Machine Learning Methods of IoT Security and Future Application
Machine Learning Methods of IoT Security and Future Application
DOI:
https://doi.org/10.53560/PPASA(59-3)782Keywords:
Internet of Things, Cyberattacks, Machine Learning, SecurityAbstract
One of the technologies that are now expanding rapidly is called the Internet of Things (IoT). It is a technology that enables billions of smart devices or things, collectively referred to as “Things,” to collect a variety of data about themselves and the environment in which they are located using a variety of sensors. They can then share data with parties who have been permitted to do so for a variety of objectives, such as the management and monitoring of industrial services or the expansion of company services or operations. However, there are presently more security risks associated with the Internet of Things than ever. The field of machine learning (ML) has recently experienced significant advancement in technology, which has resulted in the opening of various new lines of inquiry that may be used to address existing and upcoming issues related to the Internet of Things. Nevertheless, machine learning is a robust technology that can recognize suspicious dangers and activities in smart devices and grids. This paper presents an extensive literature review on Machine Learning methods and the significance of IoT security in the context of various types of potential attacks as well as the comparison of several different ML algorithms regarding the detection of attacks and anomalies. Additionally, many machines learning-based Internet of Things protection systems have been presented.
References
S.T. Arzo, C. Naiga, F. Granelli, R. Bassoli, M. DevetsikIoTis, and F.H. Fitzek. A Theoretical Discussion and Survey of Network Automation for IoT: Challenges and Opportunity. IEEE Internet of Things Journal 8(15):12021-12045(2021).
D. Desai, and H. Upadhyay. Security and privacy consideration for internet of things in smart home environments. International Journal of Engineering Research and Development 10(11):73-83(2014).
M. Boland, F. Alam, and J. Bronlund. Modern technologies for personalized nutrition. Trends in Personalized Nutrition 195-222(2019).
R. Karthick, A.M. Prabaharan, and P. Selvaprasanth. Internet of things based high security border surveillance strategy. Asian Journal of Applied Science and Technology (AJAST) (3):94-100(2019).
T. Alam. IBchain: Internet of things and blockchain integration approach for secure communication in smart cities. Informatica 45(3)1-14(2021).
V. Chang, L. Golightly, P. Modesti, Q.A. Xu, L.M.T. Doan, K. Hall, ... and A. Kobusińska. A Survey on Intrusion Detection Systems for Fog and Cloud Computing. Future Internet 14(3):89(2022).
C. Butpheng, K.H. Yeh, and H. Xiong. Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry 12(7):1191(2020).
D. Ageyev, T. Radivilova, and O. Mohammed. Traffic Monitoring and Abnormality Detection Methods Analysis. IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC SandT) 823-826(2020).
H.A. Abdul-Ghani, and D. Konstantas. A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective. Journal of Sensor and Actuator Networks 8(2):22(2019).
A. Abeshu, and N. Chilamkurti. Deep learning: the frontier for distributed attack detection in fog-tothings computing. IEEE Communications Magazine 56(2): 169-175(2018).
S. Shamshirband, M. Fathi, A.T. Chronopoulos, A. Montieri, F. Palumbo, and A. Pescapè. Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues. Journal of Information Security and Applications 55:102582(2020).
P.R. Kumar, J.S. Raj, and S. Smys. Analysis of dynamic topology wireless sensor networks for the Internet of Things (IOT). International Journal of Communication Systems 34(17):315(2021).
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming. Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 0305-0310 (2019).
S.V.N. Santhosh Kumar, M. Selvi, and A. Kannan. A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things. Computational Intelligence and Neuroscience(2023).
W. Li, Y. Chai, F. Khan, S.R.U. Jan, S. Verma, V.G. Menon, and X. Li. A comprehensive survey on machine learning-based big data analytics for IoT-enabled smart healthcare system. Mobile networks and applications 26:234-252(2021).
H. Mliki, A.H. Kaceam, and L. Chaari. A comprehensive survey on intrusion detection-based machine learning for IOT networks. EAI Endorsed Transactions on Security and Safety 8(29):e3-e3(2021).
M. Imran, U. Zaman, J. Imtiaz, M. Fayaz, and J. Gwak. Comprehensive survey of IoT, machine learning, and blockchain for health care applications: A topical assessment for pandemic preparedness, challenges, and solutions. Electronics 10(20):2501(2021).
A. Gaurav, B.B. Gupta, and P.K. Panigrahi. A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems 1-25(2022).
M. Zubair, A. Ali, S. Naeem, S. Anam. Traffic Video-Based Parking and Abandoned Object Event Detection. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
M. Zubair, A. Ali, S. Naeem, S. Anam, Image Processing Algorithm. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
M. Zubair, A. Ali, S. Anam. A DDDAS-Based Impact Area Simulation Study of Highway Abnormalities. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
M. Zubair, A. Ali, S. Naeem, S. Anam, Video Streams for The Detection of Thrown Objects from Expressways. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
A. Tewari, and B.B. Gupta. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future generation computer systems 108: 909-920(2020).
S. Rekha, L. Thirupathi, S. Renikunta, and R. Gangula. Study of security issues and solutions in Internet of Things (IoT). Materials Today: Proceedings (2021).
H. HaddadPajouh, A. Dehghantanha, R.M. Parizi, M. Aledhari, and H. Karimipour. A survey on internet of things security: Requirements, challenges, and solutions. Internet of Things 14:100129(2021).
W.Z. Khan, M.H. Rehman, H.M. Zangoti, M.K. Afzal, N. Armi, and K. Salah. Industrial internet of things: Recent advances, enabling technologies and open challenges. Computers and Electrical Engineering 81: 106522(2020).
M. Noura, M. Atiquzzaman, and M. Gaedke. Interoperability in internet of things: Taxonomies and open challenges. Mobile networks and applications 24(3):796-809(2019).
M. Lombardi, F. Pascale, and D. Santaniello. Internet of things: A general overview between architectures, protocols and applications. Information 12(2):87(2021).
M. Jangjou, and M.K. Sohrabi. A Comprehensive Survey on Security Challenges in Different Network Layers in Cloud Computing. Archives of Computational Methods in Engineering 1-22(2022).
D. Oliveira, M. Costa, S. Pinto, and T. Gomes. The future of low-end motes in the Internet of Things: A prospective paper. Electronics 9(1):111(2020).
Z. Shouran, A. Ashari, and T. Priyambodo. Internet of things (IoT) of smart home: privacy and security. International Journal of Computer Applications 182(39):3-8(2019).
L. Da Xu, Y. Lu, and L. Li. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8(13):10452 10473(2021).
G. Han, H. Wang, X. Miao, L. Liu, J. Jiang, and Y. Peng. A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT. IEEE Transactions on Industrial Informatics 16(8):5527-5538(2019).
M.Z. Gunduz, and R. Das. Cyber-security on smart grid: Threats and potential solutions. Computer networks 169:107094(2020).
M. Arulprakash, and R. Jebakumar. People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain. The Journal of Supercomputing 77(11):12582-12608(2021).
K. Kimani, V. Oduol, and K. Langat. Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection 25:36-49(2019).
D.A.S. Resul, and M.Z. Gündüz. Analysis of cyberattacks in IoT-based critical infrastructures. International Journal of Information Security Science 8(4):122-133(2020).
C. Silpa, G. Niranjana, and K. Ramani. Securing Data from Active Attacks in IoT: An Extensive Study. In Proceedings of International Conference on Deep Learning, Computing and Intelligence, Springer 51-64(2022).
N.F. Syed, Z. Baig, A. Ibrahim, and C. Valli. Denial of service attack detection through machine learning for the IoT. Journal of Information and Telecommunication 4(4):482-503(2020).
Y. Tian, S. Chen, and L. Zhang. Unsupervised Detection of Sybil Attack in Wireless Networks. In IOP Conference Series: Earth and Environmental Science 693(1):012114(2021).
H. Pirayesh, and H. Zeng. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Communications Surveys and Tutorials (2022).
M. Thankappan, H. Rifà-Pous, and C. Garrigues. Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State-of-the Art Review. preprint arXiv:2203.00579(2022).
A. Ali, S. Naeem, S. Anam, M. Zubair. Agile Software Development Processes Implementing Issues and Challenges with Scrum. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
A. TsIoTa, D. Xenakis, N. Passas, and L. Merakos. On jamming and black hole attacks in heterogeneous wireless networks. IEEE Transactions on Vehicular Technology 68(11):10761-10774(2019).
D. W. Huang, W. Liu, and J. Bi. Data tampering attacks diagnosis in dynamic wireless sensor networks. Computer Communications 172:84 92(2021).
K. Guha, S. Saha, and A. Chakrabarti. Bypassing Passive Attacks. In Self Aware Security for Real Time Task Schedules in Reconfigurable Hardware Platforms Springer 91-110(2021).
D. K. Jasim, and S. B. Sadkhan. The Eavesdropping Attack on Security tradeoff for Cognitive Radio Networks. In 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) 223-229(2021).
L. Basyoni, N. Fetais, A. Erbad, A. Mohamed, and M. Guizani. Traffic analysis attacks on Tor: a survey. In 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 183-188(2020).
P. K. Jena, S. Ghosh, and E. Koley, Design of a coordinated cyber-physical attack in IoT based smart grid under limited intruder accessibility. International Journal of Critical Infrastructure Protection 35:100484(2021).
M. M. Ogonji, G. Okeyo, and J. M. Wafula, A survey on privacy and security of Internet of Things. Computer Science Review 38:100312(2020).
H. Xu, W. Yu, X. Liu, D. Griffith, and N. Golmie. On data integrity attacks against industrial Internet of Things. In 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 21-28(2020).
S. Rizvi, R. J. Orr, A. Cox, P. Ashokkumar, and M.R. Rizvi. Identifying the attack surface for IoT network. Internet of Things 9:100162(2020).
Y. Zhao, J. Yang, Y. Bao, and H. Song. Trustworthy authorization method for security in Industrial Internet of Things. Ad Hoc Networks 121:102607(2021).
M.A. Ferrag, L. Maglaras, and A. Derhab. Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends. Security and Communication Networks (2019).
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming. Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 0305-0310 (2019).
A.A. Cook, G. Mısırlı, and Z. Fan. Anomaly detection for IoT time-series data: A survey. IEEE Internet of Things Journal 7(7):6481-6494(2019).
I.H. Sarker, A.I. Khan, Y.B. Abushark, and F. Alsolami. Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mobile Networks and Applications 1-17(2022).
A. Uprety, and D.B. Rawat. Reinforcement learning for IoT security: A comprehensive survey. IEEE Internet of Things Journal 8(11):8693 8706(2020).
V. Vijayalakshmi, and K. Venkatachalapathy. Comparison of predicting student’s performance using machine learning algorithms. International Journal of Intelligent Systems and Applications 11(12):34(2019).
E. Toch, B. Lerner, E. Ben-Zion, and I. Ben-Gal. Analyzing large-scale human mobility data: a survey of machine learning methods and applications. Knowledge and Information Systems 58(3):501-523(2019).
F. Zantalis, G. Koulouras, S. Karabetsos, and D. Kandris. A review of machine learning and IoT in smart transportation. Future Internet 11(4):94(2019).
P. Linardatos, V. Papastefanopoulos, and S. Kotsiantis. Explainable ai: A review of machine learning interpretability methods. Entropy 23(1):18(2020).
A. Aldahiri, B. Alrashed, and W. Hussain. Trends in using IoT with machine learning in health prediction system. Forecasting 3(1):181-206(2021).
Y. Liu, J. Wang, J. Li, S. Niu, and H. Song. Machine Learning for the Detection and Identification of Internet of Things Devices: A Survey. IEEE Internet of Things Journal 9(1):298-320(2021).
E.G. Dada, J.S. Bassi, H. Chiroma, A.O. Adetunmbi, and O.E. Ajibuwa. Machine learning for email spam filtering: review, approaches and open research problems. Heliyon 5(6):e01802(2019).
G. Casolla, S. Cuomo, V.S. Di Cola, and F. Piccialli. Exploring unsupervised learning techniques for the Internet of Things. IEEE Transactions on Industrial Informatics 16(4):2621-2628(2019).
T.T. Nguyen, P. Krishnakumari, S.C. Calvert, H.L. Vu, and H. Van Lint. Feature extraction and clustering analysis of highway congestion. Transportation Research Part C: Emerging Technologies 100:238-258(2019).
H. Yang, R. Zeng, F. Wang, G. Xu, and J. Zhang. An unsupervised learning-based network threat situation assessment model for Internet of Things. Security and Communication Networks (2020).
S. Bagui, X. Wang, X. Wang, and S. Bagui. Machine learning based intrusion detection for IoT botnet. International Journal of Machine Learning and Computing 11(6):399-406(2021).
S.H. Haji, and S.Y. Ameen. Attack and anomaly detection in IoT networks using machine learning techniques: A review. Asian journal of research in computer science 9(2):30-46(2021).
T. Wang, M. Z. A. Bhuiyan, G. Wang, L. Qi, J. Wu, and T. Hayajneh. Preserving balance between privacy and data integrity in edge-assisted Internet of Things. IEEE Internet of Things Journal 7(4):2679-2689(2019).
A. Batool, B. N. Hashmi, A. Ali, S. Naeem, S. Anam. IoT based smart mirror. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15 (2023).
N. Elmrabit, F. Zhou, F. Li, and H. Zhou. Evaluation of machine learning algorithms for anomaly detection. In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 1-8 (2020).
Z. Liu, N. Thapa, A. Shaver, K. Roy, X. Yuan, and S. Khorsandroo. Anomaly detection on IoT network intrusion using machine learning. In 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) 1-5(2020).
M.H. Aysa, A.A. Ibrahim, and A.H. Mohammed. IoT ddos attack detection using machine learning. In 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) 1-7(2020).
A. Batool, B. N. Hashmi, A. Ali, S. Naeem, M. H. Bukhari, M. M. Khan. The Smart Cradle System Basis on Internet of Things. Proceedings of the MOL2NET’22, Conference on Molecular, Biomedical and Computational Sciences and Engineering 8th ed. 1–15(2023).
D. Rani, and N.C. Kaushal. Supervised machine learning based network intrusion detection system for Internet of Things. In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) 1-7(2020).
A. Ali, S. Naeem, S. Anam, and M.M. Ahmed. Entropy in Information Theory from Many Perspectives and Various Mathematical Models. Journal of Applied and Emerging Sciences 12(2):158-167(2022).
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming. Ad-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 0305-0310 (2019).
J. Alsamiri, and K. Alsubhi. Internet of things cyber-attacks detection using machine learning. International Journal of Advanced Computer Science and Applications 10(12):232(2019).
S. Naeem, and A. Ali. Bees Algorithm Based Solution of Non-Convex Dynamic Power Dispatch Issues in Thermal Units. Journal of Applied and Emerging Sciences 12(1):35(2022).
A. Ali, and S. Naeem. The Controller Parameter Optimization for Nonlinear Systems Using Particle Swarm Optimization and Genetic Algorithm. Journal of Applied and Emerging Sciences 12(1):56(2022).
A. Bhargava, G. Salunkhe, S. Bhargava, and P. Goswami. A Comprehensive Study of IoT Security Risks in Building a Secure Smart City. Digital Cities Roadmap: IoT‐Based Architecture and Sustainable Buildings, 401-448(2021).
D. Li, L. Deng, M. Lee, and H. Wang. IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International journal of information management 49:533-545(2019).