{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:10:27Z","timestamp":1772910627558,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00104-w","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T15:22:28Z","timestamp":1745594548000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion detection in IoT networks using machine learning and deep learning approaches for MitM attack mitigation"],"prefix":"10.1007","volume":"5","author":[{"given":"Muhanna Ahmed","family":"Ali","sequence":"first","affiliation":[]},{"given":"Salah Alawi Hussein","family":"Al-Sharafi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"issue":"1","key":"104_CR1","first-page":"1","volume":"7","author":"JO Agyemang","year":"2019","unstructured":"Agyemang JO, Kponyo JJ, Acquah I. Lightweight man-in-the-middle (MITM) detection and defense algorithm for WiFi-enabled Internet of Things (IoT) gateways. Inf Secur Comput Fraud. 2019;7(1):1\u20136.","journal-title":"Inf Secur Comput Fraud"},{"issue":"14","key":"104_CR2","doi-asserted-by":"publisher","first-page":"3103","DOI":"10.3390\/electronics12143103","volume":"12","author":"AA Alahmadi","year":"2023","unstructured":"Alahmadi AA, Aljabri M, Alhaidari F, Alharthi DJ, Rayani GE, Marghalani LA, et al. DDoS attack detection in IoT-based networks using machine learning models: a survey and research directions. Electronics. 2023;12(14):3103.","journal-title":"Electronics"},{"key":"104_CR3","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130810","author":"S Alnasser","year":"2022","unstructured":"Alnasser S, Alsaqour R. Encryption algorithms modeling in detecting man in the middle attack in medical organizations. Int J Adv Comput Sci Appl. 2022. https:\/\/doi.org\/10.14569\/IJACSA.2022.0130810.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"104_CR4","doi-asserted-by":"crossref","unstructured":"Berte DR. Defining the iot. In: Proceedings of the international conference on business excellence (Vol.\n12, No. 1, pp. 118\u2013128). 2018.","DOI":"10.2478\/picbe-2018-0013"},{"key":"104_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9781119183457","volume-title":"Wireshark for security professionals: using wireshark and the metasploit framework","author":"J Bullock","year":"2017","unstructured":"Bullock J, Parker JT. Wireshark for security professionals: using wireshark and the metasploit framework. New Jersey: Wiley; 2017."},{"issue":"3","key":"104_CR6","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti M, Dragoni N, Lesyk V. A survey of man in the middle attacks. IEEE Commun Surv Tutor. 2016;18(3):2027\u201351.","journal-title":"IEEE Commun Surv Tutor"},{"key":"104_CR7","unstructured":"Fereidouni H, Fadeitcheva O, Zalai M. IoT and man-in-the-middle attacks. arXiv preprint arXiv:2308.02479. 2023."},{"key":"104_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-00491-4","volume-title":"Internet of things based on smart objects: technology, middleware and applications","author":"G Fortino","year":"2014","unstructured":"Fortino G, Trunfio P. Internet of things based on smart objects: technology, middleware and applications. Cham: Springer; 2014."},{"key":"104_CR9","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13937.001.0001","volume-title":"The internet of things","author":"S Greengard","year":"2021","unstructured":"Greengard S. The internet of things. Cambridge: MIT Press; 2021."},{"key":"104_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101162","volume":"26","author":"MM Inuwa","year":"2024","unstructured":"Inuwa MM, Das R. A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks. Internet Things. 2024;26: 101162.","journal-title":"Internet Things"},{"issue":"2","key":"104_CR11","doi-asserted-by":"publisher","first-page":"109","DOI":"10.22373\/cj.v2i2.3453","volume":"2","author":"A Mallik","year":"2019","unstructured":"Mallik A. Man-in-the-middle-attack: Understanding in simple words. Cyberspace Jurnal Pendidikan Teknologi Informasi. 2019;2(2):109\u201334.","journal-title":"Cyberspace Jurnal Pendidikan Teknologi Informasi"},{"issue":"2","key":"104_CR12","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13263","volume":"41","author":"A Michelena","year":"2024","unstructured":"Michelena A, Aveleira-Mata J, Jove E, Bay\u00f3n-Guti\u00e9rrez M, Novais P, Romero OF, et al. A novel intelligent approach for man-in-the-middle attacks detection over internet of things environments based on message queuing telemetry transport. Expert Syst. 2024;41(2): e13263.","journal-title":"Expert Syst"},{"key":"104_CR13","doi-asserted-by":"crossref","unstructured":"Mishra S, Paul A. A critical analysis of attack detection schemes in IoT and open challenges. Paper presented at the 2020 IEEE international conference on computing, power and communication technologies (GUCON), 2020; 57\u201362.","DOI":"10.1109\/GUCON48875.2020.9231077"},{"key":"104_CR14","doi-asserted-by":"crossref","unstructured":"Nwafor E, Schmidt C, Olufowobi H. IoT-MGSec: mitigating man-in-the-middle attacks in IoT networks using graph-based learning. Paper presented at the 2023 International Conference on Machine Learning and Applications (ICMLA), 1261\u20131266. 2023.","DOI":"10.1109\/ICMLA58977.2023.00190"},{"key":"104_CR15","volume-title":"Nmap in the enterprise: your guide to network scanning","author":"A Orebaugh","year":"2011","unstructured":"Orebaugh A, Pinkard B. Nmap in the enterprise: your guide to network scanning. Amsterdam: Elsevier; 2011."},{"key":"104_CR16","doi-asserted-by":"crossref","unstructured":"Panda D, Mishra BK, Sharma K. A taxonomy on man-in-the-middle attack in IoT network. Paper presented at the 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), 1907\u20131912. 2022.","DOI":"10.1109\/ICAC3N56670.2022.10074170"},{"issue":"24","key":"104_CR17","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3991\/ijim.v15i24.27333","volume":"15","author":"A Reshan","year":"2021","unstructured":"Reshan A, Saleh M. IoT-based application of information security triad. Int J Interact Mobile Technol (iJIM). 2021;15(24):61\u201376. https:\/\/doi.org\/10.3991\/ijim.v15i24.27333.","journal-title":"Int J Interact Mobile Technol (iJIM)"},{"issue":"1","key":"104_CR18","first-page":"684","volume":"6","author":"AD Saleem","year":"2024","unstructured":"Saleem AD, Abdulrahman AA. Attacks detection in Internet of Things using machine learning techniques: a review. J Appl Eng Technol Sci. 2024;6(1):684\u2013703.","journal-title":"J Appl Eng Technol Sci"},{"issue":"3","key":"104_CR19","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/TII.2021.3089462","volume":"18","author":"O Salem","year":"2021","unstructured":"Salem O, Alsubhi K, Shaafi A, Gheryani M, Mehaoua A, Boutaba R. Man-in-the-middle attack mitigation in internet of medical things. IEEE Trans Industr Inf. 2021;18(3):2053\u201362.","journal-title":"IEEE Trans Industr Inf"},{"key":"104_CR20","doi-asserted-by":"publisher","unstructured":"Silverio-Fern\u00e1ndez M, Renukappa S, Suresh S. What is a smart device? - A conceptualisation within the paradigm of the Internet of Things. Vis Eng. 2018. https:\/\/doi.org\/10.1186\/s40327-018-0063-8.","DOI":"10.1186\/s40327-018-0063-8"},{"key":"104_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2022.103126","volume":"169","author":"N Sivasankari","year":"2022","unstructured":"Sivasankari N, Kamalakkannan S. Detection and prevention of man-in-the-middle attack in IOT network using regression modeling. Adv Eng Softw. 2022;169: 103126.","journal-title":"Adv Eng Softw"},{"key":"104_CR22","doi-asserted-by":"crossref","unstructured":"Sultan ABM, Mehmood S, Zahid H. Man in the middle attack detection for MQTT based IOT devices using different machine learning algorithms. Paper presented at the 2022 2nd International Conference on Artificial Intelligence (ICAI), 118\u2013121. 2022.","DOI":"10.1109\/ICAI55435.2022.9773590"},{"issue":"2","key":"104_CR23","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10207-021-00548-5","volume":"21","author":"F Tommasi","year":"2022","unstructured":"Tommasi F, Catalano C, Taurino I. Browser-in-the-middle (BitM) attack. Int J Inf Secur. 2022;21(2):179\u201389.","journal-title":"Int J Inf Secur"},{"key":"104_CR24","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi A, Broody J, Sathishkumar JS. Detection of man in the middle attack in 5G IOT using machine learning. Paper presented at the 2023 International Conference on Recent Advances in Science and Engineering Technology (ICRASET), 1\u20135. 2023.","DOI":"10.1109\/ICRASET59632.2023.10420166"},{"key":"104_CR25","unstructured":"Wong H, Luo T. Man-in-the-middle attacks on MQTT-based IOT using Bert based adversarial message generation. Paper presented at the KDD 2020 AIoT Workshop. 2020"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00104-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00104-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00104-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T15:22:35Z","timestamp":1745594555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00104-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["104"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00104-w","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"13 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"48"}}