참고문헌
- H. F. Atlam, R. Walters, and G. Wills, "Internet of things: state-of-the-art, challenges, applications, and open issues," International Journal of Intelligent Computing Research (IJICR), vol. 9, pp. 928-938, 2018. https://doi.org/10.20533/ijicr.2042.4655.2018.0112
- H. F. Atlam and G. B. Wills, "IoT security, privacy, safety and ethics," in Digital twin technologies and smart cities, ed: Springer, pp. 123-149, 2020.
- L. a. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and security: Challenges and solutions," Applied Sciences, vol. 10, p. 4102, 2020. https://doi.org/10.3390/app10124102
- F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine learning in IoT security: Current solutions and future challenges," IEEE Communications Surveys & Tutorials, vol. 22, pp. 1686-1721, 2020. https://doi.org/10.1109/COMST.2020.2986444
- Number of connected devices worldwide 2030. (n.d.). Retrieved from Statista website: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-accesstechnology/
- Global IoT connections data volume 2019 and 2025. (n.d.). Retrieved from Statista website: https://www.statista.com/statistics/1017863/worldwide-iot-connected-devices-data-size/
- M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, et al., "Machine learning for Internet of Things data analysis: A survey," Digital Communications and Networks, vol. 4, pp. 161-175, 2018. https://doi.org/10.1016/j.dcan.2017.10.002
- N. Kumar and A. Makkar, Machine learning in cognitive IoT: CRC Press, 2020.
- K. Alieyan, A. Almomani, R. Abdullah, B. Almutairi, and M. Alauthman, "Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions," in Research Anthology on Combating Denial-of-Service Attacks, ed: IGI Global, pp. 138-150, 2021.
- P. P. Ray, "A survey on Internet of Things architectures," Journal of King Saud University-Computer and Information Sciences, vol. 30, pp. 291-319, 2018. https://doi.org/10.1016/j.jksuci.2016.10.003
- H. F. Atlam, A. Alenezi, R. K. Hussein, and G. B. Wills, "Validation of an Adaptive Risk-based Access Control Model for the Internet of Things," International Journal of Computer Network & Information Security, vol. 10, 2018.
- C. Maple, "Security and privacy in the internet of things," Journal of Cyber Policy, vol. 2, pp. 155-184, 2017. https://doi.org/10.1080/23738871.2017.1366536
- W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, "An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security," IEEE Internet of Things Journal, vol. 7, pp. 10250-10276, 2020. https://doi.org/10.1109/jiot.2020.2997651
- M. R. Hosenkhan and B. K. Pattanayak, "Security issues in internet of things (IoT): a comprehensive review," New Paradigm in Decision Science and Management, pp. 359-369, 2020.
- M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, et al. "A survey of machine and deep learning methods for internet of things (IoT) security," IEEE Communications Surveys & Tutorials, vol. 22, pp. 1646-1685, 2020. https://doi.org/10.1109/COMST.2020.2988293
- B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, p. 100227, 2020. https://doi.org/10.1016/j.iot.2020.100227
- A. Mubarakali, K. Srinivasan, R. Mukhalid, S. C. Jaganathan, and N. Marina, "Security challenges in internet of things: Distributed denial of service attack detection using support vector machine-based expert systems," Computational Intelligence, vol. 36, pp. 1580-1592, 2020. https://doi.org/10.1111/coin.12293
- S. Benzarti, B. Triki, and O. Korbaa, "A survey on attacks in Internet of Things based networks," in 2017 International conference on engineering & MIS (ICEMIS), pp. 1-7, 2017.
- L. Hu, H. Wen, B. Wu, F. Pan, R.-F. Liao, et al., "Cooperative jamming for physical layer security enhancement in Internet of Things," IEEE Internet of Things Journal, vol. 5, pp. 219-228, 2017. https://doi.org/10.1109/jiot.2017.2778185
- J. Verbraeken, M. Wolting, J. Katzy, J. Kloppenburg, T. Verbelen, et al. "A survey on distributed machine learning," ACM Computing Surveys (CSUR), vol. 53, pp. 1-33, 2020.
- M. Aghbashlo, W. Peng, M. Tabatabaei, S. A. Kalogirou, S. Soltanian, et al., "Machine learning technology in biodiesel research: A review," Progress in Energy and Combustion Science, vol. 85, p. 100904, 2021. https://doi.org/10.1016/j.pecs.2021.100904
- M. Mahmud, M. S. Kaiser, A. Hussain, and S. Vassanelli, "Applications of deep learning and reinforcement learning to biological data," IEEE transactions on neural networks and learning systems, vol. 29, pp. 2063-2079, 2018. https://doi.org/10.1109/tnnls.2018.2790388
- Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, et al., "Detection of unauthorized IoT devices using machine learning techniques," arXiv preprint arXiv:1709.04647, 2017.
- R. Doshi, N. Apthorpe, and N. Feamster, "Machine learning ddos detection for consumer internet of things devices," in 2018 IEEE Security and Privacy Workshops (SPW), pp. 29-35, 2018.
- M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H. V. Poor, "Machine learning methods for attack detection in the smart grid," IEEE transactions on neural networks and learning systems, vol. 27, pp. 1773-1786, 2015. https://doi.org/10.1109/TNNLS.2015.2404803
- T. Alladi, V. Chamola, B. Sikdar, and K.-K. R. Choo, "Consumer IoT: Security vulnerability case studies and solutions," IEEE Consumer Electronics Magazine, vol. 9, pp. 17-25, 2020.
- O. A. Waraga, M. Bettayeb, Q. Nasir, and M. A. Talib, "Design and implementation of automated IoT security testbed," Computers & Security, vol. 88, p. 101648, 2020. https://doi.org/10.1016/j.cose.2019.101648
- V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, et al. "A survey on IoT security: application areas, security threats, and solution architectures," IEEE Access, vol. 7, pp. 82721-82743, 2019. https://doi.org/10.1109/access.2019.2924045
- A. Tewari and B. B. Gupta, "Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework," Future generation computer systems, vol. 108, pp. 909-920, 2020. https://doi.org/10.1016/j.future.2018.04.027
- R. Roman-Castro, J. Lopez, and S. Gritzalis, "Evolution and trends in IoT security," Computer, vol. 51, pp. 16-25, 2018.
- D. Minoli and B. Occhiogrosso, "Blockchain mechanisms for IoT security," Internet of Things, vol. 1, pp. 1-13, 2018. https://doi.org/10.1016/j.iot.2018.05.002
- M. A. Khan and K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future generation computer systems, vol. 82, pp. 395-411, 2018. https://doi.org/10.1016/j.future.2017.11.022
- M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, "A machine learning security framework for iot systems," IEEE Access, vol. 8, pp. 114066-114077, 2020. https://doi.org/10.1109/access.2020.2996214
- J. Li, "IOT security analysis of BDT-SVM multi-classification algorithm," International Journal of Computers and Applications, pp. 1-10, 2020.
- S. Sankaranarayanan and S. Mookherji, "SVM-based traffic data classification for secured IoT-based road signaling system," in Research Anthology on Artificial Intelligence Applications in Security, ed: IGI Global, pp. 1003-1030, 2021.
- D. Reising, J. Cancelleri, T. D. Loveless, F. Kandah, and A. Skjellum, "Radio identity verification-based IoT security using RF-DNA fingerprints and SVM," IEEE Internet of Things Journal, vol. 8, pp. 8356-8371, 2020.
- A. Thakkar and R. Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges," Archives of Computational Methods in Engineering, vol. 28, pp. 3211-3243, 2021. https://doi.org/10.1007/s11831-020-09496-0
- B. S. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, and B. V. Murthy, "Smart Safety and Security Solution for Women using kNN Algorithm and IoT," in 2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT), pp. 87-92, 2020.
- S. S. S. Sugi and S. R. Ratna, "Investigation of Machine Learning Techniques in Intrusion Detection System for IoT Network," in 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, pp. 1164-1167, 2020.
- M. Hosseinzadeh, A. M. Rahmani, B. Vo, M. Bidaki., M. Masdari, et al., "Improving security using SVM-based anomaly detection: issues and challenges, " Soft Computing, vol. 25(4), pp. 3195-3223, 2021. https://doi.org/10.1007/s00500-020-05373-x
- M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, "Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for Internet of Things in smart city, " Future Generation Computer Systems, vol. 107, pp. 433-442, 2020. https://doi.org/10.1016/j.future.2020.02.017
- W. He, Y. Liu, H. Yao, T. Mai, N. Zhang, et al., "Distributed variational bayes-based in-network security for the Internet of Things," IEEE Internet of Things Journal, vol. 8, pp. 6293-6304, 2020.
- M. Alsharif, and D. B. Rawat, "Study of machine learning for cloud assisted IoT security as a service," Sensors, vol. 21(4), p. 1034, 2021. https://doi.org/10.3390/s21041034
- M. Babar, M. U. Tariq, and M. A. Jan, "Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid," Sustainable Cities and Society, vol. 62, p. 102370, 2020. https://doi.org/10.1016/j.scs.2020.102370