Table 1.
Survey Area | Survey Content |
Design | Focused Domain | Attacks | ML/DL Methods | Type of Experiment |
Reference |
---|---|---|---|---|---|---|---|
IoT Vision: | IoT application |
six-layer IoT architecture | IoT architecture | √ | - | - | [4] 2014 |
IDS in IoT | IDS in IoT | - | IDS | √ | ML | Statistical analysis | [7] 2018 |
Five research questions | IDS | √ | - | - | [8] 2019 | ||
IDS | - | IDS | √ | - | - | [9] 2018 | |
IoT architecture IoT security |
IoT-IDS architecture | IDS | √ | - | - | [6] 2018 | |
IoT Security-Based Data Analysis |
IoT security | Five-layer IoT architecture | IoT Security | √ | ML | - | [11] 2020 |
IoT Architectures and Applications |
IoT architectures |
IoT taxonomy | Five-layer architecture |
- | - | - | [3] 2017 |
IoT-Based Info of Things | - | IoT architecture | - | - | - | [2] 2013 | |
IoT Architecture | IoT survey taxonomy | IoT architecture, Protocols and security Privacy |
- | - | - | [13] 2020 | |
Attacks | Attacks | - | RPL and 6LoWPAN in IoT | √ | - | - | [5] 2015 |
NIDS for IoT | NIDS | IoT threats classification | Three-layer architecture, IoT threats NIDS |
√ | ML | Statistical analysis | [10] 2019 |
ML/DL Methods for IoT Security | ML/DL in IoT IoT threats |
IoTsys and threats ML/DL taxonomy |
IoT security Six-layer IoT architecture |
√ | ML/DL | - | [12] 2020 |