Related references
Note: Only part of the references are listed.
Article
Computer Science, Hardware & Architecture
Iqbal H. Sarker et al.
Summary: The Internet of Things (IoT) is a widely used technology that greatly impacts various aspects of our lives. However, cyber-attacks and threats pose significant challenges to smart applications in the IoT environment. Utilizing artificial intelligence, especially machine and deep learning, is crucial in enhancing the security of next-generation IoT systems. This article provides an overview of IoT security intelligence built on machine and deep learning technologies, aiming to intelligently protect IoT devices from a variety of cyber-attacks.
MOBILE NETWORKS & APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Pradeepkumar Bhale et al.
Summary: Distributed Denial-of-Service (DDoS) attacks are a common threat to Internet of Things (IoT) systems, and the design and placement of intrusion detection systems (IDSs) for DDoS attacks on IoT systems are challenging. Existing IDSs are not capable of handling both high-rate and low-rate DDoS attacks accurately. This work proposes a transparent and optimally placed distributed IDS solution, OPTIMIST, which can effectively detect both types of DDoS attacks. The IDS placement problem is formulated as a weighted minimum vertex cover problem and solved using an approximation algorithm. The IDS module is based on a LSTM model with a novel offline training method using Wasserstein GAN-generated artificial flows. Extensive experimentation shows that OPTIMIST achieves a good balance between DDoS detection and energy overhead.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Arash Heidari et al.
Summary: This article proposes a blockchain-based radial basis function neural networks (RBFNNs) model to improve the performance of drone networks in the Internet of Things (IoT). The research findings show that the suggested model is an excellent option for network intrusion detection in IoD contexts, outperforming cutting-edge methods. Using various data sets, the viability and efficacy of implementing blockchain and deep learning techniques in IoD are demonstrated.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Rehabilitation
Li-Chieh Kuo et al.
Summary: This study aimed to compare the effects of using an Internet of things (IoT)-assisted tenodesis-induced-grip exoskeleton robot (TIGER) and task-specific motor training (TSMT) as home programs for the upper-limb (UL) functions of patients with chronic stroke, and the results showed that the IoT-assisted TIGER training was more effective in improving the UL functions of stroke patients.
ARCHIVES OF PHYSICAL MEDICINE AND REHABILITATION
(2023)
Review
Computer Science, Information Systems
Arash Heidari et al.
Summary: The security of IoT involves not only network and data security but also human health and life attacks. The integration of Intrusion Detection System (IDS) with IoT systems is important for protecting system security.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2023)
Review
Computer Science, Information Systems
Rajasekhar Chaganti et al.
Summary: With the advent of technologies like IoT and SDN, the DDoS attack vector has expanded, posing new threats to targeted victims. Blockchain technology, with its decentralized design and secure distributed storage, can enhance security in DDoS mitigation. This paper reviews and categorizes state-of-the-art DDoS mitigation solutions based on blockchain technology, considering deployment location and architectures like IoT and SDN.
COMPUTER COMMUNICATIONS
(2023)
Review
Chemistry, Analytical
Zawar Shah et al.
Summary: Internet of Things (IoT) devices are vulnerable to Distributed Denial of Service (DDoS) attacks due to their limited resources. Blockchain-based solutions are potential to mitigate DDoS attacks in IoT. This survey provides a detailed analysis and evaluation of existing Blockchain-based solutions and identifies future research directions.
Article
Computer Science, Artificial Intelligence
Agostino Forestiero
Summary: This paper proposes a heuristic method to build a recommender engine in IoT environment using swarm intelligence techniques. Smart objects are represented using real-valued vectors and mobile agents with a similarity rule for intelligent positioning and quick selection operations.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Chemistry, Analytical
Jehad Ali et al.
Summary: The Software-Defined Networking (SDN) paradigm transfers network intelligence to a centralized controller, and segmenting the network into clusters improves the efficiency of switch allocation to the controller.
Review
Chemistry, Analytical
Tejal Rathod et al.
Summary: This paper presents a survey of wireless networks (WNs) in the context of security and privacy issues with blockchain-based solutions. The existing research works, security requirements, and security issues in different generations of WNs are analyzed. The influence of blockchain technology and a taxonomy for blockchain-enabled security solutions in WN are showcased. Furthermore, a blockchain and 6G-based WN architecture is proposed and evaluated against performance metrics. Various open issues and research challenges for blockchain-based WNs solutions are discussed.
Article
Mathematical & Computational Biology
Abdelghani Dahou et al.
Summary: This study proposes a novel framework to improve intrusion detection system performance by utilizing data from the Internet of things environments. The framework uses deep learning and metaheuristic optimization algorithms for feature extraction and selection. A convolutional neural network is implemented as the core feature extractor, and a feature selection mechanism based on the Reptile Search Algorithm is proposed. The framework achieved competitive performance in classification metrics compared to other optimization methods.
COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE
(2022)
Review
Chemistry, Multidisciplinary
Mohammed AlShamsi et al.
Summary: Blockchain technologies have unique characteristics that have attracted attention from academia and industry, but their adoption rate remains low. This systematic review analyzed 30 empirical studies to understand the impacts of Blockchain adoption, finding that trust, perceived cost, social influence, and facilitating conditions are significant determinants influencing various Blockchain applications. Supply chain management emerged as the primary domain for Blockchain applications, highlighting a need for more research on individual-level adoption and actual usage.
APPLIED SCIENCES-BASEL
(2022)
Article
Engineering, Chemical
Shailendra Mishra et al.
Summary: The Internet of Things (IoT) is a technological revolution that enables virtual data exchange between human-to-human and machine-to-machine communication using low-cost sensors. This study identifies possible attacks on different types of networks and provides valuable insights for vulnerability researchers and IoT network protection specialists to develop proactive solutions. The proposed approach utilizes machine learning algorithms to detect and mitigate attacks with high accuracy, and a theoretical proof of applicability and feasibility for an intrusion detection system using Snort is provided.
Article
Green & Sustainable Science & Technology
Umar Islam et al.
Summary: This paper investigates the detection of distributed denial-of-service (DDoS) attacks on financial organizations using the Banking Dataset. Multiple classification models, including support vector machine (SVM), K-Nearest Neighbors (KNN), and random forest algorithms (RF), were used for prediction. The results show that SVM has the highest accuracy compared to other models.
Article
Computer Science, Hardware & Architecture
Noe M. Yungaicela-Naula et al.
Summary: This paper proposes a SDN-based framework that combines DL-based IDS and DRL-based IPS to handle slow-rate DDoS threats. The framework incorporates scalability features and achieves effective responses through traffic monitoring and flow sampling.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Anichur Rahman et al.
Summary: Blockchain and software-defined networking are leading technologies that have been widely applied in network-related scenarios and have gained increasing interest in the research community. This study provides a comprehensive survey and review of the literature on these two technologies, focusing on their features, common variants, and potential integration. It also covers the individual and combined application fields of these technologies and discusses open issues and future research directions. This is the first work that analyzes the integration of blockchain and software-defined networking in a broad context, with a specific emphasis on security and privacy issues in actual utilization scenarios.
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT
(2022)
Article
Chemistry, Analytical
Rahmeh Fawaz Ibrahim et al.
Summary: This paper proposes an Ethereum blockchain model to detect and prevent DDoS attacks against IoT systems. The system authenticates and verifies IoT devices to prevent attacks, and traces and records the IP address of malicious devices inside the blockchain to prevent them from connecting and communicating with the IoT networks. Experimental results demonstrate the system's superiority in performance compared to other related works.
Proceedings Paper
Computer Science, Theory & Methods
Wiem Bekri et al.
Summary: The growth of the Internet of Things has led to a variety of heterogeneous devices generating large amounts of data, raising concerns about data privacy and security. This paper investigates security threats and issues, discusses and categorizes conventional IoT attacks, and evaluates the latest proposed countermeasures.
2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC
(2022)
Review
Computer Science, Information Systems
N'guessan Yves-Roland Douha et al.
Summary: Smart-home security has attracted the attention of industry professionals, attackers, and academic researchers. Recent studies have focused on the role of blockchain, SDN, and NFV in addressing security challenges, proposing new architectures. SDN and NFV enhance home network management and access control, while blockchain strengthens IoT data security and privacy.
INTERNET OF THINGS
(2022)
Article
Business
Rana Faisal Hayat et al.
Summary: Distributed denial of service (DDoS) attacks and botnet-based attacks are critical security vulnerabilities in IoT environments. This article proposes a multilevel DDoS mitigation approach using blockchain technology to protect IoT devices. The proposed framework achieves significant improvements in throughput, latency, and CPU utilization compared to existing methods.
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT
(2022)
Article
Computer Science, Hardware & Architecture
Afsaneh Banitalebi Dehkordi et al.
Summary: The DDoS attack is a security challenge for SDN, with existing detection methods having limitations such as dependency on network topology and outdated datasets. A new method consisting of three sections has shown improved accuracy in detecting DDoS attacks in SDN.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Automation & Control Systems
Maninderpal Singh et al.
Summary: A blockchain framework based on deep learning is designed in this article to provide secure software-defined industrial network, utilizing blockchain mechanism to register, verify, and achieve consensus for switches, with a deep Boltzmann machine flow analyzer deployed in the control plane.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Review
Computer Science, Information Systems
Yahya Al-Hadhrami et al.
Summary: The Internet of Things (IoT) is a rapidly emerging technology that has the potential to radically transform consumer experience, but faces challenges such as large data volume, network scale, and security and privacy concerns. Distributed Denial-of-Service (DDoS) attacks in IoT networks are considered a growing challenge that needs attention.
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
(2021)
Article
Chemistry, Multidisciplinary
Song Wang et al.
Summary: SDN and IoT are trends in network evolution, with SDN focusing on upper level control and management of networks and IoT aiming to bring devices together for sharing and monitoring behaviors. IoT enables remote device and network control, but also raises security concerns about network attacks.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Hardware & Architecture
Mengmeng Ge et al.
Summary: The Internet of Things brings benefits to humanity, but also vulnerabilities to cyber attacks. This paper proposes a novel intrusion detection approach for the IoT using deep learning techniques, achieving high classification accuracy.
Article
Computer Science, Information Systems
Vladimir Borgiani et al.
Summary: Wireless sensor networks are commonly used in the Industrial Internet-of-Things, but vulnerable to security attacks. A distributed congestion control method has been proposed to mitigate DoS attacks, showing potential application in a sensor network scenario with 500 nodes.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Abdelouahid Derhab et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
(2021)
Review
Telecommunications
Hai Nam Nguyen et al.
Summary: Software-Defined Networking (SDN) introduces the groundbreaking idea of separating the Control plane and Data plane of traditional networks, providing benefits such as a global network view and software-based traffic analysis. However, SDN also faces challenges in scalability, reliability, and security. Blockchain technology offers decentralized methods to authenticate exchanged network information, potentially addressing some of the current issues in SDN.
IET WIRELESS SENSOR SYSTEMS
(2021)
Article
Computer Science, Theory & Methods
Lubna Fayez Eliyan et al.
Summary: Software Defined Networking (SDN) decouples network intelligence from hardware, facing challenges like security and reliability, especially in dealing with Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. The promise of SDN lies in simplifying network management and enabling innovation through centralized control decisions.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2021)
Review
Computer Science, Information Systems
Ritika Lohiya et al.
Summary: IoT is evolving towards the Internet of Everything, encompassing wireless networks, sensors, cloud servers, smart devices, and advanced technologies. Its applications span various sectors such as transportation, healthcare, and agriculture. Challenges in IoT research and commercial solutions developed in IoT application domains are highlighted in this article.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Hardware & Architecture
Yuanhao Cui et al.
Summary: The emerging technology of ISAC combines recent advances in wireless communication, solid-state circuits, and sensing ability, leading to integration gain and coordination gain. This technology is driving a convergence towards a signaling layer in the ubiquitous IoT architecture and faces both challenges and opportunities.
Article
Engineering, Multidisciplinary
James Dzisi Gadze et al.
Summary: This paper introduces the concept of Software-Defined Networking (SDN) and its security threats, discussing the potential and efficiency of using deep learning models to detect and mitigate DDoS attacks. By comparing model performance, it was found that the RNN LSTM model has a good balance between precision and recall in DDoS classification.
Article
Computer Science, Hardware & Architecture
Mikail Mohammed Salim et al.
JOURNAL OF SUPERCOMPUTING
(2020)
Review
Computer Science, Hardware & Architecture
Jayasree Sengupta et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2020)
Review
Computer Science, Information Systems
Maninder Pal Singh et al.
COMPUTER COMMUNICATIONS
(2020)
Article
Multidisciplinary Sciences
Bo Zhao et al.
Review
Telecommunications
Abhishek Khanna et al.
WIRELESS PERSONAL COMMUNICATIONS
(2020)
Review
Computer Science, Information Systems
Jagdeep Singh et al.
COMPUTER SCIENCE REVIEW
(2020)
Article
Computer Science, Hardware & Architecture
Omer Elsier Tayfour et al.
MOBILE NETWORKS & APPLICATIONS
(2020)
Article
Computer Science, Information Systems
Jalal Bhayo et al.
Article
Telecommunications
Wiem Bekri et al.
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS
(2020)
Article
Automation & Control Systems
Hui Yang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2020)
Article
Computer Science, Information Systems
Wu Zhijun et al.
Article
Computer Science, Theory & Methods
Rochak Swami et al.
ACM COMPUTING SURVEYS
(2019)
Article
Chemistry, Analytical
Abdelouahid Derhab et al.
Proceedings Paper
Computer Science, Artificial Intelligence
Sarra Boukria et al.
2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC)
(2019)
Article
Computer Science, Information Systems
Imran Makhdoom et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2019)
Review
Computer Science, Information Systems
Tasnuva Mahjabin et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
(2017)
Article
Computer Science, Hardware & Architecture
Zhaogang Shu et al.
MOBILE NETWORKS & APPLICATIONS
(2016)