Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey

Z Liao, X Pang, J Zhang, B Xiong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Security and forensics represent two key components for network management, especially
to guarantee the trusted operation of massive access networks such as the Internet of Things …

Passban IDS: An intelligent anomaly-based intrusion detection system for IoT edge devices

M Eskandari, ZH Janjua, M Vecchio… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Cyber-threat protection is today's one of the most challenging research branches of
information technology, while the exponentially increasing number of tiny, connected …

Anomaly behavior analysis for IoT network nodes

J Pacheco, V Benitez, L Félix - … of the 3rd International Conference on …, 2019 - dl.acm.org
The Internet of Things (IoT) will connect not only computers and mobile devices, but it will
also interconnect smart buildings, homes, and cities. The integration of IoT with Fog and …

Blockchain-based architecture for secured cyber-attack features exchange

O Ajayi, T Saadawi - 2020 7th IEEE International conference on …, 2020 - ieeexplore.ieee.org
Despite the increased accuracy of intrusion detection systems (IDS) in identifying
cyberattacks in computer networks and devices connected to the internet, distributed or …

[HTML][HTML] Anomaly-based intrusion detection systems in iot using deep learning: A systematic literature review

MA Alsoufi, S Razak, MM Siraj, I Nafea, FA Ghaleb… - Applied sciences, 2021 - mdpi.com
The Internet of Things (IoT) concept has emerged to improve people's lives by providing a
wide range of smart and connected devices and applications in several domains, such as …

[HTML][HTML] Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks

X Sáez-de-Cámara, JL Flores, C Arellano, A Urbieta… - Computers & …, 2023 - Elsevier
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover,
the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse …

Smartretro: Blockchain-based incentives for distributed iot retrospective detection

B Wu, Q Li, K Xu, R Li, Z Liu - … on Mobile Ad Hoc and Sensor …, 2018 - ieeexplore.ieee.org
Internet of Things (IoT) has already been in the period of rapid development and widespread
deployment, while it is still vulnerable to various malicious attacks. Security detection before …

[HTML][HTML] Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness

G Bovenzi, G Aceto, D Ciuonzo, A Montieri… - Computers & …, 2023 - Elsevier
Abstract The Internet of Things (IoT) is a key enabler in closing the loop in Cyber-Physical
Systems, providing “smartness” and thus additional value to each monitored/controlled …

A framework for anomaly detection in IoT networks using conditional generative adversarial networks

I Ullah, QH Mahmoud - IEEE Access, 2021 - ieeexplore.ieee.org
While anomaly detection and the related concept of intrusion detection are widely studied,
detecting anomalies in new operating behavior in environments such as the Internet of …

[HTML][HTML] Scalable anomaly detection in blockchain using graphics processing unit

S Morishima - Computers & Electrical Engineering, 2021 - Elsevier
In blockchain, approved transactions, including illegal ones, cannot be modified unlike
existing bank transactions. To prevent the damage caused by illegal transactions, rapid …