How to cite this paper
Rawajbeh, M., Alzyadat, W., Kaabneh, K., Afaneh, S., Alrwashdeh, D., Albayaydah, H & AlHadid, I. (2023). A new model for security analysis of network anomalies for IoT devices.International Journal of Data and Network Science, 7(3), 1241-1248.
Refrences
Adhikary, K., Bhushan, S., Kumar, S., & Dutta, K. (2020). Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks. International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 12(4), 1-18.
Al Rawajbeh, M. (2017). Low cost design and implementation for HAS using multifunctional WI-FI. International Jour-nal of Computer Networks & Communications (IJCNC), 9(3), 105-116.
Al Rawajbeh, M. (2019). Performance evaluation of a computer network in a cloud computing environment. ICIC Express Letters, 13, 719-727.
Al Rawajbeh, M., & Haboush, A. (2015). Advanced object monitoring using wireless sensors network. Procedia Computer Science, 65, 17-24.
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Net-work and Computer Applications, 88, 10-28.
Alsoufi, M. A., Razak, S., Siraj, M. M., Nafea, I., Ghaleb, F. A., Saeed, F., & Nasser, M. (2021). Anomaly-based intrusion detection systems in IOT using deep learning: A systematic literature review. Applied sciences, 11(18), 8383.
Bagula, B. A., & Erasmus, Z. (2015, March). Iot emulation with cooja. In ICTP-IoT workshop (p. 99).
Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: a contemporary sur-vey. Wireless personal communications, 108, 363-388.
Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.
Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283-294.
Hawkins, D. M. (1980). Identification of outliers (Vol. 11). London: Chapman and Hall.
Kavyashree, E. D., Vidyashree, H. D., & Kumar, B. A. (2018). A survey of internet of things (IoT)-applications, merits, demerits & challenges. International Journal of Innovative Research in Computer and Communication Engineering, 6(2), 903-907.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Net-works, 141, 199-221.
Kumar, R., Venkanna, U., & Tiwari, V. (2020, January). A binary classification approach for time granular traffic in SDWMN based IoT networks. In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (pp. 531-534). IEEE.
Lee, J., & Park, K. (2021). GAN-based imbalanced data intrusion detection system. Personal and Ubiquitous Compu-ting, 25, 121-128.
Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., ... & Cui, L. (2020). Robust detection for network intrusion of industri-al IoT based on multi-CNN fusion. Measurement, 154, 107450.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
Mohamed, T., Otsuka, T., & Ito, T. (2018). Towards machine learning based IoT intrusion detection service. In Recent Trends and Future Technology in Applied Intelligence: 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceed-ings 31 (pp. 580-585). Springer International Publishing.
Mohammad, Z., Abusukhon, A., & Qattam, T. A. (2019, April). A survey of authenticated Key Agreement Protocols for securing IoT. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Tech-nology (JEEIT) (pp. 425-430). IEEE.
Mohammadzadeh, A. K., Ghafoori, S., Mohammadian, A., Mohammadkazemi, R., Mahbanooei, B., & Ghasemi, R. (2018). A Fuzzy Analytic Network Process (FANP) approach for prioritizing internet of things challenges in Iran. Technology in Society, 53, 124-134.
Mourtzis, D., Vlachou, E., & Milas, N. (2016). Industrial big data as a result of IoT adoption in manufacturing. Procedia cirp, 55, 290-295.
Mumtaz, R., Samawi, V., Alhroob, A., Alzyadat, W., & Almukahel, I. (2022). PDIS: A Service Layer for Privacy and De-tecting Intrusions in Cloud Computing. International Journal of Advanced Software Computer Applications, 14(2).
Murali, S., & Jamalipour, A. (2019). A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal, 7(1), 379-388.
NSF, N. S. F. (2011). The Network Simulator - ns-2. https://nsnam.sourceforge.net/wiki/index.php/User_Information#The_Network_Simulator_-_ns-2
Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J., Tanaka, Y., & Tsiftes, N. (2022). The Contiki-NG open source op-erating system for next generation IoT devices. SoftwareX, 18, 101089.
Rawajbeh, M. A., Sayenko, V. I., Alhadid, I. H., Al-Turjman, F., & Ramasamy, L. K. (2021). Evaluation of functional ma-turity for a network information service-design and case analysis. International Journal of Ad Hoc and Ubiquitous Computing, 38(1-3), 3-16.
Rydning, D. R. J. G. J., Reinsel, J., & Gantz, J. (2018). The digitization of the world from edge to core. Framingham: In-ternational Data Corporation, 16.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.
Sha, K., Wei, W., Yang, T. A., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future generation computer systems, 83, 326-337.
Shanmugam, B., & Azam, S. (2023). Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies, 11(1), 31.
Sheng, Z., Mahapatra, C., Zhu, C., & Leung, V. C. (2015). Recent advances in industrial wireless sensor networks toward efficient management in IoT. IEEE access, 3, 622-637.
Siraj, S., Gupta, A., & Badgujar, R. (2012). Network simulation tools survey. International Journal of Advanced Research in Computer and Communication Engineering, 1(4), 199-206.
Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 2020. [Online]. Availa-ble:https://www.statista.com/statistics/802690/worldwide-connecteddevices-by-access-technology/. [Accessed: 26-May-2022].
Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems, 108, 909-920.
Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), 1977.
things challenges in Iran. Technology in Society, 53, 124-134.
Turner, S., & Chen, L. (2011). Updated security considerations for the MD5 message-digest and the HMAC-MD5 algo-rithms (No. rfc6151).
TutorialsWeb. (2023). Network Simulator 2 (NS2) : Features & Basic Architecture Of NS2. https://www.tutorialsweb.com/ns2/NS2-1.htm
Velinov, A., & Mileva, A. (2016). Running and testing applications for Contiki OS using Cooja simulator.
Wahid-Ul-Ashraf, A., Budka, M., & Musial, K. (2018). Netsim–the framework for complex network generator. Procedia Computer Science, 126, 547-556.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal, 4(5), 1250-1258.
Zhang, Y., An, J. P., & Chen, P. (2012). Research of Hybrid Programming with C#. net and Matlab. Physics Procedia, 24, 1677-1681.
Al Rawajbeh, M. (2017). Low cost design and implementation for HAS using multifunctional WI-FI. International Jour-nal of Computer Networks & Communications (IJCNC), 9(3), 105-116.
Al Rawajbeh, M. (2019). Performance evaluation of a computer network in a cloud computing environment. ICIC Express Letters, 13, 719-727.
Al Rawajbeh, M., & Haboush, A. (2015). Advanced object monitoring using wireless sensors network. Procedia Computer Science, 65, 17-24.
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Net-work and Computer Applications, 88, 10-28.
Alsoufi, M. A., Razak, S., Siraj, M. M., Nafea, I., Ghaleb, F. A., Saeed, F., & Nasser, M. (2021). Anomaly-based intrusion detection systems in IOT using deep learning: A systematic literature review. Applied sciences, 11(18), 8383.
Bagula, B. A., & Erasmus, Z. (2015, March). Iot emulation with cooja. In ICTP-IoT workshop (p. 99).
Balaji, S., Nathani, K., & Santhakumar, R. (2019). IoT technology, applications and challenges: a contemporary sur-vey. Wireless personal communications, 108, 363-388.
Eskandari, M., Janjua, Z. H., Vecchio, M., & Antonelli, F. (2020). Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal, 7(8), 6882-6897.
Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer networks, 148, 283-294.
Hawkins, D. M. (1980). Identification of outliers (Vol. 11). London: Chapman and Hall.
Kavyashree, E. D., Vidyashree, H. D., & Kumar, B. A. (2018). A survey of internet of things (IoT)-applications, merits, demerits & challenges. International Journal of Innovative Research in Computer and Communication Engineering, 6(2), 903-907.
Kouicem, D. E., Bouabdallah, A., & Lakhlef, H. (2018). Internet of things security: A top-down survey. Computer Net-works, 141, 199-221.
Kumar, R., Venkanna, U., & Tiwari, V. (2020, January). A binary classification approach for time granular traffic in SDWMN based IoT networks. In 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (pp. 531-534). IEEE.
Lee, J., & Park, K. (2021). GAN-based imbalanced data intrusion detection system. Personal and Ubiquitous Compu-ting, 25, 121-128.
Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., ... & Cui, L. (2020). Robust detection for network intrusion of industri-al IoT based on multi-CNN fusion. Measurement, 154, 107450.
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE internet of things journal, 4(5), 1125-1142.
Mohamed, T., Otsuka, T., & Ito, T. (2018). Towards machine learning based IoT intrusion detection service. In Recent Trends and Future Technology in Applied Intelligence: 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceed-ings 31 (pp. 580-585). Springer International Publishing.
Mohammad, Z., Abusukhon, A., & Qattam, T. A. (2019, April). A survey of authenticated Key Agreement Protocols for securing IoT. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Tech-nology (JEEIT) (pp. 425-430). IEEE.
Mohammadzadeh, A. K., Ghafoori, S., Mohammadian, A., Mohammadkazemi, R., Mahbanooei, B., & Ghasemi, R. (2018). A Fuzzy Analytic Network Process (FANP) approach for prioritizing internet of things challenges in Iran. Technology in Society, 53, 124-134.
Mourtzis, D., Vlachou, E., & Milas, N. (2016). Industrial big data as a result of IoT adoption in manufacturing. Procedia cirp, 55, 290-295.
Mumtaz, R., Samawi, V., Alhroob, A., Alzyadat, W., & Almukahel, I. (2022). PDIS: A Service Layer for Privacy and De-tecting Intrusions in Cloud Computing. International Journal of Advanced Software Computer Applications, 14(2).
Murali, S., & Jamalipour, A. (2019). A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet of Things Journal, 7(1), 379-388.
NSF, N. S. F. (2011). The Network Simulator - ns-2. https://nsnam.sourceforge.net/wiki/index.php/User_Information#The_Network_Simulator_-_ns-2
Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J., Tanaka, Y., & Tsiftes, N. (2022). The Contiki-NG open source op-erating system for next generation IoT devices. SoftwareX, 18, 101089.
Rawajbeh, M. A., Sayenko, V. I., Alhadid, I. H., Al-Turjman, F., & Ramasamy, L. K. (2021). Evaluation of functional ma-turity for a network information service-design and case analysis. International Journal of Ad Hoc and Ubiquitous Computing, 38(1-3), 3-16.
Rydning, D. R. J. G. J., Reinsel, J., & Gantz, J. (2018). The digitization of the world from edge to core. Framingham: In-ternational Data Corporation, 16.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118-137.
Sha, K., Wei, W., Yang, T. A., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future generation computer systems, 83, 326-337.
Shanmugam, B., & Azam, S. (2023). Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies, 11(1), 31.
Sheng, Z., Mahapatra, C., Zhu, C., & Leung, V. C. (2015). Recent advances in industrial wireless sensor networks toward efficient management in IoT. IEEE access, 3, 622-637.
Siraj, S., Gupta, A., & Badgujar, R. (2012). Network simulation tools survey. International Journal of Advanced Research in Computer and Communication Engineering, 1(4), 199-206.
Statista, “Number of connected devices worldwide 2030 | Statista,” Statista Research Department, 2020. [Online]. Availa-ble:https://www.statista.com/statistics/802690/worldwide-connecteddevices-by-access-technology/. [Accessed: 26-May-2022].
Tewari, A., & Gupta, B. B. (2020). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems, 108, 909-920.
Thamilarasu, G., & Chawla, S. (2019). Towards deep-learning-driven intrusion detection for the internet of things. Sensors, 19(9), 1977.
things challenges in Iran. Technology in Society, 53, 124-134.
Turner, S., & Chen, L. (2011). Updated security considerations for the MD5 message-digest and the HMAC-MD5 algo-rithms (No. rfc6151).
TutorialsWeb. (2023). Network Simulator 2 (NS2) : Features & Basic Architecture Of NS2. https://www.tutorialsweb.com/ns2/NS2-1.htm
Velinov, A., & Mileva, A. (2016). Running and testing applications for Contiki OS using Cooja simulator.
Wahid-Ul-Ashraf, A., Budka, M., & Musial, K. (2018). Netsim–the framework for complex network generator. Procedia Computer Science, 126, 547-556.
Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal, 4(5), 1250-1258.
Zhang, Y., An, J. P., & Chen, P. (2012). Research of Hybrid Programming with C#. net and Matlab. Physics Procedia, 24, 1677-1681.