A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.
Carlos D. Morales-MolinaAldo Hernandez-SuarezGabriel Sanchez-PerezLinda K. Toscano-MedinaHéctor Pérez-MeanaJesus Olivares-MercadoJosé Portillo-PortilloVictor SanchezLuis Javier García-VillalbaPublished in: Sensors (2021)
Keyphrases
- neural network
- cryptographic protocols
- security protocols
- secure routing
- denial of service attacks
- network intrusion detection systems
- management system
- security problems
- artificial neural networks
- cryptographic algorithms
- lightweight
- rfid systems
- countermeasures
- key management
- genetic algorithm
- detecting malicious
- malicious activities
- neural network model
- back propagation
- big data
- neural network is trained
- self organizing maps
- end hosts
- authentication protocol
- security mechanisms
- network architecture
- recurrent neural networks
- attack detection
- linux kernel
- misuse detection
- cloud computing
- fuzzy logic