{"id":"https://openalex.org/W4409762632","doi":"https://doi.org/10.1109/access.2025.3563799","title":"Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods","display_name":"Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409762632","doi":"https://doi.org/10.1109/access.2025.3563799"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3563799","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3563799","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3563799","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042031296","display_name":"Ahmet Emre Erg\u00fcn","orcid":"https://orcid.org/0000-0002-3025-5640"},"institutions":[{"id":"https://openalex.org/I41641357","display_name":"Ege University","ror":"https://ror.org/02eaafc18","country_code":"TR","type":"education","lineage":["https://openalex.org/I41641357"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Ahmet Emre Ergun","raw_affiliation_strings":["Graduate School of Natural and Applied Sciences, Ege University, Bornova, T&#x00FC;rkiye","Graduate School of Natural and Applied Sciences, Ege University, Bornova-Izmir, Turkiye"],"affiliations":[{"raw_affiliation_string":"Graduate School of Natural and Applied Sciences, Ege University, Bornova, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I41641357"]},{"raw_affiliation_string":"Graduate School of Natural and Applied Sciences, Ege University, Bornova-Izmir, Turkiye","institution_ids":["https://openalex.org/I41641357"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011029346","display_name":"\u00d6zg\u00fc Can","orcid":"https://orcid.org/0000-0002-8064-2905"},"institutions":[{"id":"https://openalex.org/I41641357","display_name":"Ege University","ror":"https://ror.org/02eaafc18","country_code":"TR","type":"education","lineage":["https://openalex.org/I41641357"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ozgu Can","raw_affiliation_strings":["Department of Computer Engineering, Ege University, Bornova, T&#x00FC;rkiye","Department of Computer Engineering, Ege University, Bornova-Izmir, Turkiye"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Ege University, Bornova, T&#x00FC;rkiye","institution_ids":["https://openalex.org/I41641357"]},{"raw_affiliation_string":"Department of Computer Engineering, Ege University, Bornova-Izmir, Turkiye","institution_ids":["https://openalex.org/I41641357"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087192873","display_name":"Murat Kantarc\u0131o\u011flu","orcid":"https://orcid.org/0000-0001-9795-9063"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murat Kantarcioglu","raw_affiliation_strings":["Department of Computer Science, Virginia Tech, Blacksburg, VA, USA","Department of Computer Science, Virginia Tech, Blacksburg, VA, United States"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Virginia Tech, Blacksburg, VA, USA","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"Department of Computer Science, Virginia Tech, Blacksburg, VA, United States","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042031296"],"corresponding_institution_ids":["https://openalex.org/I41641357"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.122,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.90494092,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"71611","last_page":"71646"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9329000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9329000115394592,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.742835283279419},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6106908917427063},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5449378490447998},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5221243500709534},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.49365314841270447},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3509438633918762}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.742835283279419},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6106908917427063},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5449378490447998},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5221243500709534},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.49365314841270447},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3509438633918762}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3563799","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3563799","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:cad6bf43818d4961bb20f6827fcf1c2c","is_oa":true,"landing_page_url":"https://doaj.org/article/cad6bf43818d4961bb20f6827fcf1c2c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 71611-71646 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3563799","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3563799","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1579157456","https://openalex.org/W2021949962","https://openalex.org/W2064675550","https://openalex.org/W2071511328","https://openalex.org/W2104803737","https://openalex.org/W2111619626","https://openalex.org/W2130553876","https://openalex.org/W2135088779","https://openalex.org/W2295598076","https://openalex.org/W2574448563","https://openalex.org/W2586308986","https://openalex.org/W2598944817","https://openalex.org/W2765666662","https://openalex.org/W2785707617","https://openalex.org/W2786357803","https://openalex.org/W2790564218","https://openalex.org/W2885414611","https://openalex.org/W2887892418","https://openalex.org/W2888505697","https://openalex.org/W2901363975","https://openalex.org/W2905724129","https://openalex.org/W2911978475","https://openalex.org/W2946905885","https://openalex.org/W2961816263","https://openalex.org/W2964199361","https://openalex.org/W2964344666","https://openalex.org/W2970940899","https://openalex.org/W2984855628","https://openalex.org/W3011388169","https://openalex.org/W3042739153","https://openalex.org/W3088886246","https://openalex.org/W3091906126","https://openalex.org/W3206028689","https://openalex.org/W3211096890","https://openalex.org/W4210792781","https://openalex.org/W4212914967","https://openalex.org/W4226517325","https://openalex.org/W4290996806","https://openalex.org/W4312878958","https://openalex.org/W4321384928","https://openalex.org/W4362680782","https://openalex.org/W4367323040","https://openalex.org/W4386039321","https://openalex.org/W4387067935","https://openalex.org/W4401452496","https://openalex.org/W4403210249","https://openalex.org/W4403332078","https://openalex.org/W4403656678","https://openalex.org/W6743673742","https://openalex.org/W6760424720","https://openalex.org/W6763998606","https://openalex.org/W6772449258","https://openalex.org/W7034577592"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W4225340788","https://openalex.org/W4318485713"],"abstract_inverted_index":{"The":[0,60,169,319],"rapid":[1],"proliferation":[2],"of":[3,5,32,66,72,86,163,224,292,359,367,394],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"has":[9],"led":[10],"to":[11,28,47,90,193,279,391],"a":[12,109,130,267,315,348,356],"substantial":[13],"increase":[14],"in":[15,63,79,351,370],"network":[16,96,285,372,387],"packet":[17,53],"traffic,":[18,82],"raising":[19],"significant":[20],"privacy":[21,31,77,92,151,360,383],"concerns.":[22],"Although":[23],"traffic":[24,97,121,144,218],"encryption":[25],"is":[26,271],"employed":[27],"protect":[29],"the":[30,64,67,70,84,148,161,173,180,200,236,256,262,274,293,303,310,329,338,352,365,375,392],"IoT":[33,81,120,156,217,371,397],"devices,":[34],"attackers":[35],"can":[36],"still":[37],"leverage":[38],"Machine":[39],"Learning":[40,44],"(ML)":[41],"and":[42,58,83,125,128,139,159,211,231,246,253,258,302,364],"Deep":[43],"(DL)":[45],"techniques":[46,142,325],"classify":[48],"device":[49,157],"types":[50],"by":[51,95,354],"analyzing":[52],"characteristics,":[54],"such":[55,188],"as":[56,189],"size":[57],"timing.":[59],"main":[61],"challenges":[62],"state":[65,291],"art":[68,294],"are":[69,191,250],"lack":[71],"effective":[73],"methods":[74],"for":[75,216,261,340,381],"exposing":[76],"violations":[78],"encrypted":[80,119],"absence":[85],"robust":[87,131],"defense":[88,132,268,306,312,342,369],"mechanisms":[89],"mitigate":[91],"breaches":[93],"caused":[94],"analysis.":[98],"Considering":[99],"these":[100],"challenges,":[101],"this":[102,198,345],"study":[103,149,201,346],"presents":[104],"two":[105,167],"key":[106],"contributions:":[107],"(i)":[108],"novel":[110,330],"vector-based":[111,175],"classification":[112,176,182,248,327,362],"method":[113,177,332],"that":[114,172,309,322],"enhances":[115,334],"device-type":[116,195],"identification":[117],"from":[118],"using":[122,166,273],"advanced":[123,140],"ML":[124,164],"DL":[126],"techniques,":[127,187,296],"(ii)":[129],"mechanism":[133,307],"based":[134],"on":[135],"Differential":[136],"Privacy":[137],"(DP)":[138],"padding":[141,281,295,324],"against":[143],"analysis":[145,289],"attacks.":[146],"Therefore,":[147],"examines":[150],"risks":[152],"associated":[153],"with":[154,226,229,233,255,290],"sequential":[155],"data":[158],"evaluates":[160,202],"effectiveness":[162,366],"algorithms":[165,249],"datasets.":[168],"results":[170],"demonstrate":[171],"proposed":[174,263,304,311,376],"significantly":[178,333],"improves":[179],"attacker's":[181],"accuracy,":[183,328],"even":[184],"when":[185],"privacy-preserving":[186],"padding,":[190],"used":[192],"obscure":[194],"classification.":[196],"For":[197],"purpose,":[199],"eXtreme":[203],"Gradient":[204],"Boosting":[205],"(XGBoost),":[206],"Long":[207],"Short-Term":[208],"Memory":[209],"(LSTM),":[210],"Gated":[212],"Recurrent":[213],"Unit":[214],"(GRU)":[215],"classification,":[219],"achieving":[220],"an":[221],"accuracy":[222],"rate":[223],"99.61%":[225],"XGBoost,":[227],"96.74%":[228],"LSTM,":[230],"96.94%":[232],"GRU.":[234],"Additionally,":[235],"Decision":[237],"Tree":[238],"(DT),":[239],"Random":[240],"Forest":[241],"(RF),":[242],"k-Nearest":[243],"Neighbors":[244],"(kNN),":[245],"GRU":[247],"also":[251],"evaluated":[252],"compared":[254],"XGBoost":[257],"LSTM":[259],"classifiers":[260],"attack":[264,335],"model.":[265],"As":[266],"mechanism,":[269],"DP":[270],"applied":[272],"Fourier":[275],"Perturbation":[276],"Algorithm":[277],"(FPA)":[278],"optimize":[280],"strategies":[282],"while":[283,323,385],"maintaining":[284,386],"efficiency.":[286],"A":[287],"comparative":[288],"including":[297],"Adaptive":[298],"Packet":[299],"Padding":[300],"(APP),":[301],"DP-based":[305,368],"demonstrates":[308],"approach":[313],"achieves":[314],"superior":[316],"privacy-utility":[317],"balance.":[318],"findings":[320],"reveal":[321],"reduce":[326],"vector":[331],"performance,":[336,388],"underscoring":[337],"need":[339],"stronger":[341],"strategies.":[343],"Consequently,":[344],"addresses":[347],"critical":[349],"gap":[350],"literature":[353],"providing":[355],"comprehensive":[357],"evaluation":[358],"risks,":[361],"robustness,":[363],"traffic.":[373],"Thus,":[374],"research":[377],"provides":[378],"practical":[379],"insights":[380],"enhancing":[382],"preservation":[384],"thereby":[389],"contributing":[390],"development":[393],"more":[395],"secure":[396],"communication":[398],"frameworks.":[399]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
