Manara - Qatar Research Repository
Browse
10.1186_s40537-023-00805-5.pdf (2.87 MB)

Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review

Download (2.87 MB)
journal contribution
submitted on 2024-01-07, 05:01 and posted on 2024-01-07, 05:05 authored by Yasir Ali, Habib Ullah Khan, Muhammad Khalid

Internet of Things (IoT) driven systems have been sharply growing in the recent times but this evolution is hampered by cybersecurity threats like spoofing, denial of service (DoS), distributed denial of service (DDoS) attacks, intrusions, malwares, authentication problems or other fatal attacks. The impacts of these security threats can be diminished by providing protection towards the different IoT security features. Different technological solutions have been presented to cope with the vulnerabilities and providing overall security towards IoT systems operating in numerous environments. In order to attain the full-pledged security of any IoT-driven system the significant contribution presented by artificial neural networks (ANNs) is worthy to be highlighted. Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. This systematic literature review (SLR) is composed of three (3) research questions (RQs) such that in RQ1, the major focus is to identify security requirements or criteria that defines a full-pledge IoT system. This question also focusses on pinpointing the different types of ANNs approaches that are contributing towards IoT security. In RQ2, we highlighted and discussed the contributions of ANNs approaches for individual security requirement/feature in comprehensive and detailed fashion. In this question, we also determined the various models, frameworks, techniques and algorithms suggested by ANNs for the security advancements of IoT. In RQ3, different security mechanisms presented by ANNs especially towards intrusion detection system (IDS) in IoT along with their performances are comparatively discussed. In this research, 143 research papers have been used for analysis which are providing security solutions towards IoT security issues. A comprehensive and in-depth analysis of selected studies have been made to understand the current research gaps and future research works in this domain.

Other Information

Published in: Journal of Big Data
License: https://creativecommons.org/licenses/by/4.0
See article on publisher's website: https://dx.doi.org/10.1186/s40537-023-00805-5

Funding

Open Access funding provided by the Qatar National Library.

History

Language

  • English

Publisher

Springer Nature

Publication Year

  • 2023

License statement

This Item is licensed under the Creative Commons Attribution 4.0 International License.

Institution affiliated with

  • Qatar University
  • College of Business and Economics - QU

Usage metrics

    Qatar University

    Licence

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC