Securing the internet of wetland things (IoWT) using machine and deep learning methods: a survey

dc.contributor.authorAli, Guma
dc.contributor.authorWamusi, Robert
dc.contributor.authorMijwil, Maad M.
dc.contributor.authorSallam, Malik
dc.contributor.authorAyad, Jenan
dc.contributor.authorAdamopoulos, Ioannis
dc.date.accessioned2025-02-28T11:42:49Z
dc.date.available2025-02-28T11:42:49Z
dc.date.issued2025-02-03
dc.description.abstractWetlands are essential ecosystems that provide ecological, hydrological, and economic benefits. However, human activities and climate change are degrading their health and jeopardizing their long-term sustainability. To address these challenges, the Internet of Wetland Things (IoWT) has emerged as an innovative framework integrating advanced sensing, data collection, and communication technologies to monitor and manage wetland ecosystems. Despite its potential, the IoWT faces substantial security and privacy risks, compromising its effectiveness and hindering adoption. This survey explores integrating machine learning (ML) and deep learning (DL) techniques as solutions to address the security threats, vulnerabilities, and challenges inherent in IoWT ecosystems. The survey examines findings from 231 sources, encompassing peer-reviewed journal articles, conference papers, books, book chapters, and websites published between 2020 and 2025. It consolidates insights from prominent platforms such as the Springer Nature, Emerald Insight, ACM Digital Library, Frontiers, Wiley Online Library, SAGE, Taylor & Francis, IGI Global, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. Machine learning and DL methods have proven highly effective in detecting adversarial attacks, identifying anomalies, recognizing intrusions, and uncovering man-in-the-middle attacks, which are crucial in securing systems. These techniques also focus on detecting phishing, malware, and DoS/DDoS attacks and identifying insider and advanced persistent threats. They help detect botnet attacks and counteract jamming and spoofing efforts, ensuring comprehensive protection against a wide range of cyber threats. The survey examines case studies and the unique requirements and constraints of IoWT systems, such as limited energy resources, diverse sensor networks, and the need for real-time data processing. It also proposes future directions, such as developing lightweight, energy-efficient algorithms that operate effectively within the constrained environments typical of IoWT applications. Integrating ML and DL methods strengthens IoWT security while protecting and preserving wetlands through intelligent and resilient systems. These findings offer researchers and practitioners valuable insights into the current state of IoWT security, helping them drive and shape future advancements in the field.
dc.identifier.citationAli, G., Robert, W., Mijwil, M. M., Sallam, M., Ayad, J., & Adamopoulos, I. (2025). Securing the Internet of Wetland Things (IoWT) Using Machine and Deep Learning Methods: A Survey. Mesopotamian Journal of Computer Science, 2025, 17-63. https://doi.org/10.58496/MJCSC/2025/002
dc.identifier.issn2958-6631
dc.identifier.urihttps://dir.muni.ac.ug/handle/20.500.12260/726
dc.language.isoen
dc.publisherMesopotamian journal of Computer Science
dc.subjectWetlands
dc.subjectIoWT
dc.subjectSecurity threats and vulnerabilities
dc.subjectMachine learning
dc.subjectDeep learning
dc.titleSecuring the internet of wetland things (IoWT) using machine and deep learning methods: a survey
dc.typeArticle

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wamusi_Article2025_1.pdf
Size:
1.26 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.17 KB
Format:
Item-specific license agreed upon to submission
Description: