A Comprehensive Review of Soft Computing Enabled Techniques for IoT Security: State-of-the-Art and Challenges Ahead

被引:0
作者
Parabrahmachari, Sriram [1 ]
Narayanasamy, Srinivasan [2 ]
机构
[1] Sathyabama Inst Sci & Technol, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
[2] Rajalakshmi Engn Coll, Dept Comp Sci & Engn, Chennai 600119, Tamil Nadu, India
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023 | 2025年 / 1273卷
关键词
Internet of Things (IoT); Security and privacy; Soft Computing; Attacks; Computing methodologies; INTRUSION DETECTION; ATTACK DETECTION; INTERNET; THINGS; PROTOCOL; ISSUES; DEEP;
D O I
10.1007/978-981-97-8031-0_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the past ten years, the Internet of Things (IoT) has become a massive force in our daily lives, providing countless smart services that have improved human existence. Nevertheless, the increased availability and rapidly escalating demand for intelligent devices and networks mean that IoT is currently encountering unprecedented security challenges. While there are established security protocols in place for IoT, these conventional methods fall short in effectively addressing the escalating frequency and severity of attacks. The term 'security' is used to encompass various concepts, including integrity, confidentiality, and privacy. Therefore, a strong and up-to-date security system is necessary for the next generation of industrial IoT. One area of technological advancement that can address the ongoing and future challenges of IoT security is Soft Computing. It has opened up many possible research avenues for detecting attacks and identifying abnormal behaviors in smart devices and networks. This paper explores the architecture of IoT and provides a comprehensive literature review of Soft Computing based approaches to IoT security, including the different types of possible attacks. It also presents potential Soft Computing-based solutions for IoT security and discusses open research issues along with future research scope.
引用
收藏
页码:131 / 146
页数:16
相关论文
共 67 条
  • [11] A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
    Benkhelifa, Elhadj
    Welsh, Thomas
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3496 - 3509
  • [12] Ensembles of incremental learners to detect anomalies in ad hoc sensor networks
    Bosman, Hedde H. W. J.
    Iacca, Giovanni
    Tejada, Arturo
    Wortche, Heinrich J.
    Liotta, Antonio
    [J]. AD HOC NETWORKS, 2015, 35 : 14 - 36
  • [13] K-means clustering for the aggregation of HFLTS possibility distributions: N-two-stage algorithmic paradigm
    Chen, Zhen-Song
    Zhang, Xuan
    Pedrycz, Witold
    Wang, Xian-Jia
    Chin, Kwai-Sang
    Martinez, Luis
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 227
  • [14] Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
    Chen, Zhiyan
    Liu, Jinxin
    Shen, Yu
    Simsek, Murat
    Kantarci, Burak
    Mouftah, Hussein T.
    Djukic, Petar
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (05)
  • [15] Elazhary H., 2019, J. Netw. Comp. Appl., V128
  • [16] State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow's Intelligent Network Traffic Control Systems
    Fadlullah, Zubair Md.
    Tang, Fengxiao
    Mao, Bomin
    Kato, Nei
    Akashi, Osamu
    Inoue, Takeru
    Mizutani, Kimihiro
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (04): : 2432 - 2455
  • [17] A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems
    Farris, Ivan
    Taleb, Tarik
    Khettab, Yacine
    Song, Jaeseung
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 812 - 837
  • [18] Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
    Ferrag, Mohamed Amine
    Shu, Lei
    Friha, Othmane
    Yang, Xing
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (03) : 407 - 436
  • [19] The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial
    Ferrag, Mohamed Amine
    Shu, Lei
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) : 17236 - 17260
  • [20] APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
    Guan, Zhitao
    Zhang, Yue
    Wu, Longfei
    Wu, Jun
    Li, Jing
    Ma, Yinglong
    Hu, Jingjing
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 82 - 92