Introduction

The security of Internet of Things (IoT) has become burning issue since last couple of years as the IoT devices are not equipped with sufficient security due to low memory, storage, bandwidth and computational power which makes these devices susceptible to many attacks like denial of service (DoS), distributed denial of service (DDoS), botnet, spoofing, snipping and some other serious type of attacks. Therefore, it is indispensable to provide complete vigorous security solutions for IoT-equipped systems. Such security solutions can only be provided by covering all the aspects related to IoT security. To provide a complete package of security in IoT, it is better to understand the building blocks of IoT security. These building blocks not only cover all the aspects related to security issues in IoT but are also known as security requirements or security criteria or security characteristics of IoT. IoT security in terms of security criteria is described by different authors in the literature. For example, Hameed et al. [1] defined the security of IoT by requirements like privacy, confidentiality, attack detection and secure routing. Similarly, the security criteria for IoT defined by some authors in terms of confidentially, integrity and availability which is also known as CIA model [2]. Different approaches and research works have been presented to safeguard IoT based systems by fulfilling the IoT security requirements. This research work is also intended to highlight the significant role of ANNs technologies towards fulfilling the security requirements. These security requirements are discussed in detailed fashion in later part of this research in light of ANNs.

ANNs are the networking models, which mimic the human brain in terms of processing information [3]. They are applied to find patterns in data by building the complex relationship among the data for the entry in inputs to corresponding outputs [4]. Before using ANNs in any environment, the most vital thing is to train it by inputting a huge amount of data and rules in order to obtain the desirable output [5]. ANNs has wide spectrum of applications in various domains like engineering fields, Mathematics, Pharmacy, transportation, theft and fraud detection, Computer vision, pattern recognition and network security [6]. However, the main focus of this study is to highlight the efforts and approaches of ANNs for the IoT security domain. In this regard, different machine learning approaches have been taken in context of IoT security but ANNs have addressed the security of IoT in marvellous fashion and covered all the aspects of IoT network. ANNs have presented many approaches to address the security issues in IoT.

ANN furnishes security solutions towards IoT by using different approaches, its types and sub-types such as convolutional neural network (CNN), recurrent neural network (RNN), feed forward neural network (FF-NN), deep neural network (DNN), long short-term memory (LSTM), radial basis function (RBF), multi-layer perception (MLP), autoencoders, back propagation neural network (BP NN), probabilistic neural network (PNN) and so on. Our focus in this work is to discuss the security requirements of IoT in light of approaches and modelling techniques provided by ANN. In first attempt the security criteria for IoT has been identified from various sources of literature then ANNs contributions towards the underlying security requirements like authentication, network monitoring [7], attack detection privacy [8], secure routing [9], encryption [10], access control [11, 12], privacy [13, 14], theft resistance [14, 15] and authorization [16] have been completely discussed. ANNs not only contribute towards the security requirements but they also leverage the security of IoT to deliver a robust IDS for detecting attacks, threats and anomalies. The role of ANNs in detection of DoS/DDoS attacks in IoT is significantly conspicuous. In this regards, numerous ANNs approaches and techniques for detection and classification of DoS/DDoS attacks in IoT network have been presented [17,18,19,20,21]. ANN-based approaches and methods provide highest precision and accuracy for classification and detection of unusual traffic related to IoT. Besides, handling the DoS/DDoS threats, ANNs also provide a wide range of security solutions for other IoT security aspects. They can be applied for different purposes in IoT systems such as detection of malicious nodes [22], facial recognition services [23], anomalies detections [24, 25], routing attacks [26] and face recognition system for blind people [27].


a. Motivation

Following are the major motivations for conducing this SLR.

  • The security of IoT has become the most intriguing and trending research topic over the last few years. Different modern technologies have been adopted to deal with the security scenarios related to IoT-based systems.

  • The security of IoT is main concern for all the stakeholders such as researchers, network administrators, engineers and IoT platform companies. Exorbitant research works have been conducted in this domain but still there are a lot of potential opportunities available for the researcher to get deep dive into the security aspects of IoT.

  • The major focus of this study is to highlight the security requirements of IoT based on the application of ANNs, this research investigates all the important features of IoT that were not addressed by researchers, previously.


b. Contribution

The major contributions of this systematic literature review are given below as:

  • This is the first attempt systematic literature review (SLR) to spotlight the efforts and approaches presented by ANN for the security of IoT. To the best of our knowledge, there does not exist any related work that discusses the security requirements of IoT in light of ANNs approaches. Although, there exists a lot of works done by machine learning to address the security issues related to IoT.

  • This SLR collects the latest research articles in the field of to IoT security that are leveraging different approaches and techniques of ANNs in this domain. Research articles from 2002 up to 2021 are included in this literature study.

  • Security requirements of IoT are identified after extensive literature study and different type of ANNs approaches have been identified as well. This is novel effort to illustrate the underlying IoT security requirements such as authentication, authorization, encryption, secure routing, network monitoring, confidentially, integrity, availability, IDS and access control in light of different ANN-based solutions. The overall security requirements have never been addressed in light of engineering the security solutions of ANNs.

  • Two major areas of IoT security such as authentication and IDS have been extensively studied and state-of-the-art review has presented to address the underlying security issues in these two IoT security areas more importantly.

  • This SLR compares different ANNs approaches which are intended towards detection of DoS/DDoS attacks in IoT network. The performances of different ANNs methods for security solutions of IoT are discussed based on performance evaluation criteria to judge the best model.

  • Complete in-depth analysis of research studies is performed to know about the current research trend and research gaps in this domain. This research provides a basic foundation for the researchers and security experts related to IoT security in this area.

The remaining paper is organized as: Sect. “Related work” is consisted of similar works presented by authors related to the security of IoT. Section “SLR method” describes the overall procedure taken for the completion of SLR. The overview of selected studies or answering to the research questions is discussed in Sect. “Results”. Section “Threats to validity” includes the different types of threats to validity and finally Sect. “Conclusion” ends with conclusion part of this research work.

Related work

According to our literature study, a lot surveys, reviews and systematic literature reviews on the security in IoT by using both machine and deep learning approaches are available. The previous works discussed the security issues of IoT in broader sense like machine learning or deep learning based solutions have been applied. But, our work mainly focused to address the security aspects of IoT based on ANNs. According to our literature study, we did not find any related work that uses ANN approaches to address the security of IoT in terms of highlighting the security requirements. Therefore, in this section, we are discussing the different related works that are focusing the security of IoT in light of machine learning and deep learning methods.

Al-Garadi et al. [28] presented a survey of highlighting the various methods presented by machine learning and deep learning for security of IoT. Tahsien et al. [29] put forward the machine based solutions of for security of IoT. Mohanta et al. [30] performed a survey to address the issues related to CIA addressing different IoT layers by using Block chain, artificial intelligence and machine learning approaches. Restuccia et al. [31] surveyed the security issues and threats of IoT devices by using machine learning and software-defined networking. Andročec et al. [32] briefly discussed the security of IoT in light of machine learning techniques and approaches in SLR. The main focus of this work is to discuss authentication procedures and intrusion detection system in IoT based system with the support of machine learning methods. Rana et al. [33] highlighted different machine learning methods and their applications in IoT. Amanullah et al. [34] illustrated the relationship between IoT security, deep learning and big data technologies. They discussed the security of IoT in terms of security requirements such as CIA, authentication and access control using big data technologies. Cui et al. [35] focused on traffic profiling, IoT device authentication and other issues related to IoT security by using machine learning. Similarly, machine learning has become a powerful tool for detection of abnormal network behaviour and threats in IoT environment, therefore different surveys, reviews, and SLR are presented in this domain. In this regard Chaabouni et al. [36] presented a survey focusing on discussing the Network Intrusion Detection System (NIDS) deployed through machine learning. The main theme of their work is to discuss in detail NIDS implementations, threat detection methodologies, comparing different free datasets and various deployed machine learning strategies and algorithms in context of IoT security. Fahim et al. [37] highlighted various techniques of intrusion detection, prediction and analysis by using statistical and machine learning towards the security of IoT. They also highlighted the areas of application and performance of machine learning methods employed for IoT security. Elrawy et al. [38] surveyed all the previous works to demystify the IDS based on machine learning intended for IoT paradigm. They also provided a deep insight into the different attacks and vulnerabilities pertaining to IoT security. Costa et al. [39] also made an extensive survey and studied different intrusion detection techniques for IoT security by using machine learning approaches. Alsamiri et al. [40] evaluated different machine learning algorithms, which are used for detection of different attacks in IoT network. Albalawi [41] also discussed different machine learning algorithms for security of IoT. Albalawi discussed various machine learning approaches for IDS and authentication in IoT. Hussain et al. [42] highlighted machine learning and deep learning approaches to address the security issues in IoT network. They also identified challenges and existing gaps in current works for machine learning-based IoT security. Moh et al. [43] also focused on surveying of different machine learning techniques for IoT and fog computing security. They illustrated different machine learning techniques to identify threats and attacks in IoT network and also presented machine learning based solutions. Deorankar et al. [44] also studied machine learning approaches for detection of anomalies and cyberattacks. The work presented by Podder et al. [45] is utilizing the different types of ANNs such as deep belief network, RNNs, generative adversarial network and many others towards the cybersecurity of IoT. They discuss the various IoT attacks and the effectiveness of these approaches in managing different attacks.

We categorized the related works based upon the area of security in IoT. According to our literature study, machine learning or deep learning approaches contribute towards the security of IoT in three different areas such as IDS, authentication and general security. The majority section of related works is related to the intrusion detection of IoT. Some of authors also used machine learning or deep learning for authentication purposes and some authors focused upon general security of IoT. The general security describes network monitoring, access control, encryption, authorization, routing attack, detection of malicious nodes, theft resistance and privacy. Summary of literature work is given in Table 1. This table shows the approaches presented by different authors to address the security of IoT by considering different security requirement of IoT.

Table 1 Comparative study of proposed SRL with existing literature work

SLR method

The proposed SLR method is inspired by the work presented by Liao et al. [35]. Thus, the proposed SLR design is composed of seven (7) major steps. In step (1), the Research Questions (RQs) are defined along with their objectives. In step (2), the planning procedure for this search is discussed. In step (3), the search activity is performed on different online libraries. Inclusion–exclusion criteria and snowballing are discussed in step (4) and step (5) respectively. The quality assessment procedure is carried out in step (6) and quantitative meta-data analysis is the final step of this SLR protocol. The step-wise detail and complete structure of the proposed SLR is given is depicted in Fig. 1. All steps involved in SLR protocol are discussed in concrete and detailed manner as below.

Fig. 1
figure 1

SLR Protocol design

Defining research questions (RQs)

In first step of SLR, the research questions are formulated by focusing upon their objectives. In this systematic study, four RQs are defined such as RQ1, RQ2 and RQ3. The major focus is to define questions in such manner that each question can describe the efforts and approaches of ANNs towards the security of IoT. The detail of RQs along with motivation and objectives is given in Table 2.

Table 2 Research questions detail

Search planning

In this step of SLR design, a proper search strategy is made to complete the search process in vigorous and complete manner. First step of search planning is to define keywords for individual RQs. Then, these keywords have been used for forming search string as well. The detail of keywords related to each RQ is given in Table 3.

Table 3 Keywords and research questions

After searching individual questions with defined keywords, it was observed that some important papers were skipped and were not retrieved from some online search libraries due to the reason that some libraries do not support quotation marks for searching. So, quotation marks were expunged for those libraries that do not support. According to Kitchenham et al. [36] keywords are not enough for searching purposes and they need to be combined in form of string such as search string. For this purpose, a search string was formed based upon title of the research work to get the best results out of the search activity. Search string is derived from the keywords defined for RQs. Search string was formed by observing some steps as suggested in [37] and following steps were taken to form search string.

  • Major or key terms are derived from main research topic

  • Identification of keywords

  • “OR” operator is used for similar words and alternative spellings

  • Different terms are linked by using AND operator

In likes of this procedure, following search string is created from the research topic.

(Internet of Things security OR IoT security) AND (Artificial neural networks OR ANNs) AND (Approaches OR Techniques OR Methods OR Algorithms OR Frameworks).

There are two parts of search string: the first part is related to the security of IoT and second part is focused on ANNs approaches, methods, techniques or algorithms which are applied in the context of IoT security. Search string is applied on all database sources and it fetches the desired results related to this research work. Searching process is improved by using advance search options available in online search libraries. A pilot search is conducted to know about the results and to refine the search string for obtaining the required results related to this study. ACM, Science Direct, Springer and IEEE Xplore are the main online libraries that are selected for search purpose. While MDPI, Taylor and Francis, Hindawi and Wiley are included in other category. According to Mahdavi-Hezavehi et al. [38] these online libraries have more powerful search engines and are more ideal for automatic searching as well.

Searching process

According to 3rd step of SLR protocol, both automatic and manual searches were performed to get the most desirable primary studies related to this research work. Automatic search produces better results than manual search [39]. But, still manual search has been carried out to validate our the search string. The procedure for selection of papers from different online sources is depicted in Fig. 2.

Fig. 2
figure 2

Paper selection procedure

Online sources are ACM, Science direct, Springer and IEEE. The other category comprised of sources like Wiley, Hindawi, MDPI, Taylor and Frances etc. Initially keywords and search string were applied to identify the relevant studies. After the collection of papers, repeated papers are removed. Title of each paper is thoroughly checked against the collected papers from each online sources. Papers collected from online libraries were also checked against the keywords. Abstracts were studied to find out the most relevant studies. Finally, after full reading 160 papers were tentatively selected to address the RQs. The detail of searching process is documented and is shown in Table 4. In this table, the final list of included and excluded papers are identified. Included papers are those papers which are used for answering the research questions. These papers are selected after quality assessment (discussed in Sect. "Quality Assessment").

Table 4 Detail of included and excluded papers

Inclusion–exclusion criteria

It is important to have mechanism for inclusion and exclusion of research articles based on certain criteria. Papers inclusion and exclusion in this research work is based on the criteria which is defined in Table 5.

Table 5 Inclusion-exclusion criteria

Snowballing

Snowballing is basically the most important mechanism for inclusion of papers. Its working begins from relevant studies and it expands the number of relevant papers by deriving more relevant papers related to research studies [39]. Snowballing works in two methods such as forward snowballingFootnote 1 and backward snowballing.Footnote 2 The procedure adopted by snowballing is iterative in nature. The stepwise procedures of both approaches is given in Fig. 3. In this research, both types of snowballing have been used to get the most relevant and desired studies related to our work. Snowballing is applied in such way that initially 17 papers identified and after reading titles the number of papers diminished to 13. After reading abstracts and full reading, finally 7 research papers were selected through this procedure. These papers were also subjected to the quality assessment procedure. The working of snowballing procedure of both approaches during the 5th step of SLR is graphically in Fig. 1.

Fig. 3
figure 3

Forward and backward snowballing approaches steps

Quality assessment

This is the most significant step of our SLR protocol design as it defines a criteria for inclusion of most relevant and important papers related to research study. This criteria helps in selection of studies and improves the decision making about selection of papers. The quality assessment procedure is done in step-wise fashion such as initially quality assessment questions are defined. These questions are QA1, QA2, QA3, QA4, QA5 QA6 and QA7. The detail of these questions is given in Table 6. During the quality assessment procedure, we collected all the included research articles in excel sheet. A criteria/condition is defined for inclusion and exculsion of particular study during this process and it is given mathematically it can be written in the following equations.

Table 6 Quality assessment questions
$$A.V{(P}_{n})=\sum_{i}^{n}Q{A}_{i}$$
(1)

In Eq. (1), aggregated value (A.V) is calculated for each paper, where the values of “i” to “n” and “Pn” can be any paper for which A.V is calculated. The instance or case of nth paper, accepted in quality assessment procedure by using Eq. (1) is given as follows as.

$$If A.V{(P}_{n})=\sum_{i=1}^{n}Q{A}_{i}\ge 2.5\to Paper \, accepted$$
(2)

Similarly, the case of nth paper (any paper) rejected by using Eq. (1) is given below as.

$$If A.V{(P}_{n})=\sum_{i=1}^{n}Q{A}_{i}<2.5\to Paper \, rejected$$
(3)

A.V is aggregated value and Pn is any paper, which is subjected to quality assessment procedure. The value of “i” starts from 1 and ends with “n”, the maximum value of n is “7” as there are 7 quality assessment questions. QAi is ith quality assessment question. For the acceptance and rejection of papers a proper scale is defined, which shows the aggregate value. This scale ranges from 1 to 7. The conversion of linguistic terms into numbers and defined scale for aggregate value is shown in Fig. 4.

Fig. 4
figure 4

Scale and converting linguistic terms in numeric form

All the collected articles for this research work are checked against the quality assessment questions and numeric scores are assigned to the research papers based upon answering the quality assessment questions. If a particular paper provides enough answer to the quality assessment question then it is marked as “Yes”; and if it fails to answer the quality assessment question then it is marked as “No”. Then, to resolve this issue, we convert these linguistic terms into numeric form. Score or integer values are assigned to the research papers based upon their answers to the quality assessment questions. If a paper answered the QA question properly and completely then it is interpreted as “Yes” and value of 1 is assigned to the paper. If, it failed to answer the quality assessment question then it is considered as “No” and value of 0 is assigned to that research paper. For partially answered papers the value of 0.5 is assigned. Each paper is thoroughly checked against all quality assessment questions and corresponding numbers are assigned to each answer of question. Now, aggregate of all scores for individual paper is calculated. If the value is greater than or equal to 2.5 then it is accepted for inclusion in studies and if it is less than 2.5 then it is rejected and excluded from research studies. The outcomes derived from this assessment procedure are given in Fig. 5.

Fig. 5
figure 5

Quality assessment detail

Quantitative meta-data analysis

This is the last step SLR protocol, which is focused upon performing various analysis of research data from different perspectives. The core purpose of this section is to perform statistical and in-depth analysis of collated research articles in order to get a deep insight about the existing research trend in the field of IoT security via ANNs. The selected collated studies in this SLR to address the questions are derived from journal, conference proceedings, books and workshops. We selected 96 papers from different journals, 34 papers are chosen from conference proceedings, 3 from book extracts and 2 from workshops. The overall primary study for this research work is composed of 143 articles. The detail about source distribution of selected studies is given in Fig. 6. In this study, we collected research articles from 2002 to 2021. The research trend is investigated based on collated studies. According to our collected studies, it has been observed that exorbitant research work has taken placed during 2018, 2019 and 2020. The research in 2021 is underway. The complete research trend of security of IoT-based system using ANN techniques is given in Fig. 7.

Fig. 6
figure 6

Categories of studies

Fig. 7
figure 7

Year-wise breakup of studies

Results

In this section our focus is to provide answer to the formulated RQs in light of collected research articles. The comprehensive solutions are provided to the RQs (RQ1, RQ2 and RQ3). In first question (RQ1), we focus on to find out the security requirements that define a complete secure IoT network. We also identified the different types of ANNs. The main idea of this question is to collect security requirements of IoT and Types of ANNs, which are to be discussed in next research question i.e. RQ2. In second question (RQ2), we discussed and analyzed the security requirements of IoT by using ANNs types or different approaches. In this question, we highlighted the every security requirement with respect different approaches or methods presented by ANNs. We also highlighted the different frameworks, models, techniques and algorithms presented by ANN for overall security of IoT. In 3rd question (RQ3), we discussed the DoS/DDoS attacks and theirs solutions provided by ANNs to the IoT-based systems. In this question, we also comprehensively compared different ANN approaches in terms of performance for detection of DoS/DDoS attacks. The complete picture of entire research framework in hierarchical structure is depicted in Fig. 8. Similarly, the break–up of all papers in terms of providing answers to the related research questions is given in Table 7. The most number of papers are used for answering the RQ2.

Fig. 8
figure 8

Overall research framework

Table 7 Detail of studies for RQs

RQ1: Identify security requirements that define a full pledge secure IoT based system. What are the different types of ANNs contributing towards IoT security in the literature?

This questions consists of two sections i.e. in first section of question, we identified the security requirements of IoT from the existing literature while in second section we reported the different type of neural networks that have contributed towards the IoT security requirements. These two sections are fully explained as below.

Identifying IoT security requirements/features

In this question, the security criteria or requirements for IoT security are identified from the literature study. The main focus of this question is to identify and collect the security features/requirements that completely describe a full-pledged IoT system with the robust security. These features will be discussed for IoT security by using ANNs (will be discussed in next question). The overall procedure for selection of security features consists of two steps: in step one, 119 security features are identified from literature and in second step, duplicates or repetitive features are removed. The sources of all security features selected from literature study are given in Table 8.

Table 8 All attributes identified from various sources of literature

The final features have been collected from the pool of security attributes as identified in Table 8. These security attributes will be used as IoT security requirements. According to our literature study the most significant IoT security requirements are confidentiality (F1), integrity (F2), availability (F3) Authorization (F4), Trustworthiness (F5), Network monitoring (F6) Access Control (F7), Anti-DDoS (F8), Authentication (F9) Secure routing (F10) Encryption (F11), Privacy(F12) Theft resistance (F13), Intrusion detection (F14). We collected 14 security requirements, which are the building blocks of any IoT network. The number of studies focusing on IoT security requirement features are given in Fig. 9.

Fig. 9
figure 9

Number of studies focusing on individual IoT security requirement

Description or definitions of 14 security requirements of IoT are given Table 9.

Table 9 Detail of IoT security requirements

Frequency of attributes citation based on number of papers in literature is depicted in Fig. 9. This figure shows the number occurrence of each security attribute in literature. The detail of finally identified security attributes along with the sources are given in Table 10.

Table 10 Final list of selected attribute in this study

Now, we will discuss and analyse the security of IoT by using ANNs in light of the finally selected security requirements. The impact of ANNs approaches for IoT security requirements will be completely discussed in next RQ.

Types of artificial neural networks

The types and applications of ANNs exist in good numbers and in multiple domains. ANNs types are used for variety purposes such as data compression, prediction and pattern recognition [70]. Pattern recognition is the most important one and it is the form of classification [72]. ANNs use pattern recognition to address the security issues in IoT. For pattern recognition ANNs use different set of various algorithms, techniques, methods or types, which provide a reliable and secure options to IoT. Different types of ANNs are given in Fig. 10 [54, 71].

Fig. 10
figure 10

Summary of All ANNs types

RQ2. What is the role of ANNs towards the identified underlying security requirements/criteria of IoT? Identify the different approaches contributing towards overall IoT security

In this question, the security requirements/criteria for IoT as previously defined in RQ1 has been briefly explained in light of contributions provided by ANNs. As, ANNs provide a holistic approach towards the security of IoT but in this question, we are going to discuss the security of IoT with respect to the individual security requirements by using different ANN approaches or models. After, identifying the security requirements in the previous question, our focus is to discuss the significant role of ANNs to deal with the security issues and challenges related to IoT. In this question, we broadly address the security of IoT network in light of different frameworks, models, algorithms and techniques employed with the support of ANNs. The role of different approaches presented by ANNs for the overall security of IoT devices is highlighted. As, the number of IoT devices are drastically elevating due to their ubiquitous and pervasive nature. This significant rise has led towards the implementation issues related to the enforcement of security standards and procedures in IoT environment. Major challenges for implementing the security in IoT devices are: first, these devices are heterogeneous in nature and secondly these devices are bulky in numbers and third, these devices have less computational power, memory and processing abilities. The security of IoT devices is not only limited to the network where they are operating but it is also mandatory to inject the security in IoT devices which are using services, products and applications.

Authentication

Authentication of IoT device is mandatory before it participates in any network or login activity. For this purpose, ANNs have significant impact upon the authentication feature of IoT-based systems. ANNs based approaches provide a smart and secure authentication schemes by eliminating the traditional methods of authentication such as pins, passwords, username etc. Introducing ANNs as feature extractor for modern procedures of authentication such as biometric authentication, iris recognition, Wi-Fi signals and keystroke can be proven to provide good options for identification and authentication of IoT devices. ANNs with the support of deep learning provide strong security solution towards the authentication of IoT devices. Deep learning has major application as it is ideal for authentication of low power IoT devices [81]. In this regards, Chatterjee et al. [82] proposed authentication scheme leveraging ANNs for enhancing the security of IoT. They presented physical unclonable functions (PUF) based method which can be used for easy and secure identification of IoT devices. Similarly, the another main advantage of this method is, it does not require addition hardware cost and provides a secure way of identification. During the authentication procedure it is imperative to analyze the behavior or pattern to detect malicious activity. In this regard, to strengthen the security of IoT devices, ANNs along with support Counter Propagation ANN (CPANN) as classification models can be employed for continuous authentication to prohibit the attacker by analyzing behavior pattern of mouse and keystroke [81, 83]. Similarly, another authentication method for keystroking is introduced by Huang et al. [88]. This keystroke authentication method is using force information and touch time on piezoelectric touch panel for authentication in IoT. The signal authentication of IoT devices is also a major concern. For signal authentication of IoT devices, a deep learning based long short-term memory (LSTM) watermarking scheme is suggested by Ferdowsi et al. [84]. This approach can be used to collect data from IoT devices and authenticating the reliability of signals. This scheme is also helpful in detection of cyberattacks such as eavesdropping, man-in-the-middle and data injection. As, IoT devices have limited power options so secure authentication becomes a challenging task. In this regard, Das et al. [86] presented LSTM based framework to solve the authentication problems of low power IoT devices. This framework uses deep neural networks for classification of impairments in the signal received. For sufficient computation and memory power of IoT devices, Shi et al. [87] suggested an authentication mechanism based on Channel State Information (CSI) features of Wi-Fi signals extracted through the deep neural networks for identification.

ANNs also contributes towards biometric authentication in IoT environment. Biometric authentication does not require passwords or any other credentials so comparatively it is more convenient way of authentication. In this regards, the proposed model suggested by Meena et al. [85] has been used for biometric authentication in IoT. The proposed model uses ANNs as a classification of iris templates cells for authentication purposes of a person. ANNs are used for feature extraction in order to improve the accuracy and feasibility for deployment in IoT based system. McGinthy et al. [89] presented neural network based specific emitter identification (SEI) approach for secure authentication of IoT devices. Similarly, authentication method suggested by Reyhani et al. [90] uses encryption algorithms learned by neural networks for storing the encrypted passwords for authentication and access control. Bazrafkan et al. [91] presented segmentation algorithms derived from deep learning for iris based authentication for handheld devices in IoT environment. Chauhane et al. [138] presented end to end authentication based on breathing acoustics using RNN. Agrawal et al. [140] applied crypto token for authentication without intervention of user by using LSTM model and Blockchain technology.

Authorization

In IoT environment authorization is important security feature as it ensures that only authorized entity will get access to the applications, services or network resources. ANN with the support of deep learning has made a good influence on authorization security feature of IoT. There are various studies available in the literature, that describe the significant role of ANNs. To completely understand the authentication and authorization, Ferrag et al. [81] in their study provided a comprehensive overview of all machine learning approaches. For authorization in IoT, a trust authorization model is suggested by Du et al. [16] is using ANNs along with Back Propagation (BP) algorithm. This proposed method is used for detection of attacked node, monitoring the interactive data stream, periodically and urgently implementing the response measures. Similarly, proposed authorization technique based on behavioral characteristics extracted from the captured data by using ANN is also applicable as given in [81, 92]. Another study forwarded by Ahmed et al. [93] presented an approach for analyzing the free text of keystrokes by using neural network approach.

Encryption and decryption

Encryption is the most important security feature of IoT. ANNs also played an important role in encryption and decryption of images and data. The major reason of the applying ANNs for the encryption and decryption is that such cryptosystems are extremely hard to break but still key factors remain are the weight and architecture of the network [94]. However, neural networks are applied to build an efficient encryption systems by changing key permanently [136]. This is the main reason that the modern encryption schemes are using ANNs for cryptography. In the existing literature some studies are available, where ANNs have been applied for chaotic cryptography. Like, the study forwarded by Chauhan et al. [10] is using chaotic based artificial neural network for encryption of images. Similarly, Rarhi et al. [95] designed encryption scheme which combines the DNA encoding scheme by using Hyperchaotic Neural Network for encryption of images in IoT devices. Application of neural network in this approach, makes it hard to break. Similarly, for encryption of data different encryption and decryption schemes have been proposed for IoT devices using neural network concepts. In this regard, the Khari et al. [96] presented elliptic Galois cryptography protocol which is using chaotic artificial neural network for encryption and decryption of data. Another approach suggested by Saraswat et al. [97] is based upon auto associative neural network with the support of encryption techniques which is designed for transmission and receiving of data securely. This approach is very simple and exhibits fast encryption and decryption of data. ANNs can also be employed to provide cost effective and highly processing cryptographic algorithms that are ideal for the deployment for resource-constrained devices in the embedded systems [147].

Access control

It is another important feature of IoT that takes decision about which entity is allowed to access the network resources and which one is to be restricted. ANNs can also be used to provide a secure access control in IoT environment. The framework presented by Pacheco et al. [98] introduces ANNs as parametric model to provide access techniques for IoT end nodes. Modern authentication and access control methods like biometric access control system are based upon voice authentication, they use ANNs for identification of user voice [11]. For secure access control and offloading in IoT environment, Nguyen et al. [12] combined deep reinforcement learning (mixture of ANNs and reinforcement learning) by using block chain technology for mobile edge-cloud computation offloading system. Similarly, the block chain technology combines with machine learning approach such as reinforcement learning to define dynamic access control for IoT devices [99]. The reinforcement learning can also be used for access control and battery predication in IoT [100]. Artificial neural network has been used for collision detection and prediction mechanism for wireless network on media access control [101]. The application of ANNs approaches for access control can provide a secure access based on biometric for the network resources. In this regard, MultiLayer Perception (MLP) neural network presented by Bryliuk et al. [102] can be reckoned as good approach for nullifying the unauthorized access towards the IoT based systems.

Secure routing

Secure routing in IoT-based networks is considered as the fundamental security requirement. ANNs offer variety of approaches for the routing in IoT network. ANNs with the support of routing protocol known as SAEER [22], provides secure and energy efficient routing from one IoT device to other. Similarly, ANNs can also be applied for prediction of traffic or packet loss during the routing or congestion control [9]. In this approach ANNs combine with multi step ahead predication time series to predict the loss of packets. For efficient routing, energy utilization, ratio of packet delivery and network lifetime a routing protocol suggested by Thangaramya et al. [103]. This protocol uses CNNs in IoT based wireless sensors networks.

Privacy and trustworthiness

Privacy is also important feature of IoT and ANNs have also impacts on the privacy of IoT system. ANNs work as add-ons to provide privacy and element of trustworthy to the IoT networks. Data related to IoT devices can be locally processed in IoT network by using ANN’s components known as neurons and theirs’s interconnectivity [8]. These component allow to minimize the latency and preserves the privacy without sending data to the remote sites for the purpose of processing. Similarly, preserving the privacy of multimedia data of IoMT applications, ANNs can be applied at cloud server by segmentation techniques to extract the meaningful data generated from multimedia sensor nodes [13]. Type of ANN known as CNNs [15] can be leveraged for privacy in IoT for the energy preservation [14]. Trustworthiness of IoT can be achieved by two features such as security and privacy [68]. ANNs also provide different methods for trustworthiness security feature of IoT. In this regard, Abbas et al. [143] presented a trustworthy privacy framework known as “PriModChain” for IoT which is using deep neural networks. This framework is intended to provide trustworthy based on five security pillars such as safety, security, resilience, reliability and privacy in industrial IoT environment. Utilizing the ANNs, Banerjee et al. [144] forwarded a framework for the cyber trustworthiness in IoT environment. Although, the proposed framework has certain limitations, however it can be improved by using autoencoder and deep neural networks.

Theft resistance

Artificial neural networks are also helpful for theft detection IoT based system. Neural Networks have major applications in IoT with respect to theft resistance. The major role of neural networks can be seen in energy theft detection is inside the smart grid systems [14]. A similar model known as Smart Energy Theft System (SETS) was presented by Li et al. [15] incorporating CNNs for detection of theft. This approach provides very high accuracy of 99.96%; and it ensures the security of IoT based smart home systems. Similarly, neural networks were also applied in the approach for smart energy meter, where the role of neural networks is to analyze the trend of energy consumption in the household [104].

Network monitoring

The network monitoring and decision making about the entities involved in network are important considerations for the better and smooth running of IoT network. A proper network monitoring can be achieved by deploying a smart Intrusion Detection System (IDS). IDS is software program, which regularly monitors the network traffic and informs the network administrator about the anomalies encountered during the network traffic [105]. ANNs based intrusion detection mechanism bring forecasting approach which tends to predict the network elements in IoT environment [7]. This approach has the ability to reduces the human intervention and labor administration inside the network. The complete IDS approaches leveraging ANNs are discussed in the next section in detail.

Intrusion detection

It can be defined as “software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analysing those events for signs of the security problems” [76]. One of the most challenges faced by IoT is to detect and prevent intruders in IoT devices and networks [146]. As, security of data is important, for this purpose different IDSs have been designed to keep security of IoT device in mind. IoT devices suffer from various threats and vulnerabilities, therefore, it is necessary to detect these cyberattacks and intrusions before they exploit the vital network resources. Different approaches and attempts have been made to address the security issues and challenges related to threat detection. But, more importantly, the contribution of ANNs is noticeable in this respect. ANNs have been applied by different models related to intrusion detection in IoT environment over the years. But, the most common are two types of models such as misuse IDS and anomaly. The former model searches for activity against the well-known signatures of intrusions while anomaly based IDS detects abnormal activity [137]. Misuse IDSs normally have shortcoming, when the attacks characteristics change from built-in signatures but this problem can be solved by ANNs [137]. One of the most applications of ANNs is intrusion detection in IoT network. There is a sharp rise in intrusion detection technologies specifically in distributed and intelligent system [135]. In this survey, we collected different approaches for intrusion detection mechanisms using ANNs. The complete detail of ANNs approaches for IoT intrusion detection/attacks along with limitations are given in Table 11.

Table 11 IDS in IoT using ANN approaches/techniques

From above discussion it becomes significantly clear that the ANN approaches have significand contributions towards the intrusion detection security requirement of IoT.

Confidentiality integrity and availability (CIA) security requirements

Confidentiality is about keeping secret or preventing data disclosure to the unauthorized access. The confidentiality of data can be achieved via various security mechanisms but one of them is encryption. Encryption is a good solution in order to maintain the confidentiality and privacy of data [54]. ANNs provide confidentiality of data in IoT networks by converting it into unreadable format through different encryption approaches like [10, 94, 95]. Similarly, the most common method for confidentiality of data is biometric verification [130]. ANN has also been used to provide biometric authentication through the iris recognition [85]. ANNs are also helpful in providing biometric based verification scheme known as “gait-based security” scheme intended for the security of IoT devices operating in healthcare system [131]. To ensure the confidentiality of data in IoT network, the Usman et al. [13] presented privacy preserving framework by using counter-propagation ANNs. Similarly, Yao et al. [14] presented CNNs based scheme for detection of energy theft in smart grid. Another approach using Multilayer Perceptron (MLP) ANNs supposed by Barros et al. [132] performs biometric authentication by using ECG (electrocardiography). It uses MLP ANN for extraction of features in IoT network. The confidentiality, availability and integrity (CIA) features of systems are dependent on persistent security and robustness against routing attacks [26]. The availably of data is affected by catastrophic situations like storm, earthquake and flooding. Data can also be harmed by human activities that are done accidently or deliberately. Firewall, redundancy methods and IDS are the best possible ways of protecting the availability of data. CIA features related to IoT can be protected by using intrusion detection mechanisms [133]. Intrusion detection is mechanism of detecting any attempt which leads towards the compromising of confidentiality, integrity and availability of network resources [134]. The most significant application of ANNs is intrusion detection mechanisms as available in [19, 108,109,110,111]. The complete detail of all ANN-based approaches, which contributed towards the security requirements of IoT are given in summarized form in Table 12.

Table 12 Summary of ANN approaches for IoT security requirements

Different approaches, frameworks, models, techniques and algorithms have been presented to cope with the threats and attacks related to IoT systems. But, ANN approaches encompassing the concepts of brains and neurons can be reckoned as best security option to monitor the network and make timely decisions related to the security of IoT. ANNs also provide the features of self-organization and self-feedback network [148]. Deep neural network-a type of feed-forward ANN constructed from deep belief network but with more detail included, can be more effective towards IoT security [163]. According to different research studies, it becomes clear that ANN approaches provided better accuracy and detection rate as compared to the other approaches [115]. The detail of different types of ANNs-based methods, frameworks, models, techniques and algorithms contributing towards IoT security are given in Table 13.

Table 13 ANNs based frameworks, models and techniques for overall IoT security

RQ3: How artificial neural networks (ANNs) can be used to detect and analyze DoS/DDoS attacks in IoT network; and also compare the performances of ANNs approaches targeted towards the IoT security?

Our main motivation in this question is to discuss the security solutions provided by ANNs for IoT against DDoS or DoS attacks. In response to this question, the different types of ANN approaches that are fruitful for threat detection in IoT along with their performances evaluation are reported. We collected different studies that are reporting various attacks addressed by IoT based systems. In the literature review, it has been observed that majority of studies were focused on leveraging ANNs techniques for DoS attacks in IoT networks. The number of studies focusing on using ANNs for DoS attacks are given in Fig. 11.

Fig. 11
figure 11

Number of studies focusing on IoT attacks

IoT-based systems are susceptible to many security threats and attacks such that even a single attack can compromise the entire network system. Therefore, it is mandatory to identify and assess the gravity of such attacks which could halt the system. Like, back in 2016, Dyns security cameras were hacked, ultimately it not only led towards breaching of data but Twitter and Netix also went under DDOS attacks [143]. Similarly in 2016, IoT infrastructure suffered from Mirai attack—a family of malware attacks which halted the internet by using webcams and printers as botnet for DDoS attacks [30]. DDoS attacks spawn a conspicuous security threats to Internet in modern world. But, these attacks have more dominant impacts in IoT environment because devices operating in this environment come up with minimum memory, computation power and less security. DDoS attacks degrade the performance of IoT system by misusing the resources such as memory, CPU or network bandwidth [156]. DDoS attacks are arising at the 2.5 rate in last 3 years [164]. In response to these attacks, ANNs furnish the services for detection and classification of DoS/DDoS attacks then identifies and analyses their impacts in IoT network. For the classification of such attacks various attempts have been made that are using ANNs as identifier and classifier [117, 118]. Because, ANNs based approaches for the detection, classification and prevention of DDoS attacks produce higher accuracy than other machine learning approaches. The major reason behind the application of ANNs-based algorithms for unsupervised learning is due to theirs effectiveness in detection of DDoS [165]. We collected different approaches using ANNs algorithm for the detection of DoS/DDoS attacks in IoT as detail given in Table 14. In this table, all the ANNs algorithms and approaches that have been applied alone or with the support of other methods for the security purpose of IoT are reported. We also highlighted the existing limitations and improvements of these approaches based on our literature study. We also studied these research studies for different types of datasets that have been applied for detecting of DoS/DDoS attacks.

Table 14 ANNs-based approaches of detection of DoS/DDoS threats in IoT-driven systems

It is indispensable to select a robust and efficient ANN-based architecture/approach which can provide answers to the security questions related to the IoT network. This ANN architecture/approach can be selected based upon certain performance evaluation criteria or parameters. This performance evaluation metrics of ANN methods intended towards the IoT security can be determined by detection of accuracy, precision, recall and F1-score. But, among these evaluation parameters, the most significant one is accuracy. Accuracy determines the true detection in terms of percentage over total data instances. It is very important performance evaluation parameter for ANN approach intended towards the DDoS or other threat detection. Accuracy, precision, recall and F1-score can be calculated by using following equations.

$$Accuracy=\frac{TP+TN}{TP+FP+TN+FP}$$
(4)
$$Precison=\frac{TP}{TP+FP}$$
(5)
$$Recall=\frac{TP}{TP+FN}$$
(6)
$$F1-Score=\frac{2\times (Precision+Recall)}{Precision+Recall}$$
(7)

where, TP, FP, TN and FN represents the true positive, false positive, true negative and false negative respectively. These are the performance metrics of any ANN based detection method. There are many performance evaluation parameters for measuring the efficiency of ANN method for detection of DoS/DDoS attack but the most prominent and significant parameters, which can be used as metric for selection of best approach are accuracy, precision, recall and F1-value.

The accuracy, precision, F1 value and recall of different ANN approaches along with dataset for the DoS/DDoS attack detection in IoT-based systems are given in Table 15.

Table 15 List of studies using ANNs approaches, dataset and performance metric for IoT DoS/DDoS detection

Accuracy is important parameter for assessment of the performances of ANNs approaches. Similarly, precision, F1-score and recall are the most commonly used evaluation parameters that are also used to assess the performance of different ANN-based security techniques towards the security threats in IoT-driven systems. The number of studies measuring the performance of ANNs approaches with respect to IoT security are given in Fig. 12.

Fig. 12
figure 12

Number of studies focusing on performance evaluation parameters

From literature study we have collected the values of accuracy, precision, recall and F1-score for each ANN methods as discussed in Table 15 and the detail is given in Fig. 13.

Fig. 13
figure 13

Performance evaluation parameters comparison of different ANN methods

Among the ANNs methods of detection of threats, that method having higher value of accuracy, precision, recall and F1-score is said to be the best method of detecting DoS/DDoS attacks in IoT-based systems. According to the findings of this study, the architecture presented by Soe et al. [20] is more ideal for detection of DDoS attacks due its higher accuracy, detection rate and precision. This architecture has the advantages over other detection methods like (i) it resolves the issue of data imbalance by using Synthetic Minority Over-Sampling Technique (SMOTE), (ii) it requires very less configuration with ANN and (iii) its resampling techniques enable to extend the detection rate by 100%.

Threats to validity

In this section, we have classified the different types of threats related to validity. Validity threats affected the procedure of data extraction and quality assessment of selected studies in this SLR. According to Wohlin et al. [39], there are four categories of validity such as construct validity, internal validity, external validity and conclusion validity. Threats to the different types of validities are discussed below as.

Construct validity

Threats related to forming keywords and search string, formulating research questions, decision regarding the selection of online data sources, building inclusion–exclusion criteria and selection of primary studies towards the validity are discussed. In context of this SLR approach, these threats were diminished such as keywords and search string were formed carefully under the supervision of experts. A pilot search was conducted to refine the search string and check its validity. Research questions were thoroughly checked against the individual search string which were formed for the questions. Online data sources for searching purposes were selected based upon the reliability, authenticity, well-reputation and trust. Inclusion exclusion criteria was thoroughly checked and applied for selection of primary studies. Snowballing and pilot study mitigated the impacts of threats related to construct validity to much extent.

Internal validity

This type of validity is related to the implementation part of SLR design such as data extraction, quality assessment, search terms and search method. Threats related to internal validity were mitigated by performing manual search to validate the search terms and search method. Different versions of search string were formed to get the most desired and relevant results. Threats related to quality assessment were lessened by defining a quality assessment criteria and strictly following criteria for inclusion and exclusion of papers. Based upon a defined scale, each paper was checked against the aggregated value obtained after summation of score for each paper. If, for a particular paper the aggregated score is greater than 2.5 then it was accepted for inclusion in primary studies, otherwise, it was rejected and excluded. After the completion of quality assessment, those papers were selected in primary studies which answered the research questions.

External validity

External validity is related to the generalization of SLR results, accessibility and database. This validity describes to which level of degree the primary studies are related to the research topic. In context of our research, threats related to external validity are mitigated by running the search query on multiple database sources to refine the search query and reduce the error of subjectivity. The main focus was to remove the redundant and outdated papers. In this way, 143 papers were selected as primary studies to address the research questions.

Conclusion validity

Conclusion validity is about generalizing the finding of our primary studies to the entire literature. It is not possible that all the primary studies are included, there is chance of skipping some papers during the phase of exclusion or failing to identify such papers relevant to our research questions. To mitigate threats related to this validity, we aimed to focus upon the paper selection process, inclusion–exclusion criteria, quality assessment and snowballing. These steps were performed very carefully and meticulously. Expert’s opinions were properly utilized in defining the inclusion exclusion criteria. The main focus was to avoid the element of subjectivity and biasness in the inclusion and exclusion of papers.

Conclusion

The security of IoT is getting a burning topic due to the significant rise of research in this area. The security of IoT is important due to many reasons such as: IoT based systems are vulnerable to various cyber threats due to the nature of devices as they have limited storage, memory, processing and bandwidth capabilities. Therefore, it is important to identify and highlight those security solutions, which provide appropriate and robust ways of handling issues related to IoT. In this regard, machine learning has played an anchor role to uplift IoT security. In the existing literature, IoT security has been analysed by different authors using different machine learning methods. In this paper, we also made effort to elaborate the security of IoT by identifying the approaches and efforts of ANNs. As a compared to the previous works, the security of IoT is investigated in broader sense such as using machine learning but this research work made first attempt to bring upfront the contribution of ANNs towards the security of IoT. The starring role of ANNs for the enhancing the security of IoT has been thoroughly discussed. A complete and in-depth analysis were performed to understand the difference of research gaps between current work and future work The plus side of this work is, it made in-depth analysis by collecting 143 research articles to address the formulated research questions. All these articles were filtered and went through a systematic and organized procedure of quality assessment. All questions were answered in detailed and comprehensive manner. Different approaches, frameworks, techniques, models and methods presented by ANNs were discussed with respect to identified security requirements of IoT. This research identifies the limitations, contributions and suggest improvements for the existing ANNs approaches that are targeted towards IoT security. The ANNs intrusion detection methods for DoS/DDoS attacks in IoT were thoroughly discussed along with the comparative performance analysis of different methods.

The major limitations of this study are that the security requirements or criteria defined in this manuscript are not absolute. It significantly changes from one study to another. Similarly, there is possibility that some of ANNs approaches might be reported by this SLR. In future we are looking forward to identify more security requirements of IoT-based systems operating in different environment. Our future work is also aimed to identify the efforts of other machine learning approaches to address the security requirements of IoT.