Smart City Gnosys

Smart city article details

Title Smart Hardware Trojan Detection System
ID_Doc 50999
Authors Alkhazendar I.; Zubair M.; Qidwai U.
Year 2023
Published Lecture Notes in Networks and Systems, 544 LNNS
DOI http://dx.doi.org/10.1007/978-3-031-16075-2_58
Abstract The IoT has become an indispensable part of human lives at work and home applications. Due to the need for an enormous number of IoT devices manufacturers are least concerned about security vulnerabilities during designing and developing of these devices. Because of this, it becomes easier for adversaries to manipulate the hardware and insert Trojans or Remote File Inclusion to control remotely. In this research, we aim to build a model to identify hardware Trojans in IoT devices using Deep learning. We used different machine learning models to evaluate the performance and accuracy. In addition we choose a distinctive feature that can detect the presence of Trojan in these devices. The proposed model is evaluated using an existing and real-time dataset generated using a smart city testbed, The testbed used was designed to simulate and evaluate the Hardware trojan attacks, and by using the real-time dataset we could measure the power profile and network traffic on the IoT gateway device to analyze the performance and the accuracy. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
Author Keywords DOS attack; Hardware Trojan; Internet of Things; Smart cities; Smart detection system


Similar Articles


Id Similarity Authors Title Published
33508 View0.88Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
9648 View0.879Alsoufi M.A.; Razak S.; Siraj M.M.; Nafea I.; Ghaleb F.A.; Saeed F.; Nasser M.Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature ReviewApplied Sciences (Switzerland), 11, 18 (2021)
990 View0.878Praveen Kumar E.; Priyanka S.A Comprehensive Survey On Hardware-Assisted Malware Analysis And Primitive TechniquesComputer Networks, 235 (2023)
33032 View0.878Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
6993 View0.877Alhamdi M.J.M.; Lopez-Guede J.M.; AlQaryouti J.; Rahebi J.; Zulueta E.; Fernandez-Gamiz U.Ai-Based Malware Detection In Iot Networks Within Smart Cities: A SurveyComputer Communications, 233 (2025)
34139 View0.869Selvam R.; Velliangiri S.Iotsdl: Internet Of Things Security For Deep Learning Techniques-A Research Perspectives2023 International Conference on Computer Communication and Informatics, ICCCI 2023 (2023)
957 View0.865Houichi M.; Jaidi F.; Bouhoula A.A Comprehensive Study Of Intrusion Detection Within Internet Of Things-Based Smart Cities: Synthesis, Analysis And A Novel Approach2023 International Wireless Communications and Mobile Computing, IWCMC 2023 (2023)
5144 View0.864Liao H.; Murah M.Z.; Hasan M.K.; Aman A.H.M.; Fang J.; Hu X.; Khan A.U.R.A Survey Of Deep Learning Technologies For Intrusion Detection In Internet Of ThingsIEEE Access, 12 (2024)
58001 View0.864Rangelov D.; Lämmel P.; Brunzel L.; Borgert S.; Darius P.; Tcholtchev N.; Boerger M.Towards An Integrated Methodology And Toolchain For Machine Learning-Based Intrusion Detection In Urban Iot Networks And PlatformsFuture Internet, 15, 3 (2023)
30732 View0.863Amine M.S.; Nada F.A.; Hosny K.M.Improved Model For Intrusion Detection In The Internet Of ThingsScientific Reports, 15, 1 (2025)