Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
- URL: http://arxiv.org/abs/2407.03466v1
- Date: Wed, 3 Jul 2024 19:25:36 GMT
- Title: Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review
- Authors: Omair Faraj, David Megias, Joaquin Garcia-Alfaro,
- Abstract summary: Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected environments.
Different types of risks may be faced during data transmission in single-hop and multi-hop scenarios.
Addressing these vulnerabilities is crucial.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Internet of Things (IoT) relies on resource-constrained devices deployed in unprotected environments. Different types of risks may be faced during data transmission in single-hop and multi-hop scenarios. Addressing these vulnerabilities is crucial. A systematic literature review of data provenance in IoT is presented, exploring existing techniques, practical implementations, security requirements, and performance metrics. Respective contributions and shortcomings are compared. A taxonomy related to the development of data provenance in IoT is proposed. Open issues are identified, and future research directions are presented, providing useful insights for the evolution of data provenance research in the context of the IoT.
Related papers
- Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey
and the Open Libraries Behind Them [9.55194238764852]
The Internet of Things (IoT) has brought forth an era of unprecedented connectivity, with an estimated 80 billion smart devices expected to be in operation by the end of 2025.
Machine Learning (ML) serves as a crucial technology, not only for analyzing IoT-generated data but also for diverse applications within the IoT ecosystem.
This paper embarks on a comprehensive exploration of the security threats arising from ML's integration into various facets of IoT.
arXiv Detail & Related papers (2024-01-22T06:52:35Z) - QI2 -- an Interactive Tool for Data Quality Assurance [63.379471124899915]
The planned AI Act from the European commission defines challenging legal requirements for data quality.
We introduce a novel approach that supports the data quality assurance process of multiple data quality aspects.
arXiv Detail & Related papers (2023-07-07T07:06:38Z) - Is there a Trojan! : Literature survey and critical evaluation of the
latest ML based modern intrusion detection systems in IoT environments [0.0]
IoT as a domain has grown so much in the last few years that it rivals that of the mobile network environments in terms of data volumes as well as cybersecurity threats.
The confidentiality and privacy of data within IoT environments have become very important areas of security research within the last few years.
More and more security experts are interested in designing robust IDS systems to protect IoT environments as a supplement to the more traditional security methods.
arXiv Detail & Related papers (2023-06-14T08:48:46Z) - Evaluating Federated Learning for Intrusion Detection in Internet of
Things: Review and Challenges [0.0]
Federated Learning (FL) has attracted a significant interest in different sectors, including healthcare and transport systems.
We evaluate a FL-enabled IDS approach based on a multiclass classifier considering different data distributions for the detection of different attacks in an IoT scenario.
We identify a set of challenges and future directions based on the existing literature and the analysis of our evaluation results.
arXiv Detail & Related papers (2021-08-02T15:22:05Z) - Deep Learning Schema-based Event Extraction: Literature Review and
Current Trends [60.29289298349322]
Event extraction technology based on deep learning has become a research hotspot.
This paper fills the gap by reviewing the state-of-the-art approaches, focusing on deep learning-based models.
arXiv Detail & Related papers (2021-07-05T16:32:45Z) - Intrusion Detection Systems for IoT: opportunities and challenges
offered by Edge Computing [1.7589792057098648]
Key components of current cybersecurity methods are the Intrusion Detection Systems (IDSs)
IDSs can be based either on cross-checking monitored events with a database of known intrusion experiences, known as signature-based, or on learning the normal behavior of the system.
This work is dedicated to the application to the Internet of Things (IoT) network where edge computing is used to support the IDS implementation.
arXiv Detail & Related papers (2020-12-02T13:07:27Z) - Recommender Systems for the Internet of Things: A Survey [53.865011795953706]
Recommendation represents a vital stage in developing and promoting the benefits of the Internet of Things.
Traditional recommender systems fail to exploit ever-growing, dynamic, and heterogeneous IoT data.
arXiv Detail & Related papers (2020-07-14T01:24:44Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.