Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2022, MACHINE LEARNING WITH APPLICATIONS, LAP Lambert Academic Publishing, ISBN: 978-620-5-49896-5
…
22 pages
1 file
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest developing fields in the history of computing that spans wearable devices, homes, hospitals, cities, transportation, and critical infrastructure. IoT is a promising solution to connect and access every device through internet. Every day the device count increases with large diversity in shape, size, usage and complexity. So IoT drives the world and changes people lives with its wide range of services and applications. Providing numerous services through applications, IoT faces severe security issues, as well. There are existing security measures that can be applied to protect IoT. But, as traditional techniques are not so efficient, a strong-dynamically enhanced and up to date security system is required for next-generation IoT system. A great technological advancement has been noticed in Machine Learning (ML) and Deep Learning (DL). They have opened new possible research windows to address the present and future challenges in IoT. ML&DL are being utilized as a powerful technology for detecting attacks and identifing abnormal behaviors of smart devices and networks.
IEEE Communications Surveys & Tutorials
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. It is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. On the one hand, IoT technologies play a crucial role in enhancing several real-life smart applications that can improve life quality. On the other hand, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network security and application security, for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to secure the IoT ecosystem effectively. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory curiosity to practical machinery in several important applications. The ability to monitor IoT devices intelligently provides a significant solution to new or zero-day attacks. ML/DL are powerful methods of data exploration for learning about 'normal' and 'abnormal' behaviour according to how IoT components and devices perform within the IoT environment. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.
IEEE Communications Surveys & Tutorials, 2020
The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resourceconstrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. However, the unique characteristics of IoT nodes render the existing solutions insufficient to encompass the entire security spectrum of the IoT networks. This is, at least in part, because of the resource constraints, heterogeneity, massive real-time data generated by the IoT devices, and the extensively dynamic behavior of the networks. Therefore, Machine Learning (ML) and Deep Learning (DL) techniques, which are able to provide embedded intelligence in the IoT devices and networks, are leveraged to cope with different security problems. In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. We then shed light on the gaps in these security solutions that call for ML and DL approaches. We also discuss in detail the existing ML and DL solutions for addressing different security problems in IoT networks. At last, based on the detailed investigation of the existing solutions in the literature, we discuss the future research directions for ML-and DL-based IoT security.
Security and Communication Networks, 2022
The integration of the Internet of Things (IoT) connects a number of intelligent devices with minimum human interference that can interact with one another. IoT is rapidly emerging in the areas of computer science. However, new security problems are posed by the cross-cutting design of the multidisciplinary elements and IoT systems involved in deploying such schemes. Ineffective is the implementation of security protocols, i.e., authentication, encryption, application security, and access network for IoT systems and their essential weaknesses in security. Current security approaches can also be improved to protect the IoT environment effectively. In recent years, deep learning (DL)/machine learning (ML) has progressed significantly in various critical implementations. Therefore, DL/ML methods are essential to turn IoT system protection from simply enabling safe contact between IoT systems to intelligence systems in security. This review aims to include an extensive analysis of ML systems and state-of-the-art developments in DL methods to improve enhanced IoT device protection methods. On the other hand, various new insights in machine and deep learning for IoT securities illustrate how it could help future research. IoT protection risks relating to emerging or essential threats are identified, as well as future IoT device attacks and possible threats associated with each surface. We then carefully analyze DL and ML IoT protection approaches and present each approach’s benefits, possibilities, and weaknesses. This review discusses a number of potential challenges and limitations. The future works, recommendations, and suggestions of DL/ML in IoT security are also included.
Computer Communications
Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. Therefore, it is necessary to develop fool proof solutions by creating new technologies or combining existing technologies to address the security issues. Deep learning, a branch of machine learning has shown promising results in previous studies for detection of security breaches. Additionally, IoT devices generate large volumes, variety, and veracity of data. Thus, when big data technologies are incorporated, higher performance and better data handling can be achieved. Hence, we have conducted a comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies. Further, a comparative analysis and the relationship among deep learning, IoT security, and big data technologies have also been discussed. Further, we have derived a thematic taxonomy from the comparative analysis of technical studies of the three aforementioned domains. Finally, we have identified and discussed the challenges in incorporating deep learning for IoT security using big data technologies and have provided directions to future researchers on the IoT security aspects. Contents * Corresponding author.
QUEST Research Journal, 2020
In current era, the proliferation of IoT devices has transformed our daily life to a new level and made our life easier. IoT devices have interconnected with each other for communing and sharing information to gateways or Access Points (APs) for further processing of data. However, this provides growth to cybersecurity and zero-day attacks in IoT networks. In this paper, we have reviewed the deep learning models and datasets which are used to detect malicious data in an IoT ecosystem. We have observed that the combination of Long Short-Term Memory (LSTM) and Convolution Neural Network (CNN), LSTM, and stacked auto-encoders have better accuracy and precision for detecting malicious packets in the IoT environment. Moreover, a detailed theoretical analysis of deep learning models and datasets is also performed. This review provides a pathway for the new researchers to conduct research in IoT security and privacy issues by making these findings as references.
The study explores machine learning and deep learning (ML) (DL) model helped in solving IoT the computation problem, which led to the adoption of many domains for its application in the problem-solving task. Solving a specific problem, this has led to the idea that deep and machine learning (DL) (ML) are two powerful approaches to data. Therefore, the purpose of this article is to provide a systematic review of "Scanning Machines and Deep Learning Methods for Internet of Things (IOT) Security and Privacy" on the current state of research on IoT and its joint venture with DL. This technique uses discrepancy privacy to prevent the adversary from understanding the use cases used to build the target model. The paper concluded that algorithms deep learning and machine learning were only developed recently and are not intended for use in cryptographic applications. However, for researchers who can implement cryptography, deep learning and machine learning can be used to implement cryptography.
Asian Journal of Research in Computer Science, 2021
The Internet of Things (IoT) is a paradigm shift that enables billions of devices to connect to the Internet. The IoT's diverse application domains, including smart cities, smart homes, and e-health, have created new challenges, chief among them security threats. To accommodate the current networking model, traditional security measures such as firewalls and Intrusion Detection Systems (IDS) must be modified. Additionally, the Internet of Things and Cloud Computing complement one another, frequently used interchangeably when discussing technical services and collaborating to provide a more comprehensive IoT service. In this review, we focus on recent Machine Learning (ML) and Deep Learning (DL) algorithms proposed in IoT security, which can be used to address various security issues. This paper systematically reviews the architecture of IoT applications, the security aspect of IoT, service models of cloud computing, and cloud deployment models. Finally, we discuss the latest ML and DL strategies for solving various security issues in IoT networks.
EAI Endorsed Transactions on Smart Cities
The Internet of Things (IoT) connects billions of smart gadgets so that they may communicate with one another without the need for human intervention. With an expected 50 billion devices by the end of 2020, it is one of the fastest-growing industries in computer history. On the one hand, IoT technologies are critical in increasing a variety of real-world smart applications that can help people live better lives. The cross-cutting nature of IoT systems, on the other hand, has presented new security concerns due to the diverse components involved in their deployment. For IoT devices and their inherent weaknesses, security techniques such as encryption, authentication, permissions, network monitoring, \& application security are ineffective. To properly protect the IoT ecosystem, existing security solutions need to be strengthened. Machine learning and deep learning (ML/DL) have come a long way in recent years, and machine intelligence has gone from being a laboratory curiosity to bein...
2021
The growing Internet of Things (IoT) introduces new security challenges for network activity monitoring. Most IoT devices are vulnerable because of a lack of security awareness from device manufacturers and end users. As a consequence, they have become prime targets for malware developers who want to turn them into bots and use them to perform large scale attacks.
With an estimation of more than 35 billion interconnected smart devices by the end of 2021, Internet of Things (IoT) is one of the most rapidly growing technologies in the last decade. However, the complexity nature of IoT systems and the exponential amount of data collected and exchanged between Things relieve a big challenge in terms of security and privacy. Implementing classical security measures, such as encryption, authentication, access control, network and application security for IoT devices is no more effective against sophisticated Cyberattacks. Artificial intelligence (AI) approaches such as Machine Learning (ML), Deep Learning (DL) and Blockchain can be leveraged to enhance the security of IoT and deal with its various problems. In this paper, we will describe the IoT technology and its domain of application, the protocols used to communicate between smart devices, security issues and existing AI solution. I.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Dr.Anil Lamba, 2019
Soft Computing Research Society eBooks, 2021
Multidisciplinary International Journal of Research and Development (MIJRD), 2022
Internet of Things, 2021
International Journal of Scientific Research in Engineering and Management, 2023
Eastern-European Journal of Enterprise Technologies
Zenodo (CERN European Organization for Nuclear Research), 2022
Computers, Materials & Continua, 2021
IEEE International Conference on Computer Communications 2022 (INFOCOM 2022) - The Tenth International Workshop on Security and Privacy in Big Data (BigSecurity), 2022
DISCOVERY SCIENTIFIC SOCIETY
International Journal of Communication Networks and Information Security (IJCNIS)