Altmetrics
Downloads
175
Views
79
Comments
0
A peer-reviewed article of this preprint also exists.
This version is not peer-reviewed
Submitted:
18 July 2024
Posted:
18 July 2024
You are already at the latest version
Reference | Method/Technique | Strengths of the Study | Weaknesses of the Study |
---|---|---|---|
[11] Joel et al., 2023 | Analysis of security challenges in IoT smart homes | Comprehensive analysis of various IoT security challenges | Limited focus on mitigation strategies |
[12] Blake et al., 2022 | Security with blockchain technology | Innovative use of blockchain for IoT security | Does not address integration with other security measures |
[13] Alawadhi et al., 2022 | Analysis of IoT security risks for businesses | Focuses on business-related IoT risks | Lack of technical details on mitigation |
[14] Khanam, 2023 | Review of IoT threats and solutions | Provides a broad overview of IoT threats | Lacks in-depth analysis of specific threats |
[15] Haris et al., 2023 | Discussion on IoT security and privacy issues | Highlights various security and privacy issues | Limited empirical data to support claims |
[16] Gupta and Lingareddy, 2021 | Security threats and mitigations in IoT | Discusses a range of security threats and solutions | Focuses mainly on theoretical aspects |
[17] Bakshi, 2021 | IoT architecture vulnerabilities | Detailed analysis of IoT architecture vulnerabilities | Limited focus on practical solutions |
[18] Hromada et al., 2021 | Security aspects of IoT | Comprehensive discussion on IoT security protocols | Limited real-world application examples |
[19] Mallik and Jena, 2021 | Analysis of IoT security vulnerabilities | Provides solutions for common IoT vulnerabilities | Focuses on general rather than specific vulnerabilities |
[20] Amit et al., 2022 | Study on DDoS attacks on IoT devices | Detailed analysis of DDoS attack methods | Limited focus on preventive measures |
[21] Lightbody et al., 2023 | Framework for intrusion detection in IoT | Innovative use of side-channel analysis | Limited scalability for large IoT networks |
[22] Mohd Bakry et al., 2022 | Security attack study using Raspberry Pi | Practical demonstration of IoT attacks | Limited scope with a single device model |
[23] Neto et al., 2023 | Real-time IoT attack dataset | Provides a comprehensive IoT attack dataset | Limited focus on mitigation strategies |
[24] Kampel et al., 2022 | Detection of HTs using combinatorial testing | Effective method for detecting HTs in cryptographic circuits | May not be applicable to all circuit types |
[25] Jain et al., 2021 | Survey of HT detection methods | Comprehensive survey of HT detection techniques | Limited practical application examples |
[26] Liu et al., 2011 | Design of counter-based HT | Innovative HT design method | Dated methodology, lacks modern context |
[27] Shakya et al., 2017 | Benchmarking of HTs | Provides a benchmarking framework for HTs | Limited focus on detection methods |
[28] Tang et al., 2023 | HT detection using adversarial networks | High accuracy in HT detection | Complex implementation |
[29] Dakhale et al., 2023 | Detection of HTs using VGG-Net | Effective use of neural networks for HT detection | Computationally intensive |
[30] Mao et al., 2022 | HT detection using suspicious circuit partition | Novel approach to HT detection | May produce false positives |
[31] Hassan et al., 2023 | GNN-based HT detection | High accuracy without a golden IC reference | Requires complex graph learning algorithms |
[33] Brunner et al., 2024 | FSM-based hardware honeypot | Realistic imitation of original FSM | May not cover all HT types |
[34] Wegerer and Tjoa, 2016 | MySQL database honeypot | Effective in deceiving database adversaries | Limited to MySQL databases |
[35] Piggin and Buffey, 2016 | Operational technology honeypot | Provides insights into attacker methods | Limited scope, focused on specific technologies |
[36] Kibret and Yong, 2013 | Dynamic hybrid virtual honeypot | Combines multiple honeypot types | Complex implementation |
[37] Guan et al., 2023 | Adaptive honeypot for IoT using RL | Adapts to evolving threats using RL | High resource requirements |
[38] Ellouh et al., 2022 | IoT honeypot for zero-day attacks | Effective against zero-day attacks | Limited real-world deployment |
[39] Srinivasa et al., 2021 | Modular hybrid-interaction honeypot | Flexible and modular design | Limited long-term studies |
[40] Srinivasa et al., 2022 | Comprehensive honeypot analysis and dataset | Provides extensive data on attack patterns | High complexity in analysis |
[41] Xiaoming et al., 2022 | Lightweight honeynet for IoT | Cost-effective and scalable | Limited to lightweight applications |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated