Sensors 22 03744 With Cover
Sensors 22 03744 With Cover
Sensors 22 03744 With Cover
847
Review
https://doi.org/10.3390/s22103744
sensors
Review
Intrusion Detection in Internet of Things Systems: A Review
on Design Approaches Leveraging Multi-Access Edge
Computing, Machine Learning, and Datasets
Eric Gyamfi ∗ and Anca Jurcut
School of Computer Science, University College Dublin, D04 V1W8 Dublin, Ireland; [email protected]
* Correspondence: [email protected]
Abstract: The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various connected
devices. The IoT devices capture valuable information, which allows the industries or individual
users to make critical live dependent decisions. Most of these IoT devices have resource constraints
such as low CPU, limited memory, and low energy storage. Hence, these devices are vulnerable
to cyber-attacks due to the lack of capacity to run existing general-purpose security software. It creates
an inherent risk in IoT networks. The multi-access edge computing (MEC) platform has emerged
to mitigate these constraints by relocating complex computing tasks from the IoT devices to the edge.
Most of the existing related works are focusing on finding the optimized security solutions to protect
the IoT devices. We believe distributed solutions leveraging MEC should draw more attention.
This paper presents a comprehensive review of state-of-the-art network intrusion detection systems
(NIDS) and security practices for IoT networks. We have analyzed the approaches based on MEC
platforms and utilizing machine learning (ML) techniques. The paper also performs a comparative
analysis on the public available datasets, evaluation metrics, and deployment strategies employed
Citation: Gyamfi, E.; Jurcut, A. in the NIDS design. Finally, we propose an NIDS framework for IoT networks leveraging MEC.
Intrusion Detection in Internet
of Things Systems: A Review Keywords: Internet of Things; multi-access edge computing; network intrusion detection system;
on Design Approaches Leveraging machine learning; anomaly systems; IoT device; offloading; distributed NIDS
Multi-Access Edge Computing,
Machine Learning, and Datasets.
Sensors 2022, 22, 3744. https://
doi.org/10.3390/s22103744
1. Introduction
Academic Editor: Claudia Campolo The Internet of Things has experienced tremendous growth in area-specific applica-
Received: 18 March 2022
tions such as healthcare, smart transportation systems, smart agriculture, and industries
Accepted: 7 May 2022
to improve socio-economic development in recent years [1]. These IoT systems are com-
Published: 14 May 2022
posed of many interconnected sensors, actuators, and varieties of network-enabled de-
vices [2] that exchange different types of data through both the Internet infrastructure and
Publisher’s Note: MDPI stays neutral
the private networks. The cisco research team predicted an average of 75.3 billion actively
with regard to jurisdictional claims in
connected IoT devices by 2025 [3,4]. The absence of human intervention in data exchange
published maps and institutional affil-
between IoT systems makes it unique from traditional Internet technology. Growth in IoT
iations.
devices has also increased the data network bandwidth demands. However, most IoT
devices have resource constraints, making it challenging to execute the traditional secu-
rity methods for system protection against cyberattacks. Critical concerns about the IoT
Copyright: © 2022 by the authors.
device arise when there is a need to process sensitive information. Hence, it is essential
Licensee MDPI, Basel, Switzerland. to introduce the MEC platform that permits computation to be performed at the network
This article is an open access article end to address the resource-constraint problems in IoT systems [5,6]. MEC allows IoTs
distributed under the terms and to offload high computational-intensive tasks to the proximal edge server [7].
conditions of the Creative Commons Since the IoT has become the driving force of the current industrial revolution and
Attribution (CC BY) license (https:// the system for collecting live dependent data, it is vital to take cyber-security seriously [8,9].
creativecommons.org/licenses/by/ Hence, there is the need for a Network Intrusion Detection System (NIDS) that can detect
4.0/). current and future attacks to protect the IoT network and the systems built on it.
the mode of implementation of NIDS in IoT, while Section 6 examines the NIDS design
strategies. Then, we compare and evaluate the various implementations of ML-based NIDS,
datasets, and metrics used in NIDS design for IoT systems in Section 7. Finally, the survey
concludes with an outline and future directions in Section 8. Figure 1 shows the brief
taxonomy of the survey. Table 1 also provides some of the commonly used acronyms in
this survey.
Table 1. Cont.
legacy Autonomous Systems (ASs). Different configuration techniques were applied for IoT
routing architectures. Notwithstanding, different architectures have been implemented
for assorted use scenarios such as in [32], where the authors proposed an IoT-based archi-
tecture for sport (football). Their aims were to embed sensing devices (e.g., sensors and
RFID), telecommunication technologies (e.g., ZigBee) and cloud computing with the mis-
sion to monitor the health of footballers and eradicate the occurrence of diverse health
problems in football. In all the above-mentioned architectures, they have different use-cases;
therefore, the sensitivity of data in each scenario differs. Creating security for each system
requires special knowledge in the field of application. However, the IoT-MEC architecture
follows the level such as Sensor Level (IoT end-device), MEC/Fog Layer, and the Cloud.
Detailed the structure of the IoT devices, MEC, and the cloud is shown in Section 3.
2.2.2. MEC/Fog
The MEC is a layer that lies between mobile devices and the cloud [19]. The MEC
system directly connects to the IoT gateway. The MEC is usually equipped with high-
performance computational resources [34] to support the IoT devices connected at the net-
work edge. In an IoT MEC-enabled environment, security is vital. Hence, the computational
resources of the MEC provide an opportunity to design a sophisticated security system
to protect the IoT system.
2.2.3. Cloud
The cloud layer is part of the core network, and it consists of various cloud servers
and data centers that can process and store massive quantities of data [33].
work security and data breach. Detailed discussions of these attacks are found in [4,16].
Recently, some of the most frequent attacks initiated to target the IoT systems include:
• Spoofing: Attackers impersonate a legitimate IoT system in a network to gain control
or illegal access to the network. When the attacker obtains access, they initiate DoS
and Man-In-the-Middle attacks against targeted devices [38–40].
• Denial of Service (DoS): A cyber-attack makes IoT systems or resources on the network
unavailable to the intended legitimate users. These attacks are launched by the perpetrators
to temporarily or permanently disrupt a host IoT system’s services [41–43].
• A distributed denial-of-service (DDoS): The attack is a malicious network attack that
can disrupt the regular traffic and the network’s services. DDoS floods the target or
surrounding infrastructure with highly intense network traffic [44]. DDoS attacks
become successful when attackers apply multiple compromised computing systems
as the sources to generate a large amount of network traffic. The targets can be either
the IoT system or other networked devices [45,46].
• Jamming: Most IoT devices communicate to other devices through wireless networks.
The perpetrators attack the targeted IoT system and send a fake signal to interrupt
the radio transmission, thereby depleting the bandwidth, processing power, and
memories [47,48].
• Man-in-the-Middle: Figure 2 shows a diagram of Man-In-the-Middle (MITM) attacks.
MITM attackers secretly relay and manipulate the communication between two IoT
systems, the remote devices, and eavesdrop the private communications among
the parties [49,50].
• Privacy leakage: Data protection and privacy should be a priority in IoT system
communication. Most IoT system manufacturers and users pay minimal attention
to the contents of information stored on their devices and how third-party companies
analyze and process such IoT privacy information. IoT systems such as wearable
devices that collect user’s information about their location, situation, and health
information have contributed immensely to the high rise in the risk of personal
privacy leakage [51,52].
• Marai Botnet Attack: Mirai is malware that turns networked devices into remotely
controlled bots that cyber-attackers use as part of a botnet in a large-scale network.
It primarily targets online consumer devices such as IP cameras and home routers.
Attacks such as DoS/DDoS also used Mirai as a prevalent initiator [53,54].
• Sybil Attack: Sybil attacks are found in peer-to-peer networks. A Sybil attack sub-
verts the IoT device’s identity to create many anonymous identities and consume
a disproportionate power. It is named after Sybil, the author of the book Sybil, which
is a case study of a woman dealing with a dissociative identity disorder. An IoT
device in a network that operates multiple identities often undermines the authorized
network access in reputation systems [55,56]. Sybil attacks capitalize on this weakness
in the IoT system network to initial attacks.
Sensors 2022, 22, 3744 7 of 33
• AI-Based Attacks: AI attacks have been around since 2007 [57,58], and the high
threats they pose to the IoT are becoming more prevalent. Hackers now create AI-
powered tools that are quicker, simpler to scale, and more efficient than human-centric
attacks. This is a significant danger to the IoT ecosystem. While the techniques
and features of conventional IoT risks offered by cybercriminals may appear to be
the same, the scale, automation, and customisation of AI-powered attacks will make
them increasingly difficult to eradicate.
Table 2 summarizes some common attacks in IoT systems and their modes of initiation.
The authors used signature-based NIDS known as Suricata (an open-source NIDS soft-
ware) [65] to test their proposed framework. Suricata was designed to detect intrusion
in general computer networks, which does not specifically target IoT networks. Moreover,
there were no clear evidence of the effects of Suricata on their IoT devices use in their
research. In [66–69], the authors presented different strategies to design NIDS to protect
the IoT devices. The authors used ML methods to design signature-based NIDS to detect
network attacks in IoT devices. In [70,71], the authors applied deep reinforcement learning
to create NIDS for industrial IoT. This approach combines the observational capabilities
of deep learning with the decision-making capabilities of reinforcement learning to allow
the effective detection of various types of cyber-attacks on the Industrial Internet of Things.
However, in each of the research works, the experimental results presented are promising,
but the authors failed to demonstrate how their method could work in a real-world IoT
network environment.
approach identifies threats by the definition of high-level rules in the IoT network envi-
ronment, operational features, and mechanisms. Due to the resource constraint problems
in IoT systems, specification-based NIDS is recommended. However, specification-based
NIDS detects only specific kinds of attacks that fall within the rules defined in IoT systems.
The critical difference between specification-based and anomaly-based NIDS is their manu-
ally defined rules for each attack [83]. The authors argued in [84,85] that specification-based
NIDS can identify attacks that disturb the optimal protocol structure of IoT networks.
The authors presented an RPL specification to be used as a reference to evaluate the IoT
node’s behaviors, which was created using a semi-auto profiling approach that creates
a high-level abstract of activities using network simulation traces. This specification,
which includes all valid protocol states and transitions as well as statistics, is imple-
mented as a collection of rules in the NIDS agents, which are transmitted in the form
of cluster heads to monitor the whole network. Instead of allowing the cluster head
(usually an MEC server) to monitor everything, the members of the cluster report relevant
information about themselves and their neighbors to the cluster head to conserve resources.
Moreover, the authors in [86–88] applied a specification-based method to detect attacks
in the IoT network. All the research works in this subsection demonstrates that specific
attacks such as those that target RPL protocols in IoT devices can efficiently be detected by
applying specification-based NIDS.
a critical challenge to IoT systems. Therefore, they employed signature-based and anomaly-
based NIDS in their research. They detected known attacks with signature-based NIDS,
while the anomaly detected unknown attacks that they introduced during their experiment.
The application of hybrid-based NIDS in IoT systems solves the problems associated
with a single NIDS. However, hybrid-based NIDS require more computational resources,
storage capacity, and energy, which makes them an imperfect fit for the IoT system. Recently,
researchers have utilized MEC computing to resolve the resource constraint problems
associated with the IoT system. Researchers apply MEC technology to design NIDS
for the IoT to offload the most resource-intensive part of the NIDS to a proximal MEC
server [92,93]. A detailed discussion of this approach is provided in Section 4 of this paper.
thors proposed an internal distributed NIDS for IoT. They offloaded sections of the NIDS
system across the various IoT systems. Each IoT device in the network monitors its in-
ternal network but provides computational support to other devices whenever there is
an intrusion. Their analysis showed that the above approach has higher accuracy of de-
tection compared to a standalone NIDS. Figure 3 shows the structure of an MEC design.
Different partial computational offloading algorithms have been designed for IoT systems
in a 5 G heterogeneous network. A review of these research works shows that the algo-
rithms implemented are directed toward minimization of energy consumption and low
latency [120–122]. However, the researchers pay less attention to the use of MEC offloading
to secure the IoT. In [123], the authors implemented a multi-user partial computation
offloading. To this aim, Alladi et al. [123] described a Deep Learning Engines (DLEs)-
based artificial intelligence (AI)-based intrusion detection architecture to identify and
classify vehicle traffic within internet of vehicles (IoV) networks into probable cyber-attacks.
These DLEs were also implemented on MEC servers rather than remote cloud, which takes
into account the mobility of the vehicles and the real-time requirements of the IoV networks.
The following conditions must be considered to apply partial computational offloading
to design NIDS for IoT systems:
• First, the sequence of execution functions or routines cannot be discretionarily selected
because the outputs of some components of the NIDS model are the inputs of others.
• Second, due to resource constraints and security considerations, some algorithms
or routines of the NIDS must be offloaded to the MEC for execution, while others have
to be executed locally.
to secure connected IoT systems. Their security system, which was known as EdgeSec,
comprised six major modules that systematically handle specific security challenges in IoT
systems. The modules include a security profile manager, security analysis, protocol
mapping, a security simulation, communication interface management, and request han-
dling. In their experiment, each IoT device is registered to the security profile to manage
the device-specific information collected and the device-specific security requirements.
An NIDS deployed to an MEC platform controls the security of the various IoT sys-
tems. They also utilized protocol mapping to choose the appropriate security protocols
from the protocol library for each IoT device in their setup. In [131], the authors proposed
a privacy-aware scheduling algorithm based on MEC. The research’s primary purpose is
to execute tasks from different IoT systems with different privacy requirements connected
to different MEC platforms. The proposed scheduling algorithm also aims to satisfy the real-
time requirements of IoT system operation. The authors of [105] in their paper examine
ways to improve the security of MEC systems by utilizing the cooperative mechanism
amongst non-orthogonal multiple access (NOMA) user pairs. They presented a two-slot
hybrid cooperative NOMA security (THCNS) system that uses cooperative interference
between NOMA user pairs to improve the security of offloading, taking into account
the varying latency needs of IoT users.
The research works in this section demonstrate that the use of MEC to create NIDS
for the resource-constraint IoT devices is still in the early stage. Hence, researchers must provide
robust frameworks for the offloading process, detection models, and implementation strategies
to design sophisticated NIDS to secure the IoT system and their network environments.
share the cost of running the NIDS, which reduced the energy, processing power, and
storage capacity required for the detection.
Table 4. Analysis of NIDS in IoT systems using MEC and Placement Strategies.
Table 4. Cont.
to detect intrusion based on the behavior of the attack. In [182], the authors used K-NN
and Naive Bayes to identify intrusion. They tested their model using the NSL-KDD dataset.
In [183,184], the authors proposed an NIDS model for detecting intrusion (BOTNET) for IoT
devices using logistic regression. ML methods such as Decision Tree [185], K-Mean [186],
DNN (using the NSL-KDD dataset) [187], and CNN (using the NGIDS-DS and ADFA-LD
dataset for benchmark) [188] have been used by researchers to design NIDS for IoT systems.
RNN, LSTM, GRU, and GAN [151,174] are also one of the most common neural network
ML-based methods used by the research community to create NIDS for IoT. All the above
models provide promising results but lack the analysis of the effects they pose on resources
of the IoT devices.
7.1.1. Performance and Evaluation Metrics Used in ML-Based NIDS for IoT Systems
Cardenas et al. [192] proposed that the Bayesian detection rates, the cost effects
of failure detection rates [193], and the detection capabilities of any NIDS must be critical
metrics to study. In [194], NIDS were evaluated based on the scorecard metrics in real-
time and distributed systems. They argued that the data payload of the packets under
analysis by an NIDS must contain realistic content. From their conclusion, the best way
to evaluate any NIDS is by using real-time data from the deployed devices’ network rather
than modeling or simulation. Data packets classified as an attack in a network using some
ML-based NIDS algorithm may be regarded as legitimate packets by other classification
models. Researchers use many metrics to evaluate NIDS. No single metric seems adequate
to measure the capability and performance of NIDS. According to [195], the performance
of an NIDS can be determined based on the Detection Rate (DR) and the False Alarm Rate
(FAR). All the above analyses indicate that the performance of the NIDS designed for an IoT
use case may differ. The implementation process, type of attack, IoT device’s resource, and
the ML used during the NIDS contribute to the type of metrics.
Sensors 2022, 22, 3744 20 of 33
However, the most common metrics used by researchers include Accuracy, Recall/
Sensitivity, and F1-Score. Metrics such as false negative rate (FNR) (the number of negative
samples predicted expressed as a ratio to the available, total positive samples) and false
positive rate (FPR) (the ratio of positive samples predicted to the total predicted positive
samples) are used to measure the performance of an NIDS for IoT systems.
The OPCUA dataset [208] was created by developing and injecting several attacks
on a CPPS testbed based on OPC UA to allow users to assess the efficiency of vari-
ous strategies for built Intrusion Detection Systems (IDS) in the industrial environment.
Table 6 provides detailed information about NIDS in IoT systems. Datasets such as the EL-
EGANT dataset [209–211] targets DoS/DDoS attacks in IoT and SDN-based IoT net-
works, [212] detects anomalies in industrial IoT, Mqtt-iot-ids2020 dataset [213] detects
network intrusion in MQTT protocol IoT network, Edge-IIoTset dataset [214] was also cre-
ated for industrial IoT to detect DoS/DDoS attacks, Information gathering, Man in the mid-
dle attacks, Injection attacks, and Malware attacks. The X-IIoTID dataset [215] is a dataset
for fitting the heterogeneity and interoperability of industrial IoT systems that is network
and device agnostic. The final dataset on the NIDS IoT system radar is the IoT-BDA Botnet
Analysis Dataset [216], which was created to make it easier to refine and create host and
network-based IoT botnet detection systems. All the above datasets are publicly available
for researchers to design robust NIDS to secure the IoT system.
Table 6. Cont.
If a single IoT device is installed remotely with limited resources, a good choice of
NIDS for such a system will be a signature-based with centralized placement. Such a system
should be updated frequently to identify new attacks. A hybrid-based NIDS will work
well in an IoT MEC environment with equipped resources. In Figure 4, a link joining the
anomaly-based and the ML-based NIDS demonstrates that combining the two approaches
will be a suitable approach. The single arrow pointing to a method indicates that such a
method alone will be a suitable choice. It is important to consider all the above scenarios in
order for the manufacturers and developers to select the right NIDS for a certain IoT system.
9. Conclusions
The necessity to secure IoT systems has stimulated many novel solutions to NIDS
design. This paper has conducted a comprehensive review on NIDS that leverages MEC
and ML. A taxonomy and tabular classification of detection methods, NIDS placement
strategies, security threats, and validation methods were illustrated. We have discovered
that there is a large body of theoretical studies. However, real-world NIDS development
has not been fully testified yet. There are no specific detection techniques and deployment
methods that have been accepted as standards to secure IoT systems. It still requires more
effort to design a practical NIDS solution that effectively detects cyber-attacks in real IoT
systems. Furthermore, critical IoT system evaluation metrics such as energy consumption,
processing, and storage efficiency are not considered in most of the related studies.
Through our thoughtful review, we have identified several potential research direc-
tions. Firstly, future NIDS for IoT systems should focus on addressing the following issues:
(1) improve the effectiveness of NIDS; and (2) demonstrate how their proposed system can
be implemented in realistic IoT-MEC infrastructure. Secondly, researchers need to consider
the critical metrics discussed in Section 7 for future NIDS design. We are confident that this
survey and our proposed framework will serve as references and guidelines for researchers
developing NIDS for IoT systems.
Author Contributions: E.G. prepared the paper while A.J. also reviewed and provided extensive
ideas. All authors have read and agreed to the published version of the manuscript.
Funding: UCD School of Computer Science.
Institutional Review Board Statement: Not Applicable.
Informed Consent Statement: Not Applicable.
Sensors 2022, 22, 3744 25 of 33
References
1. Li, H.; Ota, K.; Dong, M. Learning IoT in edge: Deep learning for the Internet of Things with edge computing. IEEE Netw. 2018,
32, 96–101. [CrossRef]
2. Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A survey on the internet of things (IoT) forensics:
Challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 2020, 22, 1191–1221. [CrossRef]
3. Yastrebova, A.; Kirichek, R.; Koucheryavy, Y.; Borodin, A.; Koucheryavy, A. Future networks 2030: Architecture & requirements.
In Proceedings of the 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops
(ICUMT), Moscow, Russia, 5–9 November 2018; pp. 1–8.
4. Jurcut, A.; Niculcea, T.; Ranaweera, P.; Le-Khac, N.A. Security considerations for Internet of Things: A survey. SN Comput. Sci.
2020, 1, 1–19. [CrossRef]
5. Shi, W.; Dustdar, S. The promise of edge computing. Computer 2016, 49, 78–81. [CrossRef]
6. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637–646.
[CrossRef]
7. Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Survey on multi-access edge computing security and privacy. IEEE Commun. Surv.
Tutor. 2021, 23, 1078–1124. [CrossRef]
8. Pacheco, J.; Hariri, S. IoT security framework for smart cyber infrastructures. In Proceedings of the 2016 IEEE 1st International
Workshops on Foundations and Applications of Self* Systems (FAS* W), Augsburg, Germany, 12–16 September 2016; pp. 242–247.
9. Borhani, M.; Liyanage, M.; Sodhro, A.H.; Kumar, P.; Jurcut, A.D.; Gurtov, A. Secure and resilient communications in the industrial
internet. In Guide to Disaster-Resilient Communication Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 219–242.
10. Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv.
Tutor. 2013, 16, 266–282. [CrossRef]
11. Alrajeh, N.A.; Khan, S.; Shams, B. Intrusion detection systems in wireless sensor networks: A review. Distrib. Sens. Netw. 2013, 9,
167575. [CrossRef]
12. Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018,
38, 8–27. [CrossRef]
13. Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J.
2017, 4, 1250–1258. [CrossRef]
14. Sain, M.; Kang, Y.J.; Lee, H.J. Survey on security in Internet of Things: State of the art and challenges. In Proceedings of the
2017 19th International conference on advanced communication technology (ICACT), Pyeongchang, Korea, 19–22 February 2017;
pp. 699–704.
15. Benabdessalem, R.; Hamdi, M.; Kim, T.H. A survey on security models, techniques, and tools for the internet of things.
In Proceedings of the 2014 7th International Conference on Advanced Software Engineering and Its Applications, Hainan Island,
China, 20–23 December 2014; pp. 44–48.
16. Jurcut, A.D.; Ranaweera, P.; Xu, L. Introduction to IoT security. In IoT Security: Advances in Authentication; John Wiley & Sons:
Hoboken, NJ, USA, 2020; pp. 27–64. [CrossRef]
17. Pawar, P.; Trivedi, A. Device-to-device communication based IoT system: Benefits and challenges. IETE Tech. Rev. 2019,
36, 362–374. [CrossRef]
18. Ashouri, M.; Lorig, F.; Davidsson, P.; Spalazzese, R. Edge computing simulators for iot system design: An analysis of qualities
and metrics. Future Internet 2019, 11, 235. [CrossRef]
19. Mahbub, M.; Gazi, M.S.A.; Provar, S.A.A.; Islam, M.S. Multi-Access Edge Computing-Aware Internet of Things: MEC-IoT.
In Proceedings of the 2020 Emerging Technology in Computing, Communication and Electronics (ETCCE), London, UK, 19–20
August 2020; pp. 1–6. [CrossRef]
20. Xu, L.; Jurcut, A.D.; Ahmadi, H. Emerging Challenges and Requirements for internet of things in 5G. In 5G Enabled Internet
Things; CRC Press: Boca Raton, FL, USA, 2019; pp. 29–48.
21. Said, O.; Tolba, A. Accurate performance prediction of IoT communication systems for smart cities: An efficient deep learning
based solution. Sustain. Cities Soc. 2021, 69, 102830. [CrossRef]
22. Catarinucci, L.; De Donno, D.; Mainetti, L.; Palano, L.; Patrono, L.; Stefanizzi, M.L.; Tarricone, L. An IoT-aware architecture
for smart healthcare systems. IEEE Internet Things J. 2015, 2, 515–526. [CrossRef]
23. Almotiri, S.H.; Khan, M.A.; Alghamdi, M.A. Mobile health (m-health) system in the context of IoT. In Proceedings of the 2016
IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria, 22–24
August 2016; pp. 39–42.
24. Khoi, N.M.; Saguna, S.; Mitra, K.; Ahlund, C. Irehmo: An efficient iot-based remote health monitoring system for smart regions.
In Proceedings of the 2015 17th International Conference on E-health Networking, Application and Services (HealthCom), Boston,
MA, USA, 14–17 October 2015; pp. 563–568.
Sensors 2022, 22, 3744 26 of 33
25. Coelho, C.; Coelho, D.; Wolf, M. An IoT smart home architecture for long-term care of people with special needs. In Proceedings
of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy 14–16 December 2015; pp. 626–627.
26. Wang, S.; Hou, Y.; Gao, F.; Ji, X. A novel IoT access architecture for vehicle monitoring system. In Proceedings of the 2016 IEEE
3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 639–642.
27. Wang, S.; Hou, Y.; Gao, F.; Ma, S. A novel clock synchronization architecture for IoT access system. In Proceedings of the 2016 2nd
IEEE International Conference on Computer and Communications (ICCC), Chengdu, China 14–17 October 2016; pp. 1456–1459.
28. Shang, W.; Yu, Y.; Droms, R.; Zhang, L. Challenges in IoT Networking via TCP/IP Architecture; Technical Report; NDN-0038; NDN
Project; Named Data Networking. 2016. Available online: https://named-data.net/wp-content/uploads/2016/02/ndn-0038-1
-challenges-iot.pdf (accessed on 17 March 2022)
29. Alkhabbas, F.; Spalazzese, R.; Davidsson, P. Architecting emergent configurations in the internet of things. In Proceedings of the
2017 IEEE International Conference on Software Architecture (ICSA), Gothenburg, Sweden, 3–7 April 2017; pp. 221–224.
30. Park, S.; Crespi, N.; Park, H.; Kim, S.H. IoT routing architecture with autonomous systems of things. In Proceedings of the 2014
IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, 6–8 March 2014; pp. 442–445.
31. Amadeo, M.; Campolo, C.; Iera, A.; Molinaro, A. Named data networking for IoT: An architectural perspective. In Proceedings
of the 2014 European Conference on Networks and Communications (EuCNC), Bologna, Italy, 23–26 June 2014; pp. 1–5.
32. Ikram, M.A.; Alshehri, M.D.; Hussain, F.K. Architecture of an IoT-based system for football supervision (IoT Football). In Pro-
ceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 69–74.
33. Lyu, X.; Tian, H.; Jiang, L.; Vinel, A.; Maharjan, S.; Gjessing, S.; Zhang, Y. Selective offloading in mobile edge computing for the
green Internet of Things. IEEE Netw. 2018, 32, 54–60. [CrossRef]
34. Ali, B.; Gregory, M.A.; Li, S. Multi-access edge computing architecture, data security and privacy: A review. IEEE Access 2021,
9, 18706–18721. [CrossRef]
35. Khan, B.U.I.; Olanrewaju, R.F.; Anwar, F.; Mir, R.N.; Najeeb, A.R. A critical insight into the effectiveness of research methods
evolved to secure IoT ecosystem. Int. J. Inf. Comput. Secur. 2019, 11, 332–354. [CrossRef]
36. Wang, H.; Zhang, Z.; Taleb, T. Special issue on security and privacy of IoT. World Wide Web 2018, 21, 1–6. [CrossRef]
37. Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the 2015 International conference on
pervasive computing (ICPC), Pune, India 8–10 January 2015; pp. 1–6.
38. Hasan, M.; Mohan, S. Protecting actuators in safety-critical IoT systems from control spoofing attacks. In Proceedings of the 2nd
International ACM Workshop on Security and Privacy for the Internet-of-Things, Xi’an, China, 30 May 2019; pp. 8–14.
39. Javed, A.; Malik, K.M.; Irtaza, A.; Malik, H. Towards protecting cyber-physical and IoT systems from single-and multi-order
voice spoofing attacks. Appl. Acoust. 2021, 183, 108283. [CrossRef]
40. Aldabbas, H.; Amin, R. A novel mechanism to handle address spoofing attacks in SDN based IoT. Clust. Comput. 2021,
24, 3011–3026. [CrossRef]
41. Varalakshmi, I.; Thenmozhi, M.; Sasi, R. Detection of Distributed Denial of Service Attack in an Internet of Things Environment-A
Review. In Proceedings of the 2021 International Conference on System, Computation, Automation and Networking (ICSCAN),
Iasi, Romania, 20–23 October 2021; pp. 1–6.
42. Ferrag, M.A.; Shu, L.; Djallel, H.; Choo, K.K.R. Deep learning-based intrusion detection for distributed denial of service attack in
Agriculture 4.0. Electronics 2021, 10, 1257. [CrossRef]
43. Gupta, B.; Chaudhary, P.; Chang, X.; Nedjah, N. Smart defense against distributed Denial of service attack in IoT networks using
supervised learning classifiers. Comput. Electr. Eng. 2022, 98, 107726. [CrossRef]
44. Alyas, M.; Noor, M.I.; Hassan, H. DDOS Attack Detection Strategies in Cloud A Comparative Stud. VFAST Trans. Softw. Eng.
2017, 12, 35–42. [CrossRef]
45. Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and other botnets. Computer 2017, 50, 80–84. [CrossRef]
46. Yan, Q.; Huang, W.; Luo, X.; Gong, Q.; Yu, F.R. A multi-level DDoS mitigation framework for the industrial internet of things.
IEEE Commun. Mag. 2018, 56, 30–36. [CrossRef]
47. Abdalzaher, M.S.; Elwekeil, M.; Wang, T.; Zhang, S. A deep autoencoder trust model for mitigating jamming attack in IoT assisted
by cognitive radio. IEEE Syst. J. 2021. [CrossRef]
48. Kerrakchou, I.; Chadli, S.; Kharbach, A.; Saber, M. Simulation and Analysis of Jamming Attack in IoT Networks. In Proceed-
ings of the International Conference on Digital Technologies and Applications, Moscow, Russia, 30–31 March 2021; Springer:
Berlin/Heidelberg, Germany, 2021; pp. 323–333.
49. Salem, O.; Alsubhi, K.; Shaafi, A.; Gheryani, M.; Mehaoua, A.; Boutaba, R. Man-in-the-Middle Attack Mitigation in Internet of
Medical Things. IEEE Trans. Ind. Inform. 2021, 18, 2053–2062. [CrossRef]
50. Pospisil, O.; Fujdiak, R.; Mikhaylov, K.; Ruotsalainen, H.; Misurec, J. Testbed for LoRaWAN Security: Design and Validation
through Man-in-the-Middle Attacks Study. Appl. Sci. 2021, 11, 7642. [CrossRef]
51. Liu, J.; Sun, W. Smart attacks against intelligent wearables in people-centric internet of things. IEEE Commun. Mag. 2016,
54, 44–49. [CrossRef]
52. Ziegeldorf, J.H.; Morchon, O.G.; Wehrle, K. Privacy in the Internet of Things: Threats and challenges. Secur. Commun. Netw. 2014,
7, 2728–2742. [CrossRef]
53. Kambourakis, G.; Kolias, C.; Stavrou, A. The mirai botnet and the iot zombie armies. In Proceedings of the MILCOM 2017—2017
IEEE Military Communications Conference (MILCOM), Baltimore, MD, USA, 23–25 October 2017; pp. 267–272.
Sensors 2022, 22, 3744 27 of 33
54. Meidan, Y.; Bohadana, M.; Mathov, Y.; Mirsky, Y.; Shabtai, A.; Breitenbacher, D.; Elovici, Y. N-baiot—Network-based detection of
iot botnet attacks using deep autoencoders. IEEE Pervasive Comput. 2018, 17, 12–22. [CrossRef]
55. Rajan, A.; Jithish, J.; Sankaran, S. Sybil attack in IOT: Modelling and defenses. In Proceedings of the 2017 International Conference
on Advances in Computing, Communications and Informatics (ICACCI), Chennai, India, 3–5 August 2017; pp. 2323–2327.
56. Evangelista, D.; Mezghani, F.; Nogueira, M.; Santos, A. Evaluation of Sybil attack detection approaches in the Internet of Things
content dissemination. In Proceedings of the 2016 Wireless Days (WD), Toulouse, France, 23–25 March 2016; pp. 1–6.
57. Li, J.; Zhao, Z.; Li, R.; Zhang, H. Ai-based two-stage intrusion detection for software defined iot networks. IEEE Internet Things J.
2018, 6, 2093–2102. [CrossRef]
58. Falco, G.; Viswanathan, A.; Caldera, C.; Shrobe, H. A master attack methodology for an AI-based automated attack planner for
smart cities. IEEE Access 2018, 6, 48360–48373. [CrossRef]
59. Schneier, B. Security Risks of Embedded Systems—Schneier on Security. 2014. Available online: https://www.schneier.com/
blog/archives/2014/01/security_risks_9.html (accessed on 13 May 2021).
60. Vaca, F.D. An Ensemble Learning Based Multi-level Network Intrusion Detection System for Wi-Fi Dominant Networks. Ph.D.
Thesis, Purdue University Graduate School, Lafayette, IN, USA, 2019.
61. Abduvaliyev, A.; Pathan, A.S.K.; Zhou, J.; Roman, R.; Wong, W.C. On the vital areas of intrusion detection systems in wireless
sensor networks. IEEE Commun. Surv. Tutor. 2013, 15, 1223–1237. [CrossRef]
62. Ioulianou, P.; Vasilakis, V.; Moscholios, I.; Logothetis, M. A Signature-based Intrusion Detection System for the Internet of Things.
Inf. Commun. Technol. Form 2018, In press.
63. Kasinathan, P.; Pastrone, C.; Spirito, M.A.; Vinkovits, M. Denial-of-Service detection in 6LoWPAN based Internet of Things. In Pro-
ceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications
(WiMob), Lyon, France, 7–9 October 2013; pp. 600–607.
64. Olsson, J. 6LoWPAN demystified. Tex. Instrum. 2014, 13, 1–13.
65. Boujrad, M.; Lazaar, S.; Hassine, M. Performance Assessment of Open Source IDS for improving IoT Architecture Security
implemented on WBANs. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security,
Msida, Malta, 15–17 December 2020; pp. 1–4.
66. Hodo, E.; Bellekens, X.; Hamilton, A.; Dubouilh, P.L.; Iorkyase, E.; Tachtatzis, C.; Atkinson, R. Threat analysis of IoT networks
using artificial neural network intrusion detection system. In Proceedings of the Networks, Computers and Communications
(ISNCC), Marrakech, Morocco, 16–18 May 2016; pp. 1–6.
67. Hanif, S.; Ilyas, T.; Zeeshan, M. Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset. In Proceedings of
the 2019 IEEE 16th International Conference on Smart Cities: Improving Quality of Life Using ICT & IoT and AI (HONET-ICT),
Charlotte, NC, USA, 6–9 October 2019; pp. 152–156.
68. Qureshi, A.U.H.; Larijani, H.; Ahmad, J.; Mtetwa, N. A heuristic intrusion detection system for Internet-of-Things (IoT). In Proceed-
ings of the Intelligent Computing, Proceedings of the Computing Conference, London, UK, 16–17 July 2019; Springer: Berlin/Heidelberg,
Germany. 2019; pp. 86–98.
69. Almogren, A.S. Intrusion detection in Edge-of-Things computing. J. Parallel Distrib. Comput. 2020, 137, 259–265. [CrossRef]
70. Tharewal, S.; Ashfaque, M.W.; Banu, S.S.; Uma, P.; Hassen, S.M.; Shabaz, M. Intrusion detection system for industrial Internet
of Things based on deep reinforcement learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9023719. [CrossRef]
71. Caminero, G.; Lopez-Martin, M.; Carro, B. Adversarial environment reinforcement learning algorithm for intrusion detection.
Comput. Netw. 2019, 159, 96–109. [CrossRef]
72. Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated learning-based anomaly detection
for IoT security attacks. IEEE Internet Things J. 2021, 9, 2545–2554. [CrossRef]
73. Mehta, D.; Mady, A.E.d.; Boubekeur, M. Anomaly-Based Intrusion Detection System for Embedded Devices on Internet.
In Proceedings of the Tenth International Conference on Advances in Circuits, Electronics and Micro-electronics, Venice, Italy,
16–20 September 2018.
74. Canedo, J.; Skjellum, A. Using machine learning to secure IoT systems. In Proceedings of the 2016 14th Annual Conference
on Privacy, Security and Trust, PST, Auckland, New Zealand, 12–14 December 2016; pp. 219–222. [CrossRef]
75. Wu, Y.; Dai, H.N.; Tang, H. Graph neural networks for anomaly detection in industrial internet of things. IEEE Internet Things J.
2021. [CrossRef]
76. Pacheco, J.; Benitez, V.H.; Felix-Herran, L.C.; Satam, P. Artificial neural networks-based intrusion detection system for internet
of things fog nodes. IEEE Access 2020, 8, 73907–73918. [CrossRef]
77. Alladi, T.; Agrawal, A.; Gera, B.; Chamola, V.; Sikdar, B.; Guizani, M. Deep neural networks for securing IoT enabled vehicular
ad-hoc networks. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada,
14–23 June 2021; pp. 1–6.
78. Eskandari, M.; Janjua, Z.H.; Vecchio, M.; Antonelli, F. Passban IDS: An intelligent anomaly-based intrusion detection system
for IoT edge devices. IEEE Internet Things J. 2020, 7, 6882–6897. [CrossRef]
79. Alsoufi, M.A.; Razak, S.; Siraj, M.M.; Nafea, I.; Ghaleb, F.A.; Saeed, F.; Nasser, M. Anomaly-based intrusion detection systems
in iot using deep learning: A systematic literature review. Appl. Sci. 2021, 11, 8383. [CrossRef]
80. Kumar, P.; Gupta, G.P.; Tripathi, R. Design of anomaly-based intrusion detection system using fog computing for IoT network.
Autom. Control Comput. Sci. 2021, 55, 137–147. [CrossRef]
Sensors 2022, 22, 3744 28 of 33
81. Heartfield, R.; Loukas, G.; Bezemskij, A.; Panaousis, E. Self-configurable cyber-physical intrusion detection for smart homes
using reinforcement learning. IEEE Trans. Inf. Forensics Secur. 2020, 16, 1720–1735. [CrossRef]
82. Ma, X.; Shi, W. Aesmote: Adversarial reinforcement learning with smote for anomaly detection. IEEE Trans. Netw. Sci. Eng. 2020,
8, 943–956. [CrossRef]
83. Mitchell, R.; Chen, I.R. A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 2014,
46, 55. [CrossRef]
84. Le, A.; Loo, J.; Chai, K.K.; Aiash, M. A specification-based IDS for detecting attacks on RPL-based network topology. Information
2016, 7, 25. [CrossRef]
85. Althubaity, A.; Ammar, R.; Han, S. Detecting Rules-related Attacks in RPL-based Resource-Constrained Wireless Networks.
In Proceedings of the 2020 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Louisville,
KY, USA, 9–11 December 2020; pp. 1–8.
86. Kareem, M.A.; Tayeb, S. ML-based NIDS to secure RPL from routing attacks. In Proceedings of the 2021 IEEE 11th Annual
Computing and Communication Workshop and Conference (CCWC), Virtual, 27–30 January 2021; pp. 1000–1006.
87. Sharma, V.; You, I.; Yim, K.; Chen, R.; Cho, J.H. BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded
cyber-physical systems. IEEE Access 2019, 7, 118556–118580. [CrossRef]
88. Yun, K.; Astillo, P.V.; Lee, S.; Kim, J.; Kim, B.; You, I. Behavior-Rule Specification-based IDS for Safety-Related Embedded Devices
in Smart Home. In Proceedings of the 2021 World Automation Congress (WAC), Virtual, 1–5 August 2021; pp. 65–70.
89. Ning, H.; Liu, H. Cyber-physical-social based security architecture for future internet of things. Adv. Internet Things 2012, 2, 1.
[CrossRef]
90. Cervantes, C.; Poplade, D.; Nogueira, M.; Santos, A. Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for
Internet of Things. In Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM),
Ottawa, ON, Canada, 11–15 May 2015 pp. 606–611.
91. Krimmling, J.; Peter, S. Integration and evaluation of intrusion detection for CoAP in smart city applications. In Proceedings
of the Communications and Network Security (CNS), San Francisco, CA, USA, 29–31 October 2014; pp. 73–78.
92. Nguyen, D.C.; Pathirana, P.N.; Ding, M.; Seneviratne, A. Privacy-preserved task offloading in mobile blockchain with deep
reinforcement learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 2536–2549. [CrossRef]
93. Wu, H.; Wolter, K.; Jiao, P.; Deng, Y.; Zhao, Y.; Xu, M. EEDTO: An energy-efficient dynamic task offloading algorithm
for blockchain-enabled IoT-edge-cloud orchestrated computing. IEEE Internet Things J. 2020, 8, 2163–2176. [CrossRef]
94. Gassais, R.; Ezzati-Jivan, N.; Fernandez, J.M.; Aloise, D.; Dagenais, M.R. Multi-level host-based intrusion detection system
for Internet of things. J. Cloud Comput. 2020, 9, 1–16. [CrossRef]
95. Wang, X.; Lu, X. A host-based anomaly detection framework using XGBoost and LSTM for IoT devices. Wirel. Commun. Mob.
Comput. 2020, 2020, 8838571. [CrossRef]
96. Kfouri, G.d.O.; Gonçalves, D.G.; Dutra, B.V.; de Alencastro, J.F.; de Caldas Filho, F.L.; e Martins, L.M.; Praciano, B.J.; de Oliveira Al-
buquerque, R.; de Sousa, R.T., Jr. Design of a distributed HIDS for IoT backbone components. Ann. Comput. Sci. Inf. Syst. 2019,
81–88. [CrossRef]
97. Smys, S.; Basar, A.; Wang, H. Hybrid intrusion detection system for internet of things (IoT). J. ISMAC 2020, 2, 190–199. [CrossRef]
98. Blakley, J. Open Edge Computing Initiative. 2021. Available online: https://www.openedgecomputing.org/ (accessed on 5
January 2022).
99. ETSI, M. Mobile edge computing (mec): Framework and reference architecture. ETSI DGS MEC 2016, 3, 1–18.
100. Ai, Y.; Peng, M.; Zhang, K. Edge computing technologies for Internet of Things: A primer. Digit. Commun. Netw. 2018, 4, 77–86.
[CrossRef]
101. Gyamfi, E.; Jurcut, A. Novel Online Network Intrusion Detection System for Industrial IoT based on OI-SVDD and AS-ELM
IEEE Internet Things J. 2022. [CrossRef]
102. Corcoran, P.; Datta, S.K. Mobile-edge computing and the Internet of Things for consumers: Extending cloud computing and
services to the edge of the network. IEEE Consum. Electron. Mag. 2016, 5, 73–74. [CrossRef]
103. Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Context aware computing for the internet of things: A survey. IEEE
Commun. Surv. Tutor. 2013, 16, 414–454. [CrossRef]
104. Suo, H.; Liu, Z.; Wan, J.; Zhou, K. Security and privacy in mobile cloud computing. In Proceedings of the 2013 9th International
Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; pp. 655–659.
105. Li, B.; Wu, W.; Zhao, W.; Zhang, H. Security enhancement with a hybrid cooperative noma scheme for mec system. IEEE Trans.
Veh. Technol. 2021, 70, 2635–2648. [CrossRef]
106. Li, L.; Ota, K.; Dong, M. DeepNFV: A lightweight framework for intelligent edge network functions virtualization. IEEE Netw.
2018, 33, 136–141. [CrossRef]
107. Mastorakis, S.; Mtibaa, A.; Lee, J.; Misra, S. Icedge: When edge computing meets information-centric networking. IEEE Internet
Things J. 2020, 7, 4203–4217. [CrossRef]
108. Kaur, K.; Garg, S.; Aujla, G.S.; Kumar, N.; Rodrigues, J.J.; Guizani, M. Edge computing in the industrial internet of things
environment: Software-defined-networks-based edge-cloud interplay. IEEE Commun. Mag. 2018, 56, 44–51. [CrossRef]
109. He, Y.; Yu, F.R.; Zhao, N.; Leung, V.C.; Yin, H. Software-defined networks with mobile edge computing and caching for smart
cities: A big data deep reinforcement learning approach. IEEE Commun. Mag. 2017, 55, 31–37. [CrossRef]
Sensors 2022, 22, 3744 29 of 33
110. Baktir, A.C.; Ozgovde, A.; Ersoy, C. How can edge computing benefit from software-defined networking: A survey, use cases,
and future directions. IEEE Commun. Surv. Tutor. 2017, 19, 2359–2391. [CrossRef]
111. Wang, Q.; Hu, H.; Sun, H.; Hu, R.Q. Secure and energy-efficient offloading and resource allocation in a NOMA-based MEC
network. In Proceedings of the 2020 IEEE/ACM Symposium on Edge Computing (SEC), San Jose, CA, USA, 12–14 November
2020; pp. 420–424.
112. Ahmad, I.; Lembo, S.; Rodriguez, F.; Mehnert, S.; Vehkaperä, M. Security of Micro MEC in 6G: A Brief Overview. In Proceedings
of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January
2022; pp. 332–337.
113. Ansere, J.A.; Han, G.; Wang, H.; Choi, C.; Wu, C. A Reliable Energy Efficient Dynamic Spectrum Sensing for Cognitive Radio IoT
Networks. IEEE Internet Things J. 2019, 6, 6748–6759. [CrossRef]
114. Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Song, H.; Xie, F.; Jiang, Y.; Cao, M. Security enhancement for mobile edge computing
through physical layer authentication. IEEE Access 2019, 7, 116390–116401. [CrossRef]
115. Ranaweera, P.; Jurcut, A.D.; Liyanage, M. Realizing multi-access edge computing feasibility: Security perspective. In Proceedings
of the 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Paris, France, 29–31 October 2019;
pp. 1–7.
116. Aazam, M.; Zeadally, S.; Harras, K.A. Offloading in fog computing for IoT: Review, enabling technologies, and research
opportunities. Future Gener. Comput. Syst. 2018, 87, 278–289. [CrossRef]
117. Wang, Y.; Meng, W.; Li, W.; Liu, Z.; Liu, Y.; Xue, H. Adaptive machine learning-based alarm reduction via edge computing for
distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 2019, 31, e5101. [CrossRef]
118. Thanigaivelan, N.K.; Nigussie, E.; Kanth, R.K.; Virtanen, S.; Isoaho, J. Distributed internal anomaly detection system for
Internet-of-Things. In Proceedings of the Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA,
9–12 January 2016; pp. 319–320.
119. Ferdowsi, A.; Saad, W. Generative adversarial networks for distributed intrusion detection in the internet of things. arXiv 2019,
arXiv:1906.00567.
120. Singh, J.; Bello, Y.; Hussein, A.R.; Erbad, A.; Mohamed, A. Hierarchical security paradigm for iot multiaccess edge computing.
IEEE Internet Things J. 2020, 8, 5794–5805. [CrossRef]
121. Yang, L.; Zhang, H.; Li, M.; Guo, J.; Ji, H. Mobile edge computing empowered energy efficient task offloading in 5 G. IEEE Trans.
Veh. Technol. 2018, 67, 6398–6409. [CrossRef]
122. Abeysekara, P.; Dong, H.; Qin, A.K. Machine learning-driven trust prediction for mec-based iot services. In Proceedings
of the 2019 IEEE International Conference on Web Services (ICWS), Milan, Italy, 8–13 July 2019; pp. 188–192.
123. Alladi, T.; Kohli, V.; Chamola, V.; Yu, F.R.; Guizani, M. Artificial intelligence (AI)-empowered intrusion detection architecture
for the internet of vehicles. IEEE Wirel. Commun. 2021, 28, 144–149. [CrossRef]
124. Dinh, T.Q.; Tang, J.; La, Q.D.; Quek, T.Q. Offloading in mobile edge computing: Task allocation and computational frequency
scaling. IEEE Trans. Commun. 2017, 65, 3571–3584.
125. Chen, X.; Zhang, H.; Wu, C.; Mao, S.; Ji, Y.; Bennis, M. Optimized computation offloading performance in virtual edge computing
systems via deep reinforcement learning. IEEE Internet Things J. 2018, 6, 4005–4018. [CrossRef]
126. Iqbal, M.A.; Bayoumi, M. Secure End-to-End key establishment protocol for resource-constrained healthcare sensors
in the context of IoT. In Proceedings of the 2016 International Conference on High Performance Computing & Simulation (HPCS),
Pasadena, CA, USA, 3–6 April 2016; pp. 523–530.
127. Ranaweera, P.; Jurcut, A.; Liyanage, M. MEC-enabled 5G use cases: A survey on security vulnerabilities and countermeasures.
ACM Comput. Surv. (CSUR) 2021, 54, 1–37. [CrossRef]
128. Xu, Y.; Zhang, T.; Yang, D.; Liu, Y.; Tao, M. Joint resource and trajectory optimization for security in UAV-assisted MEC systems.
IEEE Trans. Commun. 2020, 69, 573–588. [CrossRef]
129. Ranaweera, P.; Imrith, V.N.; Liyanag, M.; Jurcut, A.D. Security as a service platform leveraging multi-access edge computing
infrastructure provisions. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin,
Ireland, 7–11 June 2020; pp. 1–6.
130. Sha, K.; Errabelly, R.; Wei, W.; Yang, T.A.; Wang, Z. Edgesec: Design of an edge layer security service to enhance iot security.
In Proceedings of the 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), Madrid, Spain, 14–15 May
2017; pp. 81–88.
131. Singh, A.; Auluck, N.; Rana, O.; Jones, A.; Nepal, S. RT-SANE: Real time security aware scheduling on the network edge.
In Proceedings of the10th International Conference on Utility and Cloud Computing, Austin, TX, USA, 5–8 December 2017;
pp. 131–140.
132. Kamma, P.K.; Palla, C.R.; Nelakuditi, U.R.; Yarrabothu, R.S. Design and implementation of 6LoWPAN border router. In Proceed-
ings of the Wireless and Optical Communications Networks (WOCN), Mumbai, India, 24–26 February 2016; pp. 1–5.
133. Wallgren, L.; Raza, S.; Voigt, T. Routing Attacks and Countermeasures in the RPL-based Internet of Things. Int. J. Distrib. Sens.
Netw. 2013, 9, 794326. [CrossRef]
134. Pongle, P.; Chavan, G. Real time intrusion and wormhole attack detection in internet of things. Int. J. Comput. Appl. 2015, 121,
1–9. [CrossRef]
Sensors 2022, 22, 3744 30 of 33
135. Gyamfi, E.; Jurcut, A. A Robust Security Task Offloading in Industrial IoT-Enabled Distributed Multi-Access Edge Computing.
Front. Signal Proc. 2022, 2, 788943. [CrossRef]
136. Gyamfi, E.; Ansere, J.A.; Kamal, M.; Tariq, M.; Jurcut, A. An Adaptive Network Security System for IoT-Enabled Maritime
Transportation. In Proceedings of the EEE Transactions on Intelligent Transportation Systems, Macau, China, 8–12 October 2022.
137. Abraham, A.; Thomas, J. Distributed intrusion detection systems: A computational intelligence approach. In Applications of
Information Systems to Homeland Security and Defense; IGI Global: Hershey, PA, USA, 2006; pp. 107–137.
138. Giang, N.K.; Blackstock, M.; Lea, R.; Leung, V.C. Developing iot applications in the fog: A distributed dataflow approach.
In Proceedings of the 2015 5th International Conference on the Internet of Things (IOT), Seoul, Korea 26–28 October 2015;
pp. 155–162.
139. Halinen, A.; Törnroos, J.Å.; Elo, M. Network process analysis: An event-based approach to study business network dynamics.
Ind. Mark. Manag. 2013, 42, 1213–1222. [CrossRef]
140. Sheikhan, M.; Bostani, H. A hybrid intrusion detection architecture for internet of things. In Proceedings of the 2016 8th
International Symposium on Telecommunications (IST), Tehran, Iran, 27–28 September 2016; pp. 601–606.
141. Hosseinpour, F.; Vahdani Amoli, P.; Plosila, J.; Hämäläinen, T.; Tenhunen, H. An intrusion detection system for fog computing
and IoT based logistic systems using a smart data approach. Int. J. Digit. Content Technol. Its Appl. 2016, 10, 1–14.
142. Gajewski, M.; Batalla, J.M.; Mastorakis, G.; Mavromoustakis, C.X. A distributed IDS architecture model for Smart Home systems.
Clust. Comput. 2019, 22, 1739–1749. [CrossRef]
143. Khan, Z.A.; Herrmann, P. A trust based distributed intrusion detection mechanism for internet of things. In Proceedings
of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan,
27–29 March 2017; pp. 1169–1176.
144. Zhou, C.V.; Leckie, C.; Karunasekera, S. A survey of coordinated attacks and collaborative intrusion detection. Comput. Secur.
2010, 29, 124–140. [CrossRef]
145. Arshad, J.; Azad, M.A.; Abdellatif, M.M.; Rehman, M.H.U.; Salah, K. COLIDE: A collaborative intrusion detection framework
for Internet of Things. IET Netw. 2018, 8, 3–14. [CrossRef]
146. Cho, E.J.; Kim, J.H.; Hong, C.S. Attack model and detection scheme for botnet on 6LoWPAN. In Proceedings of the Asia-Pacific
Network Operations and Management Symposium, Jeju Island, Korea, 23–25 September 2009; Springer: Berlin/Heidelberg,
Germany, 2009; pp. 515–518.
147. Jun, C.; Chi, C. Design of complex event-processing IDS in internet of things. In Proceedings of the 2014 Sixth International
Conference on Measuring Technology and Mechatronics Automation, Zhangjiajie, China, 10–11 January 2014; pp. 226–229.
148. Chen, R.; Liu, C.M.; Chen, C. An artificial immune-based distributed intrusion detection model for the internet of things.
Advanced materials research. Trans. Tech. Publ. 2012, 366, 165–168.
149. Abeshu, A.; Chilamkurti, N. Deep learning: The frontier for distributed attack detection in fog-to-things computing. IEEE
Commun. Mag. 2018, 56, 169–175. [CrossRef]
150. Diro, A.A.; Naveen, C. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener.
Comput. Syst. 2018, 82, 761–768. [CrossRef]
151. Diro, A.; Chilamkurti, N. Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag.
2018, 56, 124–130. [CrossRef]
152. Sohal, A.S.; Sandhu, R.; Sood, S.K.; Chang, V. A cybersecurity framework to identify malicious edge device in fog computing and
cloud-of-things environments. Comput. Secur. 2018, 74, 340–354. [CrossRef]
153. Stolfo, S.J.; Salem, M.B.; Keromytis, A.D. Fog computing: Mitigating insider data theft attacks in the cloud. In Proceedings
of the 2012 IEEE symposium on security and privacy workshops, Francisco, CA USA, 24–25 May 2012; pp. 125–128.
154. Sudqi Khater, B.; Abdul Wahab, A.; Idris, M.; Abdulla Hussain, M.; Ahmed Ibrahim, A. A Lightweight Perceptron-Based
Intrusion Detection System for Fog Computing. Appl. Sci. 2019, 9, 178. [CrossRef]
155. An, X.; Zhou, X.; Lü, X.; Lin, F.; Yang, L. Sample selected extreme learning machine based intrusion detection in fog computing
and MEC. Wirel. Commun. Mob. Comput. 2018, 2018. [CrossRef]
156. Kovanen, T.; David, G.; Hämäläinen, T. Survey: Intrusion detection systems in encrypted traffic. In Internet of Things, Smart Spaces,
and Next Generation Networks and Systems; Springer: Berlin/Heidelberg, Germany, 2016; pp. 281–293.
157. Yin, X.C.; Liu, Z.G.; Nkenyereye, L.; Ndibanje, B. Toward an applied cyber security solution in IoT-based smart grids:
An intrusion detection system approach. Sensors 2019, 19, 4952. [CrossRef] [PubMed]
158. Qiu, H.; Dong, T.; Zhang, T.; Lu, J.; Memmi, G.; Qiu, M. Adversarial attacks against network intrusion detection in iot systems.
IEEE Internet Things J. 2020, 8, 10327–10335. [CrossRef]
159. Husnain, M.; Hayat, K.; Cambiaso, E.; Fayyaz, U.U.; Mongelli, M.; Akram, H.; Ghazanfar Abbas, S.; Shah, G.A. Preventing MQTT
Vulnerabilities Using IoT-Enabled Intrusion Detection System. Sensors 2022, 22, 567. [CrossRef]
160. Jiang, X.; Qiu, T.; Zhou, X.; Zhang, B.; Sun, X.; Chi, J. A Text Similarity-based Protocol Parsing Scheme for Industrial Internet
of Things. In Proceedings of the 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design
(CSCWD), Dalian, China, 5–7 May 2021; pp. 781–787.
161. Chaabouni, N.; Mosbah, M.; Zemmari, A.; Sauvignac, C.; Faruki, P. Network intrusion detection for IoT security based
on learning techniques. IEEE Commun. Surv. Tutor. 2019, 21, 2671–2701. [CrossRef]
Sensors 2022, 22, 3744 31 of 33
162. Khan, M.A.; Karim, M.; Kim, Y. A scalable and hybrid intrusion detection system based on the convolutional-LSTM network.
Symmetry 2019, 11, 583. [CrossRef]
163. Liu, H.; Lang, B.; Liu, M.; Yan, H. CNN and RNN based payload classification methods for attack detection. Knowl. Based Syst.
2019, 163, 332–341. [CrossRef]
164. Vieira, L.; Santos, L.; Gonçalves, R.; Rabadão, C. Identifying attack signatures for the internet of things: An IP flow based
approach. In Proceedings of the 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), Coimbra,
Portugal, 19–22 June 2019; pp. 1–7.
165. Pontes, C.F.; de Souza, M.M.; Gondim, J.J.; Bishop, M.; Marotta, M.A. A new method for flow-based network intrusion detection
using the inverse Potts model. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1125–1136. [CrossRef]
166. Tiburski, R.T.; Moratelli, C.R.; Johann, S.F.; Neves, M.V.; de Matos, E.; Amaral, L.A.; Hessel, F. Lightweight security architecture
based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun. Mag. 2019, 57, 67–73. [CrossRef]
167. Sedjelmaci, H.; Senouci, S.M.; Al-Bahri, M. A lightweight anomaly detection technique for low-resource IoT devices: A game-
theoretic methodology. In Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur,
Malaysia, 23–27 May 2016; pp. 1–6.
168. MALEH, Y.; Ezzati, A. Lightweight Intrusion Detection Scheme for Wireless Sensor Networks. IAENG Int. J. Comput. Sci. 2015,
42, 1–8.
169. Zhao, S.; Li, W.; Zia, T.; Zomaya, A.Y. A dimension reduction model and classifier for anomaly-based intrusion detection
in internet of things. In Proceedings of the 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl
Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and
Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, USA, 6–10 November 2017; pp. 836–843.
170. Liu, H.; Lang, B. Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey. Appl. Sci. 2019,
9, 4396. [CrossRef]
171. Buczak, A.L.; Guven, E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE
Commun. Surv. Tutor. 2015, 18, 1153–1176. [CrossRef]
172. Mikolajczyk, K.; Leibe, B.; Schiele, B. Multiple object class detection with a generative model. In Proceedings of the IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, San Diego, CA, USA, 20–25 June 2006; Volume 1,
pp. 26–33.
173. Lin, R.S.; Ross, D.A.; Lim, J.; Yang, M.H. Adaptive discriminative generative model and its applications. In Advances in Neural
Information Processing Systems; 2005; pp. 801–808. Available online: https://proceedings.neurips.cc/paper/2004/file/f12f2b34a0
c3174269c19e21c07dee68-Paper.pdf (accessed on 18 November 2021).
174. HaddadPajouh, H.; Dehghantanha, A.; Khayami, R.; Choo, K.K.R. A deep Recurrent Neural Network based approach for Internet
of Things malware threat hunting. Future Gener. Comput. Syst. 2018, 85, 88–96. [CrossRef]
175. Saeed, A.; Ahmadinia, A.; Javed, A.; Larijani, H. Intelligent intrusion detection in low-power IoTs. ACM Trans. Internet Technol.
(TOIT) 2016, 16, 27. [CrossRef]
176. Azmoodeh, A.; Dehghantanha, A.; Choo, K.K.R. Robust malware detection for internet of (battlefield) things devices using deep
eigenspace learning. IEEE Trans. Sustain. Comput. 2018, 4, 88–95. [CrossRef]
177. Erfani, S.M.; Rajasegarar, S.; Karunasekera, S.; Leckie, C. High-dimensional and large-scale anomaly detection using a linear
one-class SVM with deep learning. Pattern Recognit. 2016, 58, 121–134. [CrossRef]
178. Razzak, I.; Zafar, K.; Imran, M.; Xu, G. Randomized nonlinear one-class support vector machines with bounded loss function
to detect of outliers for large scale IoT data. Future Gener. Comput. Syst. 2020, 112, 715–723. [CrossRef]
179. La, Q.D.; Quek, T.Q.; Lee, J.; Jin, S.; Zhu, H. Deceptive attack and defense game in honeypot-enabled networks for the internet
of things. IEEE Internet Things J. 2016, 3, 1025–1035. [CrossRef]
180. Anthi, E.; Williams, L.; Burnap, P. Pulse: An adaptive intrusion detection for the internet of things. In Proceedings of the Living
in the Internet of Things: Cybersecurity of the IoT, London, UK, 28–29 March 2018.
181. Arrington, B.; Barnett, L.; Rufus, R.; Esterline, A. Behavioral modeling intrusion detection system (bmids) using internet
of things (iot) behavior-based anomaly detection via immunity-inspired algorithms. In Proceedings of the 2016 25th International
Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–6.
182. Pajouh, H.H.; Javidan, R.; Khayami, R.; Ali, D.; Choo, K.K.R. A two-layer dimension reduction and two-tier classification model
for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans. Emerg. Top. Comput. 2016, 7, 314–323. [CrossRef]
183. Ghosh, P.; Mitra, R. Proposed GA-BFSS and logistic regression based intrusion detection system. In Proceedings of the 2015
Third International Conference on Computer, Communication, Control and Information Technology (C3IT), Hooghly, India, 7–8
February 2015; pp. 1–6.
184. Prokofiev, A.O.; Smirnova, Y.S.; Surov, V.A. A method to detect Internet of Things botnets In Proceedings of the 2018 IEEE
Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, 29 January–1
February 2018; pp. 105–108.
185. Azad, C.; Mehta, A.K.; Jha, V.K. Evolutionary Decision Tree-Based Intrusion Detection System. In Proceedings of the Third
International Conference on Microelectronics, Computing and Communication Systems; Springer: Berlin/Heidelberg, Germany, 2019;
pp. 271–282.
Sensors 2022, 22, 3744 32 of 33
186. Kumar, V.; Das, A.K.; Sinha, D. UIDS: A unified intrusion detection system for IoT environment. Evol. Intell. 2021, 14, 47–59.
[CrossRef]
187. Amarasinghe, K.; Manic, M. Improving user trust on deep neural networks based intrusion detection systems. In Proceedings of
the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018;
pp. 3262–3268.
188. Blanco, R.; Cilla, J.J.; Malagón, P.; Penas, I.; Moya, J.M. Tuning cnn input layout for ids with genetic algorithms. In Proceedings
of the International Conference on Hybrid Artificial Intelligence Systems, Oviedo, Spain, 20–22 June 2018; Springer:
Berlin/Heidelberg, Germany, 2018; pp. 197–209.
189. Mayhew, M.; Atighetchi, M.; Adler, A.; Greenstadt, R. Use of machine learning in big data analytics for insider threat detection.
In Proceedings of the MILCOM 2015-2015 IEEE Military Communications Conference, Tampa, FL, USA, 26–28 October 2015;
pp. 915–922.
190. Li, W.; Yi, P.; Wu, Y.; Pan, L.; Li, J. A new intrusion detection system based on KNN classification algorithm in wireless sensor
network. J. Electr. Comput. Eng. 2014, 2014, 240217. [CrossRef]
191. Singh, R.R.; Gupta, N.; Kumar, S. To reduce the false alarm in intrusion detection system using self organizing map. Int. J. Soft
Comput. Eng. (IJSCE) 2011, 2231, 2307.
192. Cárdenas, A.A.; Baras, J.S.; Seamon, K. A framework for the evaluation of intrusion detection systems. In Proceedings of the 2006
IEEE Symposium on Security and Privacy (S&P’06), Oakland, CA, USA, 21–24 May 2006; p. 15.
193. Gu, G.; Fogla, P.; Dagon, D.; Lee, W.; Skorić, B. Measuring intrusion detection capability: An information-theoretic approach.
In Proceedings of the 2006 ACM Symposium on Information, computer and communications security, Taipei, Taiwan, 21–24
March 2006; pp. 90–101.
194. Fink, G.A.; Chappell, B.; Turner, T.; O’Donoghue, K. A metrics-based approach to intrusion detection system evaluation
for distributed real-time systems. In Proceedings of the 16th International Parallel and Distributed Processing Symposium, Ft.
Lauderdale, FL, USA, 15–19 April 2001; p. 8.
195. Kim, J.; Kim, J.; Thu, H.L.T.; Kim, H. Long short term memory recurrent neural network classifier for intrusion detection. In
Proceedings of the 2016 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, 15–17 February
2016; pp. 1–5.
196. Ansere, J.A.; Han, G.; Bonsu, K.A.; Peng, Y. Energy Efficient Joint Power Allocation and User Selection Algorithm for Data
Transmission in Internet of Things Networks. IEEE Internet Things J. 2020, 7, 8736–8747. [CrossRef]
197. Ansere, J.A.; Han, G.; Liu, L.; Peng, Y.; Kamal, M. Optimal Resource Allocation in Energy Efficient Internet of Things Networks
with Imperfect CSI. IEEE Internet Things J. 2020, 7, 5401–5411. [CrossRef]
198. Tsai, C.F.; Lin, C.Y. A triangle area based nearest neighbors approach to intrusion detection. Pattern Recognit. 2010, 43, 222–229.
[CrossRef]
199. IDS 2012 Datasets Research Canadian Institute for Cybersecurity UNB. Available online: https://www.unb.ca/cic/datasets/ids.
html (accessed on 22 April 2020).
200. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic
characterization. In Proceedings of the International Conference on Information Systems Security and Privacy, Funchal, Madeira,
22–24 January 2018; pp. 108–116. Available online: https://www.scitepress.org/Papers/2018/66398/66398.pdf (accessed on 17
October 2021).
201. IDS 2018 Datasets Research Canadian Institute for Cybersecurity UNB. Available online: https://www.unb.ca/cic/datasets/ids-
2018.html (accessed on 22 April 2020).
202. Ullah, I.; Mahmoud, Q.H. A two-level hybrid model for anomalous activity detection in IoT networks. In Proceedings of the 2019
16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019;
pp. 1–6. [CrossRef]
203. Moustafa, N.; Slay, J. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network
data set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia,
10–12 November 2015; pp. 1–6.
204. Moustafa, N.; Slay, J. The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set
and the comparison with the KDD99 data set. Inf. Secur. J. Glob. Perspect. 2016, 25, 18–31. [CrossRef]
205. Kang, H.; Ahn, D.H.; Lee, G.M.; Yoo, J.; Park, K.H.; Kim, H.K. IoT Network Intrusion Dataset. IEEE Dataport. 2019. Available
online: https://ieee-dataport.org/ieee-dataport-dataset-upload-contest-entries (accessed on 10 January 2022).
206. Ullah, I.; Mahmoud, Q.H. A scheme for generating a dataset for anomalous activity detection in iot networks. In Proceedings of
the Canadian Conference on Artificial Intelligence, Ottawa, ON, Canada, 13–15 May 2020; Springer: Berlin/Heidelberg, Germany,
2020, pp. 508–520.
207. Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT telemetry dataset: A new generation dataset of IoT and
IIoT for data-driven intrusion detection systems. IEEE Access 2020, 8, 165130–165150. [CrossRef]
208. Pinto, R.; Gonçalves, G.; Tovar, E.; Delsing, J. Attack detection in cyber-physical production systems using the deterministic
dendritic cell algorithm. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory
Automation (ETFA), Vienna, Austria, 8–11 September 2020; Volume 1, pp. 1552–1559.
Sensors 2022, 22, 3744 33 of 33
209. Sousa, B.; Cruz, T.; Arieiro, M.; Pereira, V. An ELEGANT dataset with Denial of Service and Man in The Middle attacks. arXiv
2021, arXiv:2103.09380.
210. Sambangi, S.; Gondi, L.; Aljawarneh, S.; Annaluri, S.R. SDN DDOS Attack Image Dataset. 2021. Available online: https:
//ieee-dataport.org/documents/sdn-ddos-attack-image-dataset (accessed on 10 January 2022)
211. Hussain, F.; Abbas, S.G.; Husnain, M.; Fayyaz, U.U.; Shahzad, F.; Shah, G.A. IoT DoS and DDoS attack detection using ResNet.
In Proceedings of the 2020 IEEE 23rd International Multitopic Conference (INMIC), Bahawalpur, Pakistan, 5–7 November 2020;
pp. 1–6.
212. LEE, Y. Development of Industrial IoT System for Anomaly Detection in Smart Factory. 2020. Available online: https://ieee-
dataport.org/documents/development-industrial-iot-system-anomaly-detection-smart-factory (accessed on 10 January 2022).
213. Hindy, H.; Tachtatzis, C.; Atkinson, R.; Bayne, E.; Bellekens, X. Mqtt-iot-ids2020: Mqtt Internet of Things Intrusion Detection
Dataset. IEEE Dataport. 2020. Available online: https://ieee-dataport.org/open-access/mqtt-iot-ids2020-mqtt-internet-things-
intrusion-detection-dataset (accessed on 11 January 2022)
214. Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A New Comprehensive Realistic Cyber Security
Dataset of IoT and IIoT Applications for Centralized and Federated Learning. IEEE Access 2022, 40281–40306. [CrossRef]
215. Al-Hawawreh, M.; Sitnikova, E.; Aboutorab, N. X-IIoTID: A connectivity-and device-agnostic intrusion dataset for industrial
Internet of Things. IEEE Internet Things J. 2021, 9, 3962–3977. [CrossRef]
216. Trajanovski, T.; Zhang, N. IoT-BDA Botnet Analysis Dataset. IEEE Internet Things J. 2021, 9. [CrossRef]
217. Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009
IEEE Symposium on Computational Intelligence for Security and Defense Applications, Milano, Italy, 7–10 September 2009;
pp. 1–6.
218. Hussain, F.; Abbas, S.G.; Husnain, M.; Fayyaz, U.U.; Shahzad, F.; Shah, G.A. IoT DoS and DDoS Attack Dataset. 2021. Available
online: https://ieee-dataport.org/documents/iot-dos-and-ddos-attack-dataset (accessed on 11 January 2022). [CrossRef]
219. Hussain, F.; Abbas, S.G.; Shah, G.A.; Pires, I.M.; Fayyaz, U.U.; Shahzad, F.; Garcia, N.M.; Zdravevski, E. A Framework for
Malicious Traffic Detection in IoT Healthcare Environment. Sensors 2021, 21, 3025. [CrossRef]
220. Kalupahana Liyanage, K.S.; Divakaran, D.M.; Singh, R.P.; Gurusamy, M. NSS Mirai Dataset. 2020. Available online: https:
//ieee-dataport.org/documents/nss-mirai-dataset (accessed on 10 January 2022)
221. Zolanvari, M. WUSTL-IIOT-2021. 2021. Available online: https://ieee-dataport.org/documents/wustl-iiot-2021, (accessed on 10
January 2022)
222. Moustafa, N. The Bot-IoT Dataset. 2019. Available online: https://ieee-dataport.org/documents/bot-iot-dataset (accessed on 11
January 2022)