{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:28:27Z","timestamp":1773840507858,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:00:00Z","timestamp":1642896000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:00:00Z","timestamp":1642896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s00521-021-06823-9","type":"journal-article","created":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T00:03:55Z","timestamp":1642896235000},"page":"6927-6952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6416-2143","authenticated-orcid":false,"given":"Syed Rameem","family":"Zahra","sequence":"first","affiliation":[]},{"given":"Mohammad Ahsan","family":"Chishti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,23]]},"reference":[{"issue":"5","key":"6823_CR1","doi-asserted-by":"publisher","first-page":"2985","DOI":"10.1109\/TII.2020.3023507","volume":"17","author":"M Serror","year":"2020","unstructured":"Serror M, Hack S, Henze M, Schuba M, Wehrle K (2020) Challenges and opportunities in securing the industrial Internet of Things. IEEE Trans Ind Inf 17(5):2985\u20132996","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"6823_CR2","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","volume":"22","author":"MA Al-Garadi","year":"2020","unstructured":"Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Commun Surv Tutor 22(3):1646\u20131685","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"6823_CR3","first-page":"457","volume":"20","author":"SR Zahra","year":"2019","unstructured":"Zahra SR, Chishti MA (2019) Assesing the services, security threaths, challenges and solutions in the Internet of Things. Scal Comput: Pract Exp 20(3):457\u2013484","journal-title":"Scal Comput: Pract Exp"},{"key":"6823_CR4","unstructured":"Arbuckle A (2020) Addressing IoT device security head-on. https:\/\/www.securityweek.com\/addressing-iot-device-security-head. Accessed 20 Nov 2020"},{"key":"6823_CR5","unstructured":"National Law Review (2020) Buyer beware: the Internet of Things comes under new cyber attack from multiple fronts. https:\/\/www.natlawreview.com\/article\/buyer-beware-internet-things-comes-under-new-cyber-attack-multiple-fronts. Accessed 18 Dec 2020"},{"key":"6823_CR6","unstructured":"Burke M (2020) Man hacks RING camera in 8-year-old girl's bedroom, taunts her: 'I'm Santa Claus'. https:\/\/www.nbcnews.com\/news\/us-news\/man-hacks-ring-camera-8-year-old-girl-s-bedroom-n1100586. Accessed 20 Dec 2020"},{"key":"6823_CR7","unstructured":"Hanrahan M (2020) Ring security camera hacks see homeowners subjected to racial abuse, ransom demands. https:\/\/abcnews.go.com\/US\/ring-security-camera-hacks-homeowners-subjected-racial-abuse\/story?id=67679790#:~:text=Ring%20camera%20systems%20being%20hacked,-Multiple%20U.S.%20families&text=Owners%20of%20Ring%20security%20cameras,demanded%20a%20ransom%20in%20Bitcoin. Accessed 20 Dec 2020"},{"key":"6823_CR8","unstructured":"Fier J (2020) Smart, or not so smart? What the ring hacks tell Us about the future of IoT. https:\/\/www.securityweek.com\/smart-or-not-so-smart-what-ring-hacks-tell-us-about-future-iot. Accessed 21 December 2020"},{"key":"6823_CR9","unstructured":"Haji S (2020) Essential IIoT security trends for 2020. https:\/\/www.securityweek.com\/essential-iiot-security-trends-2020. Accessed 23 Dec 2020"},{"key":"6823_CR10","unstructured":"Ballard B (2020) Millions of smart devices could still have major security flaws. https:\/\/www.techradar.com\/in\/news\/millions-of-smart-devices-could-still-have-major-security-flaws. Accessed 26 Dec 2020"},{"key":"6823_CR11","unstructured":"Holst A (2021) Global IoT end-user spending worldwide 2017\u20132025. https:\/\/www.statista.com\/statistics\/976313\/global-iot-market-size\/#:~:text=The%20global%20market%20for%20Internet,around%201.6%20trillion%20by%202025. Accessed 05 Jan 2021"},{"key":"6823_CR12","unstructured":"Verified Market Research (2021) Internet of Things (IoT) Market worth $1319.08 Billion, Globally, by 2026 at 25.68% CAGR: verified market research. https:\/\/www.prnewswire.com\/news-releases\/internet-of-things-iot-market-worth-1319-08-billion-globally-by-2026-at-25-68-cagr-verified-market-research-301092982.html. Accessed 06 January 2021"},{"key":"6823_CR13","unstructured":"Matthews K (2021) What do IoT hacks cost the economy? https:\/\/www.iotforall.com\/iot-hacks-cost#:~:text=Attacks%20Damage%20Revenue&text=The%20survey%20polled%20approximately%20400,13.4%20percent%20of%20annual%20revenue. Accessed 08 Jan 2021"},{"key":"6823_CR14","unstructured":"Kleinman L (2021) Attack from DOS: in zero we trust. https:\/\/securitybrief.co.nz\/story\/attack-from-dos-in-zero-we-trust. Accessed 10 Jan 2021"},{"key":"6823_CR15","unstructured":"Ponemon Institute (2021) 2018 Cost of insider threats: global. https:\/\/www.insiderthreatdefense.us\/pdf\/Ponemon%20Institute%202018%20Report%20-%20The%20True%20Cost%20Of%20Insider%20Threats%20Revealed.pdf. Accessed 12 Jan 2021"},{"key":"6823_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02128-2","author":"SR Zahra","year":"2020","unstructured":"Zahra SR, Chishti MA (2020) Fuzzy logic and fog based secure architecture for Internet of Things (FLFSIoT). J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02128-2","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3\u20134","key":"6823_CR17","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/BF00485052","volume":"30","author":"LA Zadeh","year":"1975","unstructured":"Zadeh LA (1975) Fuzzy logic and approximate reasoning. Synthese 30(3\u20134):407\u2013428","journal-title":"Synthese"},{"key":"6823_CR18","unstructured":"SOS children\u2019s villages Canada (2020) Poverty in India: two-third of people are considered extremely poor. https:\/\/www.soschildrensvillages.ca\/news\/poverty-in-india602#:~:text=Two%2Dthirds%20of%20people%20in,they%20are%20considered%20extremely%20poor. Accessed 22 Dec 2020"},{"issue":"4","key":"6823_CR19","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh LA (1988) Fuzzy logic. Computer 21(4):83\u201393","journal-title":"Computer"},{"key":"6823_CR20","unstructured":"TM Forum (2020) 70 percent of IoT devices \u2018vulnerable to attack\u2019. https:\/\/inform.tmforum.org\/news\/2014\/07\/70-percent-iot-devices-vulnerable-attack\/. Accessed 27 Dec 2020"},{"issue":"3","key":"6823_CR21","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353","journal-title":"Inf Control"},{"issue":"6","key":"6823_CR22","doi-asserted-by":"publisher","first-page":"748","DOI":"10.15837\/ijccc.2017.6.3111","volume":"12","author":"I Dzitac","year":"2017","unstructured":"Dzitac I, Filip FG, Manolescu MJ (2017) Fuzzy logic is not fuzzy: world-renowned computer scientist Lotfi A. Zadeh. Int J Comput Commun Control 12(6):748\u201389","journal-title":"Int J Comput Commun Control"},{"issue":"1","key":"6823_CR23","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/81.739259","volume":"46","author":"LA Zadeh","year":"1999","unstructured":"Zadeh LA (1999) From computing with numbers to computing with words. From manipulation of measurements to manipulation of perceptions. IEEE Trans Circuits Syst I: Fundam Theor Appl 46(1):105\u201319","journal-title":"IEEE Trans Circuits Syst I: Fundam Theor Appl"},{"issue":"1","key":"6823_CR24","first-page":"73","volume":"22","author":"LA Zadeh","year":"2001","unstructured":"Zadeh LA (2001) A new direction in AI: toward a computational theory of perceptions. AI Mag 22(1):73\u201373","journal-title":"AI Mag"},{"issue":"1","key":"6823_CR25","doi-asserted-by":"publisher","first-page":"118","DOI":"10.3390\/s16010118","volume":"16","author":"A Mathur","year":"2016","unstructured":"Mathur A, Newe T, Rao M (2016) Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors 16(1):118","journal-title":"Sensors"},{"issue":"9","key":"6823_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-019-03143-7","volume":"76","author":"B Seyedi","year":"2020","unstructured":"Seyedi B, Fotohi R (2020) NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things. The J Supercomput 76(9):1\u201324","journal-title":"The J Supercomput"},{"key":"6823_CR27","doi-asserted-by":"crossref","unstructured":"Mabodi K, Yusefi M, Zandiyan S, Irankhah L, Fotohi R (2020) Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J Supercomput: 1\u201326.","DOI":"10.1007\/s11227-019-03137-5"},{"key":"6823_CR28","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1016\/j.future.2016.11.024","volume":"78","author":"P Vijayakumar","year":"2018","unstructured":"Vijayakumar P, Chang V, Deborah LJ, Balusamy B, Shynu PG (2018) Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks. Futur Gener Comput Syst 78:943\u2013955","journal-title":"Futur Gener Comput Syst"},{"key":"6823_CR29","doi-asserted-by":"crossref","unstructured":"Yaseen Q, Jararweh Y, Al-Ayyoub M, AlDwairi M (2017) Collusion attacks in internet of things: detection and mitigation using a fog based model. In: 2017 IEEE sensors applications symposium (SAS). IEEE. pp. 1\u20135","DOI":"10.1109\/SAS.2017.7894031"},{"key":"6823_CR30","doi-asserted-by":"crossref","unstructured":"Ouechtati H, Azzouna NB, Said LB (2019) A fuzzy logic based trust-ABAC model for the Internet of Things. In: International conference on advanced information networking and applications. Springer, Cham. pp. 1157\u20131168","DOI":"10.1007\/978-3-030-15032-7_97"},{"issue":"2","key":"6823_CR31","doi-asserted-by":"publisher","first-page":"25","DOI":"10.4018\/IJGHPC.2020040102","volume":"12","author":"TA Srinivas","year":"2020","unstructured":"Srinivas TA, Manivannan SM (2020) Preventing collaborative black hole attack in IoT construction using a CBHA\u2013AODV routing protocol. Int J Grid High Perform Comput (IJGHPC) 12(2):25\u201346","journal-title":"Int J Grid High Perform Comput (IJGHPC)"},{"key":"6823_CR32","doi-asserted-by":"publisher","first-page":"102343","DOI":"10.1016\/j.scs.2020.102343","volume":"61","author":"KN Qureshi","year":"2020","unstructured":"Qureshi KN, Rana SS, Ahmed A, Jeon G (2020) A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain Cities Soc 61:102343","journal-title":"Sustain Cities Soc"},{"key":"6823_CR33","doi-asserted-by":"crossref","unstructured":"Ribera EG, Alvarez BM, Samuel C, Ioulianou PP, Vassilakis VG (2020) Heartbeat-based detection of blackhole and greyhole attacks in RPL networks. In: 2020 12th international symposium on communication systems, networks and digital signal processing (CSNDSP). IEEE. pp. 1\u20136","DOI":"10.1109\/CSNDSP49049.2020.9249519"},{"issue":"8","key":"6823_CR34","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"S Raza","year":"2013","unstructured":"Raza S, Wallgren L, Voigt T (2013) SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw 11(8):2661\u20132674","journal-title":"Ad Hoc Netw"},{"key":"6823_CR35","doi-asserted-by":"publisher","first-page":"106436","DOI":"10.1016\/j.ymssp.2019.106436","volume":"136","author":"J Arshad","year":"2020","unstructured":"Arshad J, Azad MA, Abdeltaif MM, Salah K (2020) An intrusion detection framework for energy constrained IoT devices. Mech Syst Sign Process 136:106436","journal-title":"Mech Syst Sign Process"},{"key":"6823_CR36","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79\u201389","journal-title":"Appl Soft Comput"},{"issue":"1","key":"6823_CR37","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1186\/s13638-019-1402-8","volume":"2019","author":"AP Haripriya","year":"2019","unstructured":"Haripriya AP, Kulothungan K (2019) Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things. EURASIP J Wirel Commun Netw 2019(1):90","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"6823_CR38","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.future.2020.03.049","volume":"110","author":"S Velliangiri","year":"2020","unstructured":"Velliangiri S, Pandey HM (2020) Fuzzy-Taylor-elephant herd optimization inspired deep belief network for DDoS attack detection and comparison with state-of-the-arts algorithms. Fut Gener Comput Syst 110:80\u201390","journal-title":"Fut Gener Comput Syst"},{"key":"6823_CR39","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.future.2017.06.025","volume":"84","author":"Y Yang","year":"2018","unstructured":"Yang Y, Zheng X, Liu X, Zhong S, Chang V (2018) Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Futur Gener Comput Syst 84:160\u2013176","journal-title":"Futur Gener Comput Syst"},{"issue":"15","key":"6823_CR40","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"key":"6823_CR41","unstructured":"Smith B (2020) A moment of reckoning: the need for a strong and global cybersecurity response. https:\/\/blogs.microsoft.com\/on-the-issues\/2020\/12\/17\/cyberattacks-cybersecurity-solarwinds-fireeye\/. Accessed 28 Dec 2020"},{"key":"6823_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3025300","author":"J Yi","year":"2020","unstructured":"Yi J, Kim S, Kim J, Choi S (2020) Supremo: cloud-assisted low-latency super-resolution in mobile devices. IEEE Trans Mobile Comput. https:\/\/doi.org\/10.1109\/TMC.2020.3025300","journal-title":"IEEE Trans Mobile Comput"},{"key":"6823_CR43","doi-asserted-by":"crossref","unstructured":"Kamgueu PO, Nataf E, Djotio TN (2015) On design and deployment of fuzzy-based metric for routing in low-power and lossy networks. In: 2015 IEEE 40th local computer networks conference workshops (LCN Workshops). IEEE. pp. 789\u2013795","DOI":"10.1109\/LCNW.2015.7365929"},{"key":"6823_CR44","doi-asserted-by":"publisher","first-page":"1176","DOI":"10.1016\/j.procs.2019.04.168","volume":"151","author":"H Moudni","year":"2019","unstructured":"Moudni H, Er-rouidi M, Mouncif H, El Hadadi B (2019) Black hole attack detection using fuzzy based intrusion detection systems in MANET. Procedia Comput Sci 151:1176\u20131181","journal-title":"Procedia Comput Sci"},{"issue":"8","key":"6823_CR45","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/TMC.2010.249","volume":"10","author":"I Khalil","year":"2010","unstructured":"Khalil I, Bagchi S (2010) Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Trans Mob Comput 10(8):1096\u20131112","journal-title":"IEEE Trans Mob Comput"},{"key":"6823_CR46","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.future.2017.08.043","volume":"82","author":"AA Diro","year":"2018","unstructured":"Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst 82:761\u2013768","journal-title":"Futur Gener Comput Syst"},{"key":"6823_CR47","unstructured":"Moteiv (2020) Tmote Sky. https:\/\/insense.cs.st-andrews.ac.uk\/files\/2013\/04\/tmote-sky-datasheet.pdf. Accessed 15 Nov 2020"},{"key":"6823_CR48","unstructured":"Advancare SL (2020) Zolertia. http:\/\/zolertia.sourceforge.net\/wiki\/images\/e\/e8\/Z1_RevC_Datasheet.pdf. Accessed 17 November 2020"},{"issue":"2","key":"6823_CR49","first-page":"162","volume":"7","author":"H Sabireen","year":"2021","unstructured":"Sabireen H, Neelanarayanan V (2021) A review on fog computing: architecture, fog with IoT. Algoritm Res Chall ICT Expr 7(2):162\u2013176","journal-title":"Algoritm Res Chall ICT Expr"},{"key":"6823_CR50","doi-asserted-by":"publisher","first-page":"69105","DOI":"10.1109\/ACCESS.2020.2983253","volume":"8","author":"P Habibi","year":"2020","unstructured":"Habibi P, Farhoudi M, Kazemian S, Khorsandi S, Leon-Garcia A (2020) Fog computing: a comprehensive architectural survey. IEEE Access 8:69105\u201369133","journal-title":"IEEE Access"},{"issue":"9","key":"6823_CR51","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.3390\/electronics10091077","volume":"10","author":"M Ijaz","year":"2021","unstructured":"Ijaz M, Li G, Lin L, Cheikhrouhou O, Hamam H, Noor A (2021) Integration and applications of fog computing and cloud computing based on the Internet of Things for provision of healthcare services at home. Electronics 10(9):1077","journal-title":"Electronics"},{"key":"6823_CR52","doi-asserted-by":"publisher","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","volume":"8","author":"K Cao","year":"2020","unstructured":"Cao K, Liu Y, Meng G, Sun Q (2020) An overview on edge computing research. IEEE Access 8:85714\u201385728","journal-title":"IEEE Access"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06823-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-06823-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-06823-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T11:17:36Z","timestamp":1650107856000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-06823-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,23]]},"references-count":52,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["6823"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-06823-9","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,23]]},"assertion":[{"value":"6 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author\u2019s declared that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}