{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T21:20:03Z","timestamp":1771708803848,"version":"3.50.1"},"reference-count":145,"publisher":"Tech Science Press","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.064027","type":"journal-article","created":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:09:07Z","timestamp":1745968147000},"page":"3713-3752","source":"Crossref","is-referenced-by-count":2,"title":["A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications"],"prefix":"10.32604","volume":"83","author":[{"given":"Arshiya Sajid","family":"Ansari","sequence":"first","affiliation":[]},{"given":"Ghadir","family":"Altuwaijri","sequence":"additional","affiliation":[]},{"given":"Fahad","family":"Alodhyani","sequence":"additional","affiliation":[]},{"given":"Moulay Ibrahim","family":"El-Khalil Ghembaza","sequence":"additional","affiliation":[]},{"given":"Shahabas Manakunnath Devasam","family":"Paramb","sequence":"additional","affiliation":[]},{"given":"Mohammad Sajid","family":"Mohammadi","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1007\/s11036-022-01937-3","article-title":"Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions","volume":"28","author":"Sarker","year":"2023","journal-title":"Mob Netw Appl"},{"key":"ref2","series-title":"AIP Conference Proceedings","doi-asserted-by":"crossref","DOI":"10.1063\/5.0254197","article-title":"Study of various AI based security model for threat analysis in communication and IoT network","author":"Goje","year":"2025"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"6393","DOI":"10.1109\/JIOT.2020.3042174","article-title":"Industrial Internet-of-things security enhanced with deep learning approaches for smart cities","volume":"8","author":"Magaia","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.011.2000009","article-title":"Recent progress on the convergence of the Internet of Things and artificial intelligence","volume":"34","author":"Shi","year":"2020","journal-title":"IEEE Netw"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"6493","DOI":"10.1002\/int.22852","article-title":"A blockchain- and artificial intelligence-enabled smart IoT framework for sustainable city","volume":"37","author":"Ahmed","year":"2022","journal-title":"Int J Intelligent Sys"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"7082","DOI":"10.3390\/app13127082","article-title":"Re-thinking data strategy and integration for artificial intelligence: concepts, opportunities, and challenges","volume":"13","author":"Aldoseri","year":"2023","journal-title":"Appl Sci"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s13198-023-01862-y","article-title":"Semantic analysis of blockchain intelligence with proposed agenda for future issues","volume":"14","author":"Saxena","year":"2023","journal-title":"Int J Syst Assur Eng Manag"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"5754322","DOI":"10.1155\/2021\/5754322","article-title":"Artificial intelligence-(AI-) enabled Internet of Things (IoT) for secure big data processing in multihoming networks","volume":"2021","author":"Rathee","year":"2021","journal-title":"Wirel Commun Mob Comput"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"102101","DOI":"10.1016\/j.technovation.2019.102101","article-title":"Internet of Things (IoT) platform competition: consumer switching versus provider multihoming","volume":"90","author":"Basaure","year":"2020","journal-title":"Technovation"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"28","DOI":"10.52783\/jes.750","article-title":"Frontiers of computing\u2014evolutionary trends and cutting-edge technologies in computer science and next generation application","volume":"20","author":"Ajani","year":"2024","journal-title":"J Electr Syst"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"683","DOI":"10.3390\/brainsci13040683","article-title":"Analysis of IoT security challenges and its solutions using artificial intelligence","volume":"13","author":"Mazhar","year":"2023","journal-title":"Brain Sci"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1038\/s41598-025-85866-7","article-title":"Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering","volume":"15","author":"Ahmed","year":"2025","journal-title":"Sci Rep"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1007\/978-3-031-47549-8_25","author":"Kizza","year":"2024","journal-title":"Guide to computer network security"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"91357","DOI":"10.1109\/ACCESS.2024.3418995","article-title":"Internet of Things (IoT): origins, embedded technologies, smart applications, and its growth in the last decade","volume":"12","author":"Shehu Yalli","year":"2024","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1108\/ECAM-04-2020-0271","article-title":"Patterns and trends in Internet of Things (IoT) research: future applications in the construction industry","volume":"28","author":"Ghosh","year":"2020","journal-title":"Eng Constr Archit Manag"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-030-38516-3_5","author":"Bajaj","year":"2020","journal-title":"Integration of WSN and IoT for smart cities"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"106993","DOI":"10.1016\/j.compag.2022.106993","article-title":"Applications of IoT for optimized greenhouse environment and resources management","volume":"198","author":"Maraveas","year":"2022","journal-title":"Comput Electron Agric"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"26542","DOI":"10.1109\/ACCESS.2025.3539336","article-title":"Efficient task scheduling and load balancing in fog computing for crucial healthcare through deep reinforcement learning","volume":"13","author":"Choppara","year":"2025","journal-title":"IEEE Access"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3396","DOI":"10.3390\/app12073396","article-title":"IoT-enabled smart agriculture: architecture, applications, and challenges","volume":"12","author":"Quy","year":"2022","journal-title":"Appl Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"3784","DOI":"10.3390\/s21113784","article-title":"An IoT-based smart home automation system","volume":"21","author":"Stolojescu-Crisan","year":"2021","journal-title":"Sensors"},{"key":"ref21","first-page":"1","article-title":"Intelligent ecofriendly transport management system based on IoT in urban areas","volume":"10","author":"Ajay","year":"2022","journal-title":"Environ Dev Sustain"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1298","DOI":"10.1109\/TMC.2020.2967041","article-title":"An application placement technique for concurrent IoT applications in edge and fog computing environments","volume":"20","author":"Goudarzi","year":"2021","journal-title":"IEEE Trans Mob Comput"},{"key":"ref23","first-page":"87","article-title":"Privacy preserving blockchain technique to achieve secure and reliable sharing of IoT data","volume":"65","author":"Le Nguyen","year":"2020","journal-title":"Comput Mater Contin"},{"key":"ref24","first-page":"711","article-title":"A new anti-quantum proxy blind signature for blockchain-enabled Internet of Things","volume":"61","author":"Li","year":"2019","journal-title":"Comput Mater Contin"},{"key":"ref25","first-page":"2441","volume":"65","author":"Chen","year":"2020","journal-title":"Comput Mater Contin"},{"key":"ref26","first-page":"40","article-title":"Blockchain with Internet of Things: benefits, challenges, and future directions","volume":"10","author":"Atlam","year":"2018","journal-title":"Int J Intell Syst Appl"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna","year":"2018","journal-title":"Future Gener Comput Syst"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/B978-0-12-823694-9.00013-X","author":"Acharya","year":"2022","journal-title":"AI, Edge and IoT-based smart agriculture"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"100124","DOI":"10.1016\/j.nexus.2022.100124","article-title":"An overview of smart irrigation systems using IoT","volume":"7","author":"Obaideen","year":"2022","journal-title":"Energy Nexus"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.future.2021.08.006","article-title":"Recent advancements and challenges of Internet of Things in smart agriculture: a survey","volume":"126","author":"Sinha","year":"2022","journal-title":"Future Gener Comput Syst"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.3390\/agriculture12101745","article-title":"Smart farming: Internet of Things (IoT)-based sustainable agriculture","volume":"12","author":"Dhanaraju","year":"2022","journal-title":"Agriculture"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"11275","DOI":"10.1109\/JIOT.2021.3128161","article-title":"A novel model for optimization of resource utilization in smart agriculture system using IoT (SMAIoT)","volume":"9","author":"Jani","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"32","DOI":"10.9734\/ajrcos\/2021\/v8i330202","article-title":"State of art survey for IoT effects on smart city technology: challenges, opportunities, and solutions","volume":"2021","author":"Hassan","year":"2021","journal-title":"Asian J Res Comput Sci"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.3390\/electronics13081480","article-title":"Smart agriculture and greenhouse gas emission mitigation: a 6G-IoT perspective","volume":"13","author":"Polymeni","year":"2024","journal-title":"Electronics"},{"key":"ref35","unstructured":"Selvam AP, Al-Humairi SNS. The impact of IoT and sensor integration on real-time weather monitoring systems: a systematic review. [cited 2025 Jan 1]. Available from: 10.21203\/rs.3.rs-3579172\/v1."},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"Dhinakaran D, Joe Prathap PM. Preserving data confidentiality in association rule mining using data share allocator algorithm. arXiv:230414605. 2023. doi:10.32604\/iasc.2022.024509.","DOI":"10.32604\/iasc.2022.024509"},{"key":"ref37","doi-asserted-by":"crossref","unstructured":"Dhinakaran D, Sankar S, Selvaraj D, Raja SE. Privacy-preserving data in IoT-based cloud systems: a comprehensive survey with AI integration. arXiv:240100794. 2024. doi:10.32604\/iasc.2022.024509.","DOI":"10.32604\/iasc.2022.024509"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2020.04.004","article-title":"BTNC: a blockchain-based trusted network connection protocol in IoT","volume":"143","author":"Zhang","year":"2020","journal-title":"J Parallel Distrib Comput"},{"key":"ref39","series-title":"2019 21st International Conference on Advanced Communication Technology (ICACT)","article-title":"Personal data privacy challenges of the fourth industrial revolution","author":"Onik","year":"2019 Feb 17\u201320"},{"key":"ref40","doi-asserted-by":"crossref","unstructured":"Selvaraj D, Udhay Sankar SM, Dhinakaran D, Anish TP. Outsourced analysis of encrypted graphs in the cloud with privacy protection. arXiv:230410833. 2023. doi:10.14445\/23488379\/ijeee-v10i1p105.","DOI":"10.14445\/23488379\/IJEEE-V10I1P105"},{"key":"ref41","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","article-title":"Labeled PSI from fully homomorphic encryption with malicious security","author":"Chen","year":"2018 Oct 15\u201319"},{"key":"ref42","unstructured":"Mkpa A. A dynamic configurable model for addressing trust and privacy in IoT networks: anglia ruskin research online (ARRO) [master\u2019s thesis]. Cambridge, UK: Anglia Ruskin University; 2024."},{"key":"ref43","first-page":"105","author":"Awotunde","year":"2021","journal-title":"The fusion of internet of things, artificial intelligence, and cloud computing in health care"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1809","DOI":"10.3390\/s21051809","article-title":"Internet of Things: evolution, concerns and security challenges","volume":"21","author":"Malhotra","year":"2021","journal-title":"Sensors"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"e378","DOI":"10.1002\/spy2.378","article-title":"Cryptography algorithms for improving the security of cloud-based Internet of Things","volume":"7","author":"Ali Qasem","year":"2024","journal-title":"Secur Priv"},{"key":"ref46","series-title":"2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)","article-title":"Advancing security: exploring AI-driven data encryption solutions for wireless sensor networks","author":"Arulmurugan","year":"2024 May 9\u201310"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"101820","DOI":"10.1016\/j.jksuci.2023.101820","article-title":"Advancing IoT security: a systematic review of machine learning approaches for the detection of IoT botnets","volume":"35","author":"Nazir","year":"2023","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"102164","DOI":"10.1016\/j.jksuci.2024.102164","article-title":"Systematic review of deep learning solutions for malware detection and forensic analysis in IoT","volume":"36","author":"Qureshi","year":"2024","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.future.2019.04.038","article-title":"Perception layer security in Internet of Things","volume":"100","author":"Ali Khattak","year":"2019","journal-title":"Future Gener Comput Syst"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"10295","DOI":"10.1109\/JSEN.2020.2989871","article-title":"A carrier-based sensor deployment algorithm for perception layer in the IoT architecture","volume":"20","author":"Cheng","year":"2020","journal-title":"IEEE Sens J"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1002\/9781119527978.ch2","author":"Jurcut","year":"2020","journal-title":"IoT security: advances in authentication"},{"key":"ref52","doi-asserted-by":"crossref","first-page":"101728","DOI":"10.1016\/j.scs.2019.101728","article-title":"Internet of Things: evolution and technologies from a security perspective","volume":"54","author":"Ande","year":"2020","journal-title":"Sustain Cities Soc"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1109\/COMST.2021.3086014","article-title":"Distributed machine learning for wireless communication networks: techniques, architectures, and applications","volume":"23","author":"Hu","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MWC.2019.1800455","article-title":"Physical layer security for the Internet of Things: authentication and key generation","volume":"26","author":"Zhang","year":"2019","journal-title":"IEEE Wirel Commun"},{"key":"ref55","first-page":"109","article-title":"A novel IoT architecture for seamless IoT integration into university systems","volume":"13","author":"Altwoyan","year":"2022","journal-title":"Int J Adv Comput Sci Appl"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"e5429","DOI":"10.1002\/dac.5429","article-title":"Impacts of blockchain in software-defined Internet of Things ecosystem with Network Function Virtualization for smart applications: present perspectives and future directions","volume":"38","author":"Rahman","year":"2025","journal-title":"Int J Communication"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"188082","DOI":"10.1109\/ACCESS.2020.3029847","article-title":"An empirical study on system level aspects of Internet of Things (IoT)","volume":"8","author":"Swamy","year":"2020","journal-title":"IEEE Access"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/j.future.2018.04.027","article-title":"Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework","volume":"108","author":"Tewari","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref59","first-page":"6771","article-title":"IoT system model, challenges and threats","volume":"9","author":"Ahlawat","year":"2020","journal-title":"Int J Sci Technol Res"},{"key":"ref60","doi-asserted-by":"crossref","first-page":"14053","DOI":"10.1007\/s11227-021-03825-1","article-title":"Smart home security: challenges, issues and solutions at different IoT layers","volume":"77","author":"Touqeer","year":"2021","journal-title":"J Supercomput"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"3805","DOI":"10.1007\/s40747-021-00582-9","article-title":"Smart healthcare IoT applications based on fog computing: architecture, applications and challenges","volume":"8","author":"Quy","year":"2022","journal-title":"Complex Intell Systems"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"101531","DOI":"10.1016\/j.iot.2025.101531","article-title":"Application of deep reinforcement learning for intrusion detection in Internet of Things: a systematic review","volume":"31","author":"Jamshidi","year":"2025","journal-title":"Internet Things"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"323","DOI":"10.17576\/jkukm-2025-37(1)-22","article-title":"Deep learning approaches for DDoS attack detection in communication networks and IoT: a comprehensive review","volume":"37","author":"Abdulrahman","year":"2025","journal-title":"J Kejuruter"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"101406","DOI":"10.1016\/j.measen.2024.101406","article-title":"Framework to analyze and exploit the smart home IoT firmware","volume":"37","author":"Kaushik","year":"2025","journal-title":"Meas Sens"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"3654","DOI":"10.3390\/s21113654","article-title":"Internet of Things for system integrity: a comprehensive survey on security, attacks and countermeasures for industrial applications","volume":"21","author":"Abosata","year":"2021","journal-title":"Sensors"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"219709","DOI":"10.1109\/ACCESS.2020.3037359","article-title":"A survey of security challenges, attacks taxonomy and advanced countermeasures in the Internet of Things","volume":"8","author":"Khanam","year":"2020","journal-title":"IEEE Access"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"158","DOI":"10.30534\/ijeter\/2022\/041032022","article-title":"Investigation on intrusion detection systems (IDSs) in IoT","volume":"10","author":"Vaigandla","year":"2022","journal-title":"Int J Emerg Trends Eng Res"},{"key":"ref68","doi-asserted-by":"crossref","first-page":"24970","DOI":"10.1109\/ACCESS.2025.3532895","article-title":"A comprehensive approach to intrusion detection in IoT environments using hybrid feature selection and multi-stage classification techniques","volume":"13","author":"Logeswari","year":"2025","journal-title":"IEEE Access"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"2287","DOI":"10.1007\/s11277-019-06986-8","article-title":"Machine learning based intrusion detection systems for IoT applications","volume":"111","author":"Verma","year":"2020","journal-title":"Wirel Pers Commun"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"190","DOI":"10.36548\/jismac.2020.4.002","article-title":"Hybrid intrusion detection system for Internet of Things (IoT)","volume":"2","author":"Smys","year":"2020","journal-title":"J ISMAC"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"3753","DOI":"10.1007\/s10586-022-03776-z","article-title":"Internet of Things intrusion detection systems: a comprehensive review and future directions","volume":"26","author":"Heidari","year":"2023","journal-title":"Clust Comput"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"102031","DOI":"10.1016\/j.simpat.2019.102031","article-title":"Deep recurrent neural network for IoT intrusion detection system","volume":"101","author":"Almiani","year":"2020","journal-title":"Simul Model Pract Theory"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1016\/j.procs.2020.04.257","article-title":"Building a intrusion detection system for IoT environment using machine learning techniques","volume":"171","author":"Sai Kiran","year":"2020","journal-title":"Procedia Comput Sci"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"2662","DOI":"10.3390\/electronics10212662","article-title":"Detection of security attacks in industrial IoT networks: a blockchain and machine learning approach","volume":"10","author":"Vargas","year":"2021","journal-title":"Electronics"},{"key":"ref75","doi-asserted-by":"crossref","first-page":"11792","DOI":"10.1109\/ACCESS.2025.3526711","article-title":"Deep learning-based intrusion detection system for detecting IoT botnet attacks: a review","volume":"13","author":"Al-Shurbaji","year":"2025","journal-title":"IEEE Access"},{"key":"ref76","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s43926-023-00034-5","article-title":"Anomaly-based intrusion detection system for IoT application","volume":"3","author":"Bhavsar","year":"2023","journal-title":"Discov Internet Things"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"100112","DOI":"10.1016\/j.iot.2019.100112","article-title":"Deep Belief Network enhanced intrusion detection system to prevent security breach in the Internet of Things","volume":"14","author":"Balakrishnan","year":"2021","journal-title":"Internet Things"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"31505","DOI":"10.1007\/s11042-023-16662-6","article-title":"IoT-based blockchain intrusion detection using optimized recurrent neural network","volume":"83","author":"Saravanan","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref79","doi-asserted-by":"crossref","first-page":"117995","DOI":"10.1016\/j.eswa.2022.117995","article-title":"Blockchain assisted clustering with intrusion detection system for industrial Internet of Things environment","volume":"207","author":"Mansour","year":"2022","journal-title":"Expert Syst Appl"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.3390\/electronics9071120","article-title":"Intrusion detection system for the Internet of Things based on blockchain and multi-agent systems","volume":"9","author":"Liang","year":"2020","journal-title":"Electronics"},{"key":"ref81","doi-asserted-by":"crossref","first-page":"e4158","DOI":"10.1002\/ett.4158","article-title":"Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things","volume":"32","author":"Tukur","year":"2021","journal-title":"Trans Emerging Tel Tech"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"2895","DOI":"10.3390\/s22082895","article-title":"FamilyGuard: a security architecture for anomaly detection in home networks","volume":"22","author":"de Melo","year":"2022","journal-title":"Sensors"},{"key":"ref83","doi-asserted-by":"crossref","first-page":"100656","DOI":"10.1016\/j.iot.2022.100656","article-title":"Deep learning-enabled anomaly detection for IoT systems","volume":"21","author":"Abusitta","year":"2023","journal-title":"Internet Things"},{"key":"ref84","doi-asserted-by":"crossref","first-page":"62722","DOI":"10.1109\/ACCESS.2022.3176317","article-title":"Design and development of RNN anomaly detection model for IoT networks","volume":"10","author":"Ullah","year":"2022","journal-title":"IEEE Access"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.future.2020.08.010","article-title":"A framework for anomaly detection and classification in Multiple IoT scenarios","volume":"114","author":"Cauteruccio","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"ref86","first-page":"9430132","volume":"2021","author":"Yang","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref87","series-title":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","article-title":"Anomaly detection based on traffic monitoring for secure blockchain networking","author":"Kim","year":"2021 May 3\u20136"},{"key":"ref88","series-title":"2023 International Conference on Computer, Information and Telecommunication Systems (CITS)","article-title":"A study on the efficiency of intrusion detection systems in IoT networks","author":"Seifi","year":"2023 Jul 10\u201312"},{"key":"ref89","doi-asserted-by":"crossref","first-page":"e96","DOI":"10.1002\/spy2.96","article-title":"Utilization of blockchain for mitigating the distributed denial of service attacks","volume":"3","author":"Singh","year":"2020","journal-title":"Secur Priv"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","article-title":"A comprehensive study of DDoS attacks over IoT network and their countermeasures","volume":"127","author":"Kumari","year":"2023","journal-title":"Comput Secur"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jpdc.2022.01.030","article-title":"A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network","volume":"164","author":"Kumar","year":"2022","journal-title":"J Parallel Distrib Comput"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"227","DOI":"10.3390\/sym13020227","article-title":"Distributed denial of service (DDoS) mitigation using blockchain\u2014a comprehensive insight","volume":"13","author":"Wani","year":"2021","journal-title":"Symmetry"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"494","DOI":"10.3390\/electronics11030494","article-title":"Threat analysis and distributed denial of service (DDoS) attack recognition in the Internet of Things (IoT)","volume":"11","author":"Ali","year":"2022","journal-title":"Electronics"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"76","DOI":"10.3390\/fi15020076","article-title":"Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron","volume":"15","author":"Ahmed","year":"2023","journal-title":"Future Internet"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"5111","DOI":"10.1038\/s41598-024-55814-y","article-title":"A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection","volume":"14","author":"Yin","year":"2024","journal-title":"Sci Rep"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"11634","DOI":"10.3390\/app112411634","article-title":"Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection","volume":"11","author":"Alghazzawi","year":"2021","journal-title":"Appl Sci"},{"key":"ref97","first-page":"1317","article-title":"DDoS attack detection via multi-scale convolutional neural network","volume":"62","author":"Cheng","year":"2020","journal-title":"Comput Mater Contin"},{"key":"ref98","doi-asserted-by":"crossref","first-page":"98427","DOI":"10.1109\/ACCESS.2022.3206367","article-title":"Anomaly detection based on CNN and regularization techniques against zero-day attacks in IoT networks","volume":"10","author":"Hairab","year":"2022","journal-title":"IEEE Access"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"105","DOI":"10.12700\/APH.20.2.2023.2.6","article-title":"DDoS attack intrusion detection system based on hybridization of CNN and LSTM","volume":"20","author":"Ahmed Issa","year":"2023","journal-title":"Acta Polytech Hung"},{"key":"ref100","series-title":"2025 IEEE 23rd World Symposium on Applied Machine Intelligence and Informatics (SAMI)","article-title":"Feature selection methods for intrusion detection systems in IoT","author":"Saadallah","year":"2025 Jan 23\u201325"},{"key":"ref101","doi-asserted-by":"crossref","first-page":"389","DOI":"10.3390\/fi16110389","article-title":"Health IoT threats: survey of risks and vulnerabilities","volume":"16","author":"Madanian","year":"2024","journal-title":"Future Internet"},{"key":"ref102","doi-asserted-by":"crossref","first-page":"135","DOI":"10.58496\/MJAIH\/2024\/016","article-title":"A comprehensive review on cryptographic techniques for securing Internet of medical things: a state-of-the-art, applications, security attacks, mitigation measures, and future research direction","volume":"2024","author":"Robert","year":"2024","journal-title":"Mesopotamian J Artif Intell Healthc"},{"key":"ref103","first-page":"52","article-title":"Mitigation of DDOS and MiTM attacks using belief based secure correlation approach in SDN-based IoT networks","volume":"14","author":"Cherian","year":"2021","journal-title":"Int J Comput Netw Inf Secur"},{"key":"ref104","series-title":"2024 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0 & IoT)","article-title":"Security issues in industrial Internet-of-things: threats, attacks and solutions","author":"Cec\u00edlio","year":"2024 May 29\u201331"},{"key":"ref105","first-page":"d346","article-title":"A methodical analysis of medical Internet of Things (MIoT) security and privacy in current and future trends","volume":"9","author":"Perwej","year":"2022","journal-title":"J Emerg Technol Innov Res"},{"key":"ref106","series-title":"KDD 2020 AIoT Workshop","article-title":"Man-in-the-middle attacks on mqtt-based IoT using bert-based adversarial message generation","author":"Wong","year":"2020 Aug 24"},{"key":"ref107","series-title":"Proceedings of the 14th Cyber Security Experimentation and Test Workshop","article-title":"Through the spyglass: towards IoT companion app man-in-the-middle attacks","author":"OConnor","year":"2021 Aug 9"},{"key":"ref108","doi-asserted-by":"crossref","first-page":"8191","DOI":"10.3390\/s23198191","article-title":"Meta-learner-based approach for detecting attacks on Internet of Things networks","volume":"23","author":"Rihan","year":"2023","journal-title":"Sensors"},{"key":"ref109","doi-asserted-by":"crossref","first-page":"e13263","DOI":"10.1111\/exsy.13263","article-title":"A novel intelligent approach for man-in-the-middle attacks detection over Internet of Things environments based on message queuing telemetry transport","volume":"41","author":"Michelena","year":"2024","journal-title":"Expert Syst"},{"key":"ref110","doi-asserted-by":"crossref","first-page":"5","DOI":"10.3390\/network5010005","article-title":"Signature-based security analysis and detection of IoT threats in advanced message queuing protocol","volume":"5","author":"Hashimyar","year":"2025","journal-title":"Network"},{"key":"ref111","series-title":"2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR)","article-title":"Monitoring and detection time optimization of man in the middle attacks using machine learning","author":"Toutsop","year":"2020 Oct 13\u201315"},{"key":"ref112","doi-asserted-by":"crossref","first-page":"7342","DOI":"10.3390\/s23177342","article-title":"Approach for detecting attacks on IoT networks based on ensemble feature selection and deep learning models","volume":"23","author":"Rihan","year":"2023","journal-title":"Sensors"},{"key":"ref113","doi-asserted-by":"crossref","first-page":"30","DOI":"10.9734\/ajrcos\/2021\/v9i230218","article-title":"Attack and anomaly detection in IoT networks using machine learning techniques: a review","volume":"9","author":"Haji","year":"2021","journal-title":"Asian J Res Comput Sci"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"550","DOI":"10.3390\/info14100550","article-title":"A deep learning methodology for predicting cybersecurity attacks on the Internet of Things","volume":"14","author":"Alkhudaydi","year":"2023","journal-title":"Information"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"102994","DOI":"10.1016\/j.scs.2021.102994","article-title":"A new distributed architecture for evaluating AI-based security systems at the edge: network TON_IoT datasets","volume":"72","author":"Moustafa","year":"2021","journal-title":"Sustain Cities Soc"},{"key":"ref116","author":"Rane","year":"2024","journal-title":"Artificial intelligence, machine learning, and deep learning for sustainable Industry 5.0"},{"key":"ref117","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/j.jksuci.2018.08.014","article-title":"Resource management in pervasive Internet of Things: a survey","volume":"33","author":"Zahoor","year":"2021","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"ref118","first-page":"253","article-title":"An improved crow search based intuitionistic fuzzy clustering algorithm for healthcare applications","volume":"26","author":"Parvathavarthini","year":"2020","journal-title":"Intell Autom Soft Comput"},{"key":"ref119","doi-asserted-by":"crossref","first-page":"21947","DOI":"10.1109\/JSEN.2021.3101146","article-title":"A smart, low cost, wearable technology for remote patient monitoring","volume":"21","author":"Babar","year":"2021","journal-title":"IEEE Sens J"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"411","DOI":"10.32604\/csse.2020.35.411","article-title":"Internet of Things in healthcare: architecture, applications, challenges, and solutions","volume":"35","author":"Naresh","year":"2020","journal-title":"Comput Syst Sci Eng"},{"key":"ref121","first-page":"743","article-title":"An application review of artificial intelligence in prevention and cure of COVID-19 pandemic","volume":"65","author":"Yu","year":"2020","journal-title":"Comput Mater Contin"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.jnca.2019.02.027","article-title":"Blockchain in healthcare applications: research challenges and opportunities","volume":"135","author":"McGhin","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref123","doi-asserted-by":"crossref","first-page":"113","DOI":"10.2174\/1573405617666210215143503","article-title":"COVID-19: challenges and its technological solutions using IoT","volume":"18","author":"Ajaz","year":"2022","journal-title":"Curr Med Imaging"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"2926","DOI":"10.1007\/s12083-021-01151-0","article-title":"Blockchain-a promising solution to Internet of Things: a comprehensive analysis, opportunities, challenges and future research issues","volume":"14","author":"Paul","year":"2021","journal-title":"Peer Peer Netw Appl"},{"key":"ref125","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/JIOT.2019.2898113","article-title":"IoT big data security and privacy versus innovation","volume":"6","author":"Sollins","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"e4946","DOI":"10.1002\/cpe.4946","article-title":"An overview of Internet of Things (IoT): architectural aspects, challenges, and protocols","volume":"32","author":"Gupta","year":"2020","journal-title":"Concurr Comput Pract Exp"},{"key":"ref127","doi-asserted-by":"crossref","first-page":"14302","DOI":"10.1109\/ACCESS.2020.2966147","article-title":"Fast and reliable alert delivery in mission-critical Wi-Fi HaLow sensor networks","volume":"8","author":"Khorov","year":"2020","journal-title":"IEEE Access"},{"key":"ref128","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1108\/JARHE-06-2018-0099","article-title":"Use of e-learning at higher educational institutions in Bangladesh: opportunities and challenges","volume":"11","author":"Sarker","year":"2019","journal-title":"J Appl Res High Educ"},{"key":"ref129","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1109\/COMST.2019.2962586","article-title":"A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues","volume":"22","author":"Stoyanova","year":"2020","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref130","first-page":"275","article-title":"Understanding the role of digital technologies in education: a review","volume":"3","author":"Haleem","year":"2022","journal-title":"Sustain Oper Comput"},{"key":"ref131","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1007\/s12652-017-0520-6","article-title":"Cloud-centric IoT based student healthcare monitoring framework","volume":"9","author":"Verma","year":"2018","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"3607","DOI":"10.3390\/s22103607","volume":"22","author":"Ullah","year":"2022","journal-title":"Sensors"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"34","DOI":"10.3390\/computers12020034","article-title":"A novel deep learning-based intrusion detection system for IoT networks","volume":"12","author":"Awajan","year":"2023","journal-title":"Computers"},{"key":"ref134","first-page":"102804","article-title":"Attack classification of an intrusion detection system using deep learning and hyperparameter optimization","volume":"58","author":"Kunang","year":"2021","journal-title":"J Inf Secur Appl"},{"key":"ref135","doi-asserted-by":"crossref","first-page":"3621","DOI":"10.1007\/s12065-024-00949-0","article-title":"Deep learning applications in the Internet of Things: a review, tools, and future directions","volume":"17","author":"Raoufi","year":"2024","journal-title":"Evol Intell"},{"key":"ref136","first-page":"20220155","article-title":"Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks","volume":"32","author":"Aswad","year":"2023","journal-title":"J Intell Syst"},{"key":"ref137","doi-asserted-by":"crossref","first-page":"12077","DOI":"10.1038\/s41598-024-62861-y","article-title":"Using machine learning algorithms to enhance IoT system security","volume":"14","author":"El-Sofany","year":"2024","journal-title":"Sci Rep"},{"key":"ref138","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1016\/j.future.2019.09.002","article-title":"BlockIoTIntelligence: a blockchain-enabled intelligent IoT architecture with artificial intelligence","volume":"110","author":"Singh","year":"2020","journal-title":"Future Gener Comput Syst"},{"key":"ref139","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.comcom.2021.09.029","article-title":"AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems","volume":"181","author":"Latif","year":"2022","journal-title":"Comput Commun"},{"key":"ref140","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/j.comnet.2018.12.008","article-title":"Internet of Things applications: a systematic review","volume":"148","author":"Asghari","year":"2019","journal-title":"Comput Netw"},{"key":"ref141","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1186\/s40537-019-0268-2","article-title":"Internet of Things is a revolutionary approach for future technology enhancement: a review","volume":"6","author":"Kumar","year":"2019","journal-title":"J Big Data"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: a systematic review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"ref143","doi-asserted-by":"crossref","first-page":"8229","DOI":"10.1109\/JIOT.2022.3150363","article-title":"Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for Internet of Things","volume":"9","author":"Ghimire","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref144","doi-asserted-by":"crossref","first-page":"6969383","DOI":"10.1155\/2024\/6969383","article-title":"Implementing AI solutions for advanced cyber-attack detection in smart grid","volume":"2024","author":"Tightiz","year":"2024","journal-title":"Int J Energy Res"},{"key":"ref145","doi-asserted-by":"crossref","first-page":"e38917","DOI":"10.1016\/j.heliyon.2024.e38917","article-title":"Enhancing data security and privacy in energy applications: integrating IoT and blockchain technologies","volume":"10","author":"Rai","year":"2024","journal-title":"Heliyon"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_64027\/TSP_CMC_64027.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:31:50Z","timestamp":1763343110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":145,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.064027","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}