• Türkçe
    • English
  • English 
    • Türkçe
    • English
  • Login
View Item 
  •   DSpace@Muğla
  • Fakülteler
  • Mühendislik Fakültesi
  • Yazılım Mühendisliği Bölümü Koleksiyonu
  • View Item
  •   DSpace@Muğla
  • Fakülteler
  • Mühendislik Fakültesi
  • Yazılım Mühendisliği Bölümü Koleksiyonu
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things

Date

2023

Author

Deveci, Ali
Yılmaz, Selim
Şen, Sevil

Metadata

Show full item record

Citation

Ali Deveci, Selim Yilmaz, and Sevil Sen. 2023. Evolving Lightweight Intrusion Detection Systems for RPL-Based Internet of Things. In Applications of Evolutionary Computation: 26th European Conference, EvoApplications 2023, Held as Part of EvoStar 2023, Brno, Czech Republic, April 12–14, 2023, Proceedings. Springer-Verlag, Berlin, Heidelberg, 177–193. https://doi.org/10.1007/978-3-031-30229-9_12

Abstract

With the integration of efficient computation and communication technologies into sensory devices, the Internet of Things (IoT) applications have increased tremendously in recent decades. While these applications provide numerous benefits to our daily lives, they also pose a great potential risk in terms of security. One of the reasons for this is that devices in IoT-based networks are highly resource constrained and interconnected over lossy links that can be exposed by attackers. The Routing Protocol for Low-Power and Lossy Network (RPL) is the standard routing protocol for such lossy networks. Despite the efficient routing built by RPL, this protocol is susceptible to insider attacks. Therefore, researchers have been working on developing effective intrusion detection systems for RPL-based IoT. However, most of these studies consume excessive resources (e.g., energy, memory, communication, etc.) and do not consider the constrained characteristics of the network. Hence, they might not be suitable for some devices/networks. Therefore, in this study, we aim to develop an intrusion detection system (IDS) that is both effective and efficient in terms of the cost consumed by intrusion detection (ID) nodes. For this multiple-objective problem, we investigate the use of evolutionary computation-based algorithms and show the performance of evolved intrusion detection algorithms against various RPL-specific attacks.

Source

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Volume

13989

URI

https://doi.org/10.1007/978-3-031-30229-9_12
https://hdl.handle.net/20.500.12809/10741

Collections

  • Scopus İndeksli Yayınlar Koleksiyonu [6219]
  • Yazılım Mühendisliği Bölümü Koleksiyonu [11]



DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 




| Policy | Guide | Contact |

DSpace@Muğla

by OpenAIRE
Advanced Search

sherpa/romeo

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeInstitution AuthorThis CollectionBy Issue DateAuthorsTitlesSubjectsTypeLanguageDepartmentCategoryPublisherAccess TypeInstitution Author

My Account

LoginRegister

DSpace software copyright © 2002-2015  DuraSpace
Contact Us | Send Feedback
Theme by 
@mire NV
 

 


|| Policy || Guide|| Instruction || Library || Muğla Sıtkı Koçman University || OAI-PMH ||

Muğla Sıtkı Koçman University, Muğla, Turkey
If you find any errors in content, please contact:

Creative Commons License
Muğla Sıtkı Koçman University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..

DSpace@Muğla:


DSpace 6.2

tarafından İdeal DSpace hizmetleri çerçevesinde özelleştirilerek kurulmuştur.