2022
DOI: 10.3390/s22103744
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Internet of Things Systems: A Review on Design Approaches Leveraging Multi-Access Edge Computing, Machine Learning, and Datasets

Abstract: The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of network data and placed a high computation complexity across various connected devices. The IoT devices capture valuable information, which allows the industries or individual users to make critical live dependent decisions. Most of these IoT devices have resource constraints such as low CPU, limited memory, and low energy storage. Hence, these devices are vulnerable to cyber-attacks due to the lack of capacity… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(29 citation statements)
references
References 201 publications
(211 reference statements)
0
17
0
Order By: Relevance
“…The computational cost was also analyzed in the study (running time) of each malware detection approach that employs extraction and machine learning technology. On the interconnected internet of things (IoT), [20], [21], [22], [23], [24], [25], [26] conducted a comparative analysis of intrusion detection techniques on the IoT. The study used the detection approach, IDS placement strategy, and security threat to classify IDSs for IoT [18].…”
Section: Related Workmentioning
confidence: 99%
“…The computational cost was also analyzed in the study (running time) of each malware detection approach that employs extraction and machine learning technology. On the interconnected internet of things (IoT), [20], [21], [22], [23], [24], [25], [26] conducted a comparative analysis of intrusion detection techniques on the IoT. The study used the detection approach, IDS placement strategy, and security threat to classify IDSs for IoT [18].…”
Section: Related Workmentioning
confidence: 99%
“…Flexible and Advanced Internet of Things (FLEC) was proposed by author [14] as a way to combine traditional IoT with edge computing, which focuses on user positioning and environment adaptation. A genetic algorithm and a swarm optimization algorithm were presented in work [15] to maximize transfer time to solve load balancing issue in conventional data placement. MEC solution meets each and every one of the aforementioned requirements.…”
Section: Security Enhancement Based Existing Techniquementioning
confidence: 99%
“…The IDS is used to forecast hacked devices and continuously monitor the services provided to LDs [8]. This is how the proposed cybersecurity framework operates.…”
Section: A Related Work In Edge Computingmentioning
confidence: 99%