{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:17:13Z","timestamp":1769825833953,"version":"3.49.0"},"reference-count":157,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T00:00:00Z","timestamp":1757894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The exponential growth of the Internet of Things (IoT) has driven considerable advancements in many domains, such as healthcare, smart cities, and industrial automation. However, this connectivity introduces a broad attack surface, making IoT ecosystems vulnerable to sophisticated cyberattacks, including Distributed Denial of Service (DDoS), Man-In-The-Middle (MITM) attacks, and data breaches, which may severely degrade the Quality of Service (QoS) metrics, that may include latency, throughput, and packet loss. This paper provides a detailed survey of contemporary attack detection techniques, such as signature-based, anomaly-based and hybrid methods, focusing on their efficiency in securing IoT systems without undermining QoS. The impact of these methods on critical QoS parameters is analyzed in resource-constrained IoT environments, where computational and memory limitations deter the implementation of traditional security measures. Additionally, emerging approaches such as artificial intelligence (AI)-driven anomaly detection, federated learning, and blockchain are examined for their potential to balance robust security with optimal performance. The analysis reveals the trade-offs between detection accuracy, resource consumption, and QoS maintenance, identifying research gaps related to post-attack recovery mechanisms and real-time adaptive security models. A cross-domain comparison of attack detection techniques reveals how different IoT applications, from smart healthcare to industrial IoT, impact the performance of these solutions. The results provide direction for future research on developing scalable, resource-efficient security models that can maintain high QoS levels in complex IoT ecosystems.<\/jats:p>","DOI":"10.1007\/s10586-025-05449-z","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:22:45Z","timestamp":1757964165000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A comprehensive survey of cybersecurity techniques based on quality of service (QoS) on the Internet of Things (IoT)"],"prefix":"10.1007","volume":"28","author":[{"given":"Seyed Salar","family":"Sefati","sequence":"first","affiliation":[]},{"given":"Bahman","family":"Arasteh","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Halunga","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,15]]},"reference":[{"issue":"2","key":"5449_CR1","doi-asserted-by":"crossref","first-page":"186","DOI":"10.3390\/math12020186","volume":"12","author":"B Arasteh","year":"2024","unstructured":"Arasteh, B., Arasteh, K., Kiani, F., Sefati, S.S., Fratu, O., Halunga, S., Tirkolaee, E.B.: A bioinspired test generation method using discretized and modified bat optimization algorithm. Mathematics 12(2), 186 (2024)","journal-title":"Mathematics"},{"key":"5449_CR2","doi-asserted-by":"crossref","unstructured":"Haq, A.U., et al.: \"Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: potential challenges and open issues.\"\u00a0IEEE Open J. Veh. Technol\u00a0(2025).","DOI":"10.36227\/techrxiv.173626712.22689317\/v1"},{"key":"5449_CR3","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103322","volume":"152","author":"R Uddin","year":"2024","unstructured":"Uddin, R., Kumar, S.A., Chamola, V.: Denial of service attacks in edge computing layers: taxonomy, vulnerabilities, threats and solutions. Ad Hoc Netw. 152, 103322 (2024)","journal-title":"Ad Hoc Netw."},{"key":"5449_CR4","volume":"5","author":"A Wakili","year":"2024","unstructured":"Wakili, A., Bakkali, S., Alaoui, A.E.H.: Machine learning for QoS and security enhancement of RPL in IoT-Enabled wireless sensors. Sens. Int. 5, 100289 (2024)","journal-title":"Sens. Int."},{"issue":"2","key":"5449_CR5","doi-asserted-by":"crossref","first-page":"713","DOI":"10.3390\/s24020713","volume":"24","author":"E Altulaihan","year":"2024","unstructured":"Altulaihan, E., Almaiah, M.A., Aljughaiman, A.: Anomaly detection IDS for detecting DoS attacks in IoT networks based on machine learning algorithms. Sensors 24(2), 713 (2024)","journal-title":"Sensors"},{"issue":"5","key":"5449_CR6","doi-asserted-by":"crossref","first-page":"5870","DOI":"10.1007\/s11227-023-05685-3","volume":"80","author":"I Ullah","year":"2024","unstructured":"Ullah, I., et al.: Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J. Supercomput. 80(5), 5870\u20135899 (2024)","journal-title":"J. Supercomput."},{"key":"5449_CR7","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"5449_CR8","first-page":"60","volume":"22","author":"K Li","year":"2024","unstructured":"Li, K.: Energy-constrained DAG scheduling on edge and cloud servers with overlapped communication and computation. J. Comput. 22(3), 60 (2024)","journal-title":"J. Comput."},{"issue":"1","key":"5449_CR9","first-page":"5724168","volume":"2022","author":"M Aqeel","year":"2022","unstructured":"Aqeel, M., et al.: A review of security and privacy concerns in the internet of things (IoT). J. Sens. 2022(1), 5724168 (2022)","journal-title":"J. Sens."},{"issue":"1","key":"5449_CR10","first-page":"5533843","volume":"2021","author":"M Azrour","year":"2021","unstructured":"Azrour, M., et al.: Internet of things security: challenges and key issues. Secur. Commun. Netw. 2021(1), 5533843 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"5449_CR11","volume":"238","author":"Y Wu","year":"2024","unstructured":"Wu, Y., et al.: QoS-based resource allocation for uplink NOMA networks. Comput. Netw. 238, 110084 (2024)","journal-title":"Comput. Netw."},{"issue":"8","key":"5449_CR12","doi-asserted-by":"crossref","first-page":"14786","DOI":"10.3390\/s140814786","volume":"14","author":"B Ndibanje","year":"2014","unstructured":"Ndibanje, B., Lee, H.-J., Lee, S.-G.: Security analysis and improvements of authentication and access control in the internet of things. Sensors 14(8), 14786\u201314805 (2014)","journal-title":"Sensors"},{"issue":"11","key":"5449_CR13","doi-asserted-by":"crossref","first-page":"3575","DOI":"10.3390\/s24113575","volume":"24","author":"S Bamashmos","year":"2024","unstructured":"Bamashmos, S., Chilamkurti, N., Shahraki, A.S.: Two-layered multi-factor authentication using decentralized blockchain in an IoT environment. Sensors 24(11), 3575 (2024)","journal-title":"Sensors"},{"issue":"1","key":"5449_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/cryptography2010001","volume":"2","author":"A Ometov","year":"2018","unstructured":"Ometov, A., et al.: Multi-factor authentication: a survey. Cryptography 2(1), 1 (2018)","journal-title":"Cryptography"},{"issue":"3","key":"5449_CR15","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1109\/JIOT.2014.2323395","volume":"1","author":"SL Keoh","year":"2014","unstructured":"Keoh, S.L., Kumar, S.S., Tschofenig, H.: Securing the internet of things: a standardization perspective. IEEE Internet Things J. 1(3), 265\u2013275 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5449_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10723-024-09767-1","volume":"22","author":"Z Yang","year":"2024","unstructured":"Yang, Z., et al.: HRNN: hypergraph recurrent neural network for network intrusion detection. J. Grid Comput. 22(2), 1\u201315 (2024)","journal-title":"J. Grid Comput."},{"issue":"2","key":"5449_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10723-025-09805-6","volume":"23","author":"SS Sefati","year":"2025","unstructured":"Sefati, S.S., Nor, A.M., Arasteh, B., Craciunescu, R., Comsa, C.R.: A probabilistic approach to load balancing in multi-cloud environments via machine learning and optimization algorithms. J. Grid Comput. 23(2), 1\u201336 (2025)","journal-title":"J. Grid Comput."},{"key":"5449_CR18","doi-asserted-by":"crossref","unstructured":"Zeidler, O, et al.: Performance evaluation of transport layer security in the 5G Core Control Plane. In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks. (2024)","DOI":"10.1145\/3643833.3656140"},{"issue":"10","key":"5449_CR19","first-page":"330","volume":"14","author":"R Dastres","year":"2020","unstructured":"Dastres, R., Soori, M.: Secure socket layer (SSL) in the network and web security. Int. J. Comput. Inform. Eng. 14(10), 330\u2013333 (2020)","journal-title":"Int. J. Comput. Inform. Eng."},{"issue":"2","key":"5449_CR20","first-page":"1","volume":"22","author":"Q Fu","year":"2024","unstructured":"Fu, Q., Yang, T.: Enhancing service offloading for dense networks based on optimal stopping theory in virtual mobile edge computing. J. Grid Comput. 22(2), 1\u201316 (2024)","journal-title":"J. Grid Comput."},{"issue":"4","key":"5449_CR21","doi-asserted-by":"crossref","first-page":"3453","DOI":"10.1109\/COMST.2018.2855563","volume":"20","author":"I Stellios","year":"2018","unstructured":"Stellios, I., et al.: A survey of iot-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutorials 20(4), 3453\u20133495 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"12","key":"5449_CR22","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"key":"5449_CR23","volume":"239","author":"Y-J Yu","year":"2024","unstructured":"Yu, Y.-J., Lo, S.-Y.: Energy-efficient non-anchor channel allocation in NB-IoT cellular networks. Comput. Netw. 239, 110145 (2024)","journal-title":"Comput. Netw."},{"issue":"1","key":"5449_CR24","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/s11227-021-03810-8","volume":"78","author":"S Sefati","year":"2022","unstructured":"Sefati, S., Mousavinasab, M., Zareh Farkhady, R.: Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation. J. Supercomput. 78(1), 18\u201342 (2022)","journal-title":"J. Supercomput."},{"issue":"8","key":"5449_CR25","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.3390\/electronics9081306","volume":"9","author":"OE Ijiga","year":"2020","unstructured":"Ijiga, O.E., Malekian, R., Chude-Okonkwo, U.A.: Enabling emergent configurations in the industrial Internet of Things for oil and gas explorations: a survey. Electronics 9(8), 1306 (2020)","journal-title":"Electronics"},{"key":"5449_CR26","doi-asserted-by":"crossref","unstructured":"Singh, M. and G. Baranwal.: Quality of service (qos) in internet of things. In: 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU). (2018). IEEE","DOI":"10.1109\/IoT-SIU.2018.8519862"},{"issue":"2","key":"5449_CR27","doi-asserted-by":"crossref","DOI":"10.1002\/dac.4269","volume":"34","author":"A Ksentini","year":"2021","unstructured":"Ksentini, A., Jebalia, M., Tabbane, S.: IoT\/Cloud-enabled smart services: a review on QoS requirements in fog environment and a proposed approach based on priority classification technique. Int. J. Commun Syst 34(2), e4269 (2021)","journal-title":"Int. J. Commun Syst"},{"issue":"1","key":"5449_CR28","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang, K., et al.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122\u2013129 (2017)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"5449_CR29","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s10723-024-09747-5","volume":"22","author":"M Wang","year":"2024","unstructured":"Wang, M., et al.: Smart city transportation: a VANET edge computing model to minimize latency and delay utilizing 5G network. J. Grid Comput. 22(1), 25 (2024)","journal-title":"J. Grid Comput."},{"key":"5449_CR30","doi-asserted-by":"crossref","first-page":"219709","DOI":"10.1109\/ACCESS.2020.3037359","volume":"8","author":"S Khanam","year":"2020","unstructured":"Khanam, S., et al.: A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access 8, 219709\u2013219743 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"5449_CR31","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., et al.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. & Tutor. 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. & Tutor."},{"key":"5449_CR32","doi-asserted-by":"crossref","unstructured":"Nastase, L.: Security in the internet of things: A survey on application layer protocols. In: 2017 21st international conference on control systems and computer science (CSCS). (2017). IEEE.","DOI":"10.1109\/CSCS.2017.101"},{"issue":"4","key":"5449_CR33","doi-asserted-by":"crossref","first-page":"859","DOI":"10.23919\/cje.2023.00.264","volume":"33","author":"J Huang","year":"2024","unstructured":"Huang, J., Liu, F., Zhang, J.: Multi-dimensional QoS evaluation and optimization of mobile edge computing for IoT: a survey. Chin. J. Electron. 33(4), 859\u2013874 (2024)","journal-title":"Chin. J. Electron."},{"issue":"8","key":"5449_CR34","doi-asserted-by":"crossref","first-page":"4117","DOI":"10.3390\/s23084117","volume":"23","author":"U Tariq","year":"2023","unstructured":"Tariq, U., et al.: A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors 23(8), 4117 (2023)","journal-title":"Sensors"},{"key":"5449_CR35","doi-asserted-by":"crossref","unstructured":"Babu, M.R. and K. Veena.: A survey on attack detection methods for iot using machine learning and deep learning. In: 2021 3rd International conference on signal processing and communication (ICPSC). (2021). IEEE.","DOI":"10.1109\/ICSPC51351.2021.9451740"},{"issue":"7","key":"5449_CR36","doi-asserted-by":"crossref","first-page":"9986","DOI":"10.1007\/s11227-023-05843-7","volume":"80","author":"P Shukla","year":"2024","unstructured":"Shukla, P., Krishna, C.R., Patil, N.V.: Iot traffic-based DDoS attacks detection mechanisms: a comprehensive review. J. Supercomput. 80(7), 9986\u201310043 (2024)","journal-title":"J. Supercomput."},{"key":"5449_CR37","doi-asserted-by":"crossref","unstructured":"Lyu, M., Gharakheili ,H.H., Sivaraman, V.: A survey on enterprise network security: Asset behavioral monitoring and distributed attack detection. IEEE Access, (2024)","DOI":"10.1109\/ACCESS.2024.3419068"},{"key":"5449_CR38","doi-asserted-by":"crossref","unstructured":"Tatipatri, N. and Arun, S.: A comprehensive review on cyber-attacks in power systems: impact analysis, detection and cyber security. IEEE Access, (2024)","DOI":"10.1109\/ACCESS.2024.3361039"},{"issue":"11","key":"5449_CR39","doi-asserted-by":"crossref","first-page":"3571","DOI":"10.3390\/s24113571","volume":"24","author":"M Gelgi","year":"2024","unstructured":"Gelgi, M., et al.: Systematic literature review of IoT botnet DDOS attacks and evaluation of detection techniques. Sensors 24(11), 3571 (2024)","journal-title":"Sensors"},{"key":"5449_CR40","doi-asserted-by":"crossref","unstructured":"Saadouni, R., et al.: Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature. Cluster Comput 1\u201327 (2024)","DOI":"10.1007\/s10586-024-04388-5"},{"key":"5449_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69715-4","volume-title":"Internet-of-things (IoT) systems: architectures, algorithms, methodologies","author":"D Serpanos","year":"2017","unstructured":"Serpanos, D., Wolf, M.: Internet-of-things (IoT) systems: architectures, algorithms, methodologies. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69715-4"},{"issue":"4","key":"5449_CR42","doi-asserted-by":"crossref","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., et al.: Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: Leveraging blockchain for efficient and secure sensing data transactions. Information 15(4), 212 (2024)","journal-title":"Information"},{"issue":"1","key":"5449_CR43","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.arcontrol.2007.01.002","volume":"31","author":"T Brog\u00e5rdh","year":"2007","unstructured":"Brog\u00e5rdh, T.: Present and future robot control development\u2014an industrial perspective. Annu. Rev. Control. 31(1), 69\u201379 (2007)","journal-title":"Annu. Rev. Control."},{"key":"5449_CR44","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110133","volume":"238","author":"N Kumar","year":"2024","unstructured":"Kumar, N., Ali, R.: A smart contract-based robotic surgery authentication system for healthcare using 6G-Tactile Internet. Comput. Netw. 238, 110133 (2024)","journal-title":"Comput. Netw."},{"issue":"3","key":"5449_CR45","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/s10776-020-00483-7","volume":"27","author":"S Bansal","year":"2020","unstructured":"Bansal, S., Kumar, D.: IoT ecosystem: a survey on devices, gateways, operating systems, middleware and communication. Int. J. Wireless Inf. Netw. 27(3), 340\u2013364 (2020)","journal-title":"Int. J. Wireless Inf. Netw."},{"issue":"4","key":"5449_CR46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10723-024-09783-1","volume":"22","author":"I Pintye","year":"2024","unstructured":"Pintye, I., Kov\u00e1cs, J., Lovas, R.: Enhancing machine learning-based autoscaling for cloud resource orchestration. J. Grid Comput. 22(4), 1\u201331 (2024)","journal-title":"J. Grid Comput."},{"issue":"12","key":"5449_CR47","first-page":"71","volume":"5","author":"AS Abdul-Qawy","year":"2015","unstructured":"Abdul-Qawy, A.S., et al.: The internet of things (iot): an overview. Int. J. Eng. Res. Appl. 5(12), 71\u201382 (2015)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"5449_CR48","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110166","volume":"240","author":"MN Pathan","year":"2024","unstructured":"Pathan, M.N., et al.: Priority based energy and load aware routing algorithms for SDN enabled data center network. Comput. Netw. 240, 110166 (2024)","journal-title":"Comput. Netw."},{"issue":"23","key":"5449_CR49","doi-asserted-by":"crossref","first-page":"3982","DOI":"10.3390\/electronics11233982","volume":"11","author":"RF Olanrewaju","year":"2022","unstructured":"Olanrewaju, R.F., et al.: Decentralized blockchain network for resisting side-channel attacks in mobility-based IoT. Electronics 11(23), 3982 (2022)","journal-title":"Electronics"},{"issue":"124","key":"5449_CR50","first-page":"124","volume":"800","author":"M Souppaya","year":"2013","unstructured":"Souppaya, M., Scarfone, K.: Guidelines for managing the security of mobile devices in the enterprise. NIST Spec. Publ. 800(124), 124\u2013800 (2013)","journal-title":"NIST Spec. Publ."},{"issue":"3","key":"5449_CR51","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/COMST.2018.2803740","volume":"20","author":"T Qiu","year":"2018","unstructured":"Qiu, T., et al.: How can heterogeneous internet of things build our future: a survey. IEEE Commun. Surv. Tutor. 20(3), 2011\u20132027 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5449_CR52","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.future.2019.04.038","volume":"100","author":"HA Khattak","year":"2019","unstructured":"Khattak, H.A., et al.: Perception layer security in Internet of Things. Futur. Gener. Comput. Syst. 100, 144\u2013164 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"5449_CR53","first-page":"16","volume":"8","author":"SI Jasim","year":"2023","unstructured":"Jasim, S.I., Hamid, O.K., Alhyani, N.J.: A review of jamming attacks in wireless systems. Int. J. Latest Technol. Eng. Manag 8(1), 16\u201322 (2023)","journal-title":"Int. J. Latest Technol. Eng. Manag"},{"key":"5449_CR54","doi-asserted-by":"crossref","first-page":"88892","DOI":"10.1109\/ACCESS.2020.2993553","volume":"8","author":"K Lounis","year":"2020","unstructured":"Lounis, K., Zulkernine, M.: Attacks and defenses in short-range wireless technologies for IoT. IEEE Access 8, 88892\u201388932 (2020)","journal-title":"IEEE Access"},{"key":"5449_CR55","doi-asserted-by":"crossref","first-page":"61778","DOI":"10.1109\/ACCESS.2021.3073343","volume":"9","author":"BUI Khan","year":"2021","unstructured":"Khan, B.U.I., et al.: Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access 9, 61778\u201361792 (2021)","journal-title":"IEEE Access"},{"key":"5449_CR56","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.comcom.2017.03.010","volume":"107","author":"G Somani","year":"2017","unstructured":"Somani, G., et al.: DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput. Commun. 107, 30\u201348 (2017)","journal-title":"Comput. Commun."},{"issue":"6","key":"5449_CR57","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.3390\/s24061775","volume":"24","author":"MA Khan","year":"2024","unstructured":"Khan, M.A., et al.: Trust-based optimized reporting for detection and prevention of black hole attacks in low-power and lossy green IoT networks. Sensors 24(6), 1775 (2024)","journal-title":"Sensors"},{"issue":"11","key":"5449_CR58","first-page":"131","volume":"14","author":"A Sharmin","year":"2023","unstructured":"Sharmin, A., et al.: Secure iot routing through manifold criterion trust evaluation using ant colony optimization. Int. J. Adv. Comput. Sci. Appl. 14(11), 131\u2013143 (2023)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"5449_CR59","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2023.110146","volume":"240","author":"OS Younes","year":"2024","unstructured":"Younes, O.S.: A hybrid deep learning model for detecting DDoS flooding attacks in SIP-based systems. Comput. Netw. 240, 110146 (2024)","journal-title":"Comput. Netw."},{"issue":"3","key":"5449_CR60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2835375","volume":"48","author":"R Heartfield","year":"2015","unstructured":"Heartfield, R., Loukas, G.: A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput. Surv. (CSUR) 48(3), 1\u201339 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5449_CR61","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3352529","author":"AR Shahid","year":"2024","unstructured":"Shahid, A.R., Imteaj, A.: Securing user privacy in cloud-based whiteboard services against health attribute inference attacks. IEEE Trans Artif Intell (2024). https:\/\/doi.org\/10.1109\/TAI.2024.3352529","journal-title":"IEEE Trans Artif Intell"},{"key":"5449_CR62","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.0150212","author":"A Toubi","year":"2024","unstructured":"Toubi, A., Hajami, A.: Data manipulation in wireless sensor networks: enhancing security through blockchain integration with proposal mitigation strategy. Int. J. Adv. Comput. Sci. Appl. (2024). https:\/\/doi.org\/10.14569\/IJACSA.2024.0150212","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"5449_CR63","doi-asserted-by":"crossref","first-page":"616","DOI":"10.1109\/COMST.2019.2953364","volume":"22","author":"I Butun","year":"2019","unstructured":"Butun, I., \u00d6sterberg, P., Song, H.: Security of the Internet of Things: vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. & Tutor. 22(1), 616\u2013644 (2019)","journal-title":"IEEE Commun. Surv. & Tutor."},{"issue":"6","key":"5449_CR64","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","volume":"26","author":"A Heidari","year":"2023","unstructured":"Heidari, A., Jabraeil Jamali, M.A.: Internet of Things intrusion detection systems: a comprehensive review and future directions. Cluster Comput. 26(6), 3753\u20133780 (2023)","journal-title":"Cluster Comput."},{"key":"5449_CR65","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.future.2023.08.012","volume":"150","author":"M De Benedictis","year":"2024","unstructured":"De Benedictis, M., et al.: A novel architecture to virtualise a hardware-bound trusted platform module. Futur. Gener. Comput. Syst. 150, 21\u201336 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5449_CR66","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mob. (2015). https:\/\/doi.org\/10.13052\/jcsm2245-1439.414","journal-title":"J. Cyber Secur. Mob."},{"key":"5449_CR67","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.ijcip.2019.01.001","volume":"25","author":"K Kimani","year":"2019","unstructured":"Kimani, K., Oduol, V., Langat, K.: Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 25, 36\u201349 (2019)","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"5449_CR68","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103974","volume":"145","author":"N Lykousas","year":"2024","unstructured":"Lykousas, N., Patsakis, C.: Decoding developer password patterns: a comparative analysis of password extraction and selection practices. Comput. Secur. 145, 103974 (2024)","journal-title":"Comput. Secur."},{"key":"5449_CR69","doi-asserted-by":"publisher","DOI":"10.5815\/ijitcs.2024.04.04","author":"AI Jony","year":"2024","unstructured":"Jony, A.I., Arnob, A.K.B.: Securing the Internet of Things: evaluating machine learning algorithms for detecting IoT cyberattacks using CIC-IoT2023 Dataset. Int. J. Inform. Technol. Comput. Sci. (2024). https:\/\/doi.org\/10.5815\/ijitcs.2024.04.04","journal-title":"Int. J. Inform. Technol. Comput. Sci."},{"issue":"2","key":"5449_CR70","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2018","unstructured":"Makhdoom, I., et al.: Anatomy of threats to the internet of things. IEEE Commun. Surv. & Tutor. 21(2), 1636\u20131675 (2018)","journal-title":"IEEE Commun. Surv. & Tutor."},{"key":"5449_CR71","doi-asserted-by":"crossref","unstructured":"Thiel, C., Thiel, C.: Industry 4.0\u2013challenges in anti-counterfeiting. In: ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Springer. (2015)","DOI":"10.1007\/978-3-658-10934-9_10"},{"key":"5449_CR72","unstructured":"Makrakis, G.M., et al.: Vulnerabilities and attacks against industrial control systems and critical infrastructures. arXiv preprint arXiv:2109.03945, (2021)"},{"issue":"2","key":"5449_CR73","doi-asserted-by":"crossref","first-page":"708","DOI":"10.3390\/s24020708","volume":"24","author":"T Bakhshi","year":"2024","unstructured":"Bakhshi, T., Ghita, B., Kuzminykh, I.: A review of IoT firmware vulnerabilities and auditing techniques. Sensors 24(2), 708 (2024)","journal-title":"Sensors"},{"key":"5449_CR74","unstructured":"Nayan, N.A., I.A. Ikhsan, and Y. Takahashi.: Using ZigBee communication technology in a smart home wireless sensor network. In: Proceedings of Second International Conference on Modern Trends in Science, Engineering and Technology. (2014)"},{"key":"5449_CR75","doi-asserted-by":"crossref","unstructured":"Kampourakis, V., Gkioulos, V., Katsikas, S.: A systematic literature review on wireless security testbeds in the cyber-physical realm. Computers & Security 103383. (2023)","DOI":"10.1016\/j.cose.2023.103383"},{"issue":"5","key":"5449_CR76","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JIOT.2016.2516102","volume":"3","author":"X Cao","year":"2016","unstructured":"Cao, X., et al.: Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks. IEEE Internet Things J. 3(5), 816\u2013829 (2016)","journal-title":"IEEE Internet Things J."},{"key":"5449_CR77","unstructured":"Haakegaard, R., Lang, J.: The elliptic curve diffie-hellman (ecdh). Online at https:\/\/koclab.cs.ucsb. edu\/teaching\/ecc\/project\/2015Projects\/Haakegaard+Lang.pdf, (2015)"},{"issue":"4","key":"5449_CR78","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1109\/SURV.2011.122111.00145","volume":"14","author":"J Liu","year":"2012","unstructured":"Liu, J., et al.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. & Tutor. 14(4), 981\u2013997 (2012)","journal-title":"IEEE Commun. Surv. & Tutor."},{"key":"5449_CR79","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Futur. Gener. Comput. Syst. 97, 512\u2013529 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5449_CR80","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.623","volume":"7","author":"D Chicco","year":"2021","unstructured":"Chicco, D., Warrens, M.J., Jurman, G.: The coefficient of determination R-squared is more informative than SMAPE, MAE, MAPE, MSE and RMSE in regression analysis evaluation. Peerj Comput. Sci. 7, e623 (2021)","journal-title":"Peerj Comput. Sci."},{"key":"5449_CR81","unstructured":"Gwata, N.: Security analysis and advancement in zigbee communication., Cape Peninsula University of Technology (2024)"},{"key":"5449_CR82","doi-asserted-by":"crossref","unstructured":"Pallavi, S., Narayanan, V.A.: An overview of practical attacks on ble based iot devices and their security. In: 2019 5th international conference on advanced computing & communication systems (ICACCS). (2019). IEEE","DOI":"10.1109\/ICACCS.2019.8728448"},{"key":"5449_CR83","doi-asserted-by":"crossref","unstructured":"Karvonen, H., et al. Experimental performance evaluation of BLE 4 versus BLE 5 in indoors and outdoors scenarios. In: Advances in Body Area Networks I: Post-Conference Proceedings of BodyNets. Springer, Cham, 235-251 (2019)","DOI":"10.1007\/978-3-030-02819-0_18"},{"key":"5449_CR84","unstructured":"Bos, J.W., et al.: Elliptic curve cryptography in practice. In: Financial Cryptography and Data Security: 18th International Conference, FC 2014, Christ Church, Barbados, March 3\u20137, 2014, Revised Selected Papers 18. Springer. (2014)"},{"key":"5449_CR85","doi-asserted-by":"crossref","unstructured":"Nair, V., Song, D.: Multi-factor credential hashing for asymmetric brute-force attack resistance. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P). IEEE. (2023)","DOI":"10.1109\/EuroSP57164.2023.00013"},{"key":"5449_CR86","doi-asserted-by":"crossref","unstructured":"Becker, J.K., Li, D., Starobinski, D.: Tracking anonymized bluetooth devices. Proceedings on Privacy Enhancing Technologies, (2019)","DOI":"10.2478\/popets-2019-0036"},{"issue":"1","key":"5449_CR87","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/SURV.2013.111413.00196","volume":"16","author":"S Mirzadeh","year":"2013","unstructured":"Mirzadeh, S., Cruickshank, H., Tafazolli, R.: Secure device pairing: a survey. IEEE Commun. Surv. & Tutor. 16(1), 17\u201340 (2013)","journal-title":"IEEE Commun. Surv. & Tutor."},{"issue":"3","key":"5449_CR88","doi-asserted-by":"crossref","first-page":"648","DOI":"10.3390\/s20030648","volume":"20","author":"PJ Basford","year":"2020","unstructured":"Basford, P.J., et al.: LoRaWAN for smart city IoT deployments: a long term evaluation. Sensors 20(3), 648 (2020)","journal-title":"Sensors"},{"issue":"1","key":"5449_CR89","first-page":"6590713","volume":"2017","author":"J Kim","year":"2017","unstructured":"Kim, J., Song, J.: A dual key-based activation scheme for secure LoRaWAN. Wirel. Commun. Mob. Comput. 2017(1), 6590713 (2017)","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"5449_CR90","doi-asserted-by":"crossref","unstructured":"Navarro-Ortiz, J., et al.: Improving hardware security for LoRaWAN. in 2019 IEEE conference on standards for communications and networking (CSCN). IEEE (2019)","DOI":"10.1109\/CSCN.2019.8931397"},{"key":"5449_CR91","doi-asserted-by":"crossref","first-page":"45325","DOI":"10.1109\/ACCESS.2018.2852563","volume":"6","author":"K-L Tsai","year":"2018","unstructured":"Tsai, K.-L., et al.: AES-128 based secure low power communication for LoRaWAN IoT environments. IEEE Access 6, 45325\u201345334 (2018)","journal-title":"IEEE Access"},{"key":"5449_CR92","doi-asserted-by":"crossref","unstructured":"Monjur, M.M.R., et al.: An attack analysis framework for LoRaWAN applied advanced manufacturing. In: 2021 IEEE International Symposium on Technologies for Homeland Security (HST). IEEE. (2021)","DOI":"10.1109\/HST53381.2021.9619847"},{"issue":"3","key":"5449_CR93","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1109\/COMST.2023.3274934","volume":"25","author":"M Jouhari","year":"2023","unstructured":"Jouhari, M., et al.: A survey on scalable LoRaWAN for massive IoT: recent advances, potentials, and challenges. IEEE Commun. Surv. Tutor. 25(3), 1841\u20131876 (2023)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"5449_CR94","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TCAD.2020.3047976","volume":"40","author":"W Hu","year":"2020","unstructured":"Hu, W., et al.: An overview of hardware security and trust: threats, countermeasures, and design tools. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6), 1010\u20131038 (2020)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"issue":"1","key":"5449_CR95","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/s10922-024-09874-0","volume":"33","author":"MT Abdelaziz","year":"2025","unstructured":"Abdelaziz, M.T., et al.: Enhancing network threat detection with random forest-based NIDS and permutation feature importance. J. Netw. Syst. Manage. 33(1), 2 (2025)","journal-title":"J. Netw. Syst. Manage."},{"key":"5449_CR96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3444313","author":"SS Sefati","year":"2024","unstructured":"Sefati, S.S., et al.: A comprehensive survey on resource management in 6G network based on Internet of Things. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3444313","journal-title":"IEEE Access"},{"key":"5449_CR97","unstructured":"Thornton, Z.R.: Security of bluetooth low energy internet of things devices. Drexel University. (2023)"},{"issue":"1","key":"5449_CR98","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","volume":"73","author":"R Vishwakarma","year":"2020","unstructured":"Vishwakarma, R., Jain, A.K.: A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun. Syst. 73(1), 3\u201325 (2020)","journal-title":"Telecommun. Syst."},{"issue":"6","key":"5449_CR99","doi-asserted-by":"crossref","first-page":"1637","DOI":"10.3390\/s20061637","volume":"20","author":"W Song","year":"2020","unstructured":"Song, W., et al.: A software deep packet inspection system for network traffic analysis and anomaly detection. Sensors 20(6), 1637 (2020)","journal-title":"Sensors"},{"key":"5449_CR100","doi-asserted-by":"crossref","unstructured":"Dietzel, C., et al.: Stellar: network attack mitigation using advanced blackholing. In: Proceedings of the 14th international conference on emerging networking experiments and technologies. (2018)","DOI":"10.1145\/3281411.3281413"},{"issue":"3","key":"5449_CR101","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., Lesyk, V.: A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 18(3), 2027\u20132051 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5449_CR102","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1201\/9781003376064-18","volume-title":"Smart Cities","author":"V Tyagi","year":"2023","unstructured":"Tyagi, V., Saraswat, A., Bansal, S.: An Analysis of Securing Internet of Things (IoT) Devices from Man-in-the-Middle (MIMA) and Denial of Service (DoS). In: Smart Cities, pp. 337\u2013357. CRC Press (2023)"},{"key":"5449_CR103","first-page":"1","volume-title":"Encyclopedia of Cryptography, Security and Privacy","author":"H Krawczyk","year":"2021","unstructured":"Krawczyk, H.: Perfect forward secrecy. In: Encyclopedia of Cryptography, Security and Privacy, pp. 1\u20133. Springer (2021)"},{"issue":"1","key":"5449_CR104","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/45.913204","volume":"20","author":"R Venkateswaran","year":"2001","unstructured":"Venkateswaran, R.: Virtual private networks. IEEE Potentials 20(1), 11\u201315 (2001)","journal-title":"IEEE Potentials"},{"issue":"3","key":"5449_CR105","doi-asserted-by":"crossref","first-page":"2699","DOI":"10.1007\/s11277-021-09261-x","volume":"123","author":"SS Sefati","year":"2022","unstructured":"Sefati, S.S., Tabrizi, S.G.: Detecting sybil attack in vehicular ad-hoc networks (vanets) by using fitness function, signal strength index and throughput. Wireless Pers. Commun. 123(3), 2699\u20132719 (2022)","journal-title":"Wireless Pers. Commun."},{"issue":"5","key":"5449_CR106","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3390\/drones7050289","volume":"7","author":"G Airlangga","year":"2023","unstructured":"Airlangga, G., Liu, A.: A study of the data security attack and defense pattern in a centralized UAV\u2013cloud architecture. Drones 7(5), 289 (2023)","journal-title":"Drones"},{"key":"5449_CR107","doi-asserted-by":"crossref","unstructured":"Ullah, S., et al.: The revolution and vision of explainable AI for android malware detection and protection. Internet of Things 101320. (2024)","DOI":"10.1016\/j.iot.2024.101320"},{"key":"5449_CR108","doi-asserted-by":"crossref","unstructured":"Dange, S., Chatterjee, M.: IoT botnet: The largest threat to the IoT network, in Data Communication and Networks: Proceedings of GUCON 2019., Springer. 137\u2013157 (2019)","DOI":"10.1007\/978-981-15-0132-6_10"},{"issue":"4","key":"5449_CR109","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s10922-024-09875-z","volume":"32","author":"LC Guimar\u00e3es","year":"2024","unstructured":"Guimar\u00e3es, L.C., Couto, R.S.: A Performance evaluation of neural networks for botnet detection in the Internet of Things. J. Netw. Syst. Manage. 32(4), 98 (2024)","journal-title":"J. Netw. Syst. Manage."},{"issue":"18","key":"5449_CR110","doi-asserted-by":"crossref","first-page":"2917","DOI":"10.3390\/math12182917","volume":"12","author":"B Arasteh","year":"2024","unstructured":"Arasteh, B., et al.: Effective SQL injection detection: a fusion of binary olympiad optimizer and classification algorithm. Mathematics 12(18), 2917 (2024)","journal-title":"Mathematics"},{"key":"5449_CR111","unstructured":"Galluccio, E., Caselli, E., Lombari, G.: SQL Injection Strategies: Practical techniques to secure old vulnerabilities against modern attacks. Packt Publishing Ltd (2020)"},{"key":"5449_CR112","doi-asserted-by":"crossref","unstructured":"Esiefarienrhe, B.M., Phakathi, T., Lugayizi, F.: Node-based QoS-aware security framework for sinkhole attacks in mobile ad-hoc networks. In Telecom. MDPI. (2022)","DOI":"10.3390\/telecom3030022"},{"key":"5449_CR113","doi-asserted-by":"crossref","unstructured":"Saghar, K., et al.: RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network. In: 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE (2016)","DOI":"10.1109\/IBCAST.2016.7429899"},{"key":"5449_CR114","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.106960","volume":"166","author":"GE Rodr\u00edguez","year":"2020","unstructured":"Rodr\u00edguez, G.E., et al.: Cross-site scripting (XSS) attacks and mitigation: a survey. Comput. Netw. 166, 106960 (2020)","journal-title":"Comput. Netw."},{"issue":"3","key":"5449_CR115","doi-asserted-by":"crossref","first-page":"478","DOI":"10.3390\/iot5030022","volume":"5","author":"R Alquran","year":"2024","unstructured":"Alquran, R., et al.: Advancing XSS detection in IoT over 5G: a cutting-edge artificial neural network approach. IoT 5(3), 478\u2013508 (2024)","journal-title":"IoT"},{"key":"5449_CR116","unstructured":"Ioulianou, P., et al.: A signature-based intrusion detection system for the internet of things. Information and Communication Technology Form (2018)"},{"key":"5449_CR117","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-030-95161-0_5","volume-title":"Information security technologies in the decentralized distributed networks","author":"T Radivilova","year":"2022","unstructured":"Radivilova, T., et al.: Statistical and signature analysis methods of intrusion detection. In: Information security technologies in the decentralized distributed networks, pp. 115\u2013131. Springer (2022)"},{"key":"5449_CR118","doi-asserted-by":"crossref","unstructured":"Visoottiviseth, V., et al.: Signature-based and behavior-based attack detection with machine learning for home IoT devices. in 2020 IEEE REGION 10 CONFERENCE (TENCON). IEEE. (2020)","DOI":"10.1109\/TENCON50793.2020.9293811"},{"key":"5449_CR119","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109543","volume":"253","author":"S Kumari","year":"2022","unstructured":"Kumari, S., et al.: Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices. Knowl.-Based Syst. 253, 109543 (2022)","journal-title":"Knowl.-Based Syst."},{"key":"5449_CR120","doi-asserted-by":"crossref","unstructured":"El Bansarkhani, R., Misoczki, R.: G-Merkle: A hash-based group signature scheme from standard assumptions. In: International Conference on Post-Quantum Cryptography. Springer, Cham, pp. 441-463 (2018)","DOI":"10.1007\/978-3-319-79063-3_21"},{"key":"5449_CR121","doi-asserted-by":"crossref","first-page":"31630","DOI":"10.1109\/ACCESS.2018.2844406","volume":"6","author":"MA Mughal","year":"2018","unstructured":"Mughal, M.A., et al.: A lightweight digital signature based security scheme for human-centered Internet of Things. IEEE Access 6, 31630\u201331643 (2018)","journal-title":"IEEE Access"},{"key":"5449_CR122","doi-asserted-by":"crossref","unstructured":"Swarnkar, M., Kumar, R.: BitIoT: A Bit Level Deep Packet Inspection Method for Identification of MQTT-Based IoT Devices in the Wild. IEEE Transactions on Network and Service Management, (2024)","DOI":"10.1109\/TNSM.2024.3373887"},{"key":"5449_CR123","doi-asserted-by":"crossref","first-page":"25623","DOI":"10.1109\/ACCESS.2024.3367357","volume":"12","author":"MF Saiyed","year":"2024","unstructured":"Saiyed, M.F., Al-Anbagi, I.: A genetic algorithm-and t-test-based system for DDoS attack detection in IoT networks. IEEE Access 12, 25623\u201325641 (2024)","journal-title":"IEEE Access"},{"key":"5449_CR124","doi-asserted-by":"crossref","unstructured":"Jayashree, S., Kumar, S.S.: An efficient group signature based certificate less verification scheme for vehicular ad-hoc network. Wireless Networks, p. 1\u201330. (2024)","DOI":"10.1007\/s11276-024-03709-1"},{"key":"5449_CR125","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.future.2022.03.001","volume":"133","author":"I Martins","year":"2022","unstructured":"Martins, I., et al.: Host-based IDS: A review and open issues of an anomaly detection system in IoT. Futur. Gener. Comput. Syst. 133, 95\u2013113 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"5449_CR126","doi-asserted-by":"crossref","first-page":"2450","DOI":"10.1007\/s12083-024-01694-y","volume":"17","author":"K Palaniappan","year":"2024","unstructured":"Palaniappan, K., Duraipandi, B., Balasubramanian, U.M.: Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: a machine learning approach. Peer-to-Peer Netw. Appl. 17(4), 2450\u20132469 (2024)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"5449_CR127","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1016\/j.future.2020.05.035","volume":"112","author":"R Xu","year":"2020","unstructured":"Xu, R., et al.: Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services. Futur. Gener. Comput. Syst. 112, 228\u2013242 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5449_CR128","doi-asserted-by":"crossref","first-page":"165509","DOI":"10.1109\/ACCESS.2019.2953283","volume":"7","author":"H Li","year":"2019","unstructured":"Li, H., et al.: Detecting a business anomaly based on QoS benchmarks of resource-service chains for collaborative tasks in the IoT. IEEE Access 7, 165509\u2013165519 (2019)","journal-title":"IEEE Access"},{"key":"5449_CR129","doi-asserted-by":"crossref","unstructured":"Abdallah, M., et al.: A hybrid CNN-LSTM based approach for anomaly detection systems in SDNs. In: Proceedings of the 16th International Conference on Availability, Reliability and Security. (2021)","DOI":"10.1145\/3465481.3469190"},{"issue":"13","key":"5449_CR130","doi-asserted-by":"crossref","first-page":"10576","DOI":"10.1109\/JIOT.2021.3122148","volume":"9","author":"R Li","year":"2021","unstructured":"Li, R., et al.: Adriot: An edge-assisted anomaly detection framework against iot-based network attacks. IEEE Internet Things J. 9(13), 10576\u201310587 (2021)","journal-title":"IEEE Internet Things J."},{"key":"5449_CR131","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.comcom.2016.12.001","volume":"98","author":"H Bostani","year":"2017","unstructured":"Bostani, H., Sheikhan, M.: Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput. Commun. 98, 52\u201371 (2017)","journal-title":"Comput. Commun."},{"key":"5449_CR132","doi-asserted-by":"crossref","first-page":"24168","DOI":"10.1109\/ACCESS.2021.3056149","volume":"9","author":"A Yahyaoui","year":"2021","unstructured":"Yahyaoui, A., et al.: READ-IoT: reliable event and anomaly detection framework for the Internet of Things. IEEE Access 9, 24168\u201324186 (2021)","journal-title":"IEEE Access"},{"key":"5449_CR133","doi-asserted-by":"crossref","first-page":"19024","DOI":"10.1109\/ACCESS.2023.3246660","volume":"11","author":"S Yaqoob","year":"2023","unstructured":"Yaqoob, S., et al.: Deep learning based anomaly detection for fog-assisted IoVs network. IEEE Access 11, 19024\u201319038 (2023)","journal-title":"IEEE Access"},{"key":"5449_CR134","doi-asserted-by":"publisher","DOI":"10.26483\/ijarcs.v10i2.6395","author":"R Bala","year":"2019","unstructured":"Bala, R., Nagpal, R.: A review on kdd cup99 and nsl nsl-kdd dataset. Int. J. Adv. Res. Comput. Sci. (2019). https:\/\/doi.org\/10.26483\/ijarcs.v10i2.6395","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"issue":"1","key":"5449_CR135","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s40860-020-00126-x","volume":"7","author":"PK Keserwani","year":"2021","unstructured":"Keserwani, P.K., et al.: A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO\u2013PSO\u2013RF model. J. Reliab. Intell. Environ. 7(1), 3\u201321 (2021)","journal-title":"J. Reliab. Intell. Environ."},{"key":"5449_CR136","volume":"136","author":"AQ Khan","year":"2024","unstructured":"Khan, A.Q., et al.: Knowledge-based anomaly detection: survey, challenges, and future directions. Eng. Appl. Artif. Intell. 136, 108996 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"1","key":"5449_CR137","first-page":"381","volume":"13","author":"PR Kothamali","year":"2022","unstructured":"Kothamali, P.R., Banik, S.: Limitations of signature-based threat detection. Rev. de Intel. Artif. Med. 13(1), 381\u2013391 (2022)","journal-title":"Rev. de Intel. Artif. Med."},{"key":"5449_CR138","doi-asserted-by":"crossref","unstructured":"Kang, J.J., et al.: Hybrid routing for Man-in-the-Middle (MITM) attack detection in IoT networks. In: 2019 29th International Telecommunication Networks and Applications Conference (ITNAC). IEEE. (2019)","DOI":"10.1109\/ITNAC46935.2019.9077977"},{"issue":"2","key":"5449_CR139","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.13263","volume":"41","author":"\u00c1 Michelena","year":"2024","unstructured":"Michelena, \u00c1., et al.: A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert. Syst. 41(2), e13263 (2024)","journal-title":"Expert. Syst."},{"key":"5449_CR140","volume":"10","author":"S Khan","year":"2024","unstructured":"Khan, S., et al.: Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system. PeerJ. Comput. Sci. 10, e2211 (2024)","journal-title":"PeerJ. Comput. Sci."},{"issue":"7","key":"5449_CR141","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1080\/01969722.2022.2145660","volume":"55","author":"V Brindha Devi","year":"2024","unstructured":"Brindha Devi, V., Ranjan, N.M., Sharma, H.: IoT attack detection and mitigation with optimized deep learning techniques. Cybern. Syst. 55(7), 1702\u20131728 (2024)","journal-title":"Cybern. Syst."},{"key":"5449_CR142","doi-asserted-by":"crossref","unstructured":"Faysal, J.A., et al.: XGB-RF: A hybrid machine learning approach for IoT intrusion detection. In: Telecom.. MDPI (2022)","DOI":"10.3390\/telecom3010003"},{"key":"5449_CR143","doi-asserted-by":"crossref","unstructured":"Feng, Y., et al.: An MTD-driven Hybrid Defense Method Against DDoS Based on Markov Game in Multi-controller SDN-enabled IoT Networks. In: 2024 IEEE\/ACM 32nd International Symposium on Quality of Service (IWQoS). IEEE. (2024)","DOI":"10.1109\/IWQoS61813.2024.10682921"},{"key":"5449_CR144","volume":"239","author":"AB Mohammed","year":"2023","unstructured":"Mohammed, A.B., Fourati, L.C., Fakhrudeen, A.M.: Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security. Comput. Netw. 239, 110140 (2023)","journal-title":"Comput. Netw."},{"issue":"1","key":"5449_CR145","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/sym17010061","volume":"17","author":"BUI Khan","year":"2025","unstructured":"Khan, B.U.I., et al.: Resource management and secure data exchange for mobile sensors using ethereum blockchain. Symmetry 17(1), 61 (2025)","journal-title":"Symmetry"},{"key":"5449_CR146","doi-asserted-by":"crossref","first-page":"10179","DOI":"10.1109\/ACCESS.2018.2799854","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng, W., et al.: When intrusion detection meets blockchain technology: a review. Ieee Access 6, 10179\u201310188 (2018)","journal-title":"Ieee Access"},{"issue":"9","key":"5449_CR147","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.3390\/pr12091825","volume":"12","author":"BUI Khan","year":"2024","unstructured":"Khan, B.U.I., et al.: Integrating AI and blockchain for enhanced data security in IoT-driven smart cities. Processes 12(9), 1825 (2024)","journal-title":"Processes"},{"issue":"4","key":"5449_CR148","doi-asserted-by":"crossref","first-page":"218","DOI":"10.3390\/jrfm16040218","volume":"16","author":"N Sapra","year":"2023","unstructured":"Sapra, N., Shaikh, I., Dash, A.: Impact of proof of work (PoW)-based blockchain applications on the environment: a systematic review and research agenda. J. Risk Financ. Manage. 16(4), 218 (2023)","journal-title":"J. Risk Financ. Manage."},{"issue":"4","key":"5449_CR149","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10922-024-09870-4","volume":"32","author":"H Zaheer","year":"2024","unstructured":"Zaheer, H., et al.: An energy-efficient technique to secure internet of things devices using blockchain. J. Netw. Syst. Manage. 32(4), 1\u201329 (2024)","journal-title":"J. Netw. Syst. Manage."},{"issue":"3","key":"5449_CR150","volume":"5","author":"D Hanggoro","year":"2024","unstructured":"Hanggoro, D., et al.: Energy-aware proof-of-authority: blockchain consensus for clustered wireless sensor network. Blockchain: Res. Appl. 5(3), 100211 (2024)","journal-title":"Blockchain: Res. Appl."},{"issue":"5","key":"5449_CR151","doi-asserted-by":"crossref","first-page":"2802","DOI":"10.3390\/smartcities7050109","volume":"7","author":"SS Sefati","year":"2024","unstructured":"Sefati, S.S., et al.: Cybersecurity in a scalable smart city framework using blockchain and federated learning for Internet of Things (IoT). Smart Cities 7(5), 2802\u20132841 (2024)","journal-title":"Smart Cities"},{"key":"5449_CR152","doi-asserted-by":"crossref","unstructured":"Sefati, S.S., et al.: Enhancing Internet of Things security and efficiency: anomaly detection via proof of stake blockchain techniques. In: 2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE (2024)","DOI":"10.1109\/ICAIIC60209.2024.10463516"},{"issue":"7","key":"5449_CR153","first-page":"1540","volume":"51","author":"D Guha Roy","year":"2021","unstructured":"Guha Roy, D., Srirama, S.N.: A blockchain-based cyber attack detection scheme for decentralized Internet of Things using software-defined network. Softw: Pract Exp. 51(7), 1540\u20131556 (2021)","journal-title":"Softw: Pract Exp."},{"key":"5449_CR154","doi-asserted-by":"crossref","unstructured":"Pawar, P.P., et al.: An efficient ddos attack detection using attention based hybrid model in blockchain based SDN-IOT. In: 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT). IEEE. (2024)","DOI":"10.1109\/AIIoT58432.2024.10574596"},{"key":"5449_CR155","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3404656","author":"M Anwar","year":"2024","unstructured":"Anwar, M., et al.: BBAD: blockchain-backed assault detection for cyber physical systems. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3404656","journal-title":"IEEE Access"},{"issue":"3","key":"5449_CR156","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1007\/s11277-024-11050-1","volume":"135","author":"A Kumar","year":"2024","unstructured":"Kumar, A., Kumar, S.: An Advance encryption and attack detection framework for securing smart cities data in blockchain using deep learning approach. Wirel. Pers. Commun. 135(3), 1329\u20131362 (2024)","journal-title":"Wirel. Pers. Commun."},{"key":"5449_CR157","doi-asserted-by":"crossref","unstructured":"Ingre, B., Yadav. A.: Performance analysis of NSL-KDD dataset using ANN. In: 2015 international conference on signal processing and communication engineering systems. IEEE. (2015)","DOI":"10.1109\/SPACES.2015.7058223"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05449-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05449-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05449-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:54:12Z","timestamp":1762872852000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05449-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,15]]},"references-count":157,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["5449"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05449-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,15]]},"assertion":[{"value":"31 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"792"}}