scholarly journals Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

2021 ◽  
Vol 11 (12) ◽  
pp. 5713
Author(s):  
Majda Wazzan ◽  
Daniyal Algazzawi ◽  
Omaima Bamasaq ◽  
Aiiad Albeshri ◽  
Li Cheng

Internet of Things (IoT) is promising technology that brings tremendous benefits if used optimally. At the same time, it has resulted in an increase in cybersecurity risks due to the lack of security for IoT devices. IoT botnets, for instance, have become a critical threat; however, systematic and comprehensive studies analyzing the importance of botnet detection methods are limited in the IoT environment. Thus, this study aimed to identify, assess and provide a thoroughly review of experimental works on the research relevant to the detection of IoT botnets. To accomplish this goal, a systematic literature review (SLR), an effective method, was applied for gathering and critically reviewing research papers. This work employed three research questions on the detection methods used to detect IoT botnets, the botnet phases and the different malicious activity scenarios. The authors analyzed the nominated research and the key methods related to them. The detection methods have been classified based on the techniques used, and the authors investigated the botnet phases during which detection is accomplished. This research procedure was used to create a source of foundational knowledge of IoT botnet detection methods. As a result of this study, the authors analyzed the current research gaps and suggest future research directions.

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2021 ◽  
pp. 1-21
Author(s):  
Shahela Saif ◽  
Samabia Tehseen

Deep learning has been used in computer vision to accomplish many tasks that were previously considered too complex or resource-intensive to be feasible. One remarkable application is the creation of deepfakes. Deepfake images change or manipulate a person’s face to give a different expression or identity by using generative models. Deepfakes applied to videos can change the facial expressions in a manner to associate a different speech with a person than the one originally given. Deepfake videos pose a serious threat to legal, political, and social systems as they can destroy the integrity of a person. Research solutions are being designed for the detection of such deepfake content to preserve privacy and combat fake news. This study details the existing deepfake video creation techniques and provides an overview of the deepfake datasets that are publicly available. More importantly, we provide an overview of the deepfake detection methods, along with a discussion on the issues, challenges, and future research directions. The study aims to present an all-inclusive overview of deepfakes by providing insights into the deepfake creation techniques and the latest detection methods, facilitating the development of a robust and effective deepfake detection solution.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 62962-63003 ◽  
Author(s):  
Yasir Saleem ◽  
Noel Crespi ◽  
Mubashir Husain Rehmani ◽  
Rebecca Copeland

Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 309 ◽  
Author(s):  
Hind Bangui ◽  
Said Rakrak ◽  
Said Raghay ◽  
Barbora Buhnova

Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot satisfy the IoT applications that require real-time response. Yet, the location of cloud services is one of the challenges encountered in the evolution of the IoT paradigm. Recently, edge cloud computing has been proposed to bring cloud services closer to the IoT end-users, becoming a promising paradigm whose pitfalls and challenges are not yet well understood. This paper aims at presenting the leading-edge computing concerning the movement of services from centralized cloud platforms to decentralized platforms, and examines the issues and challenges introduced by these highly distributed environments, to support engineers and researchers who might benefit from this transition.


Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1793 ◽  
Author(s):  
Yousaf Bin Zikria ◽  
Sung Won Kim ◽  
Oliver Hahm ◽  
Muhammad Khalil Afzal ◽  
Mohammed Y. Aalsalem

Internet of Things (IoT) is rapidly growing and contributing drastically to improve the quality of life. Immense technological innovations and growth is a key factor in IoT advancements. Readily available low cost IoT hardware is essential for continuous adaptation of IoT. Advancements in IoT Operating System (OS) to support these newly developed IoT hardware along with the recent standards and techniques for all the communication layers are the way forward. The variety of IoT OS availability demands to support interoperability that requires to follow standard set of rules for development and protocol functionalities to support heterogeneous deployment scenarios. IoT requires to be intelligent to self-adapt according to the network conditions. In this paper, we present brief overview of different IoT OSs, supported hardware, and future research directions. Therein, we provide overview of the accepted papers in our Special Issue on IoT OS management: opportunities, challenges, and solution. Finally, we conclude the manuscript.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Ruijun Duan ◽  
Li Guo

As a disruptive emerging technology, the Internet of things (IoT) has rapidly developed, but its privacy risks and security vulnerabilities are still key challenges. The decentralized and distributed architecture of blockchain has the potential to satisfy IoT privacy and security requirements. This gives birth to the new domain of blockchain for IoT (BIoT). BIoT will cause significant transformations across several industries, paving the way for new business models. Based on the Science Citation Index Expanded (SCIE) and Social Sciences Citation Index (SSCI) databases in Web of Science (WoS) Core Collection, this study aims to explore the research trends and cooperation in the field of BIoT using the bibliometric method. The results indicate that the publications in this field have increased significantly from 2016 to 2020, with China and the USA being the most productive and influential countries. Keyword co-occurrence analysis shows that the most important research topics are as follows: security issues, core technologies, application dimensions, and transaction processes. Text mining analysis indicates that future research directions for BloT will focus more on both computing paradigms and key applications. This study will provide researchers with a greater understanding on the state of the art of BIoT and will serve as a reference for researchers engaging in this field to identify their own future research directions.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Simarjeet Singh ◽  
Nidhi Walia ◽  
Sivagandhi Saravanan ◽  
Preeti Jain ◽  
Avtar Singh ◽  
...  

PurposeThis study aims to recognize the current dynamics, prolific contributors and salient trends and propose future research directions in the area of alternative momentum investing.Design/methodology/approachThe study uses a blend of electronic database and forward reference searching to ensure the incorporation of all the significant studies. With the help of the Scopus database, the present study retrieves 122 research papers published from 1999 to 2020.FindingsThe results reveal that alternative momentum investing is an emerging area in the field of momentum investing. However, this area has witnessed an exponential growth in last ten years. The study also finds that North American, West European and East Asian countries dominate in total research publications. Through network citation analysis, the study identifies five major clusters: industrial momentum, earnings momentum, 52-week high momentum, time-series momentum and risk-managed momentum.Research limitations/implicationsThe present review will serve as a guide for financial researchers who intend to work on alternative momentum approaches. The study proposes several unexplored research themes in alternative momentum investing on which future studies can focus.Originality/valueThe study embellishes the existing literature on momentum investing by contributing the first bibliometric review on alternative momentum approaches.


2011 ◽  
Vol 30 (3) ◽  
pp. 1-31 ◽  
Author(s):  
Joseph V. Carcello ◽  
Dana R. Hermanson ◽  
Zhongxia (Shelly) Ye

SUMMARY Over the past two decades, the corporate governance literature in accounting and auditing has grown rapidly. To better understand this body of work, we discuss 12 recent literature review or meta-analysis papers and summarize selected results (i.e., clusters of papers with new and interesting results) from recent empirical research papers, after reviewing the findings of over 250 studies. Our corporate governance focus is primarily on corporate board and audit committee issues. We discuss the major insights from this literature and the practice implications of these findings. In addition, we identify a number of opportunities for future research. In particular, we make suggestions for: (1) improved research paradigms in corporate governance, (2) extensions of existing research, and (3) new or emerging lines of research.


Nutrients ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 1055 ◽  
Author(s):  
Phillipa Hay ◽  
Deborah Mitchison

Public health concerns largely have disregarded the important overlap between eating disorders and obesity. This Special Issue addresses this neglect and points to how progress can be made in preventing and treating both. Thirteen primary research papers, three reviews, and two commentaries comprise this Special Issue. Two commentaries set the scene, noting the need for an integrated approach to prevention and treatment. The empirical papers and reviews fall into four broad areas of research: first, an understanding of the neuroscience of eating behaviours and body weight; second, relationships between disordered eating and obesity risk; third, new and integrated approaches in treatment; and fourth, assessment. Collectively, the papers highlight progress in science, translational research, and future research directions.


Sign in / Sign up

Export Citation Format

Share Document