Zhe Deng;Ants Torim;Sadok Ben Yahia;Hayretdin Bahsi
{"title":"Generative AI in Intrusion Detection Systems for Internet of Things: A Systematic Literature Review","authors":"Zhe Deng;Ants Torim;Sadok Ben Yahia;Hayretdin Bahsi","doi":"10.1109/OJCOMS.2025.3573194","DOIUrl":null,"url":null,"abstract":"The ubiquitous data streaming through the Internet of Things (IoT) creates security risks. Intrusion detection systems (IDS) based on machine learning can support user security. Generative Artificial Intelligence (GenAI) demonstrates strong capabilities in generating synthetic data based on realistic distributions and learning complex patterns from high-dimensional data. By harnessing the capabilities of generative AI, it is feasible to augment intrusion detection models, allowing for more robust and adaptive security solutions in IoT environments. This paper introduces a systematic literature review of recent GenAI applications in IoT IDS and analyzes the architectures and techniques in the models. We classify the common usages such as data augmentation and class balancing, data reconstruction, and adversarial attack generation. We outline the commonly used datasets and evaluation metrics and compare the performances of each model under these conditions. The study identifies current challenges and emerging research trends in various technologies for applying GenAI in IoT IDS.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"4689-4717"},"PeriodicalIF":6.3000,"publicationDate":"2025-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11012727","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of the Communications Society","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/11012727/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
The ubiquitous data streaming through the Internet of Things (IoT) creates security risks. Intrusion detection systems (IDS) based on machine learning can support user security. Generative Artificial Intelligence (GenAI) demonstrates strong capabilities in generating synthetic data based on realistic distributions and learning complex patterns from high-dimensional data. By harnessing the capabilities of generative AI, it is feasible to augment intrusion detection models, allowing for more robust and adaptive security solutions in IoT environments. This paper introduces a systematic literature review of recent GenAI applications in IoT IDS and analyzes the architectures and techniques in the models. We classify the common usages such as data augmentation and class balancing, data reconstruction, and adversarial attack generation. We outline the commonly used datasets and evaluation metrics and compare the performances of each model under these conditions. The study identifies current challenges and emerging research trends in various technologies for applying GenAI in IoT IDS.
期刊介绍:
The IEEE Open Journal of the Communications Society (OJ-COMS) is an open access, all-electronic journal that publishes original high-quality manuscripts on advances in the state of the art of telecommunications systems and networks. The papers in IEEE OJ-COMS are included in Scopus. Submissions reporting new theoretical findings (including novel methods, concepts, and studies) and practical contributions (including experiments and development of prototypes) are welcome. Additionally, survey and tutorial articles are considered. The IEEE OJCOMS received its debut impact factor of 7.9 according to the Journal Citation Reports (JCR) 2023.
The IEEE Open Journal of the Communications Society covers science, technology, applications and standards for information organization, collection and transfer using electronic, optical and wireless channels and networks. Some specific areas covered include:
Systems and network architecture, control and management
Protocols, software, and middleware
Quality of service, reliability, and security
Modulation, detection, coding, and signaling
Switching and routing
Mobile and portable communications
Terminals and other end-user devices
Networks for content distribution and distributed computing
Communications-based distributed resources control.