Smart City Gnosys

Smart city article details

Title A Review On Intrusion Detection Approaches In Resource-Constrained Iot Environment
ID_Doc 4267
Authors Durga Bhavani A.; Mangla N.
Year 2022
Published Lecture Notes on Data Engineering and Communications Technologies, 68
DOI http://dx.doi.org/10.1007/978-981-16-1866-6_12
Abstract The Internet of things (IoT) has advanced as an innovation to build smart situations such as industrial processes, home automation, smart cities, and environment monitoring. Smart and IoT devices exist in almost every walk of life recently. Since these devices are available in an Internet-connected environment, they are exposed to different vulnerabilities and attacks, typical of any Internet-connected system. Applying conventional intrusion detection and avoidance frameworks on these IoT devices is not practical because of the different asset imperatives in these devices regarding calculation, memory, and energy availability. This survey focuses on different techniques for intrusion detection and avoidance in an IoT environment. The aim of this work is to recognize open difficulties in intrusion detection and avoidance frameworks for the resource-constrained nature of the IoT environment. © 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Author Keywords Anomalies; Attacks; Constrained environment; Intrusion detection system (IDS); IoT


Similar Articles


Id Similarity Authors Title Published
46467 View0.912Chiba Z.; Abghour N.; Moussaid K.; Lifandali O.; Kinta R.Review Of Recent Intrusion Detection Systems And Intrusion Prevention Systems In Iot Networks2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)
16580 View0.898Sharma P.Critical Review Of Various Intrusion Detection Techniques For Internet Of Things2nd International Conference on Data, Engineering and Applications, IDEA 2020 (2020)
33339 View0.892Pundir S.; Wazid M.; Singh D.P.; Das A.K.; Rodrigues J.J.P.C.; Park Y.Intrusion Detection Protocols In Wireless Sensor Networks Integrated To Internet Of Things Deployment: Survey And Future ChallengesIEEE Access, 8 (2020)
32898 View0.884Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
33346 View0.879Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
26946 View0.876Bhardwaj A.; Bharany S.; Abulfaraj A.W.; Osman Ibrahim A.; Nagmeldin W.Fortifying Home Iot Security: A Framework For Comprehensive Examination Of Vulnerabilities And Intrusion Detection Strategies For Smart CitiesEgyptian Informatics Journal, 25 (2024)
58001 View0.875Rangelov D.; Lämmel P.; Brunzel L.; Borgert S.; Darius P.; Tcholtchev N.; Boerger M.Towards An Integrated Methodology And Toolchain For Machine Learning-Based Intrusion Detection In Urban Iot Networks And PlatformsFuture Internet, 15, 3 (2023)
941 View0.874Kaura S.; Bhardwaj D.A Comprehensive Review On Intrusion Detection In Edge-Based Iot Using Machine LearningLecture Notes on Data Engineering and Communications Technologies, 131 (2023)
36080 View0.869Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
30623 View0.869Bamou A.; Khardioui M.; El Ouadghiri M.D.; Aghoutane B.Implementing And Evaluating An Intrusion Detection System For Denial Of Service Attacks In Iot EnvironmentsLecture Notes in Networks and Systems, 92 (2020)