DOI QR코드

DOI QR Code

IoT Security and Machine Learning

  • Almalki, Sarah (Department of Computer Science, College of Computers and Information Technology, Taif University) ;
  • Alsuwat, Hatim (Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University) ;
  • Alsuwat, Emad (Department of Computer Science, College of Computers and Information Technology, Taif University)
  • Received : 2022.05.05
  • Published : 2022.05.30

Abstract

The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

Keywords

References

  1. H. F. Atlam, R. Walters, and G. Wills, "Internet of things: state-of-the-art, challenges, applications, and open issues," International Journal of Intelligent Computing Research (IJICR), vol. 9, pp. 928-938, 2018. https://doi.org/10.20533/ijicr.2042.4655.2018.0112
  2. H. F. Atlam and G. B. Wills, "IoT security, privacy, safety and ethics," in Digital twin technologies and smart cities, ed: Springer, pp. 123-149, 2020.
  3. L. a. Tawalbeh, F. Muheidat, M. Tawalbeh, and M. Quwaider, "IoT Privacy and security: Challenges and solutions," Applied Sciences, vol. 10, p. 4102, 2020. https://doi.org/10.3390/app10124102
  4. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine learning in IoT security: Current solutions and future challenges," IEEE Communications Surveys & Tutorials, vol. 22, pp. 1686-1721, 2020. https://doi.org/10.1109/COMST.2020.2986444
  5. Number of connected devices worldwide 2030. (n.d.). Retrieved from Statista website: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-accesstechnology/
  6. Global IoT connections data volume 2019 and 2025. (n.d.). Retrieved from Statista website: https://www.statista.com/statistics/1017863/worldwide-iot-connected-devices-data-size/
  7. M. S. Mahdavinejad, M. Rezvan, M. Barekatain, P. Adibi, P. Barnaghi, et al., "Machine learning for Internet of Things data analysis: A survey," Digital Communications and Networks, vol. 4, pp. 161-175, 2018. https://doi.org/10.1016/j.dcan.2017.10.002
  8. N. Kumar and A. Makkar, Machine learning in cognitive IoT: CRC Press, 2020.
  9. K. Alieyan, A. Almomani, R. Abdullah, B. Almutairi, and M. Alauthman, "Botnet and Internet of Things (IoTs): A Definition, Taxonomy, Challenges, and Future Directions," in Research Anthology on Combating Denial-of-Service Attacks, ed: IGI Global, pp. 138-150, 2021.
  10. P. P. Ray, "A survey on Internet of Things architectures," Journal of King Saud University-Computer and Information Sciences, vol. 30, pp. 291-319, 2018. https://doi.org/10.1016/j.jksuci.2016.10.003
  11. H. F. Atlam, A. Alenezi, R. K. Hussein, and G. B. Wills, "Validation of an Adaptive Risk-based Access Control Model for the Internet of Things," International Journal of Computer Network & Information Security, vol. 10, 2018.
  12. C. Maple, "Security and privacy in the internet of things," Journal of Cyber Policy, vol. 2, pp. 155-184, 2017. https://doi.org/10.1080/23738871.2017.1366536
  13. W. Iqbal, H. Abbas, M. Daneshmand, B. Rauf, and Y. A. Bangash, "An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security," IEEE Internet of Things Journal, vol. 7, pp. 10250-10276, 2020. https://doi.org/10.1109/jiot.2020.2997651
  14. M. R. Hosenkhan and B. K. Pattanayak, "Security issues in internet of things (IoT): a comprehensive review," New Paradigm in Decision Science and Management, pp. 359-369, 2020.
  15. M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, et al. "A survey of machine and deep learning methods for internet of things (IoT) security," IEEE Communications Surveys & Tutorials, vol. 22, pp. 1646-1685, 2020. https://doi.org/10.1109/COMST.2020.2988293
  16. B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, p. 100227, 2020. https://doi.org/10.1016/j.iot.2020.100227
  17. A. Mubarakali, K. Srinivasan, R. Mukhalid, S. C. Jaganathan, and N. Marina, "Security challenges in internet of things: Distributed denial of service attack detection using support vector machine-based expert systems," Computational Intelligence, vol. 36, pp. 1580-1592, 2020. https://doi.org/10.1111/coin.12293
  18. S. Benzarti, B. Triki, and O. Korbaa, "A survey on attacks in Internet of Things based networks," in 2017 International conference on engineering & MIS (ICEMIS), pp. 1-7, 2017.
  19. L. Hu, H. Wen, B. Wu, F. Pan, R.-F. Liao, et al., "Cooperative jamming for physical layer security enhancement in Internet of Things," IEEE Internet of Things Journal, vol. 5, pp. 219-228, 2017. https://doi.org/10.1109/jiot.2017.2778185
  20. J. Verbraeken, M. Wolting, J. Katzy, J. Kloppenburg, T. Verbelen, et al. "A survey on distributed machine learning," ACM Computing Surveys (CSUR), vol. 53, pp. 1-33, 2020.
  21. M. Aghbashlo, W. Peng, M. Tabatabaei, S. A. Kalogirou, S. Soltanian, et al., "Machine learning technology in biodiesel research: A review," Progress in Energy and Combustion Science, vol. 85, p. 100904, 2021. https://doi.org/10.1016/j.pecs.2021.100904
  22. M. Mahmud, M. S. Kaiser, A. Hussain, and S. Vassanelli, "Applications of deep learning and reinforcement learning to biological data," IEEE transactions on neural networks and learning systems, vol. 29, pp. 2063-2079, 2018. https://doi.org/10.1109/tnnls.2018.2790388
  23. Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, et al., "Detection of unauthorized IoT devices using machine learning techniques," arXiv preprint arXiv:1709.04647, 2017.
  24. R. Doshi, N. Apthorpe, and N. Feamster, "Machine learning ddos detection for consumer internet of things devices," in 2018 IEEE Security and Privacy Workshops (SPW), pp. 29-35, 2018.
  25. M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H. V. Poor, "Machine learning methods for attack detection in the smart grid," IEEE transactions on neural networks and learning systems, vol. 27, pp. 1773-1786, 2015. https://doi.org/10.1109/TNNLS.2015.2404803
  26. T. Alladi, V. Chamola, B. Sikdar, and K.-K. R. Choo, "Consumer IoT: Security vulnerability case studies and solutions," IEEE Consumer Electronics Magazine, vol. 9, pp. 17-25, 2020.
  27. O. A. Waraga, M. Bettayeb, Q. Nasir, and M. A. Talib, "Design and implementation of automated IoT security testbed," Computers & Security, vol. 88, p. 101648, 2020. https://doi.org/10.1016/j.cose.2019.101648
  28. V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, et al. "A survey on IoT security: application areas, security threats, and solution architectures," IEEE Access, vol. 7, pp. 82721-82743, 2019. https://doi.org/10.1109/access.2019.2924045
  29. A. Tewari and B. B. Gupta, "Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework," Future generation computer systems, vol. 108, pp. 909-920, 2020. https://doi.org/10.1016/j.future.2018.04.027
  30. R. Roman-Castro, J. Lopez, and S. Gritzalis, "Evolution and trends in IoT security," Computer, vol. 51, pp. 16-25, 2018.
  31. D. Minoli and B. Occhiogrosso, "Blockchain mechanisms for IoT security," Internet of Things, vol. 1, pp. 1-13, 2018. https://doi.org/10.1016/j.iot.2018.05.002
  32. M. A. Khan and K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future generation computer systems, vol. 82, pp. 395-411, 2018. https://doi.org/10.1016/j.future.2017.11.022
  33. M. Bagaa, T. Taleb, J. B. Bernabe, and A. Skarmeta, "A machine learning security framework for iot systems," IEEE Access, vol. 8, pp. 114066-114077, 2020. https://doi.org/10.1109/access.2020.2996214
  34. J. Li, "IOT security analysis of BDT-SVM multi-classification algorithm," International Journal of Computers and Applications, pp. 1-10, 2020.
  35. S. Sankaranarayanan and S. Mookherji, "SVM-based traffic data classification for secured IoT-based road signaling system," in Research Anthology on Artificial Intelligence Applications in Security, ed: IGI Global, pp. 1003-1030, 2021.
  36. D. Reising, J. Cancelleri, T. D. Loveless, F. Kandah, and A. Skjellum, "Radio identity verification-based IoT security using RF-DNA fingerprints and SVM," IEEE Internet of Things Journal, vol. 8, pp. 8356-8371, 2020.
  37. A. Thakkar and R. Lohiya, "A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges," Archives of Computational Methods in Engineering, vol. 28, pp. 3211-3243, 2021. https://doi.org/10.1007/s11831-020-09496-0
  38. B. S. Yaswanth, R. Darshan, H. Pavan, D. Srinivasa, and B. V. Murthy, "Smart Safety and Security Solution for Women using kNN Algorithm and IoT," in 2020 Third International Conference on Multimedia Processing, Communication & Information Technology (MPCIT), pp. 87-92, 2020.
  39. S. S. S. Sugi and S. R. Ratna, "Investigation of Machine Learning Techniques in Intrusion Detection System for IoT Network," in 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), IEEE, pp. 1164-1167, 2020.
  40. M. Hosseinzadeh, A. M. Rahmani, B. Vo, M. Bidaki., M. Masdari, et al., "Improving security using SVM-based anomaly detection: issues and challenges, " Soft Computing, vol. 25(4), pp. 3195-3223, 2021. https://doi.org/10.1007/s00500-020-05373-x
  41. M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, "Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for Internet of Things in smart city, " Future Generation Computer Systems, vol. 107, pp. 433-442, 2020. https://doi.org/10.1016/j.future.2020.02.017
  42. W. He, Y. Liu, H. Yao, T. Mai, N. Zhang, et al., "Distributed variational bayes-based in-network security for the Internet of Things," IEEE Internet of Things Journal, vol. 8, pp. 6293-6304, 2020.
  43. M. Alsharif, and D. B. Rawat, "Study of machine learning for cloud assisted IoT security as a service," Sensors, vol. 21(4), p. 1034, 2021. https://doi.org/10.3390/s21041034
  44. M. Babar, M. U. Tariq, and M. A. Jan, "Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid," Sustainable Cities and Society, vol. 62, p. 102370, 2020. https://doi.org/10.1016/j.scs.2020.102370