A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions
Abstract
:1. Introduction
Organization of the Article
2. Standards of CPS and IoT
3. Traditional Machine Learning Algorithms and Advanced Algorithms
3.1. Traditional Machine Learning Algorithms
3.1.1. Classification Algorithms
- NNs: Neural networks are computing processes inspired by human brains. They form the foundation of many deep learning algorithms. Each NN comprises an input layer, a hidden layer, and an output layer. The general principle is to assign weights between nodes (representing the connection of neurons). Commonly, negative weights refer to inhibitory connections, whereas positive weights refer to excitatory connections. There are two types of NNs: feed-forward NNs and feed-backward NNs [49]. The former type includes radial basis function networks, multi-layer perceptrons, and single-layer perceptrons. The latter contains arts models, competitive networks, Hopfield networks, Kohonen’s self-organizing map, and Bayesian regularized neural networks. The advantages of NNs are their good generalization ability, fault tolerance, non-linear relationships, and good learning ability [50]. The disadvantages are that these models are noise-sensitive, require sufficient training samples, have large computing complexity, and are prone to model overfitting.
- SVMs: Support vector machines map input samples to a feature space of higher dimensions using kernel mapping. A hard-margin formulation is used if the data are linearly separable, whereas a soft-margin formulation is utilized if the data are non-linearly separable. Typical kernel functions for general applications are linear functions, radial basis functions, polynomial functions, sigmoid functions, and Gaussian kernels. To enhance mapping ability, customized kernels (kernels fulfilling Mercer’s Theorem) can be designed for desired applications [51]. The advantages of SVMs are the flexibility of kernel tricks to separate between classes, higher memory efficiency to work in high-dimensional feature spaces, and fewer convex optimization problems [52]. Their disadvantages are that they are vulnerable to noisy environments, unsuitable for large-scale datasets, and have high model complexity with more features.
- DTs: Decision trees are tree-based hierarchical structures. The members of a tree are its leaf nodes, internal nodes, branches, and one root node. The rationale is related to decisions and outcomes, which can be quantified using their utility, resource costs, and event outcomes. Attributed to their ease of interpretation, DTs are widely used in operations management and research for decision-making [53]. Their advantages are their ability to handle missing samples, tackle numerical and categorical samples, and determine representative features [54]. Their disadvantages are that they are prone to overfitting and that their models are sensitive to minor changes in sample distribution and are biased towards outcomes.
3.1.2. Clustering Algorithms
- k-means clustering: As one of the most classic algorithms, it groups samples into k-clusters. Each sample is assigned to a cluster with the nearest mean. In other words, the algorithm aims to minimize within-cluster variance. Commonly, the k-means clustering algorithm assumes that features are equally important. To choose the value of k, different indexes have been proposed, such as the Calinski–Harabasz (CH), Davies–Bouldin (DB), Silhouette (SH), and Consensus (CI) indices [57]. The advantages of the algorithm include convergence being guaranteed, good adaptation to new samples, and scalability to large-scale datasets [58]. Challenges experienced by the algorithm include the initialization of the centroids and the number of clusters.
- Mean shift clustering: This algorithm is an iterative process for the convergence of the weighted means of kernel densities. Equivalently, the probability density function of the random variables is estimated. Weighting factors are linked with samples. Standard kernels include the generalized Epanechnikov, Cauchy, and Gaussian kernels [59]. Similar to the kernel-based SVM, a customized kernel is a promising solution if the best performance is desired. The advantages of mean shift clustering are its robustness to outliers, its ability to handle any feature space, and no assumptions on the shapes of clusters [60]. Its challenges are performance degradation in high-dimensional feature spaces and difficulty in window size selection.
- Affinity propagation clustering: This algorithm is an iterative process to update two matrices: the availability matrix and the responsibility matrix. The algorithm takes advantage of free initialization of a number of clusters. Messages are sent between samples to group samples with the same exemplar in the cluster. An extended version of the affinity propagation algorithm is multi-exemplar [61]. The termination condition is that either the maximum number of iterations has been reached or the cluster boundary is unchanged. The advantages of the affinity clustering algorithm are its lack of assumptions of initial cluster centroids and a number of clusters and flexible data shapes [62]. Regarding disadvantages, the algorithm requires high computing power for large-scale datasets.
3.1.3. Regression Algorithms
- Linear regression: A linear predictor function is used as a linear regression formulation to model the relationship between a dependent variable and one independent variable. When the problem is extended to multiple linear regression, more than one independent variable is expected. The advantages of regression algorithms include the prediction of continuous variables and quick analysis of the relationships of the variables [65]. However, the algorithms may experience difficulty in highly non-linear formulations between variables, and they are vulnerable to noise and model overfitting.
- Logistic regression: This algorithm aims to model the probability of events, which includes a linear combination of at least one independent variable using the log odds. Attributed to its characteristics, logistic regression can be applied to prediction and classification problems [66]. A recent systematic review revealed that logistic regression and machine learning algorithms perform similarly well when used for prediction in medical research [67]. It can be extended to probabilistic-based or multinomial regression models. The advantages of the logistic regression algorithm are the direction (negative or positive) of association for the predictor and no assumptions of data distribution in the feature space [68]. Nevertheless, it can be applied to variables with a log odds relationship, requiring no or average multicollinearity between independent variables.
- Nonparametric regression: Unlike parametric-based regression algorithms, i.e., linear and logistic regression algorithms, the nonparametric regression algorithm does not assume any relationships between dependent and independent variables. In other words, the predictor is implemented based on the features extracted from the data distribution. The nonparametric regression algorithm takes advantage of the ability to tackle outlying and unexpected samples and is flexible to different data distributions [69]. However, it is challenging to utilize in small-scale datasets. In addition, the issue of tied values leads to the failure of a nonparametric regression algorithm.
3.2. Advanced Algorithms
3.2.1. Deep Learning
3.2.2. Transfer Learning
- Unsupervised learning [77]: In this category, transfer learning is conducted with unlabeled source and target domains. Learning good representation is challenging because the domains need not be similar (i.e., domains can be heterogeneous);
- Transductive learning [78]: This category considers the same task in the source and target domains. The source and target domains can be similar or different. The source domain is labeled data, whereas the target domain is unlabeled data;
- Inductive learning [79]: This category considers different tasks in the source and target domains. Similarity between the source and target domains is not a prerequisite. Labeled data is usually required in the target domain, whereas it is optional in the source domain;
- Cross-modality learning [80]: This is one of the most challenging categories of transfer learning, and it considers source and target domains of different modalities (from text to audio, from text to image, etc.). Knowledge transfer from any pre-trained models to any target models becomes feasible if this can be achieved. However, negative learning exists for any transfer learning category, which lowers the performance of the target model.
3.2.3. Data Generation
4. Recent CPS and IoT Applications
5. Security Threats and Tools
- Social engineering: This threat is related to human interaction-based malicious activity; the victims are usually tricked into making security mistakes. The issue is generally described as a social engineering lifecycle [132], which comprises four steps: (i) investigation, in which attackers identify targets, gather information, and select potential attack approaches; (ii) hook, in which attackers interact with the targets, tell a story, and take control of the interaction; (iii) play, in which attackers execute the attack; (iv) exit, in which attackers close the interaction with the victims and remove traces of their attack.
- Third-party exposure: Third-party breaches are usually passive because sensitive and private data are stolen from third-party vendors, or because attackers access the information via the vendors’ systems. According to a report, the average loss caused by data breaches was over 8.6 million USD in 2020 [133]. For some companies (e.g., logistics) that outsource their operations to other suppliers, this potentially leads to fourth-party risks [134].
- Configuration mistakes: Users often need to pay more attention to misconfigurations, as they put users at risk of malware. Typical misconfigurations [135] include (i) delayed software patching, as it is common for users to delay (even skip) updating their systems and servers, and breaches become more accessible via old versions of software; (ii) password reuse, as users may keep using the same password for multiple devices, and the leakage of a password in one device will affect other devices; (iii) default credentials, described as retaining the default usernames and passwords used to set up network devices, including operating systems, routers, and firewalls.
- Poor cyber hygiene: Technology use requires good practices to protect Wi-Fi networks, accounts, etc. Nowadays, two-factor authentication is often used for highly secure applications (e.g., bank transactions). Cyber hygiene is related to the habits of users; education is required to change the mindset and behavior of users [136].
- Cloud vulnerabilities: Cloud storage is taking the lead role for file storage and backup purposes instead of local computing devices. Cloud computing is also a superior tool for providing low-cost and high computing power services. Hackers may get access to and steal cloud data. Worrying about cloud vulnerabilities can be minimized when users follow the user guidelines established by the cloud providers [137]. Cloud infrastructures are designed to provide robust and secure cloud services.
- Mobile vulnerabilities: The vulnerabilities of mobile devices have become essential issues because of the rapid development of mobile applications. Vulnerabilities include code tampering, client code quality, weak authorization, poor authentication, insecure communication, data storage, and improper platform usage. In addition, mobile computing has increased the risk of threats because valuable data is sent and shared with the computing platform [138].
- Network security monitoring tools: Monitoring networks helps examine their downtime and helps to address problems via network optimization schemes. Generally, factors to be monitored are errors, traffic, memory, CPU, and availability [139]. To thoroughly study and analyze network performance, reading the monitoring report is crucial.
- Network defense wireless tools: The ease of use of wireless networks everywhere increases the risk of threats [140]. These tools help obtain secure Wi-Fi connections, detect unauthorized access points, detect reasons for wireless interference, search for areas with poor coverage in wireless local area networks, and reveal SSIDs.
- Web vulnerability scanning tools: These tools help scan for vulnerabilities, test penetration capabilities, test servers, analyze traffic between the server and browsers, discover networks, audit security, and identify open ports [141]. Different web applications are typically tested with threats such as cross-site request forgeries, cross-site scripting, and SQL injections.
- Antivirus software: An antivirus is a three-level computer program that ensures malware prevention, detection, and removal [142]. Being the most famous cybersecurity tool, antivirus software is commonly a built-in software application in operating systems. Users usually uninstall the built-in antivirus software and replace it with other software for more attractive functions.
- Encryption tools: Cryptography protects digital information stored in devices or transmitted over the internet. The best practices of encryption key management are encryption algorithms, key size, centralization, secure storage, automatic generation, access logs, audit logs, backup, life cycle management, third-party integration, and end of keys [143].
- Firewall: Untrusted and trusted networks are separated by a firewall. It is a network security system to monitor and I/O control network traffic. The development of firewalls starts from packet filters to circuit-level gateways to the application layer (the next-generation firewall) [144]. Because of the varying environments of applications, proper and solid configuration of firewalls is required.
6. Open Challenges
- Many CPS and IoT standards are not yet ready: Standards are official documents that define the guidelines and specifications that enhance the performance of services, methods, products, and/or materials. These also help to achieve replicable results. Generally, dedicated working groups (involving different parties, such as government officials, industry representatives, and consumers) take several years to publish a standard. Table 2 and Table 3 share 31 published standards in CPS and IoT. Other CPS and IoT standards are under development. Examples of developing CPS standards include (i) IEEE P1547.3 (interconnection between electric power systems and distributed energy resources); (ii) IEEE P2658 (testing of electric power systems); (iii) IEEE P2808: (function designations of electrical power systems); (iv) IEEE P2968.2 (threat modeling for decentralized clinical trials); (v) IEEE P9274.4.2 (implementation of the Experience Application Programming Interface). Examples of developing IoT standards include (i) IEEE P1912 (security and privacy for wireless devices); (ii) IEEE P2303 (adaptive management of cloud computing); (iii) IEEE P3333.1.1 (visual comfort assessment and quality of experience of 3D content); (iv) IEEE P21451-1-6 (message queue telemetry transport for networked device communication); (v) IEC/IEEE P62704-4 (finite element method for specific absorption rate calculation in the human body from wireless devices). Without the aid of standards, things become highly heterogeneous, which leads to interoperability issues. In reality, it is time-consuming to phase out existing gadgets and migrate to new versions that follow standards. Further resistance to adopting standards is due to the fact that laws may not enforce regulation of the systems and products to follow these standards, which is mainly due to a longer timeframe in law legislation than that of standard publication.
- Open data is not widely available: Open data policies have been receiving resistance from government officials [145], the general public [146], and companies [147]. Typical reasons for opposing open data include the following: (i) new laws to regulate the release and use of open data are difficult to create because there is poor acceptability across different stakeholders; (ii) ensuring data privacy is important because data often contains personal and sensitive information that, if misused or stolen, will lead to threats; (iii) data analysis turns data into valuable information that potentially brings benefits and income (for example, if sufficient samples are shared with a marketing company, it is unclear who should pay for the data because data collection is costly); (iv) collecting and storing ever-growing data is expensive, and as a result, consumer-grade products usually ignore data collection and storage. It is important to recognize that open data plays a crucial role in providing a substantial amount of data to train machine learning models. This is especially true in situations where various small-scale and diverse open datasets must be combined to create the models. Although generational algorithms can create more training data, it is not effective for classes with very few samples. In recent years, an open data working group was established under the United Nations that comprised 12 country representatives (New Zealand, Mauritius, Argentina, Poland, Australia, Suriname, Egypt, Sweden, Italy, the UK, Jordan, and Malaysia), international organizations, and agencies. It is willing to attract and invite representatives to join the working group from the rest of the member states (181) of the United Nations.
- Availability of computing power for model training and data analysis: Analyzing big data and training models using advanced algorithms requires immense computing power. Mobile devices and local computers (embedded with GPUs) are limited in many applications. The availability of edge, fog, and cloud computing offers more computing power with latency tradeoffs between edge, fog, and cloud computing [148]. There is an increasing trend toward subscribing to cloud GPUs, which usually charge based on usage each hour. Therefore, purchasing multiple GPUs for use in local computers is not necessary, which also relieves the local computing bandwidth. However, the bottleneck of the availability of computing power is that the growth rate of data is much higher than that of the processing units’ power. Only a limited number of users can rely on the computing services that lead to suitable latency in data analysis and decision-making. An alternative solution is to prioritize resources to more critical applications (i.e., those that can benefit a wider group of people).
7. Conclusions and Future Research Directions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ammi, M.; Adedugbe, O.; Alharby, F.M.; Benkhelifa, E. Taxonomical challenges for cyber incident response threat intelligence: A review. Int. J. Comput. Appl. 2022, 12, 1–14. [Google Scholar]
- Nguyen, G.N.; Le Viet, N.H.; Elhoseny, M.; Shankar, K.; Gupta, B.B.; Abd El-Latif, A.A. Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J. Parallel Distrib. Comput. 2021, 153, 150–160. [Google Scholar]
- Gaurav, A.; Psannis, K.; Peraković, D. Security of cloud-based medical internet of things (miots): A survey. Int. J. Softw. Sci. Comput. Intell. 2022, 14, 1–16. [Google Scholar]
- Singh, A.; Gupta, B.B. Distributed denial-of-service (DDoS) attacks and defense mechanisms in various web-enabled computing platforms: Issues, challenges, and future research directions. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–43. [Google Scholar]
- Pivoto, D.G.; de Almeida, L.F.; da Rosa Righi, R.; Rodrigues, J.J.; Lugli, A.B.; Alberti, A.M. Cyber-physical systems architectures for industrial internet of things applications in Industry 4.0: A literature review. J. Manuf. Syst. 2021, 58, 176–192. [Google Scholar]
- Franco, J.; Aris, A.; Canberk, B.; Uluagac, A.S. A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems. IEEE Commun. Surv. Tutor. 2021, 23, 2351–2383. [Google Scholar]
- Sharma, R.; Sharma, T.P.; Sharma, A.K. Detecting and preventing misbehaving intruders in the internet of vehicles. Int. J. Comput. Appl. 2022, 12, 1–21. [Google Scholar]
- Liu, Y.; Yang, X.; Wen, W.; Xia, M. Smarter grid in the 5G Era: A framework integrating power internet of things with a cyber physical system. Front. Commun. Netw. 2021, 2, 689590. [Google Scholar]
- Rani, S.; Kataria, A.; Chauhan, M.; Rattan, P.; Kumar, R.; Sivaraman, A.K. Security and privacy challenges in the deployment of cyber-physical systems in smart city applications: State-of-art work. Mater. Today Proc. 2022, 62, 4671–4676. [Google Scholar]
- Barroso, S.; Bustos, P.; Núñez, P. Towards a cyber-physical system for sustainable and smart building: A use case for optimizing water consumption on a SmartCampus. J. Ambient Intell. Humaniz. Comput. 2023, 14, 6379–6399. [Google Scholar]
- Lesch, V.; Züfle, M.; Bauer, A.; Iffländer, L.; Krupitzer, C.; Kounev, S. A literature review of IoT and CPS—What they are, and what they are not. J. Syst. Softw. 2023, 200, 111631. [Google Scholar]
- Radanliev, P.; De Roure, D.; Nicolescu, R.; Huth, M.; Santos, O. Digital twins: Artificial intelligence and the IoT cyber-physical systems in Industry 4.0. Int. J. Intell. Robot. Appl. 2022, 6, 171–185. [Google Scholar]
- Latif, S.A.; Wen, F.B.X.; Iwendi, C.; Li-li, F.W.; Mohsin, S.M.; Han, Z.; Band, S.S. AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems. Comput. Commun. 2022, 181, 274–283. [Google Scholar]
- Fatima, I.; Malik, S.U.; Anjum, A.; Ahmad, N. Cyber physical systems and IoT: Architectural practices, interoperability, and transformation. IT Prof. 2020, 22, 46–54. [Google Scholar] [CrossRef]
- Kwon, Y.; Lee, S.; King, R.; Lim, J.I.; Kim, H.K. Behavior analysis and anomaly detection for a digital substation on cyber-physical system. Electronics 2019, 8, 326. [Google Scholar] [CrossRef] [Green Version]
- Gaggero, G.B.; Rossi, M.; Girdinio, P.; Marchese, M. Cybersecurity Issues in Communication-Based Electrical Protections. In Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies, Prague, Czech Republic, 20–22 July 2022. [Google Scholar]
- Gaggero, G.B.; Girdinio, P.; Marchese, M. Advancements and research trends in microgrids cybersecurity. Appl. Sci. 2021, 11, 7363. [Google Scholar]
- Hinkel, G. The TTC 2017 Outage System Case for Incremental Model Views. In Proceedings of the 10th Transformation Tool Contest, Marburg, Germany, 21 July 2017. [Google Scholar]
- Nweke, L.O.; Weldehawaryat, G.K.; Wolthusen, S.D. Threat modelling of cyber–physical systems using an applied π-calculus. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100466. [Google Scholar]
- Balijepalli, V.M.; Sielker, F.; Karmakar, G. Evolution of power system cim to digital twins-a comprehensive review and analysis. In Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Europe, Espoo, Finland, 18–21 October 2021. [Google Scholar]
- Esiner, E.; Tefek, U.; Erol, H.S.; Mashima, D.; Chen, B.; Hu, Y.C.; Kalbarczyk, Z.; Nicol, D.M. LoMoS: Less-online/more-offline signatures for extremely time-critical systems. IEEE Trans. Smart Grid 2022, 13, 3214–3226. [Google Scholar] [CrossRef]
- Georg, H.; Müller, S.C.; Rehtanz, C.; Wietfeld, C. Analyzing cyber-physical energy systems: The INSPIRE cosimulation of power and ICT systems using HLA. IEEE Trans. Ind. Inform. 2014, 10, 2364–2373. [Google Scholar] [CrossRef]
- Becejac, T.; Eppinger, C.; Ashok, A.; Agrawal, U.; O’Brien, J. Prime: A real-time cyber-physical systems testbed: From wide-area monitoring, protection, and control prototyping to operator training and beyond. IET Cyber-Phys. Syst. Theory Appl. 2020, 5, 186–195. [Google Scholar] [CrossRef]
- Yoo, H.; Shon, T. Challenges and research directions for heterogeneous cyber–physical system based on IEC 61850: Vulnerabilities, security requirements, and security architecture. Future Gener. Comput. Syst. 2016, 61, 128–136. [Google Scholar]
- Awadid, A. Reference Architectures for Cyber-Physical Systems: Towards a Standard-Based Comparative Framework. In Advances in Information and Communication, Proceedings of the 2022 Future of Information and Communication Conference, San Francisco, CA, USA, 3–4 March 2022; Springer International Publishing: Cham, Switzerland, 2022. [Google Scholar]
- Chawla, A.; Aftab, M.A.; Hussain, S.S.; Panigrahi, B.K.; Ustun, T.S. Cyber–physical testbed for Wide Area Measurement System employing IEC 61850 and IEEE C37. 118 based communication. Energy Rep. 2022, 8, 570–578. [Google Scholar] [CrossRef]
- Rana, S.; Zhu, H.; Lee, C.W.; Nicol, D.M.; Shin, I. The Not-So-Smart grid: Preliminary work on identifying vulnerabilities in ANSI C12.22. In Proceedings of the 2012 IEEE Globecom Workshops, Anaheim, CA, USA, 3–7 December 2012. [Google Scholar]
- Rosado, D.G.; Santos-Olmo, A.; Sánchez, L.E.; Serrano, M.A.; Blanco, C.; Mouratidis, H.; Fernández-Medina, E. Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Comput. Ind. 2022, 142, 103715. [Google Scholar]
- Weiss, J.; Hood, M.; Miller, N.; Potorieko, C.; Michael, J.B. Using Machine Learning to Work Around the Operational and Cybersecurity Limitations of Legacy Process Sensors. Computer 2022, 55, 106–111. [Google Scholar] [CrossRef]
- Taherdoost, H. Understanding Cybersecurity Frameworks and Information Security Standards—A Review and Comprehensive Overview. Electronics 2022, 11, 2181. [Google Scholar]
- Arandia, N.; Garate, J.I.; Mabe, J. Embedded Sensor Systems in Medical Devices: Requisites and Challenges Ahead. Sensors 2022, 22, 9917. [Google Scholar] [PubMed]
- Puder, A.; Henle, J.; Sax, E. Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry. Healthcare 2023, 11, 872. [Google Scholar]
- Chen, X.; Zhang, Q.; Zhang, L.; Jia, X.; Zheng, P.; Yang, X. Standardization of Financial Blockchain: Technologies, Challenges, and Future. In Proceedings of the 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud, Xi’an, China, 25–27 June 2022. [Google Scholar]
- David, A. Unsettled Topics Concerning Airport Cybersecurity Standards and Regulation; No. EPR2021020; SAE Technical Paper: Warrendale, PA, USA, 2021. [Google Scholar]
- Hands, J.; Coughlin, T. New IEEE Media Sanitization Specification Enables Circular Economy for Storage. Computer 2023, 56, 111–116. [Google Scholar]
- Da Rocha, H.; Abrishambaf, R.; Pereira, J.; Espirito Santo, A. Integrating the IEEE 1451 and IEC 61499 standards with the industrial internet reference architecture. Sensors 2022, 22, 1495. [Google Scholar] [CrossRef]
- Rajendran, T.; Surya, S.; Babu, N. Big Data Analytics in Industrial IoT and Cybertwin. In New Approaches to Data Analytics and Internet of Things Through Digital Twin; IGI Global: Hershey, PA, USA, 2023; pp. 191–210. [Google Scholar]
- Khalil, R.A.; Saeed, N.; Babar, M.I.; Jan, T. Toward the internet of underwater things: Recent developments and future challenges. IEEE Consum. Electron. Mag. 2020, 10, 32–37. [Google Scholar] [CrossRef]
- Karale, A. The challenges of IoT addressing security, ethics, privacy, and laws. Internet Things 2021, 15, 100420. [Google Scholar]
- Lee, C.; Kim, N.; Hong, S. Toward industrial IoT: Integrated architecture of an OPC UA synergy platform. IEEE Access 2021, 9, 164720–164731. [Google Scholar] [CrossRef]
- Mukhopadhyay, S.C.; Tyagi, S.K.S.; Suryadevara, N.K.; Piuri, V.; Scotti, F.; Zeadally, S. Artificial intelligence-based sensors for next generation IoT applications: A review. IEEE Sens. J. 2021, 21, 24920–24932. [Google Scholar]
- Shang, K.; McDonald, S.; Buticchi, G.; Brusic, V. The development of ethically informed standards for intelligent monitoring systems of electric machines. In Proceedings of the 2022 IEEE 46th Annual Computers, Software, and Applications Conference, Los Alamitos, CA, USA, 27 June–1 July 2022. [Google Scholar]
- Sousa, J.; Mendonça, J.P.; Machado, J. A generic interface and a framework designed for industrial metrology integration for the Internet of Things. Comput. Ind. 2022, 138, 103632. [Google Scholar]
- Zachila, K.; Kotis, K.; Paparidis, E.; Ladikou, S.; Spiliotopoulos, D. Facilitating Semantic Interoperability of Trustworthy IoT Entities in Cultural Spaces: The Smart Museum Ontology. IoT 2021, 2, 741–760. [Google Scholar] [CrossRef]
- Liu, D.; Wu, C.; Yang, L.; Zhao, X.; Sun, Q. The Development of Privacy Protection Standards for Smart Home. Wirel. Commun. Mob. Comput. 2022, 2022, 9641143. [Google Scholar]
- Abramovich, F.; Pensky, M. Classification with many classes: Challenges and pluses. J. Multivar. Anal. 2019, 174, 104536. [Google Scholar] [CrossRef] [Green Version]
- Gibert, D.; Mateu, C.; Planes, J. The rise of machine learning for detection and classification of malware: Research developments, trends and challenges. J. Netw. Comput. Appl. 2020, 153, 102526. [Google Scholar]
- Mukhamediev, R.I.; Popova, Y.; Kuchin, Y.; Zaitseva, E.; Kalimoldayev, A.; Symagulov, A.; Levashenko, V.; Abdoldina, F.; Gopejenko, V.; Yakunin, K.; et al. Review of Artificial Intelligence and Machine Learning Technologies: Classification, Restrictions, Opportunities and Challenges. Mathematics 2022, 10, 2552. [Google Scholar]
- Abiodun, O.I.; Jantan, A.; Omolara, A.E.; Dada, K.V.; Mohamed, N.A.; Arshad, H. State-of-the-art in artificial neural network applications: A survey. Heliyon 2018, 4, e00938. [Google Scholar]
- Peng, J.; Yang, B.; Gupta, B.B.; Abd El-Latif, A.A. A biometric cryptosystem scheme based on random projection and neural network. Soft Comput. 2021, 25, 7657–7670. [Google Scholar]
- Chui, K.T.; Gupta, B.B.; Torres-Ruiz, M.; Arya, V.; Alhalabi, W.; Zamzami, I.F. A Convolutional Neural Network-Based Feature Extraction and Weighted Twin Support Vector Machine Algorithm for Context-Aware Human Activity Recognition. Electronics 2023, 12, 1915. [Google Scholar]
- Srivastava, D.; Chui, K.T.; Arya, V.; Peñalvo, F.J.G.; Kumar, P.; Singh, A.K. Analysis of Protein Structure for Drug Repurposing Using Computational Intelligence and ML Algorithm. Int. J. Softw. Sci. Comput. Intell. 2022, 14, 1–11. [Google Scholar] [CrossRef]
- Chou, Y.C.; Chuang, H.H.C.; Chou, P.; Oliva, R. Supervised machine learning for theory building and testing: Opportunities in operations management. J. Oper. Manag. 2023, 2023, 643–675. [Google Scholar]
- Almomani, A.; Alauthman, M.; Shatnawi, M.T.; Alweshah, M.; Alrosan, A.; Alomoush, W.; Gupta, B.B. Phishing website detection with semantic features based on machine learning classifiers: A comparative study. Int. J. Semant. Web Inf. Syst. 2022, 18, 1–24. [Google Scholar]
- Cai, J.; Hao, J.; Yang, H.; Zhao, X.; Yang, Y. A review on semi-supervised clustering. Inf. Sci. 2023, 632, 164–200. [Google Scholar]
- Chui, K.T. Driver stress recognition for smart transportation: Applying multiobjective genetic algorithm for improving fuzzy c-means clustering with reduced time and model complexity. Sustain. Comput. Inform. Syst. 2022, 35, 100668. [Google Scholar]
- Chui, K.T.; Tsang, K.F.; Chung, S.H.; Yeung, L.F. Appliance signature identification solution using K-means clustering. In Proceedings of the IECON 2013-39th Annual Conference of the IEEE Industrial Electronics Society, Vienna, Austria, 10–13 November 2013. [Google Scholar]
- Ikotun, A.M.; Ezugwu, A.E.; Abualigah, L.; Abuhaija, B.; Heming, J. K-means Clustering Algorithms: A Comprehensive Review, Variants Analysis, and Advances in the Era of Big Data. Inf. Sci. 2023, 622, 178–210. [Google Scholar]
- Beck, G.; Duong, T.; Lebbah, M.; Azzag, H.; Cérin, C. A distributed approximate nearest neighbors algorithm for efficient large scale mean shift clustering. J. Parallel Distrib. Comput. 2019, 134, 128–139. [Google Scholar]
- Ranjbarzadeh, R.; Saadi, S.B. Automated liver and tumor segmentation based on concave and convex points using fuzzy c-means and mean shift clustering. Measurement 2020, 150, 107086. [Google Scholar]
- Wang, C.D.; Lai, J.H.; Suen, C.Y.; Zhu, J.Y. Multi-exemplar affinity propagation. IEEE Trans. Pattern Anal. Mach. Intell. 2013, 35, 2223–2237. [Google Scholar] [CrossRef] [PubMed]
- Rahman, M.R.; Arefin, M.S.; Rahman, S.; Ahmed, A.; Islam, T.; Dhar, P.K.; Kwon, O.J. A Comprehensive Survey on Affinity Analysis, Bibliomining, and Technology Mining: Past, Present, and Future Research. Appl. Sci. 2022, 12, 5227. [Google Scholar] [CrossRef]
- Pentoś, K.; Mbah, J.T.; Pieczarka, K.; Niedbała, G.; Wojciechowski, T. Evaluation of multiple linear regression and machine learning approaches to predict soil compaction and shear stress based on electrical parameters. Appl. Sci. 2022, 12, 8791. [Google Scholar] [CrossRef]
- Zuur, A.F.; Ieno, E.N. A protocol for conducting and presenting results of regression-type analyses. Methods Ecol. Evol. 2016, 7, 636–645. [Google Scholar] [CrossRef] [Green Version]
- Fernández-Delgado, M.; Sirsat, M.S.; Cernadas, E.; Alawadi, S.; Barro, S.; Febrero-Bande, M. An extensive experimental survey of regression methods. Neural Netw. 2019, 111, 11–34. [Google Scholar] [CrossRef] [PubMed]
- Zhou, Y.; Song, L.; Liu, Y.; Vijayakumar, P.; Gupta, B.B.; Alhalabi, W.; Alsharif, H. A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare. Future Gener. Comput. Syst. 2023, 144, 63–73. [Google Scholar] [CrossRef]
- Christodoulou, E.; Ma, J.; Collins, G.S.; Steyerberg, E.W.; Verbakel, J.Y.; Van Calster, B. A systematic review shows no performance benefit of machine learning over logistic regression for clinical prediction models. J. Clin. Epidemiol. 2019, 110, 12–22. [Google Scholar]
- Shipe, M.E.; Deppen, S.A.; Farjah, F.; Grogan, E.L. Developing prediction models for clinical use using logistic regression: An overview. J. Thorac. Dis. 2019, 11, S574. [Google Scholar] [CrossRef]
- Čížek, P.; Sadıkoğlu, S. Robust nonparametric regression: A review. Wiley Interdiscip. Rev. Comput. Stat. 2020, 12, e1492. [Google Scholar] [CrossRef] [Green Version]
- Abrol, A.; Fu, Z.; Salman, M.; Silva, R.; Du, Y.; Plis, S.; Calhoun, V. Deep learning encodes robust discriminative neuroimaging representations to outperform standard machine learning. Nat. Commun. 2021, 12, 353. [Google Scholar] [CrossRef]
- Janiesch, C.; Zschech, P.; Heinrich, K. Machine learning and deep learning. Electron. Mark. 2021, 31, 685–695. [Google Scholar] [CrossRef]
- Lakshmanna, K.; Kaluri, R.; Gundluru, N.; Alzamil, Z.S.; Rajput, D.S.; Khan, A.A.; Haq, M.A.; Alhussen, A. A review on deep learning techniques for IoT data. Electronics 2022, 11, 1604. [Google Scholar] [CrossRef]
- Dubey, S.R.; Singh, S.K.; Chaudhuri, B.B. Activation functions in deep learning: A comprehensive survey and benchmark. Neurocomputing 2022, 503, 92–108. [Google Scholar]
- Zhang, Q.; Guo, Z.; Zhu, Y.; Vijayakumar, P.; Castiglione, A.; Gupta, B.B. A deep learning-based fast fake news detection model for cyber-physical social services. Pattern Recognit. Lett. 2023, 168, 31–38. [Google Scholar] [CrossRef]
- Niu, S.; Liu, Y.; Wang, J.; Song, H. A decade survey of transfer learning (2010–2020). IEEE Trans. Artif. Intell. 2020, 1, 151–166. [Google Scholar]
- Yao, S.; Kang, Q.; Zhou, M.; Rawa, M.J.; Abusorrah, A. A survey of transfer learning for machinery diagnostics and prognostics. Artif. Intell. Rev. 2023, 56, 2871–2922. [Google Scholar] [CrossRef]
- Zhao, Z.; Zhang, Q.; Yu, X.; Sun, C.; Wang, S.; Yan, R.; Chen, X. Applications of unsupervised deep transfer learning to intelligent fault diagnosis: A survey and comparative study. IEEE Trans. Instrum. Meas. 2021, 70, 1–28. [Google Scholar] [CrossRef]
- Luo, Y.; Zhang, Z.; Zhang, L.; Han, J.; Cao, J.; Zhang, J. Developing High-Resolution Crop Maps for Major Crops in the European Union Based on Transductive Transfer Learning and Limited Ground Data. Remote Sens. 2022, 14, 1809. [Google Scholar] [CrossRef]
- Zhang, Y.; Xia, K.; Jiang, Y.; Qian, P.; Cai, W.; Qiu, C.; Wee, L.K.; Wu, D. Multi-modality fusion & inductive knowledge transfer underlying non-sparse multi-kernel learning and distribution adaption. IEEE ACM Trans. Comput. Biol. Bioinform. 2022. [Google Scholar] [CrossRef]
- Song, Y.; Li, J.; Gao, P.; Li, L.; Tian, T.; Tian, J. Two-stage cross-modality transfer learning method for military-civilian SAR ship recognition. IEEE Geosci. Remote Sens. Lett. 2022, 19, 1–5. [Google Scholar] [CrossRef]
- Liu, X.; Li, Y.; Chen, L.; Chen, G.; Zhao, B. Multiple source partial knowledge transfer for manufacturing system modelling. Robot. Comput. Integr. Manuf. 2023, 80, 102468. [Google Scholar] [CrossRef]
- Chui, K.T.; Gupta, B.B.; Jhaveri, R.H.; Chi, H.R.; Arya, V.; Almomani, A.; Nauman, A. Multiround transfer learning and modified generative adversarial network for lung cancer detection. Int. J. Intell. Syst. 2023, 2023, 6376275. [Google Scholar] [CrossRef]
- Kang, Z.; Nielsen, M.; Yang, B.; Ghazi, M.M. Partial feedback online transfer learning with multi-source domains. Inf. Fus. 2023, 89, 29–40. [Google Scholar] [CrossRef]
- Li, C.; Li, S.; Wang, H.; Gu, F.; Ball, A.D. Attention-based deep meta-transfer learning for few-shot fine-grained fault diagnosis. Knowl.-Based Syst. 2023, 264, 110345. [Google Scholar] [CrossRef]
- Qian, Q.; Zhou, J.; Qin, Y. Relationship Transfer Domain Generalization Network for Rotating Machinery Fault Diagnosis Under Different Working Conditions. IEEE Trans. Ind. Inform. 2023. [Google Scholar] [CrossRef]
- Arora, A.; Arora, A. Synthetic patient data in health care: A widening legal loophole. Lancet 2022, 399, 1601–1602. [Google Scholar] [CrossRef]
- Matuzevičius, D. Synthetic Data Generation for the Development of 2D Gel Electrophoresis Protein Spot Models. Appl. Sci. 2022, 12, 4393. [Google Scholar] [CrossRef]
- Shorten, C.; Khoshgoftaar, T.M. A survey on image data augmentation for deep learning. J. Big Data 2019, 6, 1–48. [Google Scholar] [CrossRef] [Green Version]
- Chlap, P.; Min, H.; Vandenberg, N.; Dowling, J.; Holloway, L.; Haworth, A. A review of medical image data augmentation techniques for deep learning applications. J. Med. Imaging Radiat. Oncol. 2021, 65, 545–563. [Google Scholar] [CrossRef]
- Xu, M.; Yoon, S.; Fuentes, A.; Park, D.S. A comprehensive survey of image augmentation techniques for deep learning. Pattern Recognit. 2023, 137, 109347. [Google Scholar]
- Kuhail, M.A.; Alturki, N.; Alramlawi, S.; Alhejori, K. Interacting with educational chatbots: A systematic review. Educ. Inf. Technol. 2023, 28, 973–1018. [Google Scholar] [CrossRef]
- Lin, C.C.; Huang, A.Y.; Yang, S.J. A review of ai-driven conversational chatbots implementation methodologies and challenges (1999–2022). Sustainability 2023, 15, 4012. [Google Scholar] [CrossRef]
- Singh, A.; Ogunfunmi, T. An overview of variational autoencoders for source separation, finance, and bio-signal applications. Entropy 2022, 24, 55. [Google Scholar] [CrossRef] [PubMed]
- Figueira, A.; Vaz, B. Survey on synthetic data generation, evaluation methods and GANs. Mathematics 2022, 10, 2733. [Google Scholar] [CrossRef]
- Brophy, E.; Wang, Z.; She, Q.; Ward, T. Generative adversarial networks in time series: A systematic literature review. ACM Comput. Surv. 2023, 55, 1–31. [Google Scholar] [CrossRef]
- AlAmir, M.; AlGhamdi, M. The Role of generative adversarial network in medical image analysis: An in-depth survey. ACM Comput. Surv. 2022, 55, 1–36. [Google Scholar] [CrossRef]
- Suárez, P.L.; Sappa, A.D.; Vintimilla, B.X. Infrared image colorization based on a triplet dcgan architecture. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Honolulu, HI, USA, 21–26 July 2017. [Google Scholar]
- Mirza, M.; Osindero, S. Conditional generative adversarial nets. arXiv 2014, arXiv:1411.1784. [Google Scholar]
- Chen, X.; Duan, Y.; Houthooft, R.; Schulman, J.; Sutskever, I.; Abbeel, P. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Proceedings of the Annual Conference on Neural Information Processing Systems 2016, Barcelona, Spain, 5–10 December 2016. [Google Scholar]
- Odena, A.; Olah, C.; Shlens, J. Conditional image synthesis with auxiliary classifier gans. In Proceedings of the International Conference on Machine Learning, Sydney, Australia, 6–11 August 2017. [Google Scholar]
- Donahue, J.; Krähenbühl, P.; Darrell, T. Adversarial feature learning. arXiv 2016, arXiv:1605.09782. [Google Scholar]
- Qi, G.J. Loss-sensitive generative adversarial networks on lipschitz densities. Int. J. Comput. Vis. 2020, 128, 1118–1140. [Google Scholar] [CrossRef] [Green Version]
- Wu, Y.; Nie, L.; Wang, S.; Ning, Z.; Li, S. Intelligent intrusion detection for internet of things security: A deep convolutional generative adversarial network-enabled approach. IEEE Int. Things J. 2023, 10, 3094–3106. [Google Scholar] [CrossRef]
- Feng, J.; Yang, L.T.; Zhu, Y.; Gati, N.J.; Mo, Y. Blockchain-enabled tensor-based conditional deep convolutional GAN for Cyber-physical-Social systems. ACM Trans. Internet Technol. 2021, 21, 1–17. [Google Scholar] [CrossRef]
- Le, K.H.; Nguyen, M.H.; Tran, T.D.; Tran, N.D. IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics 2022, 11, 524. [Google Scholar] [CrossRef]
- Mokbal, F.M.M.; Wang, D.; Wang, X.; Fu, L. Data augmentation-based conditional Wasserstein generative adversarial network-gradient penalty for XSS attack detection system. PeerJ Comput. Sci. 2020, 6, e328. [Google Scholar] [CrossRef]
- Cheng, K.; Tahir, R.; Eric, L.K.; Li, M. An analysis of generative adversarial networks and variants for image synthesis on MNIST dataset. Multimed. Tools Appl. 2020, 79, 13725–13752. [Google Scholar] [CrossRef]
- Zhou, K.; Wang, W.; Huang, L.; Liu, B. Comparative study on the time series forecasting of web traffic based on statistical model and Generative Adversarial model. Knowl.-Based Syst. 2021, 213, 106467. [Google Scholar] [CrossRef]
- Zhao, Q.; Chen, M.; Gu, Z.; Luan, S.; Zeng, H.; Chakrabory, S. CAN bus intrusion detection based on auxiliary classifier GAN and out-of-distribution detection. ACM Trans. Embed. Comput. Syst. 2022, 21, 1–30. [Google Scholar] [CrossRef]
- Farajzadeh-Zanjani, M.; Hallaji, E.; Razavi-Far, R.; Saif, M. Generative-adversarial class-imbalance learning for classifying cyber-attacks and faults-a cyber-physical power system. IEEE Trans. Dependable Secure Comput. 2022, 19, 4068–4081. [Google Scholar] [CrossRef]
- Xu, W.; Jang-Jaccard, J.; Liu, T.; Sabrina, F.; Kwak, J. Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier. Computers 2022, 11, 85. [Google Scholar] [CrossRef]
- Liao, J.; Teo, S.G.; Kundu, P.P.; Truong-Huu, T. ENAD: An ensemble framework for unsupervised network anomaly detection. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience, Rhodes, Greece, 26–28 July 2021. [Google Scholar]
- Liu, L.; Cao, D.; Wu, Y.; Wei, T. Defective samples simulation through adversarial training for automatic surface inspection. Neurocomputing 2019, 360, 230–245. [Google Scholar] [CrossRef]
- Chen, J.; Wang, W.H.; Gao, H.; Shi, X. PAR-GAN: Improving the generalization of generative adversarial networks against membership inference attacks. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, Singapore, 14–18 August 2021. [Google Scholar]
- Behnke, I.; Blumschein, C.; Danicki, R.; Wiesner, P.; Thamsen, L.; Kao, O. Towards a real-time IoT: Approaches for incoming packet processing in cyber-physical systems. J. Syst. Archit. 2023, 140, 102891. [Google Scholar] [CrossRef]
- Zahid, S.; Mazhar, M.S.; Abbas, S.G.; Hanif, Z.; Hina, S.; Shah, G.A. Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls. Internet Things 2023, 22, 100766. [Google Scholar]
- Bakkiam Deebak, D.; AL-Turjman, F. Lightweight privacy-aware secure authentication scheme for cyber-physical systems in the edge intelligence era. Concurr. Comput. Pract. Exp. 2023, 35, e6510. [Google Scholar] [CrossRef]
- Catillo, M.; Pecchia, A.; Villano, U. CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. Comput. Secur. 2023, 129, 103210. [Google Scholar] [CrossRef]
- Cicceri, G.; Tricomi, G.; D’Agati, L.; Longo, F.; Merlino, G.; Puliafito, A. A Deep Learning-Driven Self-Conscious Distributed Cyber-Physical System for Renewable Energy Communities. Sensors 2023, 23, 4549. [Google Scholar] [CrossRef] [PubMed]
- Wang, X.; Wang, Y.; Javaheri, Z.; Almutairi, L.; Moghadamnejad, N.; Younes, O.S. Federated deep learning for anomaly detection in the internet of things. Comput. Electr. Eng. 2023, 108, 108651. [Google Scholar] [CrossRef]
- Alohali, M.A.; Elsadig, M.; Al-Wesabi, F.N.; Al Duhayyim, M.; Hilal, A.M.; Motwakel, A. Swarm intelligence for IoT attack detection in fog-enabled cyber-physical system. Comput. Electr. Eng. 2023, 108, 108676. [Google Scholar] [CrossRef]
- Daniel, A.; Deebalakshmi, R.; Thilagavathy, R.; Kohilakanagalakshmi, T.; Janakiraman, S.; Balusamy, B. Optimal feature selection for malware detection in cyber physical systems using graph convolutional network. Comput. Electr. Eng. 2023, 108, 108689. [Google Scholar] [CrossRef]
- Arat, F.; Akleylek, S. Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. Comput. Secur. 2023, 128, 103174. [Google Scholar] [CrossRef]
- Bovenzi, G.; Aceto, G.; Ciuonzo, D.; Montieri, A.; Persico, V.; Pescapé, A. Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness. Comput. Secur. 2023, 128, 103167. [Google Scholar] [CrossRef]
- Bai, R.; Zhang, P.; Zhang, Z.; Sun, X.; Fei, H.; Bao, S.; Hu, G.; Li, W. Optimization of blasting parameters and prediction of vibration effects in open pit mines based on deep neural networks. Alex. Eng. J. 2023, 70, 261–271. [Google Scholar] [CrossRef]
- Langarica, S.; Núñez, F. Contrastive blind denoising autoencoder for real time denoising of industrial IoT sensor data. Eng. Appl. Artif. Intell. 2023, 120, 105838. [Google Scholar] [CrossRef]
- Wang, Y.; Kong, L.; Lin, S.; He, L. Detecting Engine Anomalies Using Batteries. IEEE Trans. Mob. Comput. 2023, 22, 2069–2083. [Google Scholar] [CrossRef]
- Sadek, R.A.; Elbadawy, H.M. Towards IoT Era with current and Future Wireless Communication Technologies: An Overview. In Proceedings of the 2022 39th National Radio Science Conference, Cairo, Egypt, 29 November–1 December 2022. [Google Scholar]
- Monzon Baeza, V.; Ortiz, F.; Herrero Garcia, S.; Lagunas, E. Enhanced communications on satellite-based iot systems to support maritime transportation services. Sensors 2022, 22, 6450. [Google Scholar] [CrossRef] [PubMed]
- Fort, A.; Mugnaini, M.; Peruzzi, G.; Pozzebon, A. Reliability Analysis of an IoT Satellite Facility for Remote Monitoring and Asset Tracking within Marine Environments. In Proceedings of the 2022 IEEE International Workshop on Metrology for the Sea; Learning to Measure Sea Health Parameters, Milazzo, Italy, 24 November 2022. [Google Scholar]
- Georgiadou, A.; Mouzakitis, S.; Askounis, D. Working from home during COVID-19 crisis: A cyber security culture assessment survey. Secur. J. 2022, 35, 486–505. [Google Scholar] [CrossRef]
- Chetioui, K.; Bah, B.; Alami, A.O.; Bahnasse, A. Overview of social engineering attacks on social networks. Procedia Comput. Sci. 2022, 198, 656–661. [Google Scholar] [CrossRef]
- Ponemon Institute. Cost of Data Breach Report (2020); Ponemon Institute: Traverse City, MI, USA, 2020. [Google Scholar]
- Wang, H.; Huang, M.; Feng, X.; Zhou, Y. Contract design for the fourth party logistics considering tardiness risk. Int. J. Ind. Eng. Comput. 2022, 13, 13–30. [Google Scholar] [CrossRef]
- Angelogianni, A.; Politis, I.; Mohammadi, F.; Xenakis, C. On identifying threats and quantifying cybersecurity risks of mnos deploying heterogeneous rats. IEEE Access 2020, 8, 224677–224701. [Google Scholar] [CrossRef]
- Neigel, A.R.; Claypoole, V.L.; Waldfogle, G.E.; Acharya, S.; Hancock, G.M. Holistic cyber hygiene education: Accounting for the human factors. Comput. Secur. 2020, 92, 101731. [Google Scholar] [CrossRef]
- Achar, S. Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape. Int. J. Comput. Syst. Eng. 2022, 16, 379–384. [Google Scholar]
- Liao, B.; Ali, Y.; Nazir, S.; He, L.; Khan, H.U. Security analysis of IoT devices by using mobile computing: A systematic literature review. IEEE Access 2020, 8, 120331–120350. [Google Scholar] [CrossRef]
- Du, M. Application of information communication network security management and control based on big data technology. Int. J. Commun. Syst. 2022, 35, e4643. [Google Scholar] [CrossRef]
- Sheikh, A. Hacking Wireless Networks. In Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing; Apress: Berkeley, CA, USA, 2021. [Google Scholar]
- Tundis, A.; Mazurczyk, W.; Mühlhäuser, M. A review of network vulnerabilities scanning tools: Types, capabilities and functioning. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018. [Google Scholar]
- Garba, F.A.; Kunya, K.I.; Ibrahim, S.A.; Isa, A.B.; Muhammad, K.M.; Wali, N.N. Evaluating the state of the art antivirus evasion tools on windows and android platform. In Proceedings of the 2019 2nd International Conference of the IEEE Nigeria Computer Chapter, Zaria, Nigeria, 14–17 October 2019. [Google Scholar]
- Gupta, B.B.; Li, K.C.; Leung, V.C.; Psannis, K.E.; Yamaguchi, S. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE CAA J. Autom. Sin. 2021, 8, 1877–1890. [Google Scholar]
- Anwar, R.W.; Abdullah, T.; Pastore, F. Firewall best practices for securing smart healthcare environment: A review. Appl. Sci. 2021, 11, 9183. [Google Scholar] [CrossRef]
- Ansari, B.; Barati, M.; Martin, E.G. Enhancing the usability and usefulness of open government data: A comprehensive review of the state of open government data visualization research. Gov. Inf. Q. 2022, 39, 101657. [Google Scholar] [CrossRef]
- Gao, Y.; Janssen, M. The open data canvas–Analyzing value creation from open data. Digit. Gov. Res. Prac. 2022, 3, 1–15. [Google Scholar] [CrossRef]
- Kamariotou, M.; Kitsios, F. Bringing Digital Innovation Strategies and Entrepreneurship: The Business Model Canvas in Open Data Ecosystem and Startups. Future Internet 2022, 14, 127. [Google Scholar] [CrossRef]
- Kar, B.; Yahya, W.; Lin, Y.D.; Ali, A. Offloading using traditional optimization and machine learning in federated cloud-edge-fog systems: A survey. IEEE Commun. Surv. Tutor. 2023, 25, 1199–1226. [Google Scholar] [CrossRef]
Work | Standards | Algorithms | Applications | Security | Challenges | Future Directions |
---|---|---|---|---|---|---|
[5] | X | X | 🗸 | 🗸 | 🗸 | 🗸 |
[6] | X | X | 🗸 | 🗸 | 🗸 | 🗸 |
[7] | X | 🗸 | 🗸 | X | 🗸 | 🗸 |
[8] | 🗸 | X | 🗸 | 🗸 | 🗸 | 🗸 |
[11] | X | X | 🗸 | X | 🗸 | 🗸 |
[12] | X | X | 🗸 | 🗸 | 🗸 | 🗸 |
[13] | X | X | 🗸 | 🗸 | 🗸 | 🗸 |
[14] | X | X | 🗸 | X | 🗸 | 🗸 |
Our work | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 |
Work | Name of Standard | Launch Year | Descriptions |
---|---|---|---|
[15] | IEC 60870-5 | 1990 | A transmission protocol that manages the communication profile for information exchange. |
[16] | IEC 60870-6 | 1992 | A standard for data acquisition and control of supervision. |
[17] | IEC 60834 | 1999 | A standard for the protection of equipment and command systems. It specifies the maximum latency of the control signal for protective action to be 10 ms. |
[18] | IEC 62056 | 2002 | A standard for supporting advanced metering infrastructure. Typical applications are demand response, tariffs, and automatic meter reading. |
[19] | IEC 61850 | 2003 | A standard that specifies the requirement for communication between substations and three-layer architectures (station, bay, and process levels). |
[20] | IEC 61970 | 2005 | A standard for managing the interoperability between energy management systems with different environments and interfaces. |
[21] | IEC 62351-6 | 2007 | Security support for IEC 61850. |
[22] | IEC 61968 | 2008 | A standard that defines the information exchange between applications with different environments and interfaces. |
[23] | PRIME | 2008 | A standard that specifies the interoperability of narrow band powerline communications, mainly adopted in advanced metering infrastructure. |
[24] | IEEE 1815 | 2010 | A standard for distributed network protocols that specifies the structure, functionality, and interoperability of devices for electrical systems. |
[25] | IEEE 2030 | 2011 | A standard for smart grid interoperability between energy technologies and IT operation with electric power systems. |
[26] | IEEE C37.118 | 2011 | A standard for the measurement of the rates of change of frequency and synchrophasors in different environments and situations. |
[27] | ANSI C12 | 2012 | A standard for supporting advanced metering infrastructure, with a stronger focus on the application and transportation layers. |
[28] | ENISA | 2014 | A standard for promoting a typical level of information and network security. |
[29] | ISA-62443-4-2 | 2018 | Technical requirements for cybersecurity for industrial automation and control systems. |
[30] | ISO/IEC 27014 | 2020 | Guidelines for processes of information security. |
[31] | IEC TR 60601-4-5 | 2021 | Requirements for the cybersecurity of medical devices and systems. |
[32] | IEC 81001-5-1 | 2021 | A standard for the security, effectiveness, and safety of health software and systems. |
[33] | IEEE 2418.7 | 2021 | A standard for blockchain use in supply chain management, procedures, and implementations. |
[34] | SAE JA7496 | 2022 | A standard for accessing and managing security risks of cyber-physical systems. |
[35] | IEEE 2883 | 2022 | A standard for conformance and sanitizing storage. |
Work | Name of Standard | Launch Year | Descriptions |
---|---|---|---|
[36] | IEEE 1451 | 1999 | A standard approach for message security, interoperability, and data sharing in IoT networks. Networks with different communication protocols can be supported. |
[37] | ANSI/ISA-95 | 2005 | A standard that provides automation for interfaces in control and IoT systems. |
[38] | IEEE P2510 | 2017 | A standard that defines the definitions, parameters, controls, and quality testing methods for IoT data. |
[39] | ISO/IEC 20924 | 2018 | A standard that provides definitions and terminologies for IoT systems. |
[40] | ISO/IEC 30141 | 2018 | A standard that defines the best practices, reusable designs, and architectures for IoT systems. |
[41] | IEEE P2413 | 2020 | A standard that summarizes descriptions, definitions, and commonalities between IoT domains. It helps promote compatibility and interoperability between IoT systems. |
[42] | ISO/IEC 30161-1 | 2020 | A standard that specifies guidelines for IoT data exchange platforms, service communication networks, functionalities, end-point performance, and middleware components. |
[43] | ISO/IEC TR 30166 | 2020 | A standard that outlines standardization, functionality, technical aspects, and characteristics for IoT systems. |
[44] | ISO/IEC 30162 | 2022 | A standard that covers the best guidance and practices for network connectivity, transportation connectivity, framework connectivity, data management, data interoperability, and interaction between data transmission protocols used in industrial IoT systems. |
[45] | ISO/IEC 27400 | 2022 | A guideline on the controls, principles, and risks to privacy and security of IoT systems. |
Deep Learning Algorithms | Advantages | Disadvantages |
---|---|---|
Deep neural networks | Good self-learning ability to extract deep features; can capture non-linear knowledge, particularly from images | Vanishing gradient issue; generally possess higher dimensionality |
Convolutional neural networks | Shared biases and weights for hidden neurons; reduce dimensionality without information loss | Variance in images with different orientations and positions; longer training time due to computationally intensive max pooling operations |
Deep belief networks | Good for tackling images with different orientations and positions; good for managing unlabeled data for better generalization | Slow convergence rate; becomes stuck in local solutions |
Gated recurrent units | Good memory capacity; prevent gradient vanishing issue | No exploration of the importance of elements in sequences; challenging to train the model with long-term sequences |
Long short-term memory | Good at handling long-term sequences; prevents gradient vanishing issue | Difficultly supporting online learning; higher risk of model overfitting |
Deep Learning Algorithms | Characteristics |
---|---|
Deep convolutional GAN | Convolutional stride is used instead of max pooling; up-sampling is achieved using transposed convolution; batch normalization is used in all layers except the output layer; the activation function leaky rectified linear unit is introduced. |
Conditional GAN | Introduces conditions to the generator and discriminator to control the generated outputs; supports the learning of multi-modal models. |
Information-maximizing GAN | Introduces control variables, which are automatically updated to control the generated outputs; the loss function is updated to include mutual information to maximize the information between a small subset of the latent variables. |
Auxiliary classifier GAN | The discriminator is assigned to predict the class label instead of using it as an input so that learning is independent of the class label; allows separation of a dataset into subsets to train the generator and discriminator. |
Bidirectional GAN | Introduces an encoder to map data to the latent representation; the encoder and generator cannot communicate, but they are designed to invert one another. |
Loss-sensitive GAN | The generator learns to generate real samples; the loss function is regularized using the Lipschitz regularity condition. |
Works | Applications | Methodologies | Results |
---|---|---|---|
[103] | Intrusion detection | Deep convolutional GAN; fuzzy rough set | Accuracies of 95.2–98.6% using two benchmark datasets |
[104] | Cyber–physical–social detection system | Deep convolutional GAN; blockchain | Accuracies of 95–100% using the Cifar10 dataset |
[105] | Intrusion detection | Conditional GAN; convolutional neural networks | An average accuracy of 74.3% |
[106] | Cross-site scripting attacks detection | Conditional GAN; gradient penalty | Recall rates of 96.7–99.0% |
[107] | Security analysis | Information-maximizing GAN | Accuracy of 51.9% |
[108] | Web traffic estimation | Information-maximizing GAN; long short-term memory | Root-mean-square error of 40.6 |
[109] | Controller area network bus intrusion detection | Auxiliary classifier GAN; binary real–fake classifier | F1-scores of 97.5–99.8% |
[110] | Cyber-attacks and faults detection | Auxiliary classifier GAN; multilayer perceptron | F1-scores of 88.2–99.7% in 45 scenarios |
[111] | Network intrusion detection | Bidirectional GAN; encoder–discriminator | Accuracies of 99.1–99.7% using two benchmark datasets |
[112] | Network anomaly detection | Bidirectional GAN | F1-scores of 83.5–94.9% using two benchmark datasets |
[113] | Automated surface inspection | Loss-sensitive GAN; wavelet fusion | Accuracies of 90.8–95.7% |
[114] | Membership inference attacks detection | Loss-sensitive GAN | Accuracies of 50.8–90.8% |
Works | Applications | Methodologies | Results |
---|---|---|---|
[115] | Open network connections for real-time packet reception | Soft early demultiplexing with packet classification and lazy cache invalidation; priority inheritance scheme to facilitate the communication process; rate limitation scheme to protect the system from unexpected high traffic | The network traffic load was increased by seven times |
[116] | Attack detection and mitigation using a threat modeling framework | Center for threat-informed defense techniques with threat lists and mapped controls | Only theoretical discussions were shared |
[117] | An authentication scheme preserving light computational load, privacy, and security | Secured data exchange via GaggleBridge and Gaggle; seven-phase privacy-preserving approach, including server registration and system initialization, application server, client registration, system login, network ID and device verification, system authentication and key agreement, and service-ware verification phases | Reduced the total number of transmission bits by 33–70% and energy consumption by 97–159% |
[118] | Network intrusion detection systems | Semi-supervised stacked autoencoder with a threshold selection algorithm | Recall rate of 94.9–100% and precision of 96.1–99.9% using six benchmark datasets |
[119] | A prediction system for energy production and consumption | Bidirectional long short-term memory network with an attention mechanism | Root-mean-square error of 0.011 and a mean average error of 0.002 |
[120] | Anomaly detection for network incursions | Federated deep neural network | True negative rate of 97.9%, true positive rate of 99.7%, and accuracy of 99.7% |
[121] | Network intrusion detection systems | Self-learning ability-basedfeature extraction and an enhanced chicken swarm optimization for the enhancement of recurrent neural networks | Error rate of 8.16% |
[122] | Malware detection systems | Snake optimization-based feature extraction approach for the enhancement of graph convolutional network | Precision of 98.7%, recall rate of 98.5%, and F1-score of 98.5% |
[123] | Attack path detection systems | Depth-first search algorithm for the identification of all paths between sources and target nodes; Floyd–Warshall algorithm for detection of attack path risk level | Running time of 7–18 ms with varying target nodes of 7–10, and running time of 6–130 ms with varying source nodes of 0–15 |
[124] | Network intrusion detection systems under the presence of label-flipping poisoning attacks | Ensemble equalization and normalization of Kitsune’s core algorithm to self-reproduce data; one-class support vector machine for network anomaly detection | Partial area under the ROC curve of 97.1% |
[125] | Blasting parameters and fragmentation prediction model for open pit mines | Evolutionary particle swarm optimization-based support vector regression | Relative errors ranging from 0.76% to 10.82% |
[126] | Real-time denoising of IoT data | Noise contrastive estimation; autoencoder and denoising autoencoder | Reduced root-mean-square error from 2.165–4.277 to 0.276–0.542 |
[127] | Anomaly detection of engines | Three-layer correlation graph; decision tree | Average accuracy of 98.4% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chui, K.T.; Gupta, B.B.; Liu, J.; Arya, V.; Nedjah, N.; Almomani, A.; Chaurasia, P. A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information 2023, 14, 388. https://doi.org/10.3390/info14070388
Chui KT, Gupta BB, Liu J, Arya V, Nedjah N, Almomani A, Chaurasia P. A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information. 2023; 14(7):388. https://doi.org/10.3390/info14070388
Chicago/Turabian StyleChui, Kwok Tai, Brij B. Gupta, Jiaqi Liu, Varsha Arya, Nadia Nedjah, Ammar Almomani, and Priyanka Chaurasia. 2023. "A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions" Information 14, no. 7: 388. https://doi.org/10.3390/info14070388
APA StyleChui, K. T., Gupta, B. B., Liu, J., Arya, V., Nedjah, N., Almomani, A., & Chaurasia, P. (2023). A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information, 14(7), 388. https://doi.org/10.3390/info14070388