References
- L. Lee and K. Lee, The Internet of Things (IoT): Applications, investments, and challenges for enterprises, Bus. Horiz. 4 (2015), 431-440. https://doi.org/10.1016/j.bushor.2015.03.008
- M. M. Noor and W. H. Hassan, Current research on Internet of Things (IoT) security: A survey, Comput. Netw. 148 (2019), 283-294. https://doi.org/10.1016/j.comnet.2018.11.025
- E. B. Priyanka, C. Maheswari, and S. Thangavel, A smart-integrated IoT module for intelligent transportation in oil industry, Int. J. Numer. Model. 1 (2020), article no. e2731.
- L. Garcia et al., IoT-based smart irrigation systems: An overview on the recent trends on sensors and IoT systems for irrigation in precision agriculture, Sensors 20 (2020), article no. 1042.
- F. Mehmood et al., A novel approach towards the design and implementation of virtual network based on controller in future IoT applications, Electronics 9 (2020), article no. 604.
- F. John Dian, R. Vahidnia, and A. Rahmati, Wearables and the Internet of Things (IoT), applications, opportunities, and challenges: A survey, IEEE Access 8 (2020), 69200-69211. https://doi.org/10.1109/access.2020.2986329
- K. Ashton, That 'Internet of Things' thing, 2009, Available from: http://www.rfidjournal.com/articles/view?4986
- K. Shafique et al., Internet of Things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios, IEEE Access 8 (2020), 23022-23040. https://doi.org/10.1109/access.2020.2970118
- L. Greco et al., Trends in IoT based solutions for health care: Moving AI to the edge, Pattern Recognit. Lett. 135 (2020), 346-353. https://doi.org/10.1016/j.patrec.2020.05.016
- F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, An overview of security and privacy in smart cities IoT communications, Trans. Emerg. Telecommun. Technol. (2019), e3677.
- V. Hassija et al., A survey on IoT security: Application areas, security threats, and solution architectures, IEEE Access 7 (2019), 82721-82743. https://doi.org/10.1109/access.2019.2924045
- N. Chaabouni et al., Network intrusion detection for IoT security based on learning techniques, IEEE Commun. Surv. Tutor. 21 (2019), 2671-2701. https://doi.org/10.1109/COMST.2019.2896380
- M. Gajewski et al., Anomaly traffic detection and correlation in smart home automation IoT systems, Trans. Emerg. Telecommun. Technol. 1 (2020), article no. e4053.
- L. Chettri and R. Bera, A comprehensive survey on Internet of Things (IoT) toward 5G wireless systems, IEEE Internet Things J. 7 (2020), 16-32. https://doi.org/10.1109/jiot.2019.2948888
- M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, Intrusion detection systems for IoT-based smart environments: A survey, J. Cloud Comput. 7 (2018), 1-20. https://doi.org/10.1186/s13677-017-0102-3
- M. D. S. S. Romeo, Intrusion detection system (IDS) in Internet of Things (IoT) devices for smart home, Int. J. Psychosoc. Rehabil. 23 (2019), 1217-1227.
- S. N. Mohanty et al., An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy, Future Gener. Comput. Syst. 102 (2020), 1027-1037. https://doi.org/10.1016/j.future.2019.09.050
- Y. Maleh and A. Ezzati, Towards an efficient datagram transport layer security for constrained applications in Internet of Things, Int. Rev. Comput. Softw. 11 (2016), 611-621.
- P. Sudhakaran, Energy efficient distributed lightweight authentication and encryption technique for IoT security, Int. J. Commun. Syst. (2019), article no. e4198.
- J. Kari, Theory of cellular automata: A survey, Theor. Comput. Sci. 334 (2005), 3-33. https://doi.org/10.1016/j.tcs.2004.11.021
- H. H. Pajouh et al., A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks, IEEE Trans. Emerg. Topics Comput. Secur. 7 (2019), no. 2, 314-323. https://doi.org/10.1109/TETC.2016.2633228
- R. Rani, S. Kumar, and U. Dohare, Trust evaluation for light weight security in sensor enabled Internet of Things: Game theory oriented approach, IEEE Internet Things J. 6 (2019), 8421-8432. https://doi.org/10.1109/jiot.2019.2917763
- T. D. Nguyen et al., DI OT: A federated self-learning anomaly detection system for IoT, in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), (Dallas, TX, USA), July 2019.
- H. Zhu et al., Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks, Int. J. Distrib. Sens. Netw. 14 (2018), no. 11, 1-15.
- D. Airehrour, J. Gutierrez, and S. Kumar Ray, A lightweight trust design for IoT routing, in Proc. IEEE Int. Conf. Dependable, Auton. Secure Comput. & Int. Conf. Pervasive Intell. Comput. & Int. Conf. Big Data Intell. Comput. Cyber Sci. Technol. Congr. (DASC/PiCom/DataCom/CyberSciTech), (Auckland, New Zealand), Aug. 2016.
- Y. Fu et al., An automata based intrusion detection method for Internet of Things, Mob. Inf. Syst. 2017 (2017), 1-13.
- X. Yan et al., Trustworthy network anomaly detection based on an adaptive learning rate and momentum in IIoT, IEEE Trans. Industr. Inform. 16 (2020), no. 9, 6182-6192. https://doi.org/10.1109/tii.2020.2975227
- H. Wu and W. Wang, A game theory based collaborative security detection method for Internet of Things systems, IEEE Trans. Inf. Forensics Secur. 13 (2018), no. 6, 1432-1445. https://doi.org/10.1109/tifs.2018.2790382
- T. Gu et al., Towards learning-automation IoT attack detection through reinforcement learning, in Proc. IEEE Int. Symp. World Wirel. Mob. Multimed. Netw. (WoWMoM), (Cork, Ireland), Aug. 2020.
- S. Venkatraman and B. Surendiran, Adaptive hybrid intrusion detection system for crowd sourced multimedia Internet of Things systems, Multimed. Tools Appl. 79 (2020), 3993-4010. https://doi.org/10.1007/s11042-019-7495-6
- A. A. Diro and N. Chilamkurti, Distributed attack detection scheme using deep learning approach for Internet of Things, Future Gener. Comput. Syst. 82 (2018), 761-768. https://doi.org/10.1016/j.future.2017.08.043
- S. Rezvy et al., An efficient deep learning model for intrusion classification and prediction in 5G and IoT networks, in Proc. Annu. Conf. Inf. Sci. Syst. (CISS), (Baltimore, MD, USA), Mar. 2019, 1-6.
- B. Hussain et al., Deep learning-based DDoS-attack detection for cyber-physical system over 5G network, IEEE Trans. Industr. Inform. 17 (2021), no. 2, 860-870. https://doi.org/10.1109/tii.2020.2974520
- W. Q. Li, Q. Yu, and L. X. Ma, Cellular automata-based WSN energy saving technology, Adv. Mat. Res. 546-547 (2012), 1334-1339. https://doi.org/10.4028/www.scientific.net/AMR.546-547.1334