1. Internet of Things: Evolution, Concerns and Security Challenges
- Author
-
Pooja Anand, Parushi Malhotra, Deep Kumar Bangotra, Wei-Chiang Hong, Yashwant Singh, and Pradeep Kumar Singh
- Subjects
Computer science ,Test data generation ,02 engineering and technology ,Intrusion detection system ,Computer security ,computer.software_genre ,lcsh:Chemical technology ,Biochemistry ,Article ,Analytical Chemistry ,testbed ,wireless sensor network ,0202 electrical engineering, electronic engineering, information engineering ,lcsh:TP1-1185 ,Electrical and Electronic Engineering ,Instrumentation ,business.industry ,Testbed ,deep learning ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,Internet of Things (IoT) ,machine learning ,Software deployment ,intrusion detection system ,020201 artificial intelligence & image processing ,The Internet ,business ,Wireless sensor network ,computer - Abstract
The escalated growth of the Internet of Things (IoT) has started to reform and reshape our lives. The deployment of a large number of objects adhered to the internet has unlocked the vision of the smart world around us, thereby paving a road towards automation and humongous data generation and collection. This automation and continuous explosion of personal and professional information to the digital world provides a potent ground to the adversaries to perform numerous cyber-attacks, thus making security in IoT a sizeable concern. Hence, timely detection and prevention of such threats are pre-requisites to prevent serious consequences. The survey conducted provides a brief insight into the technology with prime attention towards the various attacks and anomalies and their detection based on the intelligent intrusion detection system (IDS). The comprehensive look-over presented in this paper provides an in-depth analysis and assessment of diverse machine learning and deep learning-based network intrusion detection system (NIDS). Additionally, a case study of healthcare in IoT is presented. The study depicts the architecture, security, and privacy issues and application of learning paradigms in this sector. The research assessment is finally concluded by listing the results derived from the literature. Additionally, the paper discusses numerous research challenges to allow further rectifications in the approaches to deal with unusual complications.
- Published
- 2021