2023
DOI: 10.1016/j.iot.2023.100780
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things (IoT) security dataset evolution: Challenges and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
17
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(18 citation statements)
references
References 79 publications
1
17
0
Order By: Relevance
“…The survey on intrusion detection using machine learning by S. V. N. Santhosh Kumar et al [6], S. Fraihat et al [21], and B. Kaur et al [22] supports the hypothesis of this paper. The recent research in intrusion detection using IoT focuses on performance improvement while ignoring the development of application models.…”
Section: Literature Reviewsupporting
confidence: 79%
See 1 more Smart Citation
“…The survey on intrusion detection using machine learning by S. V. N. Santhosh Kumar et al [6], S. Fraihat et al [21], and B. Kaur et al [22] supports the hypothesis of this paper. The recent research in intrusion detection using IoT focuses on performance improvement while ignoring the development of application models.…”
Section: Literature Reviewsupporting
confidence: 79%
“…That is why the He weight initialization method has been used in this paper [42]. It is defined by Equation (22), where N (0, 2 n input ) is the Gaussian distribution in which the mean is zero, and 2 n input is the standard deviation.…”
Section: Weight Initializationmentioning
confidence: 99%
“…Additionally, in order to demonstrate whether the model created using this dataset can be used to detect the most recent attacks, it is also preferable to identify the most recent types of attacks in the dataset. This is done by highlighting the various attack types that can affect IoT systems [25] as well as the vulnerable system layers [26]. Value: a list of the available attacks.…”
Section: A Novel Framework For Selecting Iot Datasetmentioning
confidence: 99%
“…However, in the study, the authors failed to discuss the potential impact of deploying emerging technologies as a means of ensuring the security of IIoT networks. In a study by Kaur et al [24] attacks, datasets, as well as machine learning algorithms and structures employed in the context of intrusion detection systems for IoT devices were highlighted. A categorisation of attacks targeting IoT devices across various layers and protocols was done.…”
Section: Related Workmentioning
confidence: 99%