2020
DOI: 10.3390/electronics9040629
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT

Abstract: Internet of Things (IoT) is a disruptive technology with applications across diverse domains such as transportation and logistics systems, smart grids, smart homes, connected vehicles, and smart cities. Alongside the growth of these infrastructures, the volume and variety of attacks on these infrastructures has increased highlighting the significance of distinct protection mechanisms. Intrusion detection is one of the distinguished protection mechanisms with notable recent efforts made to establish effective i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 64 publications
(39 citation statements)
references
References 73 publications
0
34
0
Order By: Relevance
“…In addition, they only selected 131 articles for review. Most of the review studies not listed in Table 2 focused on specific areas of IoT security, such as layer protocols [33], intrusion detection [34], device security [35,36], trust [37], and security of specific IoT applications [38]. us, a systematic mapping study is still required to determine research topics and trends in IoT security and gain insights on this field.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…In addition, they only selected 131 articles for review. Most of the review studies not listed in Table 2 focused on specific areas of IoT security, such as layer protocols [33], intrusion detection [34], device security [35,36], trust [37], and security of specific IoT applications [38]. us, a systematic mapping study is still required to determine research topics and trends in IoT security and gain insights on this field.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%
“…The intrusion detection system (IDS) is required to prevent unauthorized access to IoT. [153]. But these introduce challenges to power, bandwidth, and network.…”
Section: Mitigationsmentioning
confidence: 99%
“…On the other hand, anomaly-based IDS find anomalous behavior by learning from current data. Therefore, they can detect new attacks, but they are less accurate and computationally expensive (Arshad et al 2020;Jan et al 2019;Midi et al 2017). The recent attacks such as DoS, DDoS and different malware attacks are the most common mitigated attacks by IDSs (Din et al 2019;Meidan et al 2018;Roopak et al 2020).…”
Section: Intrusion and Malware Detectionmentioning
confidence: 99%