{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:41Z","timestamp":1750219721223,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T00:00:00Z","timestamp":1703116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,21]]},"DOI":"10.1145\/3629188.3629195","type":"proceedings-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T23:08:54Z","timestamp":1702508934000},"page":"35-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Strategic Placement of Intrusion Detection Systems in IoT Mesh Networks through Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1833-3614","authenticated-orcid":false,"given":"Samhitha","family":"Perala","sequence":"first","affiliation":[{"name":"International Institute of Information Technology Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6214-0010","authenticated-orcid":false,"given":"Manaswitha","family":"Reddy","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4041-0795","authenticated-orcid":false,"given":"Sharvari","family":"Ravindran","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4450-5871","authenticated-orcid":false,"given":"Sasirekha","family":"Gvk","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology Bangalore, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0866-9895","authenticated-orcid":false,"given":"Jyotsna","family":"Bapat","sequence":"additional","affiliation":[{"name":"International Institute of Information Technology Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2023,12,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Internet Revolution: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet, 1 ed","author":"Okin J.","year":"2005","unstructured":"[ 1 ] J. Okin , The Internet Revolution: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet, 1 ed ., Winter Harbor, ME : Ironbound Press , 2005 . [1] J. Okin, The Internet Revolution: The Not-for-Dummies Guide to the History, Technology, and Use of the Internet, 1 ed., Winter Harbor, ME: Ironbound Press, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/iWEM.2017.7968828"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767242"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"28417","DOI":"10.1109\/ACCESS.2018.2836677","article-title":"IoT Heterogeneous Mesh Network Deployment for Human-in-the-Loop Challenges Towards a Social and Sustainable Industry 4.0","volume":"6","author":"Garrido-Hidalgo C.","year":"2018","unstructured":"[ 4 ] C. Garrido-Hidalgo , D. Hortelano , L. Roda-Sanchez , T. Olivares , M. C. Ruiz and V. Lopez , IoT Heterogeneous Mesh Network Deployment for Human-in-the-Loop Challenges Towards a Social and Sustainable Industry 4.0 , in IEEE Access , vol. 6 , pp. 28417 - 28437 , 2018 . [4] C. Garrido-Hidalgo, D. Hortelano, L. Roda-Sanchez, T. Olivares, M. C. Ruiz and V. Lopez, IoT Heterogeneous Mesh Network Deployment for Human-in-the-Loop Challenges Towards a Social and Sustainable Industry 4.0, in IEEE Access, vol. 6, pp. 28417-28437, 2018.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2020.2977739"},{"key":"e_1_3_2_1_6_1","volume-title":"Applied graph theory to security: A qualitative placement of security solutions within IoT networks","author":"Godquin T.","year":"2020","unstructured":"[ 6 ] T. Godquin , M. Barbier , C. Gaber , J. Grimault , J. Bars , Applied graph theory to security: A qualitative placement of security solutions within IoT networks , Elsevier Journal of Information Security and Applications , 2020 . [6] T. Godquin, M. Barbier, C. Gaber, J. Grimault, J. Bars, Applied graph theory to security: A qualitative placement of security solutions within IoT networks, Elsevier Journal of Information Security and Applications, 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1919","DOI":"10.1109\/ICAC3N56670.2022.10074548","volume-title":"2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","author":"Rosangliana M.","year":"2022","unstructured":"[ 7 ] M. Rosangliana , Vanlalhruaia and R. Chawngsangpuii , Packet Authentication in Wireless Mesh Network , 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) , Greater Noida, India , 2022 , pp. 1919 - 1925 . [7] M. Rosangliana, Vanlalhruaia and R. Chawngsangpuii, Packet Authentication in Wireless Mesh Network, 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Greater Noida, India, 2022, pp. 1919-1925."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20123590"},{"volume-title":"Computer Networks","author":"Mao B.","key":"e_1_3_2_1_9_1","unstructured":"[ 9 ] B. Mao , J. Liu , M. Sun , MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion , in Computer Networks , vol. 198 , 108340, ISSN 1389-1286. [9] B. Mao, J. Liu, M. Sun, MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion, in Computer Networks, vol. 198, 108340, ISSN 1389-1286."},{"key":"e_1_3_2_1_10_1","first-page":"0142","article-title":"Identification of strategic sensor locations for intrusion detection and classification in smart grid networks","volume":"139","author":"Jena Prasanta Kumar","year":"2022","unstructured":"[ 10 ] Prasanta Kumar Jena , Subhojit Ghosh , Ebha Koley , Identification of strategic sensor locations for intrusion detection and classification in smart grid networks , International Journal of Electrical Power & Energy Systems , Volume 139 , 2022 , ISSN 0142 - 0615 . [10] Prasanta Kumar Jena, Subhojit Ghosh, Ebha Koley, Identification of strategic sensor locations for intrusion detection and classification in smart grid networks, International Journal of Electrical Power & Energy Systems, Volume 139, 2022, ISSN 0142-0615.","journal-title":"International Journal of Electrical Power & Energy Systems"},{"key":"e_1_3_2_1_11_1","first-page":"102041","article-title":"Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System, Simulation Modelling Practice and Theory","volume":"101","author":"Krzyszto\u0144 Mateusz","year":"2020","unstructured":"[ 11 ] Mateusz Krzyszto\u0144 , Micha\u0142 Marks , Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System, Simulation Modelling Practice and Theory , Elsevier , Volume 101 , 2020 , 102041 , ISSN 1569-190X. [11] Mateusz Krzyszto\u0144, Micha\u0142 Marks, Simulation of watchdog placement for cooperative anomaly detection in Bluetooth Mesh Intrusion Detection System, Simulation Modelling Practice and Theory, Elsevier, Volume 101, 2020, 102041, ISSN 1569-190X.","journal-title":"Elsevier"},{"key":"e_1_3_2_1_12_1","first-page":"1","volume-title":"International Conference on Industry 4.0 Technology (I4Tech)","author":"Sivanandam N.","year":"2022","unstructured":"[ 12 ] N. Sivanandam and T. Ananthan , Intrusion Detection System for Bluetooth Mesh Networks using Machine Learning , International Conference on Industry 4.0 Technology (I4Tech) , Pune, India , 2022 , pp. 1 - 6 . [12] N. Sivanandam and T. Ananthan, Intrusion Detection System for Bluetooth Mesh Networks using Machine Learning, International Conference on Industry 4.0 Technology (I4Tech), Pune, India, 2022, pp. 1-6."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/PerComWorkshops51409.2021.9430966","volume-title":"2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)","author":"Lacava A.","year":"2021","unstructured":"[ 13 ] A. Lacava , E. Giacomini , F. D\u2019Alterio and F. Cuomo , Intrusion Detection System for Bluetooth Mesh Networks: Data Gathering and Experimental Evaluations , 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) , Kassel, Germany , 2021 , pp. 661 - 666 . [13] A. Lacava, E. Giacomini, F. D\u2019Alterio and F. Cuomo, Intrusion Detection System for Bluetooth Mesh Networks: Data Gathering and Experimental Evaluations, 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Kassel, Germany, 2021, pp. 661-666."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"[\n  14\n  ]  Sasirekha G.V.K. Bhanu Prakash V. Bapat J. Das D. (2022). Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings. In: Gude Prego J.J. de la Puerta J.G. Garc\u00eda Bringas P. Quinti\u00e1n H. Corchado E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing vol 1400. Springer Cham.  [14] Sasirekha G.V.K. Bhanu Prakash V. Bapat J. Das D. (2022). Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings. In: Gude Prego J.J. de la Puerta J.G. Garc\u00eda Bringas P. Quinti\u00e1n H. Corchado E. (eds) 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021). CISIS - ICEUTE 2021. Advances in Intelligent Systems and Computing vol 1400. Springer Cham.","DOI":"10.1007\/978-3-030-87872-6_7"},{"issue":"6","key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"1068","DOI":"10.1016\/j.dcan.2022.05.013","article-title":"Al-Anzi, Design and analysis of intrusion detection systems for wireless mesh networks","volume":"8","author":"Fawaz","year":"2022","unstructured":"[ 15 ] Fawaz S . Al-Anzi, Design and analysis of intrusion detection systems for wireless mesh networks , Digital Communications and Networks , Volume 8 , Issue 6 , 2022 , Pages 1068 - 1076 . [15] Fawaz S. Al-Anzi, Design and analysis of intrusion detection systems for wireless mesh networks, Digital Communications and Networks, Volume 8, Issue 6, 2022, Pages 1068-1076.","journal-title":"Digital Communications and Networks"},{"key":"e_1_3_2_1_16_1","unstructured":"[\n  16\n  ]  Input and output (scipy.io) Available [Online]: https:\/\/docs.scipy.org\/doc\/scipy\/reference\/io.html.  [16] Input and output (scipy.io) Available [Online]: https:\/\/docs.scipy.org\/doc\/scipy\/reference\/io.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389067"},{"key":"e_1_3_2_1_18_1","volume-title":"Ross","author":"Kurose James F.","year":"2012","unstructured":"[ 18 ] James F. Kurose and Keith W . Ross . 2012 . Computer Networking : A Top-Down Approach (6th Edition) (6th. ed.). Pearson . [18] James F. Kurose and Keith W. Ross. 2012. Computer Networking: A Top-Down Approach (6th Edition) (6th. ed.). Pearson."},{"key":"e_1_3_2_1_19_1","first-page":"352","volume-title":"Journal of Biomedical Informatics","volume":"35","author":"Dreiseitl Stephan","year":"2002","unstructured":"[ 19 ] Stephan Dreiseitl , Lucila Ohno-Machado , Logistic regression and artificial neural network classification models: a methodology review , Journal of Biomedical Informatics , Volume 35 , Issues 5\u20136 , 2002 , Pages 352 - 359 . [19] Stephan Dreiseitl, Lucila Ohno-Machado, Logistic regression and artificial neural network classification models: a methodology review, Journal of Biomedical Informatics, Volume 35, Issues 5\u20136, 2002, Pages 352-359."},{"volume-title":"International Journal of Data Analysis Techniques and Strategies. 3. 281-299. 10.1504\/IJDATS.2011.041335.","year":"2011","key":"e_1_3_2_1_20_1","unstructured":"[ 20 ] Maalouf, Maher. ( 2011 ). Logistic regression in data analysis: An overview . International Journal of Data Analysis Techniques and Strategies. 3. 281-299. 10.1504\/IJDATS.2011.041335. [20] Maalouf, Maher. (2011). Logistic regression in data analysis: An overview. International Journal of Data Analysis Techniques and Strategies. 3. 281-299. 10.1504\/IJDATS.2011.041335."}],"event":{"name":"10th NSysS 2023: 10th International Conference on Networking, Systems and Security","acronym":"10th NSysS 2023","location":"Khulna Bangladesh"},"container-title":["10th International Conference on Networking, Systems and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629188.3629195","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:18Z","timestamp":1750178178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3629188.3629195"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,21]]},"references-count":20,"alternative-id":["10.1145\/3629188.3629195","10.1145\/3629188"],"URL":"https:\/\/doi.org\/10.1145\/3629188.3629195","relation":{},"subject":[],"published":{"date-parts":[[2023,12,21]]},"assertion":[{"value":"2023-12-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}