CFP last date
29 September 2025
Call for Paper
October Edition
CAE solicits high quality original research papers for the upcoming October edition of the journal. The last date of research paper submission is 29 September 2025

Submit your paper
Know more
Random Articles
Reseach Article

Real-Time Simulation and Detection of Unauthorized Devices in IoT Networks using MAC-Level Monitoring

by Eman Gaber Ahmed Mahomud
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 1
Year of Publication: 2025
Authors: Eman Gaber Ahmed Mahomud
10.5120/cae2025652910

Eman Gaber Ahmed Mahomud . Real-Time Simulation and Detection of Unauthorized Devices in IoT Networks using MAC-Level Monitoring. Communications on Applied Electronics. 8, 1 ( Aug 2025), 1-7. DOI=10.5120/cae2025652910

@article{ 10.5120/cae2025652910,
author = { Eman Gaber Ahmed Mahomud },
title = { Real-Time Simulation and Detection of Unauthorized Devices in IoT Networks using MAC-Level Monitoring },
journal = { Communications on Applied Electronics },
issue_date = { Aug 2025 },
volume = { 8 },
number = { 1 },
month = { Aug },
year = { 2025 },
issn = { 2394-4714 },
pages = { 1-7 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume8/number1/real-time-simulation-and-detection-of-unauthorized-devices-in-iot-networks-using-mac-level-monitoring/ },
doi = { 10.5120/cae2025652910 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-08-31T03:09:03.151823+05:30
%A Eman Gaber Ahmed Mahomud
%T Real-Time Simulation and Detection of Unauthorized Devices in IoT Networks using MAC-Level Monitoring
%J Communications on Applied Electronics
%@ 2394-4714
%V 8
%N 1
%P 1-7
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In modern Internet of Things (IoT) environments, the detection of unauthorized devices is critical for maintaining network security and integrity. This paper presents a MATLAB-based simulation framework that monitors connected devices in a wireless network and distinguishes between authorized and intruder devices using MAC address filtering. The simulation dynamically generates device activity over time, logs connection events, and visualizes trends in intrusions. Statistical analysis such as intrusion ratios, detection accuracy, and temporal patterns are computed. The proposed tool serves both as a security validation method and a data generation model for future intrusion detection system (IDS) research.

References
  1. R. H. Weber, "Internet of Things – New Security and Privacy Challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010.
  2. P. H. Pathak, M. F. Alizai, and P. Mohapatra, "Security in Emerging Wireless Technologies for the Internet of Things," IEEE Communications Magazine, vol. 53, no. 6, pp. 168–174, 2015.
  3. F. Zhang and R. Green, "Communication Security in Internet of Things: Preventive Measure and Avoidance Approach," Proc. 11th Int. Conf. Machine Learning and Applications, pp. 372–377, 2012.
  4. L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey," Computer Networks, vol. 54, no. 15, pp. 2787–2805, 2010.
  5. A. Abeshu and N. Chilamkurti, "Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing," IEEE Communications Magazine, vol. 56, no. 2, pp. 169–175, 2018.
  6. X. Zhang, L. Wang, Y. Zhang, "Anomaly Detection in IoT Using Machine Learning: A Survey," IEEE IoT Journal, vol. 8, no. 5, pp. 3170–3191, 2021.
  7. S. Gupta, H. Gaur, "Lightweight Intrusion Detection for IoT Networks: A Comparative Study," Future Generation Computer Systems, vol. 141, pp. 230–245, 2023.
  8. E. Alsurvey et al., "A critical review of practices and challenges in intrusion detection systems for IoT," IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2472–2525, 2019.
  9. S. Hajiheidari, K. Wakil, M. Badri, and N. J. Navimipour, "Intrusion detection systems in the Internet of Things: A comprehensive investigation," Computer Networks, vol. 160, pp. 165–191, Sep. 2019.
  10. M. A. Khan et al., "Insights into modern intrusion detection strategies for Internet of Things: Taxonomy, challenges and future directions," Electronics, vol. 13, no. 12, p. 2370, Jun. 2024.
  11. D. Kumar et al., "IoT intrusion detection taxonomy, reference architecture, and research challenges," Sensors, vol. 21, no. 19, p. 6432, Oct. 2021.
  12. M. T. Ahmed and A. H. Kadhim, "Hybrid intrusion detection system for wireless IoT network using MATLAB simulation," Computers & Electrical Engineering, vol. 101, p. 107915, Jan. 2022.
  13. R. S. M. Isa, F. A. Razak, and N. Yaakob, "Building an intrusion detection system for IoT environment using machine learning techniques," in Proc. Int.
Index Terms

Computer Science
Information Sciences

Keywords

IoT Security Intrusion Detection MAC Filtering Simulation Network Monitoring MATLAB