Altmetrics
Downloads
96
Views
48
Comments
0
This version is not peer-reviewed
IoT for Energy Management Systems and Smart Cities, 2nd Edition
Submitted:
07 October 2024
Posted:
08 October 2024
You are already at the latest version
Key Ideas | Survey Scope | Cross-Layer Inspired? | Challenges | References |
---|---|---|---|---|
LPWANs like LoRaWAN in IoT: Challenges and Cross-Layer Optimization, Cognitive Radio, EE Multi-Channel Cross-Layer MAC Framework | 6G, LoRaWAN in IoT, CSMA Protocols, 6G Communication, EE in IoT Networks, CSMA Protocols | Yes | Protocol optimization, data rate, duty cycle, Massive connectivity Requirement, Energy Constraint | [4] |
Cyber-physical systems: Testing platforms and vulnerability modelling, Combining Exposure Indicators and Predictive Analytics, Internal Assessment and Evaluation, H2020 ECHO Project Implementation, | Cyber-physical systems, Exposure Indicators and Predictive Analytics, Privacy-Preserving Evaluation, Cybersecurity Information Sharing | No | Data security, vulnerability modelling, Gaps Between Exposure Indicators and Predictive Analytics, Sensitive Information Protection, Trust and Transparency Among Stakeholders | [5] |
Social Internet of Things (SIoT) Security, CPS in Industry, Hybrid Risk Identification Methodology, Four-Step Risk Identification Process, | SIoT security, Risk Identification in Industry, CPS Interactions, Risk Management Standards and Frameworks | Yes | Security, energy efficiency, graph-powered learning, Comprehensive Risk Identification, Complexity of CPS Interconnections, Redundancy of Risks | [6] |
IoT Security Challenges and Solutions, Flying Ad Hoc Networks Challenges, Energy-Aware Routing Scheme, Path Selection Metrics, Performance Evaluation | IoT security challenges, Routing Algorithms in FANETs, Virtual Relay Tunnel (VRT) Concept, Comparison of Routing Schemes | No | Security vulnerabilities, cryptographic protocols, Dynamic Topology and High Mobility, Energy Restrictions, Efficient Path Selection | [7] |
Smart City Concept, Smart City Security and Privacy: Suggested Solutions Using Blockchain and Encryption, Blockchain for Security | Adaptive cybersecurity, IoT and Cloud-based Security Issues, Data Privacy and Security Solutions, Smart City Data Management | No | Real-world network packet collection, machine learning, Resource Optimization vs. Security, Decentralized and Distributed Structure, Implementing Blockchain | [8] |
Comprehensive Overview of IoT Security, Rapid Growth of IoT, IoT Security Concerns, Case Study on Camera-based IoT, Importance of Privacy and Stakeholder Roles | IoT security overview, IoT Overview and Security, Threat Analysis for Smart Camera Systems (SCS), IoT Security and Privacy | No | IoT development, security solutions, Complexity of IoT Security, Vulnerabilities in IoT Applications, Stakeholder Responsibility | [9] |
NOMA-based-MIoT Communication System, 5G Technology in MIoT, NOMA-based Heterogeneous Communication System, Energy Efficiency (EE) Optimization, Iterative Approach for Optimization | MIoT Networks, MIoT communication, Energy Efficiency in MIoT, Optimization Techniques, Handling uncertain channel state Information | Yes | Energy efficiency, spectrum consumption, Complexity of Optimization, Inadequate Channel State Information, Balancing Constraints, Quality of Service | [10] |
Energy-efficient Routing for Smart Dust Head Networks, Challenges with Movable Smart Dust Basestation, Flooding Approach, EE Routing Mechanism, Fuzzy Clustering and Optimization | Smart Dust energy-efficient routing, Movable BS Positioning, Routing Architectures, Optimization Techniques | No | Energy-efficient routing, network performance, High Power Usage, Network Stability, Efficient Routing | [11] |
Cognitive Radio Technology for Energy-efficient IoT, IoT and Spectrum Demand, Cognitive Radio (CR) Technology, Efficient Communication Protocols, Cross-Layer Design Proposal | CR Technology for IoT, Cross-Layer Optimization, Simulation and Performance Evaluation | Yes | Spectrum optimization, Spectrum Utilization, Energy Efficiency, Network Adaptation | [12] |
Key Contributions | Performance Evaluation Methods | Limitations | References |
---|---|---|---|
Enhanced LoRaWAN for IoT applications,Cross-Layer Optimization Overview, Classification of Techniques, Identification of Issues and Challenges, Performance Overview | State-of-the-Art Summary, Cross-Layer Optimisation of LoRaWAN, Overview of Challenges of LoRaWAN | Lack of empirical validation, Lack of Summary, Protocol Stack Restrictions, Optimization Gaps | [16] |
Designed energy-efficient MAC solution for NB-IoT, Energy-Efficient MAC Layer Solution, Optimization Framework, Cross-Layer Approach, Probabilistic Sleep Scheduling | MINLP optimization; Lyapunov optimization, Distributed sleep scheduling, Simulation Results, High Traffic Load Testing | Reliance on simulation, Resource Constraints, Traffic Model Assumptions, Scalability | [17] |
Integrated energy-efficient OF into RPL routing, Introduction of ELITE, New Routing Metric, Cross-Layer Integration, Path Selection Improvement | Energy-efficient cross-layer OF integration, RPL protocol, Comparison with Existing OFs, Simulation Results | Limited evaluation in diverse IoT environments, potential complexity in implementation, MAC Layer Dependency, Metric Specificity, Generalizability | [18] |
Enhance HCN energy efficiency with NOMA, Focus on Energy Efficiency, Optimization Problem Formulation, Introduction of Quantum-inspired political optimizer(QPO) Algorithm | Hybrid resource allocation optimization, Simulation Results(Evaluation of the QPO algorithm’s performance) | Reliance on simulated comparisons, potential challenges in real-world deployment, Non-Convex Problem Complexity, Algorithm Specific | [19] |
Optimized routing for energy efficiency in FANETs, Virtual relay tunnel based on a suggested energy-conscious routing strategy (ECRS), Incorporation of Multiple Metrics, Path Correlation Metric (enhance route selection) | Energy-aware routing with virtual relay tunnel, comparison against existing methods, Comparative Analysis, Simulation Studies | Limited real-world validation; potential trade-offs between efficiency and longevity, Specificity to FANETs, Complexity in Path Selection, Comparative Scope | [20] |
Investigated energy management in edge computing, Energy-Efficient Secure Data Transmission, Multi-Scale Grasshopper Optimization, Robust Multi-Cascaded CNN (RMC-CNN), Dynamic Honey Pot Encryption Algorithm | Cross-layer energy optimization, Comparison with Existing Techniques, Encryption and Decryption Time Analysis, | Lack of empirical validation; potential complexity in cross-layer management, Specific Dataset Focus, Complexity of Encryption and Detection Mechanisms, Scalability and Real-Time Constraints | [21] |
Developed energy-efficient MAC for CR-enabled 6G-IoT, Joint Adaptation of Physical and MAC Layer Parameters, Per-Bit Energy Efficiency Maximization | Multi-channel MAC design, Numerical Results | Reliance on simulations; potential challenges in real-world deployment, Specific to Non-Persistent CSMA, Simulation-Based Evaluation, Design Constraints in 6G-IoT, Design Constraints in 6G-IoT | [4] |
Integrated energy-efficient protocols into IoT, Cross-Layer Energy Architecture Model, Focus on Green and Renewable Energy, Mathematical Modeling | Utilization of MQTT, CoAP, Zigbee, Wi-Fi for energy efficiency; support for various IoT applications, Mathematical Analysis, Power Savings Estimation, | Lack of empirical validation, Limited Exploration of Practical Implementation, Focus on Theoretical Framework, Scalability and Applicability | [22] |
Investigated energy efficiency, Thorough Review of IoT for EE, Identification of Common Design Factors, Future Research Directions | Examination of hardware, software for energy management, use of historical data for forecasting, Review and Analysis, Identification of Patterns | Lack of real-world validation, Lack of Original Empirical Data, Application-Specific Variables, Focus on Heating Systems | [23] |
Key Contributions | Limitations | Security Measures? | References |
---|---|---|---|
Cross-layer security and privacy were designed, Integration of IoT technologies with AI for security, Adoption of blockchain for decentralized coordination, Multidisciplinary approaches to ensure IoT security | Application layer security has not been explored, Resource constraints, Privacy concerns, Security issues, Lack of training data, Centralized architecture limitations | AI-based real-time data analysis, Blockchain for secure resource and data sharing, Addressing IoT and WSNs security threats dynamically | [39] |
Presented various IoT framework tiers,Development of model to mitigate DDoS attacks in local networks, Utilization of Host Intrusion Detection Systems, Integration of Network Intrusion Detection System with federated learning | Think about tiered communication alone, Privacy concerns in decentralized IoT infrastructure, Potential for increased complexity in federated training/detection, Possible challenges in real-time and precise attack detection | Use of HIDS and NIDS for comprehensive attack identification, Federated learning data analysis/anomaly detection, Distributed architecture to prevent volumetric attack traffic, Near-real-time detection in fog Computing | [40] |
Systematic literature review (SLR) on AI methods for IoT cybersecurity, investigation of machine learning and deep learning methods for IoT security, Finding popular techniques for high accuracy detection, such as random forests (RF) and support vector machines (SVM) | Framework for detecting intrusions at the network layer, Lacks a cross-layer strategy, Existing security and privacy challenges despite AI advancements, Need for intelligent architectural frameworks for better intrusion detection | Artificial intelligence (AI) techniques are utilized to secure Internet of Things devices. applying AI methods to identify cybersecurity threats, intelligent intrusion detection systems (IDS) with frameworks based on AI, Examination of AI techniques based on attack categories | [1] |
At the most basic level of security, perception, the physical layer, and the wireless network layer were considered, Proposal of a global perspective security framework for PIoT, Focus on security issues in the perception layer of PIoT, Development of security policies and countermeasures for PIoT, Application of research results in real-world projects | Complexity of securing a large, complex cyber-physical network like PIoT, Potential challenges in implementing the proposed security framework across all layers, Complexity of securing a large, complex cyber-physical network like PIoT, Potential challenges in implementing the proposed security framework across all layers | The deployment of the autonomous safety system. security audits, residual information protection, intrusion prevention, and data backup, systems, Security framework spanning from perception layer to application layer, Specific security policies and countermeasures for addressing PIoT security issues | [2] |
Discussion of existing vulnerabilities and attacks in the IoT ecosystem, Testing secure framework for IoT applications, Framework evaluates IoT applications from the initial phase | Complexity of securing IoT applications,Potential challenges in implementing comprehensive monitoring and security testing. | Monitoring and security testing framework and evaluate IoT applications, Focus on addressing security issues from the early stages of IoT application development | [3] |
Examination of communication standards (ITU-T), Discussion of 4-levels of IoT security gateways, Overview of testing methods for IoT devices | Potential complexity in securing diverse communication standards, Challenges in applying uniform security measures across different levels | Identification of 4-levels of security in IoT systems, Application of security testing methods to evaluate IoT components and systems | [41] |
Review of IoT threats, security requirements, challenges, Proposal of a novel paradigm combining IoT architecture with SDN, Discussion on SDN-based IoT deployment models | Challenges in unifying all IoT stakeholders on a single platform, Potential hurdles in implementing SDN-based security solutions across diverse IoT environments | Introduction of SDN-based IoT security solutions, Comprehensive overview of software-defined security (SDSec), Emphasis on network-based security solutions for the IoT paradigm | [42] |
Analysis of IoT’s impact across various domains, Discussion of Service Oriented Architecture model, Divided into application network and perception layers, Examination of IoT security attacks during COVID-19 | Numerous privacy concerns in rapidly developing IoT environments, Increased security attacks on IoT devices, especially during the COVID-19 | Security and privacy challenges in IoT based on SOA layers, Identification of different technologies used for communication in each IoT layer, Overview of attacks targeting specific SOA layers and IoT devices | [15] |
Survey Scope | IoT Security | Security-Measure Implemented | Limitations | References |
---|---|---|---|---|
IoT Security Research,Focuses on the deployment of IoT technology in industrial automation, Next Generation Cyber Security Architecture (NCSA) for the Industrial IoT | NCSA Implementation, Automated Cyber-Defense | Vulnerabilities, attacks, cross-layer security, Real-time Protection, Identity Token Mechanism | Limited consideration of interaction of cyber-physical devices,Specific Focus on IIoT, No Detailed Performance Evaluation, Potential Integration Challenges | [77] |
In-depth analysis of the IIoT ecosystem focusing on security and digital forensics, Overview of the state-of-the-art in IIoT security and digital forensics, Highlighting key achievements, Challenges | Examination of the structural and dynamic complexity of IIoT, Exploration of vulnerabilities introduced by the continuous integration of IIoT | Analysis of cutting-edge security mechanisms deployed in IIoT ecosystems to protect processes,Survey of digital forensics literature related to IIoT, Focusing on techniques and tools to mitigate security breaches | NCSA proposed for real-time threat detection,Complexity and Integration, Evolving Threat Landscape, Need for Future Research | [69] |
Cyber-physical system risk identification, Analysis of risk identification in Industry (CPS), Examination of methodologies for identifying risks across physical, Interconnection layers in CPS | Focus on the security vulnerabilities and cyber-attacks associated with interconnected devices and equipment in Industry CPS | Proposed a new hybrid methodology for risk identification in Industry, Integrating existing frameworks and standards such as ISO 31000, PMBOK, HAZOP, and NIST, Developed a four-step process that includes identifying risks from various sources | Lack of consideration for interaction of cyber-physical devices, Incompleteness of Existing Methodologies | [6] |
Threat detection in industrial networks, Exploration of a framework combining using AI tools, Focus on threat detection within real industrial IoT sensor networks | Addresses the challenge of detecting threats IIoT networks while maintaining privacy and security | Big data architecture, predictive analytics | Limited to real industrial network, AI-based predictive analytics, Securely sharing results, Application of the framework as part of the H2020 ECHO project | [5] |
Cross-layer authentication framework, Focuses on addressing security challenges in IIoT of 5G technology, Explores the security implications of bypassing upper authentication protocols and supporting small data transmission during initial access in IIoT systems | Highlights the vulnerabilities in IIoT due to the use of 5G, Emphasizes the need for secure cross-layer authentication frameworks to address these vulnerabilities | Device authentication vulnerabilities, 5G technology, Proposes a secure cross-layer authentication framework, Utilizes a quantum walk-based privacy-preserving, Derives the space of one-time keys for encryption | Proposal addresses security vulnerabilities, Complexity, Scalability, Performance Overhead | [58] |
Adaptive Cybersecurity system, Cybersecurity for networked devices using virtual environment services | Addresses increased risks due to widespread device connectivity | Real-world network packet collection, Machine learning, Honeynet architecture, Adaptive Cybersecurity (AC) system | Performance improvements needed, dataset expansion planned, Data dependency, Scalability challenges | [61] |
Main Contributions | Trends | Application Area | Reference |
---|---|---|---|
Big Data Architecture, Predictive Analytics, Threat detection, Obscuring sensitive data, Evaluation framework | Enhances trust among stakeholders, Closes security gaps | Industrial networks | [5] |
Cross-layer Optimization, LoRaWAN, Flexibility across protocol layers, Energy-efficient | Optimizes protocol, Enhances performance | IoT applications, LPWANs | [16] |
Hybrid Methodology, Risk Identification, ISO 31000, PMBOK, HAZOP, NIST strategies | Reduces risk redundancy, Comprehensive analysis | Cyber-Physical Systems (CPS) | [6] |
Social IoT (SIoT), Cross-layer Security, Data trustworthiness, Graph-powered learning strategies | Enhances network navigability, Balance energy efficiency | SIoT ecosystems | [14] |
Lightweight Encryption, Key Management, Random key encryption, Information-theoretic security | Efficient and secure, Suitable for resource-limited IoT | IoT, Cyber-Physical Systems (CPS) | [52] |
Cross-layer Intrusion Detection, Ensemble Learning, IoT-Sentry, Cooja IoT simulator analysis | High detection accuracy, Minimal overhead | Standardized IoT networks | [53] |
IoT Authentication Strategies, Categorization by hierarchy, centralization, distribution | Comprehensive review, Encourages further research | IoT authentication | [55] |
Lightweight Mutual Authentication, Smart city applications, Performance optimization | Balances security and efficiency, Outperforms existing protocols | Smart cities, Traffic and water management | [57] |
Cross-layer Authentication, Quantum Walk, Device identifier encoding, Privacy-preserving protocol | High security and privacy, Low latency | IIoT, 5G networks | [58] |
Honeynet Architecture, Machine Learning, Real-world attack detection, Web-based IDS-AC | Effective attack warnings, User self-update | Industrial networks, Cybersecurity | [61] |
Survey of IoT Security Research, Vulnerabilities, Mitigation strategies, Future directions | Comprehensive overview, Guides future research | IoT development, Security solutions | [62] |
ESPINA Protocol, IoT network technologies in delay, Improved security with keys-renewal strategy, Reduces computational cost | Energy optimization, 6G wireless connectivity, Superior to current protocols, Effective for 6G standards,6G wireless communications, Energy-efficient and secure protocols | Healthcare IoT, Embedded systems, Security-sensitive applications | [73] |
CLCSR Protocol, Attack detection, Secure clustering, Lightweight cryptography | Enhances network performance, Privacy preservation | E-healthcare, Smart cities | [74] |
Hierarchical Authentication, Key Agreement, Physically unclonable functions, Elliptic curve cryptography | Efficient and secure, Resistant to common attacks | Industry 4.0, IoT environments | [76] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated