Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa
{"title":"A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)","authors":"Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa","doi":"10.1007/s10207-024-00828-w","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"139 1","pages":""},"PeriodicalIF":2.4000,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Information Security","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10207-024-00828-w","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.
期刊介绍:
The International Journal of Information Security is an English language periodical on research in information security which offers prompt publication of important technical work, whether theoretical, applicable, or related to implementation.
Coverage includes system security: intrusion detection, secure end systems, secure operating systems, database security, security infrastructures, security evaluation; network security: Internet security, firewalls, mobile security, security agents, protocols, anti-virus and anti-hacker measures; content protection: watermarking, software protection, tamper resistant software; applications: electronic commerce, government, health, telecommunications, mobility.