Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects

U Inayat, MF Zia, S Mahmood, HM Khalid… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) is a developing technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …

Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology

BK Mohanta, D Jena, U Satapathy, S Patnaik - Internet of Things, 2020 - Elsevier
Abstract Internet of Things (IoT) is one of the most rapidly used technologies in the last
decade in various applications. The smart things are connected in wireless or wired for …

Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things

SVN Santhosh Kumar, M Selvi… - Computational …, 2023 - Wiley Online Library
The Internet of Things (IoT) is a distributed system which is made up of the connections of
smart objects (things) that can continuously sense the events in their sensing domain and …

Security and privacy in smart cities: Challenges and opportunities

L Cui, G Xie, Y Qu, L Gao, Y Yang - IEEE access, 2018 - ieeexplore.ieee.org
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …

Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

Intrusion detection systems in the Internet of things: A comprehensive investigation

S Hajiheidari, K Wakil, M Badri, NJ Navimipour - Computer Networks, 2019 - Elsevier
Recently, a new dimension of intelligent objects has been provided by reducing the power
consumption of electrical appliances. Daily physical objects have been upgraded by …

A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

Game theory for multi-access edge computing: Survey, use cases, and future trends

J Moura, D Hutchison - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …

A comprehensive study on cybersecurity challenges and opportunities in the IoT world

AN Lone, S Mustajab, M Alam - Security and Privacy, 2023 - Wiley Online Library
It has become possible to link anything and everything to the Internet in recent decades due
to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a …