4.7 Review

Internet of Things (IoT) security dataset evolution: Challenges and future directions

Journal

INTERNET OF THINGS
Volume 22, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.iot.2023.100780

Keywords

Internet of Things (IoT); Intrusion detection system (IDS); IoT attacks; IoT security; IoT datasets; Machine learning

Ask authors/readers for more resources

The evolution of mobile technologies has introduced smarter and more connected objects into our day-to-day lives, known as the Internet of Things (IoT). However, the IoT also brings cybersecurity threats due to different communication standards, weak security defaults, and the difficulty of updating. To address these threats, developing a robust intrusion detection framework specifically for IoT is a promising approach.
The evolution of mobile technologies has introduced smarter and more connected objects into our day-to-day lives. This trend, known as the Internet of Things (IoT), has applications in smart homes, smart cities, industrial automation, health monitoring systems, and has become an essential component of the communication and networking industry. However, different communication and protocol standards, weak security defaults and the difficulty of distributing updates have exacerbated cybersecurity threats to critical applications that employ IoT. To mitigate the threats and counter these attacks, a promising approach is to develop a robust intrusion detection framework specifically aimed at securing IoT. This paper presents our efforts to catalogue and compare attacks, datasets and machine learning algorithms and architectures for intrusion detection systems for IoT devices. We classify attacks aimed at IoT devices at different layers and protocols. This work also highlights potential features that can be used by machine learning-based intrusion detection systems to detect different types of attacks. We provide a comparative study of IoT datasets used for model training and identify key properties which helps in assessing their suitability in particular scenarios. Finally, we discuss our observations and propose the research directions for building a robust IoT intrusion detection system.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available