A Comprehensive Study of IoT Security Risks in Building a Secure Smart City

[1]  Daphne Koller,et al.  Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..

[2]  Anil Kumar Verma,et al.  SAPDA: Secure Authentication with Protected Data Aggregation Scheme for Improving QoS in Scalable and Survivable UWSNs , 2020, Wireless Personal Communications.

[3]  Md Zahangir Alom,et al.  Intrusion detection using deep belief networks , 2015, 2015 National Aerospace and Electronics Conference (NAECON).

[4]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[5]  Paul Geladi,et al.  Principal Component Analysis , 1987, Comprehensive Chemometrics.

[6]  Menachem Domb,et al.  Lightweight adaptive Random-Forest for IoT rule generation and execution , 2017, J. Inf. Secur. Appl..

[7]  Gisung Kim,et al.  A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..

[8]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[9]  Simon A. Dobson,et al.  Adaptive middleware for autonomic systems , 2006, Ann. des Télécommunications.

[10]  Sandip Ray,et al.  The Changing Computing Paradigm With Internet of Things: A Tutorial Introduction , 2016, IEEE Design & Test.

[11]  Piyush Kumar Shukla,et al.  Improved Malware Detection Technique Using Ensemble Based Classifier and Graph Theory , 2015, 2015 IEEE International Conference on Computational Intelligence & Communication Technology.

[12]  Vallipuram Muthukkumarasamy,et al.  Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[13]  Lemuria Carter,et al.  literature review of RFID-enabled healthcare applications and issues amuel , 2013 .

[14]  Paul Smolensky,et al.  Information processing in dynamical systems: foundations of harmony theory , 1986 .

[15]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[16]  Abdul Razaque,et al.  Deep recurrent neural network for IoT intrusion detection system , 2020, Simul. Model. Pract. Theory.

[17]  Windu Gata,et al.  Intrusion detection system using hybrid binary PSO and K-nearest neighborhood algorithm , 2017, 2017 11th International Conference on Information & Communication Technology and System (ICTS).

[18]  Quan Z. Sheng,et al.  Realizing an Internet of Secure Things: A Survey on Issues and Enabling Technologies , 2020, IEEE Communications Surveys & Tutorials.

[19]  Robert H. Deng,et al.  Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data , 2019, IEEE Internet of Things Journal.

[20]  Dang Hai Hoang,et al.  A PCA-based method for IoT network traffic anomaly detection , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[21]  J. Paulo Davim,et al.  Handbook of IoT and Big Data , 2019 .

[22]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[23]  Bayu Adhi Tama,et al.  Anomaly detection using random forest: A performance revisited , 2017, 2017 International Conference on Data and Software Engineering (ICoDSE).

[24]  Daniel L. Marino,et al.  Generalization of Deep Learning for Cyber-Physical System Security: A Survey , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[25]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[26]  Aleksandar Vakanski,et al.  A secure architecture for IoT with supply chain risk management , 2017, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[27]  Syed Hassan Ahmed,et al.  NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks , 2018, The Journal of Supercomputing.

[28]  Foutse Khomh,et al.  Enforcing security in Internet of Things frameworks: A Systematic Literature Review , 2019, Internet Things.

[29]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[30]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[31]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[32]  Mohammad Ali Jabraeil Jamali,et al.  Towards the Internet of Things - Architectures, Security, and Applications , 2019 .

[33]  Thomas Porter,et al.  Chapter 7 – Active Security Monitoring , 2007 .

[34]  Ju Ren,et al.  Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.

[35]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.

[36]  Jin Wei,et al.  Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.

[37]  Rakesh Kumar Jha,et al.  NB-IoT Security: A Survey , 2020, Wireless Personal Communications.

[38]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[39]  Muhammad Shafique,et al.  Intelligent Security Measures for Smart Cyber Physical Systems , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).

[40]  Yan Zhang,et al.  Deep Learning for Secure Mobile Edge Computing , 2017, ArXiv.

[41]  Tommaso Melodia,et al.  Machine Learning for Wireless Communications in the Internet of Things: A Comprehensive Survey , 2019, Ad Hoc Networks.

[42]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[43]  Neelam Sharma,et al.  INTRUSION DETECTION USING NAIVE BAYES CLASSIFIER WITH FEATURE REDUCTION , 2012 .

[44]  Yuefei Zhu,et al.  A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.

[45]  Farhan Ullah,et al.  IoT-based green city architecture using secured and sustainable android services , 2020 .

[46]  Wenchang Shi,et al.  A survey on internet of things security from data perspectives , 2019, Comput. Networks.

[47]  Praveen Kumar Reddy Maddikunta,et al.  An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture , 2020, Comput. Commun..

[48]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[49]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[50]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[51]  Azizol Abdullah,et al.  Open Issues and Security Challenges of Data Communication Channels in Distributed Internet of Things (IoT): A Survey , 2018 .

[52]  Shichao Zhang,et al.  Efficient kNN classification algorithm for big data , 2016, Neurocomputing.

[53]  Vijay Sivaraman,et al.  Characterizing and classifying IoT traffic in smart cities and campuses , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[54]  Kathleen Goeschel,et al.  Reducing false positives in intrusion detection systems using data-mining techniques utilizing support vector machines, decision trees, and naive Bayes for off-line analysis , 2016, SoutheastCon 2016.

[55]  Ranjan Kumar Behera,et al.  Supervised link prediction using structured‐based feature extraction in social network , 2020, Concurr. Comput. Pract. Exp..

[56]  Lan Wang,et al.  Securing wireless implantable devices for healthcare: Ideas and challenges , 2009, IEEE Communications Magazine.

[57]  Rajesh Kumar,et al.  Fog computing: from architecture to edge computing and big data processing , 2018, The Journal of Supercomputing.

[58]  Ali A. Ghorbani,et al.  Botnet detection based on traffic behavior analysis and flow intervals , 2013, Comput. Secur..

[59]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[60]  Arshdeep Bahga,et al.  Blockchain Platform for Industrial Internet of Things , 2016 .

[61]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[62]  Geoffrey E. Hinton,et al.  Learning representations by back-propagating errors , 1986, Nature.

[63]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[64]  Michael I. Jordan,et al.  Machine learning: Trends, perspectives, and prospects , 2015, Science.

[65]  Concha Bielza,et al.  A Comparison of Graphical Techniques for Asymmetric Decision Problems , 1999 .

[66]  Xue-wen Chen,et al.  Big Data Deep Learning: Challenges and Perspectives , 2014, IEEE Access.

[67]  Nadra Guizani,et al.  A Network Function Virtualization System for Detecting Malware in Large IoT Based Networks , 2020, IEEE Journal on Selected Areas in Communications.

[68]  Yoshua Bengio,et al.  Gradient-based learning applied to document recognition , 1998, Proc. IEEE.

[69]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[70]  Shilpa Chaudhari,et al.  An efficient approach for enhancing security in Internet of Things using the optimum authentication key , 2020, International Journal of Computers and Applications.

[71]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[72]  Akshi Kumar,et al.  Machine Learning from Theory to Algorithms: An Overview , 2018, Journal of Physics: Conference Series.

[73]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[74]  Song Guo,et al.  The Web of Things: A Survey (Invited Paper) , 2011, J. Commun..

[75]  Amr M. Youssef,et al.  Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices , 2016, IEEE Access.

[76]  Srinivasan Seshan,et al.  Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.

[77]  Soma Bandyopadhyay,et al.  Role Of Middleware For Internet Of Things: A Study , 2011 .

[78]  Kiran Ahuja,et al.  Sustainable future IoT services with touch-enabled handheld devices , 2019 .

[79]  Manas Ranjan Patra,et al.  Network intrusion detection system: A machine learning approach , 2011, Intell. Decis. Technol..

[80]  Guy W. Mineau,et al.  A simple KNN algorithm for text categorization , 2001, Proceedings 2001 IEEE International Conference on Data Mining.

[81]  Mohamed Amine Ferrag,et al.  Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security , 2019, Sensors.

[82]  Meng Zhang,et al.  Recent Advances in Convolutional Neural Network Acceleration , 2018, Neurocomputing.

[83]  Yang Xin,et al.  Robust detection for network intrusion of industrial IoT based on multi-CNN fusion , 2020 .

[84]  Axel Legay,et al.  On the Performance of Convolutional Neural Networks for Side-Channel Analysis , 2018, SPACE.

[85]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[86]  Anand Nayyar,et al.  Cyber Security Challenges for Smart Cities , 2019, Practice, Progress, and Proficiency in Sustainability.

[87]  Mohamed Amine Ferrag,et al.  DeepCoin: A Novel Deep Learning and Blockchain-Based Energy Exchange Framework for Smart Grids , 2020, IEEE Transactions on Engineering Management.

[88]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[89]  Amit Jain,et al.  Machine Learning and Its Applicability in Networking , 2020 .

[90]  Ying Zhang,et al.  Intrusion Detection for IoT Based on Improved Genetic Algorithm and Deep Belief Network , 2019, IEEE Access.

[91]  Mohammad Hammoudeh,et al.  Defence for Distributed Denial of Service Attacks in Cloud Computing , 2015 .

[92]  Longzhi Yang,et al.  Privacy and Security Aspects of E-Government in Smart Cities , 2019, Smart Cities Cybersecurity and Privacy.

[93]  Wei Wei,et al.  A survey of edge computing-based designs for IoT security , 2020, Digit. Commun. Networks.

[94]  Sotiris B. Kotsiantis,et al.  Machine learning: a review of classification and combining techniques , 2006, Artificial Intelligence Review.