Research article Special Issues

Ensemble learning-based IDS for sensors telemetry data in IoT networks


  • The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that these protocols are vulnerable to attack and prove a significant threat to IoT telemetry data. Within a network, IoT devices are interdependent, and the behaviour of one device depends on the data coming from another device. An intruder exploits vulnerabilities of a device's interdependent feature and can alter the telemetry data to indirectly control the behaviour of other dependent devices in a network. Therefore, securing IoT devices have become a significant concern in IoT networks. The research community often proposes intrusion Detection Systems (IDS) using different techniques. One of the most adopted techniques is machine learning (ML) based intrusion detection. This study suggests a stacking-based ensemble model makes IoT devices more intelligent for detecting unusual behaviour in IoT networks. The TON-IoT (2020) dataset is used to assess the effectiveness of the proposed model. The proposed model achieves significant improvements in accuracy and other evaluation measures in binary and multi-class classification scenarios for most of the sensors compared to traditional ML algorithms and other ensemble techniques.

    Citation: Naila Naz, Muazzam A Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, Jawad Ahmad. Ensemble learning-based IDS for sensors telemetry data in IoT networks[J]. Mathematical Biosciences and Engineering, 2022, 19(10): 10550-10580. doi: 10.3934/mbe.2022493

    Related Papers:

    [1] Kai Su, Xuan Zhang, Qing Liu, Bin Xiao . Strategies of similarity propagation in web service recommender systems. Mathematical Biosciences and Engineering, 2021, 18(1): 530-550. doi: 10.3934/mbe.2021029
    [2] Diego G. Rossit, Segio Nesmachnow, Jamal Toutouh, Francisco Luna . Scheduling deferrable electric appliances in smart homes: a bi-objective stochastic optimization approach. Mathematical Biosciences and Engineering, 2022, 19(1): 34-65. doi: 10.3934/mbe.2022002
    [3] Yuan Tian, Biao Song, Mznah Al Rodhaan, Chen Rong Huang, Mohammed A. Al-Dhelaan, Abdullah Al-Dhelaan, Najla Al-Nabhan . A stochastic location privacy protection scheme for edge computing. Mathematical Biosciences and Engineering, 2020, 17(3): 2636-2649. doi: 10.3934/mbe.2020144
    [4] Tianjun Lu, Xian Zhong, Luo Zhong, RuiqiLuo . A location-aware feature extraction algorithm for image recognition in mobile edge computing. Mathematical Biosciences and Engineering, 2019, 16(6): 6672-6682. doi: 10.3934/mbe.2019332
    [5] Hossein Habibi, Abbas Rasoolzadegan, Amir Mashmool, Shahab S. Band, Anthony Theodore Chronopoulos, Amir Mosavi . SaaSRec+: a new context-aware recommendation method for SaaS services. Mathematical Biosciences and Engineering, 2022, 19(2): 1471-1495. doi: 10.3934/mbe.2022068
    [6] Mingchang Ni, Guo Zhang, Qi Yang, Liqiong Yin . Research on MEC computing offload strategy for joint optimization of delay and energy consumption. Mathematical Biosciences and Engineering, 2024, 21(6): 6336-6358. doi: 10.3934/mbe.2024276
    [7] Yanpei Liu, Wei Huang, Liping Wang, Yunjing Zhu, Ningning Chen . Dynamic computation offloading algorithm based on particle swarm optimization with a mutation operator in multi-access edge computing. Mathematical Biosciences and Engineering, 2021, 18(6): 9163-9189. doi: 10.3934/mbe.2021452
    [8] Chun-Chao Yeh, Ke-Jia Jhang, Chin-Chun Chang . An intelligent indoor positioning system based on pedestrian directional signage object detection: a case study of Taipei Main Station. Mathematical Biosciences and Engineering, 2020, 17(1): 266-285. doi: 10.3934/mbe.2020015
    [9] Grzegorz Radzki, Grzegorz Bocewicz, Jaroslaw Wikarek, Peter Nielsen, Zbigniew Banaszak . Comparison of exact and approximate approaches to UAVs mission contingency planning in dynamic environments. Mathematical Biosciences and Engineering, 2022, 19(7): 7091-7121. doi: 10.3934/mbe.2022335
    [10] Yanpei Liu, Yunjing Zhu, Yanru Bin, Ningning Chen . Resources allocation optimization algorithm based on the comprehensive utility in edge computing applications. Mathematical Biosciences and Engineering, 2022, 19(9): 9147-9167. doi: 10.3934/mbe.2022425
  • The Internet of Things (IoT) is a paradigm that connects a range of physical smart devices to provide ubiquitous services to individuals and automate their daily tasks. IoT devices collect data from the surrounding environment and communicate with other devices using different communication protocols such as CoAP, MQTT, DDS, etc. Study shows that these protocols are vulnerable to attack and prove a significant threat to IoT telemetry data. Within a network, IoT devices are interdependent, and the behaviour of one device depends on the data coming from another device. An intruder exploits vulnerabilities of a device's interdependent feature and can alter the telemetry data to indirectly control the behaviour of other dependent devices in a network. Therefore, securing IoT devices have become a significant concern in IoT networks. The research community often proposes intrusion Detection Systems (IDS) using different techniques. One of the most adopted techniques is machine learning (ML) based intrusion detection. This study suggests a stacking-based ensemble model makes IoT devices more intelligent for detecting unusual behaviour in IoT networks. The TON-IoT (2020) dataset is used to assess the effectiveness of the proposed model. The proposed model achieves significant improvements in accuracy and other evaluation measures in binary and multi-class classification scenarios for most of the sensors compared to traditional ML algorithms and other ensemble techniques.



    The global diffusion of COVID-19 has had notable effects on customer lifestyles, including food and eating behavior. In light of its rapid diffusion and negative effects on our society, the majority of national and local governments have implemented their own diffusion-prevention policies (i.e., stay-at-home plans) [1]. Moreover, in South Korea, social distance rules to reduce personal interactions that can diffuse infectious diseases, have been implemented. Due to social distance rules and stay-at-home plans, several delivery services have been introduced to support the ''untact economy'' in Korea [2]. Among these services, mobile food delivery services (MFDSs) are among the greatest beneficiaries by linking consumers and restaurants, allowing a number of restaurants to start providing delivery services through mobile applications [3].

    In the restaurant industry, consumers avoid physically visiting restaurants, but are more likely to use mobile food delivery applications for their meals. For instance, the total revenue of online food delivery services is estimated to be 22,000 million USD, with an expected compound annual growth rate (from 2022 to 2026) of about 15% in South Korea*. Along with this growth of MFDSs, the needs of consumers are constantly becoming more diverse and complex [4]. Thus, it is necessary to computationally and systematically investigate user experiences with MFDSs to afford the providers of MFDS applications the opportunity to improve their applications based on user feedback. Although many scholars have explored users' perspectives toward MFDSs [5,6], the majority of these scholars' approaches are limited due to such factors as small numbers of participants in surveys [7,8,9], or a reliance on traditional marketing/consumer-oriented theories [10].

    * https://www.statista.com/outlook/dmo/eservices/online-food-delivery/south-korea

    Thus, this study aims to computationally address factors of the user experience with MFDSs as determinants of user satisfaction when employing MFDSs. To this end, the following procedures are applied.

    1) We collected the datasets of user information, review comments, and ratings on MFDSs.

    2) The elements of user experiences with MFDSs were computationally and systematically extracted from the datasets.

    3) Two multiple regression analyses were conducted to explore UX factors as key determinants of user satisfaction with MFDSs.

    The next section presents the literature review. The data collection and processing procedures are examined next, followed by the data analysis strategy. After examining the empirical results, a general discussion and concluding remarks are presented.

    When innovative or new services are proposed and diffused [11], users' individual perceptions of the services are notable factors in determining their perceived satisfaction and adoption [12]. Among these factors, several components related to user experience (UX) are considered potential antecedents of users' perceived satisfaction. Generally, the definition of UX is "an individual assessment and feeling of the quality of a user's interaction with a particular service or product, for completing a certain task in a specific context" [13]. Based on this definition, several scholars have examined the elements of UX and their effects on users' perspectives toward a service or product [4].

    Considering users' post-assessments of specific services from UX perspectives, three elements, usability, usefulness, and affection, have been examined as dominant components in UX. The definition of perceived usability is "service/product attributes, which allow users to easily, effectively and efficiently achieve specific tasks" [14]. Perceived usefulness is referred as "the level to which an individual user considers that employing a particular service/product could enhance his/her performance" [15]. Finally, a common definition of users' affection is "a user's emotional response to the perceptual details of a particular service/product" [16].

    UX is one of the core concepts in exploring the successful distribution of mobile applications [17]. For instance, Harrison et al. [18] introduced systematic approaches for improving users' perceived satisfaction through a new usability-evaluation model based on the characteristics of earlier usability-oriented theories. In addition, Park et al. [19] examined the motivating factors determining users' behavioral intention to use mobile geographic information services with an integrated user acceptance model. Examining more than 1000 users, they found that users' perceived usefulness played both direct and indirect roles in their intention to use the services; the research model showed great fit to the data. Gupta and Arora [20] investigated consumer behavioral intention to adopt mobile payment systems with an integrated acceptance model. Based on the responses of 267 users, they found that hedonic motivation, which is one of the notable affective constructs, is a predictor of users' intention to use the systems.

    Shah et al. [6] proposed a research model to investigate effects of technological and psychological cues on user continuous intention to employ mobile food ordering applications with consideration of the uses and gratification theory. Considering 661 and 307 responses, they found several notable cues (convenience, price saving orientation, and compatibility) as direct determinants of user satisfaction and intention. Choi [21] also focused on user satisfaction of mobile food delivery applications in Korea with the concept of perceived familiarity, ease of use, usefulness, and intention to reuse. Based on 296 valid responses, the satisfaction is mainly determined by perceived usefulness of the applications, which is one of the core UX dimensions. In addition, Shah et al. [8] also examined customers' mobile dining choice applications with consideration of the stimulus-organism-responses framework. Considering 351 responses in Indonesia, customers' purchase intention is mainly determined by perceived value, which is organized by nine factors (e.g., source credibility, food quality, and ease of use) via three key sectors (electronic word-of-mouth, overall restaurant image, and system quality).

    Although a huge number of mobile applications and their services have appeared in recent years [19], user-oriented approaches to MFDSs have not been well examined. Thus, this study aims to explore users' perspectives on MFDSs with consideration of UX as one of the cornerstones of MFDSs.

    To quantitatively address post-evaluations of UX, user review comments are a useful source of valuable insights into and practical implications of UX, which can allow researchers to improve mobile applications. In particular, Google Play Store and Apple App Store tend to be the globally dominant mobile application markets for mobile devices. Because both stores have a space for users' comments and ratings on each application, users consider them an online forum for comments on the application.

    Several scholars have examined users' review comments in this space as key sources for their overall perspectives toward each application, including perceived satisfaction. For example, Park [22] showed that the results of sentiment analysis on fusers' review comments can be employed to estimate their overall satisfaction with online information services. Zhao et al. [23] examined the linguistic elements of 127,629 responses. They found that customer satisfaction is significantly affected by review diversity (positive), polarity (positive), subjectivity (negative), readability (negative), and word counts (negative). In addition, customers' perceived technical attributes play a notable role in determining satisfaction. As another example, Oh et al. [24] applied the widely employed psychological theory of expectation-confirmation theory to customer satisfaction with hospitality services through deep learning approaches. Applying a fused deep learning model to the responses of 12,363 users, they achieved an average precision of 0.9277 in investigating whether customers are satisfied with hospitality services.

    Review comments are also helpful for understanding users' perspectives toward mobile services. Jang and Park [25] indicated through a consideration of application domains that users' perceived satisfaction with mobile augmented reality applications is significantly affected by several factors of their user experience, based on the responses of 8627 users. Similarly, Phetrungnapha and Senivongse [26] showed that users' comments on mobile applications play a notable role in identifying the troubles and issues of the applications based on the extraction and natural language processing of several features. They achieved a recall of 91.23% in addressing bug report classification tasks. Thus, the current study employs user review comments to explore the determinants of users' perceived satisfaction when using MFDSs.

    Users' comments on MFDSs in Apple App Store and Google Play were collected. Three top-ranked download applications in both stores were selected (Uber Eats, DoorDash, and Grubhub). We collected 140,992 responses, including users' review comments and ratings, from 2022. The ratings, which ranged from 1 to 5, are employed as users' perceived satisfaction. We excluded comments with fewer than five words, emoticons, and non-English characters.

    We employed two different natural language processing approaches, -words and sentiment analysis, to examine the effects of UX elements on user satisfaction with the MFDSs. We conducted a sentiment analysis through LIWC software to computationally examine the dimensions of UX. Jang and Yi [27] employed hedonic, user burden, confirmation, and pragmatic factors as key UX elements, and matched them with LIWC categories, positive emotion (PE), negative emotion (NE), comparisons (COM), and work/leisure/home (WLH). Moreover, the cost (CO) dimension is considered one of the determinants of user satisfaction [4]. Based on the guidance of Jang and Yi [27], we computed the level of each UX dimension using LIWC software (Table 1).

    Table 1.  LIWC categories and UX dimensions.
    Category of LIWC UX dimension Ratio
    Positive emotion Hedonic values 0 -.0 (xPE)
    Negative emotion User burden values 0 -.0 (xNE)
    Comparisons Confirmation 0 -.0 (xCOM)
    Work/leisure/home Pragmatic values 0 -.0 (xWLH)
    Cost Cost values 0 -.0 (xCO)

     | Show Table
    DownLoad: CSV

    The following equation was used to explore the effects of UX elements, as well as cost, from the sentiment analysis of user satisfaction, where b0 is the intercept, xPE, xNE, xCOM, xWLH, and xCO are the regression coefficient levels for UX dimensions (Eq (3.1)).

    ysatisfaction=b0+bPE×xPE+bNE×xNE+bCOM×xCOM+bWLH×xWLH+bCO×xCO (3.1)

    For a bag-of-words approach, we collected a set of words pertaining to the three dimensions of UX (usefulness, usability (ease of use), and affection) based on earlier research that presented word lists for the dimensions [25]. We retained 88 (usability), 62 (usefulness), and 84 (affection) words. Moreover, we conducted the stemming, lemmatization, pos-tagging and validation procedures on each comment. The ratio of each dimension was then calculated by applying a bag-of-words approach to each review comment (Eq (3.2)). For instance, if 12 words from the usability dimension were included in a specific review comment, which is organized by 50 words, then the usability level of the comment was computed as 24% (12/50).

    xusability=Number of usability wordsNumber of total words,xusefulness=Number of usefulness wordsNumber of total words,xaffection=Number of affection wordsNumber of total words (3.2)

    This yields Eq (3.3), where b1 is the intercept, xusability, xusefulness, and xaffection are the regression coefficient levels for a bag-of-words approach.

    ysatisfaction=b1+busability×xusability+busefulness×xusefulness+baffection×xaffection (3.3)

    Table 2 presents the descriptive results for the employed constructs. Moreover, we conducted two multiple regression analyses to investigate the effects of the sentiment dimensions and three UX dimensions of bag-of-word approaches on user satisfaction.

    Table 2.  Descriptive analysis.
    Sentiment analysis Bag-of-words
    Constructs Mean Standard deviation Constructs Mean Standard deviation
    Satisfaction 3.17 1.58 Satisfaction 3.17 1.58
    Positive emotion-Hedonic values 0.114 0.066 Usability 0.151 0.101
    Negative emotion-User burden values 0.106 0.083 Usefulness 0.152 0.062
    Comparisons-Confirmation 0.063 0.051 Affection 0.192 0.114
    Work/Leisure/Home-Pragmatic values 0.177 0.145
    Cost-Cost values 0.457 0.152

     | Show Table
    DownLoad: CSV

    The results of multiple regression analysis indicate that users' hedonic values (PE; bPE = 14.209, β = 0.591, p < 0.001) and confirmation (COM; bCOM = 14.951, β = 0.477, p < 0.001) have notable positive effects on user satisfaction, with an R2 value of 0.811, while cost values are negatively related to satisfaction (CO; bCO = -8.183, β = -0.787, p < 0.001). In addition, two factors, user burden values (NE; bNE = -1.083, β = -0.056, p < 0.001) and pragmatic values (WLH; bWLH = 0.570, β = 0.052, p < 0.001), are marginally associated with satisfaction.

    The results of multiple regression analysis indicate that usability (busability = 6.263, β = 0.202, p < 0.001) and usefulness (busefulness = 7.645, β = 0.300, p < 0.001) have notable effects on user satisfaction with an R2 value of 0.460. Moreover, affection has a significant positive association with satisfaction (baffection = 12.579, β = 0.513, p < 0.001).

    We conducted additional correlation analysis of the sentiment and UX dimensions using two separate approaches. Table 3 shows the results of the analysis.

    Table 3.  Results of correlation analysis of sentiment and UX dimension factors.
    Sentiment analysis Bag-of-words
    Dimension Hedonic values User burden values Confirmation Pragmatic values Cost values Usability Usefulness Affection
    Hedonic values 1
    User burden values -0.055 1
    Confirmation 0.149 -0.126 1
    Pragmatic values 0.188 -0.119 0.104 1
    Cost values -0.360 0.555 -0.288 -0.019 1
    Usability 0.035 -0.002 0.027 0.077 -0.313 1
    Usefulness 0.045 -0.030 0.074 0.070 -0.375 0.266 1
    Affection 0.088 -0.341 0.013 0.077 -0.540 0.051 0.078 1

     | Show Table
    DownLoad: CSV

    This study examines the effects of UX dimension factors on user satisfaction through two text analysis approaches on MFDSs. To this end, we compiled a dataset of 140,992 responses on three top-ranked MFDS applications from two widely used mobile application stores. Both sentiment analysis and bag-of-words approaches to user reviews were examined, and multiple regression analyses were conducted to identify which UX factors significantly affect satisfaction.

    As shown using Eq (3.1), UX factors projected by sentiment analysis play dominant roles in determining user satisfaction with MFDSs. Of these factors, two positive ones (hedonic values and confirmation) and one negative one (cost values) are examined as key determinants of satisfaction. Moreover, the UX factors contributed 81.1% to the variance in satisfaction. In relation to Eq (3.3), usability, usefulness, and affection as computed by the bag-of-word approach play determining roles in user satisfaction: About 46.0% of the variance in satisfaction is contributed by usability, usefulness, and affection.

    The main contributions of the current study are summarized as follows: First, two basic natural language processing approaches can be easily applied to address user satisfaction of MFDSs, one of the widely-used mobile applications. Second, user review comments are one of the valuable and useful resources to improve mobile applications. Third, UX dimensions are comprehensive and essential components in addressing MFDSs.

    Considering that the variance of user satisfaction explained by sentiment analysis factors (81.1%) is significantly greater than with a bag-of-word approach (46.0%), we infer that sentiment analysis can be more effective than the bag-of-word approach in addressing user satisfaction with MFDSs. This difference may be due to the fact that sentiment analysis considers more dynamic constructs than the bag-of-word approach. The correlation analysis found several highly correlated factors (e.g., affection-cost values), indicating that the UX factors are complex and composite concepts that need to be analyzed when we seek to improve UX with mobile services. Thus, additional discussions are needed to provide a better understanding of the UX of a huge number of mobile services.

    One of the intriguing practical findings of the current study is the marginal effects of user burden values on user satisfaction, which implies that users are more likely to concentrating on the positive aspects of mobile applications, rather than negative points or inconveniences of the applications. Thus, developers and researchers should aim at strengthening/maximizing the advantages and benefits of the applications. This study also considers both the applicability and availability of two natural language processing approaches to the use of user review comments as potential resources for improving user experiences and satisfaction with mobile applications. Mobile application developers can easily employ our approaches to improve their mobile applications.

    Despite several significant findings of this study, some limitations remain. First, we employed two basic natural language processing methods. There thus might be better text processing methods for identifying key determinants of user satisfaction with MFDSs. Second, other comprehensive natural language processing approaches can provide the better understanding and examination in investigating user satisfaction (e.g., deep neural network [28]). Third, there can be other effective indicators of UX with MFDSs. Among a number of indicators, we employed two widely-employed approaches (Bag-Of-Words and sentimental dimensions) [29,30]. Fourth, we only considered user review comments written in English [31]. Thus, the results of the current study might be poorly generalizable to comments in low-resource languages. Future research can thus address the limitations of the current study.

    This research was supported by the MSIT (Ministry of Science and ICT), Korea, under the ICAN (ICT Challenge and Advanced Network of HRD) program (IITP-2020-0-01816) supervised by the IITP (Institute of Information & Communications Technology Planning & Evaluation). This work was also supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT)(NRF-2020R1C1C1004324).

    The authors declare there is no conflict of interest.



    [1] Y. Mehmood, F. Ahmad, I. Yaqoob, A. Adnane, M. Imran, S. Guizani, Internet-of-things-based smart cities: Recent advances and challenges, IEEE Commun. Mag., 55 (2017), 16–24. https://ieeexplore.ieee.org/document/8030479
    [2] H. Yang, J. Yuan, C. Li, G. Zhao, Z. Sun, Q. Yao, et al., BrainIoT: Brain-like productive services provisioning with federated learning in industrial IoT, IEEE Int. Things J., 9 (2021), 2014–2024. https://ieeexplore.ieee.org/document/9454442
    [3] B. Bera, S. Saha, A. K. Das, A. V. Vasilakos, Designing blockchain-based access control protocol in iot-enabled smart-grid system, IEEE Int. Things J., 8 (2020), 5744–5761. https://ieeexplore.ieee.org/document/9222155
    [4] M. Hatamian, M. A. Bardmily, M. Asadboland, M. Hatamian, H. Barati, Congestion-aware routing and fuzzy-based rate controller for wireless sensor, Radioengineering, 25 (2016), 114–123. https://www.radioeng.cz/fulltexts/2016/16_01_0114_0123.pdf
    [5] M. Nobakht, V. Sivaraman, R. Boreli, A host-based intrusion detection and mitigation framework for smart home iot using openflow, IEEE, (2016), 147–156. https://ieeexplore.ieee.org/document/7784565
    [6] H. Alkahtani, T. H. Aldhyani, M. Al-Yaari, Adaptive anomaly detection framework model objects in cyberspace, Appl. Bionics Biomech., 2020 (2020). https://doi.org/10.1155/2020/6660489
    [7] T. H. Aldhyani, M. R. Joshi, Intelligent time series model to predict bandwidth utilization, Int. J. Comput. Sci. Appl., 14 (2017).
    [8] M. Tang, M. Alazab, Y. Luo, Big data for cybersecurity: Vulnerability disclosure trends and dependencies, IEEE Trans. Big Data, 5 (2017), 317–329. https://ieeexplore.ieee.org/document/7968482
    [9] V. Priya, I. S. Thaseen, T. R. Gadekallu, M. K. Aboudaif, E. A. Nasr, Robust attack detection approach for iiot using ensemble classifier, preprint, arXiv: 2102.01515.
    [10] S. I. E-ISAC, Analysis of the cyber attack on the ukrainian power grid, 2016.
    [11] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, D. Qiu, Security of the internet of things: perspectives and challenges, Wireless Networks, 20 (2014), 2481–2501. https://doi.org/10.1007/s11276-014-0761-7 doi: 10.1007/s11276-014-0761-7
    [12] A. N. Shahbaz, H. Barati, A. Barati, Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks, Peer-to-Peer Networking Appl., 14 (2021), 541–558. https://doi.org/10.1007/s12083-020-01004-2 doi: 10.1007/s12083-020-01004-2
    [13] A. Mosavifard, H. Barati, An energy-aware clustering and two-level routing method in wireless sensor networks, Computing, 102 (2020), 1653–1671. https://doi.org/10.1007/s00607-020-00817-6 doi: 10.1007/s00607-020-00817-6
    [14] N. N. Dezfuli, H. Barati, Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks, IET Commun., 13 (2019), 578–584. https://doi.org/10.1049/iet-com.2018.5329 doi: 10.1049/iet-com.2018.5329
    [15] N. N. Dezfouli, H. Barati, A distributed energy-efficient approach for hole repair in wireless sensor networks, Wireless Networks, 26 (2020), 1839–1855. https://doi.org/10.1007/s11276-018-1867-0 doi: 10.1007/s11276-018-1867-0
    [16] W. Zhou, Y. Jia, A. Peng, Y. Zhang, P. Liu, The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Int. Things J., 6 (2019), 1606–1616. https://ieeexplore.ieee.org/document/8386824
    [17] J. Ni, K. Zhang, A. V. Vasilakos, Security and privacy for mobile edge caching: Challenges and solutions, IEEE Wireless Commun., 28 (2020), 77–83. https://doi.org/10.48550/arXiv.2012.03165 doi: 10.48550/arXiv.2012.03165
    [18] W. Zhou, Y. Jia, A. Peng, Y. Zhang, P. Liu, The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved, IEEE Int. Things J., 6 (2019), 1606–1616. https://ieeexplore.ieee.org/document/8386824
    [19] A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, 2 (2019), 1–22. https://doi.org/10.1186/s42400-019-0038-7 doi: 10.1186/s42400-019-0038-7
    [20] N. H. Al-A'araji, S. O. Al-Mamory, A. H. Al-Shakarchi, Classification and clustering based ensemble techniques for intrusion detection systems: A survey, in Journal of Physics: Conference Series, 1818 (2021), 012106.
    [21] J. Arshad, M. Azad, M. Abdeltaif, K. Salah, An intrusion detection framework for energy constrained IoT devices, Mech. Syst. Signal Process., 136 (2020), 106436. https://doi.org/10.1016/j.ymssp.2019.106436 doi: 10.1016/j.ymssp.2019.106436
    [22] S. S. Sharifi, H. Barati, A method for routing and data aggregating in cluster-based wireless sensor networks, Int. J. Commun. Syst., 34 (2021), e4754. https://doi.org/10.1002/dac.4754 doi: 10.1002/dac.4754
    [23] J. P. Amaral, L. M. Oliveira, J. J. Rodrigues, G. Han, L. Shu, Policy and network-based intrusion detection system for ipv6-enabled wireless sensor networks, IEEE, (2014), 1796–1801. https://ieeexplore.ieee.org/document/6883583
    [24] B. S. Bhati, G. Chugh, F. Al-Turjman, N. S. Bhati, An improved ensemble based intrusion detection technique using xgboost, Trans. Emerging Telecommun. Technol., (2020), e4076. https://doi.org/10.1002/ett.4076
    [25] M. Roesch, Snort: Lightweight intrusion detection for networks, Lisa, 99 (1999), 229–238.
    [26] J. Singh, M. J. Nene, A survey on machine learning techniques for intrusion detection systems, Int. J. Adv. Res. Comput. Commun. Eng., 2 (2013), 4349–4355.
    [27] T. H. Lee, C. H. Wen, L. H. Chang, H. S. Chiang, M. C. Hsieh, A lightweight intrusion detection scheme based on energy consumption analysis in 6lowpan, in Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, (2014), 1205–1213. https://doi.org/10.1007/978-94-007-7262-5_137
    [28] S. Raza, L. Wallgren, T. Voigt, Svelte: Real-time intrusion detection in the internet of things, Ad Hoc Networks, 11 (2013), 2661–2674. https://doi.org/10.1016/j.adhoc.2013.04.014 doi: 10.1016/j.adhoc.2013.04.014
    [29] B. B. Zarpel˜ao, R. S. Miani, C. T. Kawakani, S. C. de Alvarenga, A survey of intrusion detection in internet of things, J. Network Comput. Appl., 84 (2017), 25–37. https://doi.org/10.1016/j.jnca.2017.02.009 doi: 10.1016/j.jnca.2017.02.009
    [30] H. Wong, T. Luo, Man-in-the-middle attacks on mqtt-based iot using bert based adversarial message generation, KDD'20, 2020.
    [31] M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, A. P. Sheth, Machine learning for internet of things data analysis: A survey, Digital Commun. Networks, 4 (2018), 161–175. https://doi.org/10.1016/j.dcan.2017.10.002 doi: 10.1016/j.dcan.2017.10.002
    [32] K. A. da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, V. H. C. de Albuquerque, Internet of things: A survey on machine learning-based intrusion detection approaches, Comput. Networks, 151 (2019), 147–157. https://doi.org/10.1016/j.comnet.2019.01.023 doi: 10.1016/j.comnet.2019.01.023
    [33] N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, P. Faruki, Network intrusion detection for iot security based on learning techniques, IEEE Commun. Surv. Tutor., 21 (2019), 2671–2701. https://ieeexplore.ieee.org/document/8629941
    [34] M. Dibaei, X. Zheng, Y. Xia, X. Xu, A. Jolfaei, A. K. Bashir et al., Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey, IEEE Trans. Intell. Transp. Syst., 23 (2021), 683–700. https://ieeexplore.ieee.org/document/9519843
    [35] X. Liu, L. Xie, Y. Wang, J. Zou, J. Xiong, Z. Ying et al., Privacy and security issues in deep learning: A survey, IEEE Access, 9 (2020), 4566–4593. https://ieeexplore.ieee.org/document/9294026
    [36] M. Wazid, A. K. Das, V. Bhat, A. V. Vasilakos, Lam-ciot: Lightweight authentication mechanism in cloud-based iot environment, J. Network Comput. Appl., 150 (2020), 102496. https://doi.org/10.1016/j.jnca.2019.102496 doi: 10.1016/j.jnca.2019.102496
    [37] E. Borgia, The internet of things vision: Key features, applications and open issues, Comput. Commun., 54 (2014), 1–31. https://doi.org/10.1016/j.comcom.2014.09.008 doi: 10.1016/j.comcom.2014.09.008
    [38] F. Papi, H. Barati, Hdrm: A hole detection and recovery method in wireless sensor network, Int. J. Commun. Syst., 35 (2022), e5120. https://doi.org/10.1002/dac.5120 doi: 10.1002/dac.5120
    [39] E. G. Dehkordi, H. Barati, Cluster based routing method using mobile sinks in wireless sensor network, Int. J. Electron., (2022), 1–13. https://doi.org/10.1080/00207217.2021.2025451
    [40] X. Liu, M. Zhao, S. Li, F. Zhang, W. Trappe, A security framework for the internet of things in the future internet architecture, Future Int., 9 (2017), 27. https://doi.org/10.3390/fi9030027 doi: 10.3390/fi9030027
    [41] E. Yousefpoor, H. Barati, A. Barati, A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks, Peer-to-Peer Networking Appl., 14 (2021), 1917–1942. https://link.springer.com/article/10.1007/s12083-021-01116-3
    [42] E. Hasheminejad, H. Barati, A reliable tree-based data aggregation method in wireless sensor networks, Peer-to-Peer Networking Appl., 14 (2021), 873–887. https://doi.org/10.1007/s12083-020-01025-x doi: 10.1007/s12083-020-01025-x
    [43] M. Naghibi, H. Barati, Shsda: secure hybrid structure data aggregation method in wireless sensor networks, J. Ambient Intell. Human. Comput., 12 (2021), 10769–10788. https://doi.org/10.1007/s12652-020-02751-z doi: 10.1007/s12652-020-02751-z
    [44] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, R. Boreli, An experimental study of security and privacy risks with emerging household appliances, in 2014 IEEE Conference on Communications and Network Security, (2014), 79–84. https://ieeexplore.ieee.org/document/6997469
    [45] Z. Hajipour, H. Barati, Eelrp: energy efficient layered routing protocol in wireless sensor networks, Computing, 103 (2021), 2789–2809. https://doi.org/10.1007/s00607-021-00996-w doi: 10.1007/s00607-021-00996-w
    [46] A. Arabo, I. Brown, F. El-Moussa, Privacy in the age of mobility and smart devices in smart homes, in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, (2012), 819–826. https://ieeexplore.ieee.org/document/6406331
    [47] M. Al-Hawawreh, E. Sitnikova, F. den Hartog, An efficient intrusion detection model for edge system in brownfield industrial internet of things, in Proceedings of the 3rd International Conference on Big Data and Internet of Things, (2019), 83–87. https://doi.org/10.1145/3361758.3361762
    [48] A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, A. Anwar, Ton iot telemetry dataset: A new generation dataset of iot and iiot for data-driven intrusion detection systems, IEEE Access, 8 (2020), 165130–165150. https://ieeexplore.ieee.org/document/9189760
    [49] E. Anthi, L. Williams, M. Słowinska, G. Theodorakopoulos, P. Burnap, A supervised intrusion detection system for smart home iot devices, IEEE Int. Things J., 6 (2019), 9042–9053. https://ieeexplore.ieee.org/document/8753563
    [50] S. U. Jan, S. Ahmed, V. Shakhov, I. Koo, Toward a lightweight intrusion detection system for the internet of things, IEEE Access, 7 (2019), 42450–42471. https://ieeexplore.ieee.org/document/8675917
    [51] F. Ertam, L. F. Kilincer, O. Yaman, Intrusion detection in computer networks via machine learning algorithms, in 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), (2017), 1–4. https://ieeexplore.ieee.org/document/8090165
    [52] T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, M. A. Khan, Performance analysis of machine learning algorithms in intrusion detection system: A review, Procedia Comput. Sci., 171 (2020), 1251–1260. https://doi.org/10.1016/j.procs.2020.04.133 doi: 10.1016/j.procs.2020.04.133
    [53] O. Almomani, M. A. Almaiah, A. Alsaaidah, S. Smadi, A. H. Mohammad, A. Althunibat, Machine learning classifiers for network intrusion detection system: comparative study, in International Conference on Information Technology (ICIT), (2021), 440–445. https://ieeexplore.ieee.org/document/9491770
    [54] B. S. Bhati, G. Chugh, F. Al-Turjman, N. S. Bhati, An improved ensemble based intrusion detection technique using xgboost, Trans. Emerging Telecommun. Technol., 32 (2021), e4076. https://doi.org/10.1002/ett.4076 doi: 10.1002/ett.4076
    [55] M. Belouch, S. E. hadaj, Comparison of ensemble learning methods applied to network intrusion detection, in Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing, (2017), 1–4. https://doi.org/10.1145/3018896.3065830
    [56] N. Moustafa, B. Turnbull, K. K. R. Choo, An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things, IEEE Int. Things J., 61 (2018), 4815–4830. https://ieeexplore.ieee.org/document/8470090
    [57] V. Priya, I. S. Thaseen, T. R. Gadekallu, M. K. Aboudaif, E. A. Nasr, Robust attack detection approach for iiot using ensemble classifier, preprint, arXiv: 2102.01515.
    [58] A. Verma, V. Ranga, Elnids: Ensemble learning based network intrusion detection system for rpl based internet of things, in 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), (2019), 1–6. https://ieeexplore.ieee.org/document/8777504
    [59] A. Elijah, A. Abdullah, N. Jhanjhi, M. Supramaniam, B. Abdullateef, Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: An empirical study, Int. J. Adv. Comput. Sci. Appl., 10 (2019), 520–528. 10.14569/IJACSA.2019.0100969 doi: 10.14569/IJACSA.2019.0100969
    [60] Y. Wang, Y. Shen, G. Zhang, Research on intrusion detection model using ensemble learning methods, in 2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), (2016), 422–425. https://ieeexplore.ieee.org/document/7883100
    [61] B. A. Tama, M. Comuzzi, K. H. Rhee, Tse-ids: A two-stage classifier ensemble for intelligent anomaly-based intrusion detection system, IEEE Access, 7 (2019), 94497–94507. https://ieeexplore.ieee.org/document/8759867
    [62] R. Primartha, B. A. Tama, Anomaly detection using random forest: A performance revisited, in 2017 International Conference on Data and Software Engineering (ICoDSE), (2017), 1–6. https://ieeexplore.ieee.org/document/8285847
    [63] R. Abdulhammed, M. Faezipour, A. Abuzneid, A. AbuMallouh, Deep and machine learning approaches for anomaly-based intrusion detection of imbalanced network traffic, Int. J. Adv. Comput. Sci. Appl., 10 (2019), 1–4. https://ieeexplore.ieee.org/document/8526292
    [64] C. Ioannou, V. Vassiliou, An intrusion detection system for constrained wsn and iot nodes based on binary logistic regression, in Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, (2018), 259–263. https://doi.org/10.1145/3242102.3242145
    [65] P. Ghosh, R. Mitra, Proposed ga-bfss and logistic regression based intrusion detection system, in Proceedings of the 2015 Third International Conference on Computer, Communication, Control and Information Technology (C3IT) (2015), 1–6. https://ieeexplore.ieee.org/document/7060117
    [66] S. U. Jan, S. Ahmed, V. Shakhov, I. Koo, Toward a lightweight intrusion detection system for the internet of things, IEEE Access, 7 (2019), 42450–42471. https://ieeexplore.ieee.org/document/8675917
    [67] B. Sharmila, R. Nagapadma, Intrusion detection system using naive bayes algorithm, in 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE.IEEE, (2019), 1–4. https://ieeexplore.ieee.org/document/9019921
    [68] Z. Muda, W. Yassin, M. Sulaiman, N. Udzir, Intrusion detection based on k-means clustering and naıve bayes classification, in 2011 7th International Conference on Information Technology in Asia, (2011), 1–6. https://ieeexplore.ieee.org/document/5999520
    [69] A. Halimaa, K. Sundarakantham, Machine learning based intrusion detection system, in 2019 3rd International conference on trends in electronics and informatics (ICOEI), (2019), 916–920. https://ieeexplore.ieee.org/document/8862784
    [70] N. Farnaaz, M. Jabbar, Random forest modeling for network intrusion detection system, Procedia Comput. Sci., 89 (2016), 213–217. https://doi.org/10.1016/j.procs.2016.06.047 doi: 10.1016/j.procs.2016.06.047
    [71] M. A. M. Hasan, M. Nasser, B. Pal, S. Ahmad, Support vector machine and random forest modeling for intrusion detection system (ids), J. Intell. Learn. Syst. Appl., 2014 (2014). https://www.scirp.org/journal/paperinformation.aspx?paperid=42869
    [72] D. Zheng, Z. Hong, N. Wang, P. Chen, An improved lda-based elm classification for intrusion detection algorithm in iot application, Sensors, 20 (2020), 1706. https://doi.org/10.3390/s20061706 doi: 10.3390/s20061706
    [73] B. Subba, S. Biswas, S. Karmakar, Intrusion detection systems using linear discriminant analysis and logistic regression, in 2015 Annual IEEE India Conference (INDICON), (2015), 1–6. https://ieeexplore.ieee.org/document/7443533
    [74] L. Rutkowski, M. Jaworski, L. Pietruczuk, P. Duda, Decision trees for mining data streams based on the gaussian approximation, IEEE Trans. Knowl. Data Eng., 26 (2013), 108–119. https://ieeexplore.ieee.org/document/6466324
    [75] B. V. Dasarathy, B. V. Sheela, A composite classifier system design: Concepts and methodology, Proc. IEEE, 67 (1979), 708–713. https://ieeexplore.ieee.org/document/1455590
    [76] A. Lal, B. Datta, Performance evaluation of homogeneous and heterogeneous ensemble models for groundwater salinity predictions: A regional-scale comparison study, Water, Air, Soil Pollut., 231 (2020), 1–21. https://doi.org/10.1007/s11270-020-04693-w doi: 10.1007/s11270-020-04693-w
    [77] A. Subasi, S. Algebsani, W. Alghamdi, E. Kremic, J. Almaasrani, N. Abdulaziz, Intrusion detection in smart healthcare using bagging ensemble classifier, in International Conference on Medical and Biological Engineering, (2021), 164–171. https://doi.org/10.1007/978-3-030-73909-6_18
    [78] U. Sydney, The ton-iot dataset, 2020. Available from: https://research.unsw.edu.au/projects/toniot-datasets.
    [79] A. Geron, Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, tools, and Techniques to Build Intelligent Systems, O'Reilly Media, 2019.
    [80] V. Priya, I. S. Thaseen, T. R. Gadekallu, M. K. Aboudaif, E. A. Nasr, Robust attack detection approach for iiot using ensemble classifier, preprint, arXiv2102.01515.
    [81] S. Rajagopal, P. P. Kundapur, K. S. Hareesha, A stacking ensemble for network intrusion detection using heterogeneous datasets, Secur. Commun. Networks, 2020 (2020). https://doi.org/10.1155/2020/4586875
    [82] S. Fenanir, F. Semchedine, A. Baadache, A machine learning-based lightweight intrusion detection system for the internet of things, Rev. d'Intell. Artif., 33 (2019), 203–211. https://doi.org/10.18280/ria.330306 doi: 10.18280/ria.330306
  • This article has been cited by:

    1. Muhamad Redha Iqbal Bin Daud, Norhidayah Abdullah, Lovelyna Benedict Jipiu, Determining the Correlation among the Users' Satisfaction and Familiarity with Malay Entrepreneurs Food Delivery Mobile Applications in Malaysia, 2024, 2198-5804, 10.1007/s40745-024-00568-7
    2. Janupally Vedika Reddy, Gugulothu Chaitanya, Jeelugula Sai Lalitha Manogna, Donthula Nihitha, Mohammad Manzoor Hussain, 2024, Online Food Delivery by Personal Customization System, 979-8-3503-9463-4, 1, 10.1109/HORA61326.2024.10550811
    3. Begoña Juliá-Nehme, Javiera Rosell, Interaction and Design Barriers for Older Adults in Food Delivery Apps: A Usability Study, 2024, 1044-7318, 1, 10.1080/10447318.2024.2365484
    4. Eunil Park, Examining metaverse game platform adoption: Insights from innovation, behavior, and coolness, 2024, 77, 0160791X, 102594, 10.1016/j.techsoc.2024.102594
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(13275) PDF downloads(208) Cited by(12)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog