首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems 多核系统上可成型团伙任务的非工作保护动态调度
Pub Date : 2024-03-01 DOI: 10.1016/j.iotcps.2024.03.001
Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama
{"title":"Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems","authors":"Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama","doi":"10.1016/j.iotcps.2024.03.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.03.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing immersive toy trial experience in mobile augmented reality 在移动增强现实技术中构建身临其境的玩具试用体验
Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.02.001
Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han
{"title":"Constructing immersive toy trial experience in mobile augmented reality","authors":"Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han","doi":"10.1016/j.iotcps.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139891880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma, Vijay Kumar, K. Dutta
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma, Vijay Kumar, K. Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.003","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139871865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalAware: A tabletop exercise for malware security awareness education and incident response training 恶意软件:恶意软件安全意识教育和事件响应培训桌面演练
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.02.003
Giddeon Angafor , Iryna Yevseyeva , Leandros Maglaras

Advancements in technology, including the Internet of Things (IoT) revolution, have enabled individuals and businesses to use systems and devices that connect, exchange data, and provide real-time information from far and near. Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. This paper discusses ’MalAware’, a ‘Malware Awareness Education’ and incident response (IR) scenario-based tabletop exercise and card game for malware threat mitigation training. It introduces the importance of incident management, highlights the dangers posed by malware for connected systems, and outlines the role of tabletop games and exercises in helping businesses mature their malware incident response capabilities. The study discusses the design of MalAware and summarises the results of 2 pilots undertaken to assess the concept, maintaining that the results highlighted the value of ‘MalAware’ as an essential tool to help students and staff master how to mitigate security threats caused by malware. It argues that MalAware can assist businesses in their IR preparedness endeavors, enabling incident management teams to review plans and processes to ensure they are fit for purpose. It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.

技术的进步,包括物联网(IoT)革命,使个人和企业能够使用连接、交换数据和提供实时信息的系统和设备。尽管如此,系统和设备之间通过互联网实现的互联和数据共享也带来了安全和隐私风险,因为威胁行为者可以拦截、窃取和使用所有者的数据来达到邪恶目的。本文讨论的 "恶意软件 "是一种基于 "恶意软件意识教育 "和事件响应(IR)情景的桌面演练和卡片游戏,用于恶意软件威胁缓解培训。它介绍了事件管理的重要性,强调了恶意软件给联网系统带来的危险,并概述了桌面游戏和演习在帮助企业提高恶意软件事件响应能力方面的作用。该研究讨论了恶意软件的设计,总结了为评估这一概念而进行的两次试点的结果,认为这些结果突出了 "恶意软件 "作为帮助学生和教职员工掌握如何减轻恶意软件造成的安全威胁的重要工具的价值。报告认为,"恶意软件 "可以帮助企业做好爱尔兰共和军的准备工作,使事件管理团队能够审查计划和流程,确保其符合目的。它使员工能够利用基于场景和模拟的安全漏洞实例(包括角色扮演)建立适当的恶意软件防御。MalAware 的实际操作练习可以帮助学员获得基本的恶意软件和其他威胁缓解技能,从而帮助保护物联网的安全和隐私。
{"title":"MalAware: A tabletop exercise for malware security awareness education and incident response training","authors":"Giddeon Angafor ,&nbsp;Iryna Yevseyeva ,&nbsp;Leandros Maglaras","doi":"10.1016/j.iotcps.2024.02.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.003","url":null,"abstract":"<div><p>Advancements in technology, including the Internet of Things (IoT) revolution, have enabled individuals and businesses to use systems and devices that connect, exchange data, and provide real-time information from far and near. Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. This paper discusses ’MalAware’, a ‘Malware Awareness Education’ and incident response (IR) scenario-based tabletop exercise and card game for malware threat mitigation training. It introduces the importance of incident management, highlights the dangers posed by malware for connected systems, and outlines the role of tabletop games and exercises in helping businesses mature their malware incident response capabilities. The study discusses the design of MalAware and summarises the results of 2 pilots undertaken to assess the concept, maintaining that the results highlighted the value of ‘MalAware’ as an essential tool to help students and staff master how to mitigate security threats caused by malware. It argues that MalAware can assist businesses in their IR preparedness endeavors, enabling incident management teams to review plans and processes to ensure they are fit for purpose. It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 280-292"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000063/pdfft?md5=61feca14037fa00f21581df14b5c4571&pid=1-s2.0-S2667345224000063-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-enhanced smart road infrastructure systems for comprehensive real-time monitoring 用于全面实时监控的物联网增强型智能道路基础设施系统
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.002
Zhoujing Ye , Ya Wei , Songli Yang , Pengpeng Li , Fei Yang , Biyu Yang , Linbing Wang

With the rapid advancement of Internet of Things (IoT) technology, its applications in road infrastructure have garnered attention. However, challenges persist when applying IoT to road infrastructure monitoring, including insufficient durability of front-end sensors, pavement damage due to sensor embedding, and the redundancy of a vast amount of real-time data, hindering the long-term real-time monitoring of pavements. To address these challenges, this study developed a self-powered distributed intelligent pavement monitoring system based on IoT, encompassing a sensor network, cloud platform, communication network, and power supply system. Considering the specific characteristics of slipform paving for cement concrete pavements, an integrated paving process was proposed, merging embedded sensors with pavement material structures. Through on-site engineering monitoring, the system actively collects and analyzes various data types such as system energy consumption, temperature and humidity, environmental noise, wind speed and direction, and pavement structural vibrations, providing data support for pavement design, maintenance, and vehicle-road synergy applications. Future efforts will continue to promote the application of IoT technology in digital road maintenance, traffic safety, and optimized pavement material structure design.

随着物联网(IoT)技术的快速发展,其在道路基础设施中的应用也备受关注。然而,将物联网应用于道路基础设施监测仍存在一些挑战,包括前端传感器的耐用性不足、传感器嵌入造成的路面损坏以及海量实时数据的冗余性阻碍了对路面的长期实时监测。针对这些挑战,本研究开发了一种基于物联网的自供电分布式智能路面监测系统,包括传感器网络、云平台、通信网络和供电系统。考虑到水泥混凝土路面滑模摊铺的特殊性,提出了将嵌入式传感器与路面材料结构相结合的一体化摊铺工艺。通过现场工程监测,系统主动收集并分析系统能耗、温湿度、环境噪声、风速风向、路面结构振动等各类数据,为路面设计、养护和车路协同应用提供数据支持。未来将继续推动物联网技术在数字化道路养护、交通安全、路面材料结构优化设计等方面的应用。
{"title":"IoT-enhanced smart road infrastructure systems for comprehensive real-time monitoring","authors":"Zhoujing Ye ,&nbsp;Ya Wei ,&nbsp;Songli Yang ,&nbsp;Pengpeng Li ,&nbsp;Fei Yang ,&nbsp;Biyu Yang ,&nbsp;Linbing Wang","doi":"10.1016/j.iotcps.2024.01.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.002","url":null,"abstract":"<div><p>With the rapid advancement of Internet of Things (IoT) technology, its applications in road infrastructure have garnered attention. However, challenges persist when applying IoT to road infrastructure monitoring, including insufficient durability of front-end sensors, pavement damage due to sensor embedding, and the redundancy of a vast amount of real-time data, hindering the long-term real-time monitoring of pavements. To address these challenges, this study developed a self-powered distributed intelligent pavement monitoring system based on IoT, encompassing a sensor network, cloud platform, communication network, and power supply system. Considering the specific characteristics of slipform paving for cement concrete pavements, an integrated paving process was proposed, merging embedded sensors with pavement material structures. Through on-site engineering monitoring, the system actively collects and analyzes various data types such as system energy consumption, temperature and humidity, environmental noise, wind speed and direction, and pavement structural vibrations, providing data support for pavement design, maintenance, and vehicle-road synergy applications. Future efforts will continue to promote the application of IoT technology in digital road maintenance, traffic safety, and optimized pavement material structure design.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 235-249"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000026/pdfft?md5=e2593131eb914f50ce726004b9037d6b&pid=1-s2.0-S2667345224000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139718721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges 网络物理系统中的勒索软件:分类、案例研究、安全漏洞和公开挑战
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.001
Mourad Benmalek

Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control systems, smart grids, and healthcare networks. The unique attack surface and safety-critical nature of CPS introduce new challenges in defending against ransomware. This paper provides a comprehensive overview of ransomware threats to CPS. We propose a dual taxonomy to classify ransomware attacks on CPS based on infection vectors, targets, objectives, and technical attributes. Through an analysis of 10 real-world incidents, we highlight attack patterns, vulnerabilities, and impacts of ransomware campaigns against critical systems and facilities. Based on the insights gained, we identify open research problems and future directions to improve ransomware resilience in CPS environments.

勒索软件攻击已成为全球组织面临的最重要的网络威胁之一。近年来,勒索软件也开始瞄准关键基础设施和网络物理系统(CPS),如工业控制系统、智能电网和医疗保健网络。CPS 独特的攻击面和安全关键性为防御勒索软件带来了新的挑战。本文全面概述了勒索软件对 CPS 的威胁。我们提出了一种双重分类法,根据感染载体、目标、目的和技术属性对针对 CPS 的勒索软件攻击进行分类。通过对 10 起真实事件的分析,我们强调了针对关键系统和设施的勒索软件活动的攻击模式、漏洞和影响。根据所获得的见解,我们确定了改进 CPS 环境中勒索软件复原力的开放研究问题和未来方向。
{"title":"Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges","authors":"Mourad Benmalek","doi":"10.1016/j.iotcps.2023.12.001","DOIUrl":"10.1016/j.iotcps.2023.12.001","url":null,"abstract":"<div><p>Ransomware attacks have emerged as one of the most significant cyberthreats faced by organizations worldwide. In recent years, ransomware has also started to target critical infrastructure and Cyber-Physical Systems (CPS) such as industrial control systems, smart grids, and healthcare networks. The unique attack surface and safety-critical nature of CPS introduce new challenges in defending against ransomware. This paper provides a comprehensive overview of ransomware threats to CPS. We propose a dual taxonomy to classify ransomware attacks on CPS based on infection vectors, targets, objectives, and technical attributes. Through an analysis of 10 real-world incidents, we highlight attack patterns, vulnerabilities, and impacts of ransomware campaigns against critical systems and facilities. Based on the insights gained, we identify open research problems and future directions to improve ransomware resilience in CPS environments.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 186-202"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000561/pdfft?md5=4e1f20e6c28b32ae59f1f757ef9b4c6b&pid=1-s2.0-S2667345223000561-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data management method for building internet of things based on blockchain sharding and DAG 基于区块链分片和 DAG 构建物联网的数据管理方法
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.001
Wenhu Zheng, Xu Wang, Zhenxi Xie, Yixin Li, Xiaoyun Ye, Jinlong Wang, Xiaoyun Xiong

Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT). However, existing sharding solutions focus on addressing issues like malicious nodes clustering and cross-shard transactions. Existing sharding solutions cannot adapt to the performance disparities of edge nodes and the characteristic of three-dimensional data queries in building IoT. This leads to problems such as shard overheating and inefficient data query efficiency. This paper proposes a dual-layer architecture called S-DAG, which combines sharded blockchain and DAG blockchain. The sharded blockchain processes transactions within the building IoT, while the DAG blockchain stores block headers from the sharded network. By designing an Adaptive Balancing Load Algorithm (ABLA) for periodic network sharding, nodes are divided based on their load performance values to prevent the aggregation of low-load performance nodes and the resulting issue of shard overheating. By combining the characteristics of the KD tree and Merkle tree, a block structure known as 3D-Merkle tree is designed to support three-dimensional data queries, enhancing the efficiency of three-dimensional data queries in building IoT. By deploying and conducting simulation experiments on various physical devices, we have verified the effectiveness of the solution proposed in this paper. The results indicate that, compared to other solutions, the proposed solution is better suited for building IoT data management. ABLA is effective in preventing shard overheating issue, and the 3D-Merkle tree significantly enhances data query efficiency.

在物联网(IoT)中应用单链区块链时,分片技术可以解决吞吐量和可扩展性方面的限制。然而,现有的分片解决方案侧重于解决恶意节点集群和跨分片交易等问题。现有的分片解决方案无法适应边缘节点的性能差异和构建物联网中三维数据查询的特点。这导致了分片过热和数据查询效率低下等问题。本文提出了一种名为 S-DAG 的双层架构,它结合了分片区块链和 DAG 区块链。分片区块链处理建筑物联网内的交易,而 DAG 区块链存储来自分片网络的区块头。通过为周期性网络分片设计自适应平衡负载算法(ABLA),根据节点的负载性能值对节点进行划分,以防止低负载性能节点的聚集和由此导致的分片过热问题。结合KD树和Merkle树的特点,设计了一种支持三维数据查询的块结构,即3D-Merkle树,提高了楼宇物联网中三维数据查询的效率。通过在各种物理设备上进行部署和模拟实验,我们验证了本文提出的解决方案的有效性。结果表明,与其他解决方案相比,本文提出的解决方案更适合楼宇物联网数据管理。ABLA 能有效防止碎片过热问题,3D-Merkle 树能显著提高数据查询效率。
{"title":"Data management method for building internet of things based on blockchain sharding and DAG","authors":"Wenhu Zheng,&nbsp;Xu Wang,&nbsp;Zhenxi Xie,&nbsp;Yixin Li,&nbsp;Xiaoyun Ye,&nbsp;Jinlong Wang,&nbsp;Xiaoyun Xiong","doi":"10.1016/j.iotcps.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.001","url":null,"abstract":"<div><p>Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT). However, existing sharding solutions focus on addressing issues like malicious nodes clustering and cross-shard transactions. Existing sharding solutions cannot adapt to the performance disparities of edge nodes and the characteristic of three-dimensional data queries in building IoT. This leads to problems such as shard overheating and inefficient data query efficiency. This paper proposes a dual-layer architecture called S-DAG, which combines sharded blockchain and DAG blockchain. The sharded blockchain processes transactions within the building IoT, while the DAG blockchain stores block headers from the sharded network. By designing an Adaptive Balancing Load Algorithm (ABLA) for periodic network sharding, nodes are divided based on their load performance values to prevent the aggregation of low-load performance nodes and the resulting issue of shard overheating. By combining the characteristics of the KD tree and Merkle tree, a block structure known as 3D-Merkle tree is designed to support three-dimensional data queries, enhancing the efficiency of three-dimensional data queries in building IoT. By deploying and conducting simulation experiments on various physical devices, we have verified the effectiveness of the solution proposed in this paper. The results indicate that, compared to other solutions, the proposed solution is better suited for building IoT data management. ABLA is effective in preventing shard overheating issue, and the 3D-Merkle tree significantly enhances data query efficiency.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 217-234"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000014/pdfft?md5=4cbb598cfddbffa06e124be5e2862437&pid=1-s2.0-S2667345224000014-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139718720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma , Vijay Kumar , Kamlesh Dutta

The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.

由于数字革命和业务量的增加,入侵检测系统在网络中的重要性与日俱增。入侵检测方法根据数据特征对网络流量进行威胁或正常分类。入侵检测系统面临着检测准确性、相关性、冗余性、误报率等各种参数和其他目标之间的权衡。本文系统回顾了物联网(IoT)网络中使用多目标优化算法(MOA)进行入侵检测的情况,以识别利用安全漏洞的企图,降低安全攻击的几率。MOA 为高度复杂的物联网网络中的入侵检测过程提供了一套优化解决方案。本文介绍了入侵检测多目标的识别、基于其方法的物联网入侵检测多目标算法的比较分析以及用于评估的数据集。多目标优化算法显示了物联网网络在增强入侵检测的多重冲突目标方面令人鼓舞的潜力。此外,还确定了当前的挑战和未来的研究思路。除了展示入侵检测技术的新进展外,本研究还试图找出在设计物联网网络入侵检测系统时可以解决的研究空白。
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma ,&nbsp;Vijay Kumar ,&nbsp;Kamlesh Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"10.1016/j.iotcps.2024.01.003","url":null,"abstract":"<div><p>The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 258-267"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000038/pdfft?md5=19510c1690405bb751695fbd58ac122c&pid=1-s2.0-S2667345224000038-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139812070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card default prediction using ML and DL techniques 利用 ML 和 DL 技术预测信用卡违约情况
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.09.001
Fazal Wahab , Imran Khan , Sneha Sabada

The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typically serve as intermediaries for loans, investments, short-term loans, and other types of credit. The usage of credit cards is experiencing a steady increase, thereby leading to a rise in the default rate that banks encounter. Although there has been much research investigating the efficacy of conventional Machine Learning (ML) models, there has been relatively less emphasis on Deep Learning (DL) techniques. The application of DL approaches to credit card default prediction has not been extensively researched despite their considerable potential in numerous fields. Moreover, the current literature frequently lacks particular information regarding the DL structures, hyperparameters, and optimization techniques employed. To predict credit card default, this study evaluates the efficacy of a DL model and compares it to other ML models, such as Decision Tree (DT) and Adaboost. The objective of this research is to identify the specific DL parameters that contribute to the observed enhancements in the accuracy of credit card default prediction. This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. Subsequently, various techniques are employed to preprocess the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). Furthermore, the algorithms are hypertuned to evaluate the enhancement in prediction. We used standard evaluation metrics to evaluate all the models. The evaluation indicates that the AdaBoost and DT exhibit the highest accuracy rate of 82 ​% in predicting credit card default, surpassing the accuracy of the ANN model, which is 78 ​%.

银行业因其固有的不可预测性和易受风险影响而广为人知。在过去几十年中,银行贷款已成为最新提供的服务之一。银行通常是贷款、投资、短期贷款和其他类型信贷的中介。信用卡的使用率正在稳步上升,从而导致银行遇到的违约率上升。尽管对传统机器学习(ML)模型的功效进行了大量研究,但对深度学习(DL)技术的重视程度相对较低。尽管深度学习方法在许多领域都具有相当大的潜力,但将其应用于信用卡违约预测的研究却并不广泛。此外,目前的文献经常缺乏有关深度学习结构、超参数和优化技术的具体信息。为了预测信用卡违约,本研究评估了 DL 模型的功效,并将其与决策树 (DT) 和 Adaboost 等其他 ML 模型进行了比较。本研究的目的是找出有助于提高信用卡违约预测准确性的特定 DL 参数。本研究利用 UCI ML 资源库访问信用卡违约客户数据集。随后,采用各种技术对未经处理的数据进行预处理,并通过探索性数据分析(EDA)直观地展示结果。此外,还对算法进行了超调,以评估预测的增强效果。我们使用标准评估指标对所有模型进行评估。评估结果表明,AdaBoost 和 DT 预测信用卡违约的准确率最高,达到 82%,超过 ANN 模型的 78%。
{"title":"Credit card default prediction using ML and DL techniques","authors":"Fazal Wahab ,&nbsp;Imran Khan ,&nbsp;Sneha Sabada","doi":"10.1016/j.iotcps.2024.09.001","DOIUrl":"10.1016/j.iotcps.2024.09.001","url":null,"abstract":"<div><p>The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typically serve as intermediaries for loans, investments, short-term loans, and other types of credit. The usage of credit cards is experiencing a steady increase, thereby leading to a rise in the default rate that banks encounter. Although there has been much research investigating the efficacy of conventional Machine Learning (ML) models, there has been relatively less emphasis on Deep Learning (DL) techniques. The application of DL approaches to credit card default prediction has not been extensively researched despite their considerable potential in numerous fields. Moreover, the current literature frequently lacks particular information regarding the DL structures, hyperparameters, and optimization techniques employed. To predict credit card default, this study evaluates the efficacy of a DL model and compares it to other ML models, such as Decision Tree (DT) and Adaboost. The objective of this research is to identify the specific DL parameters that contribute to the observed enhancements in the accuracy of credit card default prediction. This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. Subsequently, various techniques are employed to preprocess the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). Furthermore, the algorithms are hypertuned to evaluate the enhancement in prediction. We used standard evaluation metrics to evaluate all the models. The evaluation indicates that the AdaBoost and DT exhibit the highest accuracy rate of 82 ​% in predicting credit card default, surpassing the accuracy of the ANN model, which is 78 ​%.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 293-306"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000087/pdfft?md5=f77f275cf416221418432e3c1d730036&pid=1-s2.0-S2667345224000087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models 物联网安全的机器学习技术:使用生成式人工智能和大型语言模型的当前研究和未来展望
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.003
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi

Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. Integrating emerging technologies to address these concerns becomes imperative as the dynamic IoT landscape evolves. Machine Learning (ML), a rapidly advancing technology, has shown considerable promise in addressing IoT security issues. It has significantly influenced and advanced research in cyber threat detection. This survey provides a comprehensive overview of current trends, methodologies, and challenges in applying machine learning for cyber threat detection in IoT environments. Specifically, we further perform a comparative analysis of state-of-the-art ML-based Intrusion Detection Systems (IDSs) in the landscape of IoT security. In addition, we shed light on the pressing unresolved issues and challenges within this dynamic field. We provide a future vision with Generative AI and large language models to enhance IoT security. The discussions present an in-depth understanding of different cyber threat detection methods, enhancing the knowledge base of researchers and practitioners alike. This paper is a valuable resource for those keen to delve into the evolving world of cyber threat detection leveraging ML and IoT security.

尽管物联网(IoT)生态系统提供了无与伦比的连接性和便利性,但其指数级增长也引发了重大的网络安全问题。这些问题源于多种因素,包括物联网设备的异构性、广泛部署以及固有的计算局限性。随着动态物联网环境的发展,整合新兴技术以解决这些问题变得势在必行。机器学习(ML)是一项快速发展的技术,在解决物联网安全问题方面已显示出相当大的前景。它极大地影响并推动了网络威胁检测方面的研究。本调查全面概述了在物联网环境中应用机器学习进行网络威胁检测的当前趋势、方法和挑战。具体来说,我们进一步对物联网安全领域最先进的基于 ML 的入侵检测系统(IDS)进行了比较分析。此外,我们还揭示了这一动态领域中尚未解决的紧迫问题和挑战。我们提出了利用生成式人工智能和大型语言模型加强物联网安全的未来愿景。讨论深入介绍了不同的网络威胁检测方法,增强了研究人员和从业人员的知识基础。对于那些热衷于利用人工智能和物联网安全深入研究不断发展的网络威胁检测领域的人来说,本文是一份宝贵的资料。
{"title":"Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models","authors":"Fatima Alwahedi,&nbsp;Alyazia Aldhaheri,&nbsp;Mohamed Amine Ferrag,&nbsp;Ammar Battah,&nbsp;Norbert Tihanyi","doi":"10.1016/j.iotcps.2023.12.003","DOIUrl":"10.1016/j.iotcps.2023.12.003","url":null,"abstract":"<div><p>Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. Integrating emerging technologies to address these concerns becomes imperative as the dynamic IoT landscape evolves. Machine Learning (ML), a rapidly advancing technology, has shown considerable promise in addressing IoT security issues. It has significantly influenced and advanced research in cyber threat detection. This survey provides a comprehensive overview of current trends, methodologies, and challenges in applying machine learning for cyber threat detection in IoT environments. Specifically, we further perform a comparative analysis of state-of-the-art ML-based Intrusion Detection Systems (IDSs) in the landscape of IoT security. In addition, we shed light on the pressing unresolved issues and challenges within this dynamic field. We provide a future vision with Generative AI and large language models to enhance IoT security. The discussions present an in-depth understanding of different cyber threat detection methods, enhancing the knowledge base of researchers and practitioners alike. This paper is a valuable resource for those keen to delve into the evolving world of cyber threat detection leveraging ML and IoT security.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 167-185"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000585/pdfft?md5=d4450c6f6b2d36d74f0de919ecba7bd9&pid=1-s2.0-S2667345223000585-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1