0% found this document useful (0 votes)
12 views3 pages

Review

Uploaded by

binmubark1994
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

Review

Uploaded by

binmubark1994
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Title Author Journal Year Summarized Abstract Objectives Methods Results Conclusion Research Gap

Analysis of Tehseen University 2023 1.The paper analyzes IoT The objectives of the study are to The study uses a review of existing The results of the study show that The conclusions of the study are that 1.Lack of standardized
IoT Security Mazhar; of security challenges and explore the use of machine literature and research to explore the use machine learning and deep learning machine learning and deep learning security measures for
Challenges Dhani Bux Johannesbur solutions using AI. learning and deep learning of machine learning and deep learning techniques can be effective in improving techniques are essential for improving N.B. IoT in healthcare.
and Its Talpur; g 2.IoT enhances various techniques to improve IoT techniques in IoT security. IoT security, and that clustering IoT security, and that further research 2.Insufficient
Solutions Tamara Al sectors but faces significant security, to identify the challenges algorithms can be used to resolve IoT is needed to address the challenges exploration of deep
Using Shloul et al. cyber threats. and limitations of IoT security, The research method involved a security issues. and limitations of IoT security. learning methods for
Artificial 3.Traditional security and to discuss the potential literature review of IoT security studies, The study concludes that machine IoT security.
Intelligence methods are ineffective solutions and future work in this using search operators to find relevant The study found that IoT devices are learning and deep learning solutions 3.Need for addressing
against new vulnerabilities. area. information on topics such as IoT, vulnerable to network threats, including are essential for effective IoT security, unique IoT node
4.AI, particularly machine machine learning, deep learning, threats, spoofing and denial of service, and that and that further research is needed to security characteristics.
learning, is essential for IoT cyberattacks, and vulnerabilities. machine learning and deep learning develop effective strategies for 4.Limited research on
security. solutions can be used to detect and continuously improving IoT security. integrating AI with IoT
5.The study examines attack prevent these threats. security solutions
patterns in unstructured data.
6.Future research directions
and challenges in IoT security
are discussed.

Using Hosam F. El- Scientific 2024 1.The paper addresses IoT The main objective of the study is The study uses seven ML algorithms to The proposed ML-based security model The proposed ML-based security 1.Limited datasets may
machine Sofany; Reports system security using to develop a novel ML-based identify the most accurate classifiers for achieves a high accuracy rate of 99.9% model is a viable option for improving not cover all IoT attack
learning Samir Abou machine learning. security model that can improve their AI-based reaction agent’s compared to previous research for the security of IoT systems, types.
algorithms El-Seoud; 2.It presents a novel ML- the security of IoT systems by implementation phase, which can identify improving IoT systems’ security. outperforming existing ML-based 2.Need for optimizing
to enhance Omar H. based security model for IoT. autonomously managing the attack activities and patterns in networks models in terms of accuracy and execution time for real-
IoT system Karam et al. 3.The model autonomously growing number of security connected to the IoT. The proposed ML-based security model execution time. world applications.
security manages increasing security issues associated with the IoT The study employed various machine achieved high accuracy, precision, and 3.Integration with other
issues in IoT. domain. learning algorithms, including Random detection rates, and outperformed The development of this novel ML- security solutions is
4.Seven ML algorithms were Forest, Naive Bayes, Decision Tree, previous solutions in terms of accuracy, based security model is a significant necessary for
utilized for attack detection. Neural Networks, XGBoost, AdaBoost, precision, detection rate, CPE, and time contribution to the literature on ML robustness.
5.The proposed approach and Ensemble RF with backpropagation complexity. security models and IoT security, and 4.Lack of explainability
achieved 99.9% accuracy NN, to detect and mitigate IoT security further work and improvements will in AI-based IDS
and perfect AUC score. threats. The proposed ML-based model is found continue to advance the field. decision-making
6.It outperforms previous The research applied the proposed IDS to have a good accuracy rate of 99.9% process.
models in speed and model to a dataset that included more compared to previous research, and can
accuracy. than 23 types of attacks, and utilized the automatically address rising concerns
NSL-KDD dataset to evaluate the about high security in the IoT domain.
intrusion detection mechanism in a real-
world smart building environment.
Enhancing Ashish Future 2023 1.The paper focuses on IoT The objective of this research is The methods used in this research The results of this research show that The study concludes that the 1.The paper does not
IoT Device Koirala; Internet device security enhancement. to improve the security of IoT include generating normal and attack the machine learning models are able to employment of machine learning address real-time
Security Rabindra 2.It addresses confidentiality devices by investigating the network traffic using Wireshark, identify the normal behaving network applications, especially for classifying attack detection
through Bista; João and security issues in IoT. likelihood of network attacks converting packet-based data into a flow- and attack network with optimal complex and imbalanced datasets, methods.
Network C. Ferreira 3.Network attack data is using ordinary device network based format using the Argus tool, and accuracy. The ensemble approach utilizing suitable data preprocessing 2.Limited exploration of
Attack Data analyzed using machine data and attack network data implementing machine learning provided significant results, and the techniques, is effective in improving the diverse IoT device
Analysis learning algorithms. acquired from similar statistics. algorithms to categorize normal and gradient boost classifier showed high security of IoT devices. types and
Using 4.Botnet attacks were attack traffic. accuracy. environments.
Machine conducted on smart The study concludes that machine 3.Lack of
Learning healthcare IoT devices. The study involves capturing network The results show that the random forest learning models can effectively classify comprehensive
Algorithms 5.Data was analyzed using packets in real-time using packet classifier provided the optimal result of normal and attack network traffic with evaluation of machine
statistical measures for analyzer tools and network flow tracers, 99.9872% to classify the attack and high accuracy, and the generated learning algorithms.
feature extraction. and then preprocessing the data using normal network traffic in binary dataset has the potential to serve as a 4.Insufficient focus on
6.Machine learning techniques such as imblearn, classification valuable resource for further long-term security
categorized normal and normalization, correlation, and entropy investigations in the area of IoT security implications of IoT
attack traffic effectively. selection devices.
7.The BoT-IoT dataset was 5.No discussion on
used for cross-evaluation. user privacy concerns
8.The study emphasizes during data collection
advanced strategies for
attack detection

Security Prafulla E Research 2024 1.The paper discusses IoT The objective of the study is to The study uses the CICIDS 2017 The results show that Hybrid algorithms The study concludes that Hybrid 1.Lack of
Measures at Ajmire , security using machine design a framework for detecting benchmark dataset and implements achieve better accuracy and efficiency algorithms are effective in detecting comprehensive
Network Pragati learning techniques. DDoS attacks in IoT networks machine learning models such as Linear in detecting DDoS attacks compared to DDoS attacks in IoT networks and can evaluation of hybrid
Layer of IoT Vishal 2.IoT devices face unique using machine learning Regression, Decision Tree, Random individual machine learning models. The be used to improve the security of IoT algorithms.
Using Thawani security and privacy techniques and to evaluate the Forest, and Hybrid algorithms using study also presents the performance devices and networks. 2.Limited exploration of
Machine challenges. performance of different machine Python Jupyter notebook. metrics of each model, including real-time
Learning 3.Machine learning learning models. accuracy, precision, recall, F1 score, The study concludes that machine implementation
Techniques addresses various security The study uses machine learning detection rate, and false alarm rate. learning techniques, specifically hybrid challenges.
issues in IoT. techniques, including decision trees, algorithms, are effective in detecting 3.Insufficient analysis
4.The study uses CICIDS random forest, and hybrid algorithms, to The study finds that the hybrid algorithm, DDoS attacks on IoT devices, of varying IoT device
2017 dataset for analysis. detect DDoS attacks on IoT devices. The specifically Hybrid Algorithm 2 (DT+RF), specifically Raspberry Pi. The study capabilities.
5.Three ML models are study also uses a dataset, specifically is the strongest ML classifier with an also emphasizes the importance of 4.Need for broader
evaluated: Linear CICIDS 2017, to evaluate the accuracy of 99.98%, precision of using lightweight machine learning dataset diversity for
Regression, Random Forest, performance of the algorithms. 99.97%, and a good false alarm rate of approaches to safeguard IoT training.
Decision Tree. 0.0002. The study also finds that the deployments. 5.Limited focus on long-
6.Decision trees provide a algorithm is suitable for real-time term security
balance of speed and deployment on Raspberry Pi. effectiveness.
accuracy.
7.Hybrid algorithms aim for
improved accuracy in results
IoT Security Chaw Su Journal of 2024 1.The paper focuses on IoT The objective is to develop a The proposed system consists of four The experiment results indicate that the The proposed system contributes to 1.The paper does not
Using Htwe; Zin Computing security using machine machine learning-based phases: feature extraction, feature detection results with selected features the development of a real-time attack address unknown
Machine Thu Thu Theories learning methods. approach for attack detection in selection, feature encoding, and are improved, especially in terms of the detection capability in an IoT attack detection
Learning Myint; Yee and 2.IoT devices face security IoT network traffic data, using machine-learning-based attack detection. processing time and detection rate in environment, with faster processing methods.
Methods Mon Thant Applications weaknesses and malware feature extraction, selection, and The feature extraction mechanism uses Naïve Bayes. The CART algorithm and better detection accuracy by 2.Limited focus on
with attacks. classification algorithms to Algorithm 1, and the feature selection outperformed the result of Naïve Bayes. reducing the number of features. feature selection impact
Features 3.Proposed framework improve detection accuracy and process applies the Pearson correlation The proposed system is effective in on performance
Correlation improves attack detection efficiency. method. The CART algorithm is used for The results show that the proposed detecting attacks in IoT network traffic metrics.
with feature correlation. attack detection. system achieves high accuracy with data, with CART achieving perfect 3.Lack of exploration
4.Achieves nearly 100% both all and selected features using accuracy with selected features. on alternative machine
detection accuracy with The methods used include feature CART and Naïve Bayes, with CART Feature selection improves learning algorithms.
selected features. extraction using CICFlowMeter and achieving perfect accuracy with selected computational efficiency and detection 4.Insufficient analysis
5.CART algorithm is Zeek, feature selection using Pearson features. The results also show that accuracy with CART, but may lead to a of real-time attack
preferred for processing time correlation, and classification using feature selection improves slight decrease in some performance detection challenges
and accuracy CART and Naïve Bayes. computational efficiency with CART. metrics with Naïve Bayes.
The study concludes that feature
The study uses the Pearson correlation The results of the study show that CART selection is advantageous for
feature selection method to reduce can detect attacks with 100% accuracy, improving computational efficiency, and
irrelevant features and applies the CART even when reducing many features. CART is a better choice for
algorithm for building the attack detection Naive Bayes performance also computational efficiency based on the
model. The performance of CART is achieves up to 99.93% with the selected provided data.
compared with Naive Bayes. features.

You might also like