An Intrusion Detection Algorithm for Resource-Constrained IoT.
Zhongke LuYuqing LanJianhai DuYixuan WangPublished in: ICCCS (2022)
Keyphrases
- detection algorithm
- resource constrained
- key management
- resource constraints
- intrusion detection
- sensor networks
- wireless sensor networks
- detection rate
- detection method
- detection accuracy
- intrusion detection system
- motion detection
- outlier detection
- anomaly detection
- embedded systems
- multipath
- moving objects
- network traffic
- vehicle detection
- rfid tags
- low cost
- shot boundary detection