King J, Awad AI (2016) A distributed security mechanism for resource-constrained IoT devices. Informatica (Slovenia) 40(1):133–143.
Google Scholar
Weber M, Boban M (2016) Security challenges of the internet of things In: 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 638–643.. IEEE, Opatija.
Chapter
Google Scholar
Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 84–90.. IEEE, Vienna.
Chapter
Google Scholar
Kafle VP, Fukushima Y, Harai H (2016) Internet of things standardization in ITU and prospective networking technologies. IEEE Commun Mag 54(9):43–49.
Article
Google Scholar
Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32.
Article
Google Scholar
IoT Bots Cause Massive Internet Outage. https://www.beyondtrust.com/blog/iot-bots-cause-october-21st-2016-massive-internet-outage/. Accessed 22 Oct 2016.
Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25–37.
Article
Google Scholar
Ayoub W, Mroue M, Nouvel F, Samhat AE, Prévotet J (2018) Towards IP over LPWANs technologies: LoRaWAN, DASH7, NB-IoT In: 2018 Sixth International Conference on Digital Information, Networking, and Wireless Communications (DINWC), 43–47.. IEEE, Beirut.
Chapter
Google Scholar
Aras E, Ramachandran GS, Lawrence P, Hughes D (2017) Exploring the security vulnerabilities of LoRa In: 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), 1–6.. IEEE, Exeter.
Google Scholar
Butun I, Pereira N, Gidlund M (2018) Analysis of LoRaWAN v1.1 security In: Proceedings of the 4th ACM MobiHoc Workshop on Experiences with the Design and Implementation of Smart Objects, SMARTOBJECTS ’18, 5–156.. ACM, New York.
Google Scholar
Čolaković A, Hadžialić M (2018) Internet of things (IoT): A review of enabling technologies, challenges, and open research issues. Comput Netw 144:17–39.
Article
Google Scholar
IEEEThe institute, Special Report:The Internet of Things. http://theinstitute.ieee.org/static/special-report-the-internet-of-things. Accessed 8 Jan 2017.
Thiesse F, Michahelles F (2006) An overview of EPC technology. Sens Rev 26(2):101–105.
Article
Google Scholar
Minerva R, Biru A, Rotondi D (2015) Towards a definition of the internet of things (IoT). Technical report, IEEE, Internet of Things.
SPU (2005) The internet of things executive summary. Technical report, The ITU Strategy & Policy Unit, (SPU).
Krčo S, Pokrić B, Carrez F (2014) Designing IoT architecture(s): A european perspective In: 2014 IEEE World Forum on Internet of Things (WF-IoT), 79–84.. IEEE, Seoul.
Chapter
Google Scholar
Ray PP (2018) A survey on Internet of Things architectures. J King Saud Univ Comput Inform Sci 30(3):291–319.
Google Scholar
Bradley J, Loucks J, Macaulay J, Noronha A (2013) Internet of everything (IoE) value index. Technical report, Cisco.
IEEE (2015) Standards, Internet of Things, IEEE P2413. http://standards.ieee.org/develop/project/2413.html. Accessed 8 Jan 2017.
Bandyopadhyay D, Sen J (2011) Internet of things: Applications and challenges in technology and standardization. Wirel Pers Commun 58(1):49–69.
Article
Google Scholar
Han C, Jornet JM, Fadel E, Akyildiz IF (2013) A cross-layer communication module for the internet of things. Comput Netw 57(3):622–633.
Article
Google Scholar
Khan R, Khan S, Zaheer R, Khan S (2012) Future internet: The internet of things architecture, possible applications and key challenges In: 2012 10th International Conference on Frontiers of Information Technology, 257–260.. IEEE, Islamabad.
Chapter
Google Scholar
Rao BBP, Saluia P, Sharma N, Mittal A, Sharma SV (2012) Cloud computing for internet of things & sensing based applications In: 2012 Sixth International Conference on Sensing Technology (ICST), 374–380.. IEEE, Kolkata.
Chapter
Google Scholar
Khan Z, Kiani SL, Soomro K (2014) A framework for cloud-based context-aware information services for citizens in smart cities. J Cloud Comput 3(1):14.
Article
Google Scholar
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347–2376.
Article
Google Scholar
Charif B, Awad AI (2014) Business and government organizations’ adoption of cloud computing. In: Corchado E, Lozano JA, Quintián H, Yin H (eds)Intelligent Data Engineering and Automated Learning – IDEAL 2014, 492–501.. Springer, Cham.
Google Scholar
Citron R, Maxwell K, Woods E (2017) Smart city services market. Technical report, Navigant Research.
Ahmed E, Yaqoob I, Gani A, Imran M, Guizani M (2016) Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges. IEEE Wirel Commun 23(5):10–16.
Article
Google Scholar
Schaffers H, Komninos N, Pallot M, Trousse B, Nilsson M, Oliveira A (2011) Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation. Springer, Berlin.
Google Scholar
Taherkordi A, Eliassen F (2016) Scalable modeling of cloud-based IoT services for smart cities In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 1–6.. IEEE, Sydney.
Google Scholar
Ali B, Awad AI (2018) Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors 18(3):1–17.
Article
Google Scholar
Granjal J, Monteiro E, SáSilva J (2015) Security for the internet of things: A survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294–1312.
Article
Google Scholar
Kumar S, Vealey T, Srivastava H (2016) Security in internet of things: Challenges, solutions and future directions In: 2016 49th Hawaii International Conference on System Sciences (HICSS), 5772–5781, Koloa.
Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3).
Article
Google Scholar
Trappe W, Howard R, Moore RS (2015) Low-energy security: Limits and opportunities in the internet of things. IEEE Secur Priv 13(1):14–21.
Article
Google Scholar
Hassan AM, Awad AI (2018) Urban transition in the era of the internet of things: Social implications and privacy challenges. IEEE Access 6:36428–36440.
Article
Google Scholar
Mohan R, Danda J, Hota C (2016) Attack Identification Framework for IoT Devices. Springer, New Delhi.
Google Scholar
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501.
Article
Google Scholar
Forsström S, Butun I, Eldefrawy M, Jennehag U, Gidlund M (2018) Challenges of securing the industrial internet of things value chain In: 2018 Workshop on Metrology for Industry 4.0 and IoT, 218–223.. IEEE, Brescia.
Chapter
Google Scholar
Rubio-Loyola J, Sala D, Ali AI (2008) Accurate real-time monitoring of bottlenecks and performance of packet trace collection In: 2008 33rd IEEE Conference on Local Computer Networks (LCN), 884–891.. IEEE, Montreal.
Chapter
Google Scholar
Rubio-Loyola J, Sala D, Ali AI (2008) Maximizing packet loss monitoring accuracy for reliable trace collections In: 2008 16th IEEE Workshop on Local and Metropolitan Area Networks, 61–66.. IEEE, Chij-Napoca.
Chapter
Google Scholar
Ghorbani AA, Lu W, Tavallaee M (2010) Network Intrusion Detection and Prevention, Advances in Information Security, vol. 47. Springer, US.
Book
Google Scholar
Anwar S, Mohamad Zain J, Zolkipli MF, Inayat Z, Khan S, Anthony B, Chang V (2017) From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions. Algorithms 10(2):1–24.
Article
MATH
Google Scholar
Denning DE (1987) An intrusion-detection model. IEEE Trans Softw Eng SE-13(2):222–232.
Article
Google Scholar
Stefan A (2000) Intrusion detection systems: A survey and taxonomy. Technical report, Chalmers University of Technology Göteborg, Sweden.
Ganapathy S, Kulothungan K, Muthurajkumar S, Vijayalakshmi M, Yogesh P, Kannan A (2013) Intelligent feature selection and classification techniques for intrusion detection in networks: a survey. EURASIP J Wirel Commun Netw 2013(1):1–16.
Article
Google Scholar
Mitchell R, Chen I-R (2014) A survey of intrusion detection in wireless network applications. Comput Commun 42:1–23.
Article
Google Scholar
Butun I, Morgera SD, Sankar R (2014) A survey of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 16(1):266–282.
Article
Google Scholar
Creech G, Hu J (2014) A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns. IEEE Trans Comput 63(4):807–819.
Article
MathSciNet
MATH
Google Scholar
Kumar S, Gautam, Om H (2016) Computational neural network regression model for host based intrusion detection system. Perspect Sci 8:93–95.
Article
Google Scholar
SnortThe Open Source Network Intrusion Detection System. https://www.snort.org. Accessed 1 Nov 2016.
Macia-Perez F, Mora-Gimeno FJ, Marcos-Jorquera D, Gil-Martinez-Abarca JA, Ramos-Morillo H, Lorenzo-Fonseca I (2011) Network intrusion detection system embedded on a smart sensor. IEEE Trans Ind Electron 58(3):722–732.
Article
Google Scholar
Pontarelli S, Bianchi G, Teofili S (2013) Traffic-aware design of a high-speed fpga network intrusion detection system. IEEE Trans Comput 62(11):2322–2334.
Article
MathSciNet
MATH
Google Scholar
Mori Y, Kuroda M, Makino N (2016) Nonlinear Principal Component Analysis and Its Applications, JSS Research Series in Statistics. Springer, Singapore.
Book
MATH
Google Scholar
Jolliffe IT (2002) Principal Component Analysis, Springer Series in Statistics, vol. 2. Springer, New York.
Google Scholar
Elrawy MF, Awad AI, Hamed HFA (2016) Flow-based features for a robust intrusion detection system targeting mobile traffic In: 2016 23rd International Conference on Telecommunications (ICT), 1–6.. IEEE, Thessaloniki.
Google Scholar
Nwanze N, i. Kim S, Summerville DH (2009) Payload modeling for network intrusion detection systems In: MILCOM 2009 - 2009 IEEE Military Communications Conference, 1–7.. IEEE, Boston.
Google Scholar
Chabathula KJ, Jaidhar CD, Kumara MAA (2015) Comparative study of principal component analysis based intrusion detection approach using machine learning algorithms In: 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), 1–6.. IEEE, Chennai.
Google Scholar
Bul’ajoul W, James A, Pannu M (2015) Improving network intrusion detection system performance through quality of service configuration and parallel technology. J Comput Syst Sci 81(6):981–999.
Article
Google Scholar
Meng W, Li W, Kwok L-F (2014) Efm: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. Comput Secur 43:189–204.
Article
Google Scholar
Abduvaliyev A, Pathan ASK, Zhou J, Roman R, Wong WC (2013) On the vital areas of intrusion detection systems in wireless sensor networks. IEEE Commun Surv Tutor 15(3):1223–1237.
Article
Google Scholar
Bhuyan MH, Bhattacharyya DK, Kalita JK (2014) Network anomaly detection: Methods, systems and tools. IEEE Commun Surv Tutor 16(1):303–336.
Article
Google Scholar
Hong J, Liu C, Govindarasu M (2014) Integrated anomaly detection for cyber security of the substations. IEEE Trans Smart Grid 5(4):1643–1653.
Article
Google Scholar
Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: A survey. J Netw Comput Appl 77:18–47.
Article
Google Scholar
Han J, Kamber M, Pei J (eds)2012. Data mining: concepts and techniques. Morgan Kaufmann, Boston.
MATH
Google Scholar
Duque S, bin Omar MN (2015) Using data mining algorithms for developing a model for intrusion detection system (IDS). Procedia Comput Sci 61:46–51.
Article
Google Scholar
Feng W, Zhang Q, Hu G, Huang JX (2014) Mining network data for intrusion detection through combining SVMs with ant colony networks. Futur Gener Comput Syst 37:127–140.
Article
Google Scholar
Alseiari FAA, Aung Z (2015) Real-time anomaly-based distributed intrusion detection systems for advanced metering infrastructure utilizing stream data mining In: 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), 148–153.. IEEE, Offenburg.
Chapter
Google Scholar
Tsai JJP, Yu PS (eds)2009. Machine Learning in Cyber Trust: Security, Privacy, and Reliability. First edn. Springer US, Springer-Verlag US. pp 1–362.
Google Scholar
Nishani L, Biba M (2016) Machine learning for intrusion detection in MANET: a state-of-the-art survey. J Intell Inf Syst 46(2):391–407.
Article
Google Scholar
Namdev N, Agrawal S, Silkari S (2015) Recent advancement in machine learning based internet traffic classification. Procedia Comput Sci 60:784–791.
Article
Google Scholar
Tsai C-F, Hsu Y-F, Lin C-Y, Lin W-Y (2009) Intrusion detection by machine learning: A review. Expert Syst Appl 36(10):11994–12000.
Article
Google Scholar
Weller-Fahy DJ, Borghetti BJ, Sodemann AA (2015) A survey of distance and similarity measures used within network intrusion anomaly detection. IEEE Commun Surv Tutor 17(1):70–91.
Article
Google Scholar
Amin SO, Siddiqui MS, Hong CS, Lee S (2009) RIDES: Robust intrusion detection system for ip-based ubiquitous sensor networks. Sensors 9(5):3447.
Article
Google Scholar
Muzammil MJ, Qazi S, Ali T (2013) Comparative analysis of classification algorithms performance for statistical based intrusion detection system In: 2013 3rd IEEE International Conference on Computer, Control and Communication (IC4), 1–6, Karachi.
Mabu S, Chen C, Lu N, Shimada K, Hirasawa K2011. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming, Vol. 41.
Xu C, Chen S, Su J, Yiu SM, Hui LCK (2016) A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms. IEEE Commun Surv Tutor 18(4):2991–3029.
Article
Google Scholar
Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: A review. Comput Secur 30(6–7):353–375.
Article
Google Scholar
Vancea F, Vancea C (2015) Some results on intrusion and anomaly detection using signal processing and NEAR system In: 2015 38th International Conference on Telecommunications and Signal Processing (TSP), 113–116.. IEEE, Prague.
Chapter
Google Scholar
Ko C, Ruschitzka M, Levitt K (1997) Execution monitoring of security-critical programs in distributed systems: a specification-based approach In: 1997 IEEE Symposium on Security and Privacy, 175–187, Oakland.
Berthier R, Sanders WH (2011) Specification-based intrusion detection for advanced metering infrastructures In: 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, 184–193.. IEEE, Pasadena.
Chapter
Google Scholar
Surendar M, Umamakeswari A (2016) InDReS: An intrusion detection and response system for internet of things with 6LoWPAN In: 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 1903–1908, Chennai.
Le A, Loo J, Chai KK, Aiash M (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information 7(2):1–19.
Article
Google Scholar
Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71.
Article
Google Scholar
Gupta GP, Kulariya M (2016) A framework for fast and efficient cyber security network intrusion detection using apache spark. Procedia Comput Sci 93:824–831.
Article
Google Scholar
Farissi IE, Saber M, Chadli S, Emharraf M, Belkasmi MG (2016) The analysis performance of an intrusion detection systems based on neural network In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), 145–151.. IEEE, Tangier.
Chapter
Google Scholar
Liu C, Yang J, Chen R, Zhang Y, Zeng J (2011) Research on immunity-based intrusion detection technology for the internet of things In: 2011 Seventh International Conference on Natural Computation, vol. 1. 212–216.. IEEE, Shanghai.
Chapter
Google Scholar
Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-service detection in 6LoWPAN based internet of things In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 600–607.. IEEE, Lyon.
Chapter
Google Scholar
SuricataThe Next Generation Intrusion Detection System. https://oisf.net/. Accessed 5 Dec 2017.
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) DEMO: An IDS framework for internet of things empowered by 6LoWPAN In: Proceedings of the 2013 ACM SIGSAC Conference on Computer; Communications Security, CCS ’13, 1337–1340, Berlin.
Jun C, Chi C (2014) Design of complex event-processing IDS in internet of things In: 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation, 226–229.. IEEE, Zhangjiajie.
Chapter
Google Scholar
Krimmling J, Peter S (2014) Integration and evaluation of intrusion detection for CoAP in smart city applications In: 2014 IEEE Conference on Communications and Network Security, 73–78.. IEEE, San Francisco.
Google Scholar
Butun I, Ra I-H, Sankar R (2015) An intrusion detection system based on multi-level clustering for hierarchical wireless sensor networks. Sensors 15(11):28960–28978.
Article
Google Scholar
Alzubaidi M, Anbar M, Al-Saleem S, Al-Sarawi S, Alieyan K (2017) Review on mechanisms for detecting sinkhole attacks on RPLs In: 2017 8th International Conference on Information Technology (ICIT), 369–374.. IEEE, Amman.
Chapter
Google Scholar
Garcia-Font V, Garrigues C, Rifà-Pous H (2017) Attack classification schema for smart city WSNs. Sensors 17(4):1–24.
Article
Google Scholar
Fu Y, Yan Z, Cao J, Ousmane K, Cao X (2017) An automata based intrusion detection method for internet of things. Mob Inf Syst 2017:13.
Google Scholar
Deng L, Li D, Yao X, Cox D, Wang H (2018) Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust Comput 21:1–16.
Article
Google Scholar
KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 6 Oct 2018.
Amouri A, Alaparthy VT, Morgera SD (2018) Cross layer-based intrusion detection based on network behavior for IoT In: 2018 IEEE 19th Wireless and Microwave Technology Conference (WAMICON), 1–4.. IEEE, Sand Key.
Google Scholar
Liu L, Xu B, Zhang X, Wu X (2018) An intrusion detection method for internet of things based on suppressed fuzzy clustering. EURASIP J Wirel Commun Netw 2018(1):113.
Article
Google Scholar
Abhishek NV, Lim TJ, Sikdar B, Tandon A (2018) An intrusion detection system for detecting compromised gateways in clustered IoT networks In: 2018 IEEE International Workshop Technical Committee on Communications Quality and Reliability (CQR), 1–6.. IEEE, Austin.
Google Scholar
Oh D, Kim D, Ro WW (2014) A malicious pattern detection engine for embedded security systems in the internet of things. Sensors 14(12):24188–24211.
Article
Google Scholar
Summerville DH, Zach KM, Chen Y (2015) Ultra-lightweight deep packet anomaly detection for internet of things devices In: 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), 1–8.. IEEE, Nanjing.
Google Scholar
Arrington B, Barnett L, Rufus R, Esterline A (2016) Behavioral modeling intrusion detection system (BMIDS) using internet of things (IoT) behavior-based anomaly detection via immunity-inspired algorithms In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), 1–6, Waikoloa.
Gupta A, Pandey OJ, Shukla M, Dadhich A, Mathur S, Ingle A (2013) Computational intelligence based intrusion detection systems for wireless communication and pervasive computing networks In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, 1–7.. IEEE, Enathi.
Google Scholar
Raza S, Wallgren L, Voigt T (2013) SVELTE: Real-time intrusion detection in the internet of things. Ad Hoc Netw 11(8):2661–2674.
Article
Google Scholar
Khan ZA, Herrmann P (2017) A trust based distributed intrusion detection mechanism for internet of things In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 1169–1176.. IEEE, Taipei.
Chapter
Google Scholar
Okoh E, Awad AI (2015) Biometrics applications in e-health security: A preliminary survey. In: Yin X, Ho K, Zeng D, Aickelin U, Zhou R, Wang H (eds)Health Information Science, 92–103.. Springer, Cham.
Google Scholar
Noura M, Atiquzzaman M, Gaedke M (2018) Interoperability in internet of things: Taxonomies and open challenges. Mobile Networks and Applications 23:1–14.
Article
Google Scholar