulerttiyawong, Xinyu Wan, Abbas Jamalipour, Raad Raad
Summary: This paper presents a comprehensive survey on mobile ECNs, classifying them into four categories and providing detailed descriptions for each category, including node types, network architectures, methods and algorithms, and challenges. The paper also discusses integrated architectures and future research directions.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2022)
Proceedings Paper
Telecommunications
Donpiti Mick Chulerttiyawong, Abbas Jamalipour
Summary: This paper discusses the security of wearable and implantable devices for human body interface and control systems. It proposes algorithms that use physiological biometrics, such as the inter-pulse interval, to mitigate jamming attacks on communication links. The results show the feasibility of some algorithms and identify potential improvements.
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022)
(2022)