Refs. | Research method | IoT security requirements | Machine learning technology | Year | ||
---|---|---|---|---|---|---|
IDS | Authentication | General security (encryption, privacy, integrity DoS/DDoS, authorization, secure routing, confidentiality, access control, theft detection secure routing, availability, etc.) | ||||
[46] | Survey | × | × | ✓ | Deep learning | 2020 |
[47] | Survey | ✓ | × | ✓ | Machine learning | 2020 |
[48] | Survey | × | × | ✓ | Machine learning and artificial intelligence | 2020 |
[49] | Literature review | × | ✓ | ✓ | Machine learning | 2018 |
[50] | SLR | ✓ | ✓ | × | Machine learning | 2018 |
[51] | Literature review | × | × | ✓ | Machine learning | 2018 |
[52] | Review | ✓ | × | ✓ | Deep learning | 2020 |
[53] | Survey | ✓ | × | ✓ | Machine learning | 2018 |
[54] | Survey | ✓ | × | × | Machine learning | 2019 |
[55] | Literature review | ✓ | × | × | Machine learning | 2019 |
[56] | Survey | ✓ | × | × | Machine learning | 2018 |
[57] | Survey | ✓ | × | × | Machine learning | 2019 |
[28] | Review | ✓ | × | × | Machine learning | 2019 |
[29] | Review | ✓ | ✓ | × | Machine learning | 2020 |
[30] | Review | × | × | ✓ | Deep learning and machine learning | 2020 |
[31] | Survey | ✓ | × | ✓ | Machine learning | 2018 |
[32] | Survey | ✓ | × | × | Machine learning | 2020 |
[33] | Review | × | × | ✓ | Machine learning | 2018 |
[34] | SLR | ✓ | × | × | Machine learning | 2020 |
Proposed work | SLR | ✓ | ✓ | ✓ | Artificial neural networks (ANNs) | 2020 |