22
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Optimizing Internet-Wide Port Scanning for IoT Security and Network Resilience: A Reinforcement Learning-Based Approach in WLANs with IEEE 802.11ah

, , &
Pages 14-42 | Received 08 Dec 2023, Accepted 09 Apr 2024, Published online: 15 May 2024

References

  • I. G. Lee et al. “WiFi HaLow for long-range and low-power internet of things: system on chip development and performance evaluation.” IEEE Commun. Mag., vol. 59, no. 7, pp. 101–107, 2021. DOI: 10.1109/MCOM.001.2000815.
  • A. Farhad and J. Y. Pyun, “Resource management for massive internet of things in IEEE 802.11 ah wlan: Potentials, current solutions, and open challenges.” Sensors., vol. 22, no. 23, pp. 9509, 2022. DOI: 10.3390/s22239509.
  • E. Garcia-Villegas, A. Lopez-Garcia, and E. Lopez-Aguilera, “Genetic algorithm-based grouping strategy for IEEE 802.11 ah networks,” Sensors., vol. 23, no. 2, pp. 862, 2023. DOI: 10.3390/s23020862.
  • H. B. Patel and D. C. Jinwala, “6MID: Mircochain based intrusion detection for 6LoWPAN based IoT networks,” Procedia Comput. Sci., vol. 184, pp. 929–934, 2021. DOI: 10.1016/j.procs.2021.04.023.
  • S. Verma, Y. Kawamoto, and N. Kato “A novel IoT-aware WLAN environment identification for efficient internet-wide port scan,” GLOBECOM 2020-2020 IEEE Global Communications Conference, Taipei, Taiwan. IEEE, Dec. 2020, pp. 1–6.
  • J. Schwenk, “IP Security (IPSec),” in Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications, Cham: Springer International Publishing, 2022, pp. 135–190.
  • B. R. Chen, S. M. Cheng, and M. B. Mwangi, “A mobility-based epidemic model for IoT malware spread,” IEEE. Access., vol. 10, pp. 107929–107941, 2022. DOI: 10.1109/ACCESS.2022.3213032.
  • H. A. Tarish, “Enhanced IoT Wi-Fi protocol standard’s security using secure remote password,” Periodicals Of Engineering And Natural Sciences., vol. 10, no. 1, pp. 632–644, 2022. DOI: 10.21533/pen.v10i1.2728.
  • B. Alotaibi and M. Alotaibi, “A stacked deep learning approach for IoT cyberattack detection,” J. Sens., vol. 2020, pp. 1–10, 2020. DOI: 10.1155/2020/8828591.
  • O. Elsier et al. “Adapting deep learning-LSTM method in SDN controller for secure IoT,” 2023.
  • R. Gayathri et al. “Detection and mitigation of IoT-based attacks using SNMP and moving target defense techniques,” Sensors., vol. 23, no. 3, pp. 1708, 2023. DOI: 10.3390/s23031708.
  • S. Mirdula and M. Roopa, “MUD enabled deep learning framework for anomaly detection in IoT- integrated smart building,” E-Prime-Adv Electr Eng Electron Energy., vol. 5, pp. 100186, 2023. DOI: 10.1016/j.prime.2023.100186.
  • A. K. Yadav, M. Misra, P. K. Pandey, and M. Liyanage, “An EAP-Based mutual authentication protocol for WLAN-Connected IoT devices,” IEEE Trans Ind Informat., vol. 19, no. 2, pp. 1343–1355, 2022. DOI: 10.1109/TII.2022.3194956.
  • A. Wani and R. Khaliq, “SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL),” CAAI. Trans. Intell. Technol., vol. 6, no. 3, pp. 281–290, 2021. DOI: 10.1049/cit2.12003.
  • A. Koirala, R. Bista, and J. C. Ferreira, “Enhancing IoT device security through network attack data analysis using machine learning algorithms,” Future Internet., vol. 15, no. 6, pp. 210, 2023. DOI: 10.3390/fi15060210.
  • F. Tang, Y. Kawamoto, N. Kato, K. Yano, and Y. Suzuki, “Probe delay based adaptive port scanning for IoT devices with private IP address behind NAT,” IEEE Netw., vol. 34, no. 2, pp. 195–201, 2019. DOI: 10.1109/MNET.001.1900264.
  • S. Verma, Y. Kawamoto, and N. Kato, “A smart Internet-wide port scan approach for improving IoT security under dynamic WLAN environments,” IEEE Internet Things J., vol. 9, no. 14, pp. 11951–11961, 2021. DOI: 10.1109/JIOT.2021.3132389.
  • A. Fatani et al. “Enhancing intrusion detection systems for iot and cloud environments using a growth optimizer algorithm and conventional neural networks,” Sensors., vol. 23, no. 9, pp. 4430, 2023. DOI: 10.3390/s23094430.
  • S. P. Singh, Y. Alotaibi, G. Kumar, and S. S. Rawat, “Intelligent adaptive optimisation method for enhancement of information security in iot-enabled environments,” Sustain.(switzerland)., vol. 14, no. 20, pp. 13635, 2022. DOI: 10.3390/su142013635.
  • H. A. Alterazi et al. “Prevention of cyber security with the internet of things using particle swarm optimization,” Sensors., vol. 22, no. 16, pp. 6117, 2022. DOI: 10.3390/s22166117.
  • N. Goswami et al. “Intrusion detection system for iot-based healthcare intrusions with lion-salp-swarm-optimization algorithm: metaheuristic-enabled hybrid intelligent approach,” Eng Sci., 2023. DOI: 10.30919/es933.
  • T. Gu et al. August. Towards learning-automation IoT attack detection through reinforcement learning. In 2020 IEEE 21st International Symposium on“A World of Wireless, Mobile and Multimedia Networks”(WoWMoM), Cork, Ireland. IEEE, 2020, pp. 88–97.
  • J. Zhang, Z. Zhang, S. Han, and S. Lü, “Proximal policy optimization via enhanced exploration efficiency,” Inf Sci (Ny)., vol. 609, pp. 750–765, 2022. DOI: 10.1016/j.ins.2022.07.111.
  • S. Verma, Y. Kawamoto, and N. Kato, “A network-aware Internet-wide scan for security maximization of IPV6-enabled WLAN IoT devices,” IEEE Internet Things J., vol. 8, no. 10, pp. 8411–8422, 2020. DOI: 10.1109/JIOT.2020.3045733.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.