{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:55:59Z","timestamp":1776444959226,"version":"3.51.2"},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1]]},"abstract":"<jats:p>Network security and network forensics technologies for the Internet of Things (IoT) need special consideration due to resource-constraints. Cybercrimes conducted in IoT focus on network information and energy sources. Graph theory is adopted to analyze the IoT network and a hybrid Intrusion Detection System (IDS) is proposed. The hybrid IDS consists of Centralized and Active Malicious Node Detection (CAMD) and Distributed and Passive EEA (Energy Exhaustion Attack) Resistance (DPER). CAMD is integrated in the genetic algorithm-based data gathering scheme. CAMD detects malicious nodes manipulated by cyber criminals and provides digital evidence for forensics. DPER is implemented in a set of communication protocols to alleviate the impact of EEA attacks. Simulation experiments conducted on NS-3 platform showed the hybrid IDS proposed detected and traced malicious nodes precisely without compromising energy efficiency. Besides, the impact of EEA attacks conducted by cyber criminals was effectively alleviated.<\/jats:p>","DOI":"10.4018\/ijdcf.2020010106","type":"journal-article","created":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T16:03:55Z","timestamp":1571760235000},"page":"109-130","source":"Crossref","is-referenced-by-count":9,"title":["A Hybrid Intrusion Detection System for IoT Applications with Constrained Resources"],"prefix":"10.4018","volume":"12","author":[{"given":"Chao","family":"Wu","sequence":"first","affiliation":[{"name":"Chongqing Vehicle Test & Research Institute Co. Ltd., Chongqing, China"}]},{"given":"Yuan'an","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[{"name":"SKLOIS, IIE & SCS UCAS, CAS, Beijing, China"}]},{"given":"Hui","family":"Lu","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics of the Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wenhao","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Bihua","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2020010106-0","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2013010101"},{"key":"IJDCF.2020010106-1","doi-asserted-by":"publisher","DOI":"10.4018\/IJDCF.2017010102"},{"key":"IJDCF.2020010106-2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"issue":"1-2","key":"IJDCF.2020010106-3","first-page":"109","article-title":"Artificial Neural Network Based Detection of Energy Exhaustion Attacks in Wireless Sensor Networks Capable of Energy Harvesting.","volume":"22","author":"N. A.Alrajeh","year":"2014","journal-title":"Ad-Hoc & Sensor Wireless Networks"},{"key":"IJDCF.2020010106-4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883583"},{"key":"IJDCF.2020010106-5","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9863032"},{"key":"IJDCF.2020010106-6","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-016-0803-1"},{"key":"IJDCF.2020010106-7","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554706"},{"key":"IJDCF.2020010106-8","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2015.070386"},{"key":"IJDCF.2020010106-9","unstructured":"Lacage, M., & Carneiro, G. (2008). Network Simulator-3. Retrieved from https:\/\/www.nsnam.org"},{"key":"IJDCF.2020010106-10","doi-asserted-by":"crossref","unstructured":"Le, A., Loo, J., Chai, K.K., & Aiash, M. (2016). A Specification-based IDS for Detecting Attacks on RPL-based Network Topology. Information, 7(2).","DOI":"10.3390\/info7020025"},{"key":"IJDCF.2020010106-11","doi-asserted-by":"crossref","unstructured":"Lee, T. H., Wen, C. H., Chang, L. H., Chiang, H. S., & Hsieh, M. C. (2014). A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN. In Proceedings of Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013 (pp. 1205-1213). Academic Press.","DOI":"10.1007\/978-94-007-7262-5_137"},{"key":"IJDCF.2020010106-12","doi-asserted-by":"crossref","unstructured":"Liu, Q., Zhang, K., Shen, J., Fu, Z., & Linge, N. (2016). Glrm: An Improved Grid-based Load-Balanced Routing Method for WSN with Single Controlled Mobile Sink. In Proceedings of 18th International Conference on Advanced Communications Technology: \u201cInformation and Communications for Safe and Secure Life!\u201d ICACT 2016 (pp. 34-38). Academic Press.","DOI":"10.1109\/ICACT.2016.7423263"},{"key":"IJDCF.2020010106-13","doi-asserted-by":"publisher","DOI":"10.1109\/ICONSTEM.2016.7560872"},{"key":"IJDCF.2020010106-14","doi-asserted-by":"publisher","DOI":"10.3390\/s141224188"},{"key":"IJDCF.2020010106-15","doi-asserted-by":"publisher","DOI":"10.3138\/infor.45.3.123"},{"key":"IJDCF.2020010106-16","first-page":"286","article-title":"A Realistic Power Consumption Model for Wireless Sensor Network Devices","author":"W.Qin","year":"2006","journal-title":"Proceedings of 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks"},{"key":"IJDCF.2020010106-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-60761-772-3_7"},{"key":"IJDCF.2020010106-18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36672-7_2"},{"key":"IJDCF.2020010106-19","doi-asserted-by":"publisher","DOI":"10.3390\/s16081217"},{"key":"IJDCF.2020010106-20","first-page":"167","article-title":"Routing Attacks and Countermeasures in The RPL-based Internet of Things.","volume":"2","author":"L.Wallgren","year":"2013","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"IJDCF.2020010106-21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.152"},{"key":"IJDCF.2020010106-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.02.009"},{"key":"IJDCF.2020010106-23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2667687"},{"key":"IJDCF.2020010106-24","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2015.2489160"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=240653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T23:56:18Z","timestamp":1651794978000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2020010106"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":25,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2020010106","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1]]}}}