Skip to main content
Top
Published in: Neural Computing and Applications 20/2020

25-02-2020 | S.I. : Applying Artificial Intelligence to the Internet of Things

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things

Authors: Hamed HaddadPajouh, Raouf Khayami, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi

Published in: Neural Computing and Applications | Issue 20/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in emerging vulnerabilities in most IoT-run environments. Due to the low processing ability, IoT devices are often not capable of running complex defensive mechanisms. Lack of an architecture for a safer IoT environment is referred to as the most important barrier in developing a secure IoT system. In this paper, we propose a secure architecture for IoT edge layer infrastructure, called AI4SAFE-IoT. This architecture is built upon AI-powered security modules at the edge layer for protecting IoT infrastructure. Cyber threat attribution, intelligent web application firewall, cyber threat hunting, and cyber threat intelligence are the main modules proposed in our architecture. The proposed modules detect, attribute, and further identify the stage of an attack life cycle based on the Cyber Kill Chain model. In the proposed architecture, we define each security module and show its functionality against different threats in real-world applications. Moreover, due to the integration of AI security modules in a different layer of AI4SAFE-IoT, each threat in the edge layer will be handled by its corresponding security module delivered by a service. We compared the proposed architecture with the existing models and discussed our architecture independence of the underlying IoT layer and its comparatively low overhead according to delivering security as service for the edge layer of IoT architecture instead of embed implementation. Overall, we evaluated our proposed architecture based on the IoT service management score. The proposed architecture obtained 84.7 out of 100 which is the highest score among peer IoT edge layer security architectures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zhu Q, Wang R, Chen Q, Liu Y, Qin W (2010) Iot gateway: bridgingwireless sensor networks into Internet of Things. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing. IEEE, pp 347–352 Zhu Q, Wang R, Chen Q, Liu Y, Qin W (2010) Iot gateway: bridgingwireless sensor networks into Internet of Things. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing. IEEE, pp 347–352
2.
go back to reference Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864 Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864
3.
go back to reference Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of Things security and forensics: challenges and opportunities. Elsevier, Amsterdam Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of Things security and forensics: challenges and opportunities. Elsevier, Amsterdam
6.
go back to reference Domingo MC (2012) An overview of the Internet of Things for people with disabilities. J Netw Comput Appl 35(2):584–596 Domingo MC (2012) An overview of the Internet of Things for people with disabilities. J Netw Comput Appl 35(2):584–596
7.
go back to reference Jia X, Feng Q, Fan T, Lei Q (2012) RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1282–1285 Jia X, Feng Q, Fan T, Lei Q (2012) RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1282–1285
8.
go back to reference Wang L, Da Xu L, Bi Z, Xu Y (2013) Data cleaning for RFID and WSN integration. IEEE Trans Ind Inf 10(1):408–418 Wang L, Da Xu L, Bi Z, Xu Y (2013) Data cleaning for RFID and WSN integration. IEEE Trans Ind Inf 10(1):408–418
9.
go back to reference Liu CH, Yang B, Liu T (2014) Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw 18:85–101 Liu CH, Yang B, Liu T (2014) Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw 18:85–101
11.
go back to reference Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094 Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094
12.
go back to reference Binti N, Kamaludeen A, Lee SP, Parizi RM (2019) Guideline-based approach for IoT home application development. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 929–936 Binti N, Kamaludeen A, Lee SP, Parizi RM (2019) Guideline-based approach for IoT home application development. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 929–936
13.
go back to reference Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International conference on advances in energy engineering. IEEE, pp 69–72 Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International conference on advances in energy engineering. IEEE, pp 69–72
14.
go back to reference Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in wsns for IoT application. IEEE Internet Things J 6:5132–5139 Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in wsns for IoT application. IEEE Internet Things J 6:5132–5139
15.
go back to reference Catarinucci L, De Donno D, Mainetti L, Palano L, Patrono L, Stefanizzi ML, Tarricone L (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526 Catarinucci L, De Donno D, Mainetti L, Palano L, Patrono L, Stefanizzi ML, Tarricone L (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526
16.
go back to reference He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Trans Ind Inf 10(2):1587–1595 He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Trans Ind Inf 10(2):1587–1595
17.
go back to reference Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2020) I-sep: an improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J 7(1):710–717 Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2020) I-sep: an improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J 7(1):710–717
18.
go back to reference Paranjothi A, Tanik U, Wang Y, Khan MS (2019) Hybrid-vehfog: a robust approach for reliable dissemination of critical messages in connected vehicles. Trans Emerg Telecommun Technol 30(6):e3595 (e3595 ETT-18-0175.R3) Paranjothi A, Tanik U, Wang Y, Khan MS (2019) Hybrid-vehfog: a robust approach for reliable dissemination of critical messages in connected vehicles. Trans Emerg Telecommun Technol 30(6):e3595 (e3595 ETT-18-0175.R3)
19.
go back to reference Gardašević G, Veletić M, Maletić N, Vasiljević D, Radusinović I, Tomović S, Radonjić M (2017) The IoT architectural framework, design issues and application domains. Wirel Pers Commun 92(1):127–148 Gardašević G, Veletić M, Maletić N, Vasiljević D, Radusinović I, Tomović S, Radonjić M (2017) The IoT architectural framework, design issues and application domains. Wirel Pers Commun 92(1):127–148
20.
go back to reference Karanki SS, Khan MS (2017) SMMV: secure multimedia delivery in vehicles using roadside infrastructure. Veh Commun 7:40–50 Karanki SS, Khan MS (2017) SMMV: secure multimedia delivery in vehicles using roadside infrastructure. Veh Commun 7:40–50
21.
go back to reference Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2016) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20 Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2016) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20
22.
go back to reference Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853 Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853
23.
go back to reference Giuliano R, Mazzenga F, Neri A, Vegni AM (2016) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645–657 Giuliano R, Mazzenga F, Neri A, Vegni AM (2016) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645–657
24.
go back to reference Zhang Y, Raychadhuri D, Ravindran R, Wang G (2013) ICN based architecture for IoT. IRTF Contribution Zhang Y, Raychadhuri D, Ravindran R, Wang G (2013) ICN based architecture for IoT. IRTF Contribution
25.
go back to reference Chang K-H (2014) Bluetooth: a viable solution for IoT?[Industry perspectives]. IEEE Wirel Commun 21(6):6–7 Chang K-H (2014) Bluetooth: a viable solution for IoT?[Industry perspectives]. IEEE Wirel Commun 21(6):6–7
26.
go back to reference Santos J, Rodrigues JJ, Silva BM, Casal J, Saleem K, Denisov V (2016) An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. J Netw Comput Appl 71:194–204 Santos J, Rodrigues JJ, Silva BM, Casal J, Saleem K, Denisov V (2016) An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. J Netw Comput Appl 71:194–204
27.
go back to reference Behera TM, Khan MS, Mohapatra SK, Samail UC, Bhuiyan MZA (2019) Energy-efficient routing for greenhouse monitoring using heterogeneous sensor networks. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 953–958 Behera TM, Khan MS, Mohapatra SK, Samail UC, Bhuiyan MZA (2019) Energy-efficient routing for greenhouse monitoring using heterogeneous sensor networks. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 953–958
28.
go back to reference Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105 Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105
29.
go back to reference HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96 HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96
30.
go back to reference Baccelli E, Gündoğan C, Hahm O, Kietzmann P, Lenders MS, Petersen H, Schleiser K, Schmidt TC, Wählisch M (2018) RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J 5(6):4428–4440 Baccelli E, Gündoğan C, Hahm O, Kietzmann P, Lenders MS, Petersen H, Schleiser K, Schmidt TC, Wählisch M (2018) RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J 5(6):4428–4440
31.
go back to reference Levis P et al (2005) TinyOS: an operating system for sensor networks. In: Weber W, Rabaey JM, Aarts E (eds) Ambient intelligence. Springer, Berlin, Heidelberg, pp 115–148 Levis P et al (2005) TinyOS: an operating system for sensor networks. In: Weber W, Rabaey JM, Aarts E (eds) Ambient intelligence. Springer, Berlin, Heidelberg, pp 115–148
32.
go back to reference Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7 Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7
33.
go back to reference Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10–28 Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10–28
34.
go back to reference Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20(8):2481–2501 Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20(8):2481–2501
36.
go back to reference Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32(5):64–69 Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32(5):64–69
37.
go back to reference Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96–101 Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96–101
39.
go back to reference Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459 Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459
40.
go back to reference Leusse PD, Dimitrakos T (2010) SOA-Based security governance middleware. In: 2010 fourth international conference on emerging security information, systems and technologies Leusse PD, Dimitrakos T (2010) SOA-Based security governance middleware. In: 2010 fourth international conference on emerging security information, systems and technologies
41.
go back to reference Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw 32:3–16 Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw 32:3–16
42.
go back to reference Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International conference on electronic design (ICED). IEEE, pp 321–326 Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International conference on electronic design (ICED). IEEE, pp 321–326
43.
go back to reference Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47 Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47
44.
go back to reference Jang J, Kong S, Kim M, Kim D, Kang BB (2015) SeCReT: secure channel between rich execution environment and trusted execution environment. In: Proceedings 2015 network and distributed system security symposium Jang J, Kong S, Kim M, Kim D, Kang BB (2015) SeCReT: secure channel between rich execution environment and trusted execution environment. In: Proceedings 2015 network and distributed system security symposium
45.
go back to reference Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2015) TEE: a virtual DRTM based execution environment for secure cloud-end computing. Future Gener Comput Syst 49:47–57 Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2015) TEE: a virtual DRTM based execution environment for secure cloud-end computing. Future Gener Comput Syst 49:47–57
46.
go back to reference Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 2:62–67 Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 2:62–67
47.
go back to reference Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S A publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International conference on communication systems software and middleware and workshops (COMSWARE’08). IEEE, pp 791–798 Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S A publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International conference on communication systems software and middleware and workshops (COMSWARE’08). IEEE, pp 791–798
48.
go back to reference Ito M, Iyatomi H (2018) Web application firewall using character-level convolutional neural network. In: 2018 IEEE 14th International colloquium on signal processing and its applications (CSPA). IEEE, pp 103–106 Ito M, Iyatomi H (2018) Web application firewall using character-level convolutional neural network. In: 2018 IEEE 14th International colloquium on signal processing and its applications (CSPA). IEEE, pp 103–106
49.
go back to reference Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532–537 Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532–537
50.
go back to reference Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74 Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74
51.
go back to reference Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 7(2):314–323 Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 7(2):314–323
52.
go back to reference Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141–1152 Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141–1152
53.
go back to reference Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023 Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:​1807.​11023
54.
go back to reference Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17), pp 1093–1110 Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17), pp 1093–1110
55.
go back to reference Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84 Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84
56.
go back to reference Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16 Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16
57.
go back to reference HosseiniNejad R, HaddadPajouh H, Dehghantanha A, Parizi RM (2019) A cyber kill chain based analysis of remote access trojans. In: Dehghantanha A, Choo KK (eds) Handbook of big data and iot security. Springer, Cham HosseiniNejad R, HaddadPajouh H, Dehghantanha A, Parizi RM (2019) A cyber kill chain based analysis of remote access trojans. In: Dehghantanha A, Choo KK (eds) Handbook of big data and iot security. Springer, Cham
58.
go back to reference Taylor PJ, Dargahi T, Dehghantanha A (2019) Analysis of APT actors targeting iot and big data systems: shell_crew, nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study. In: Handbook of big data and iot security, pp 257–272 Taylor PJ, Dargahi T, Dehghantanha A (2019) Analysis of APT actors targeting iot and big data systems: shell_crew, nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study. In: Handbook of big data and iot security, pp 257–272
59.
go back to reference Mwiki H, Dargahi T, Dehghantanha A, Choo KKR (2019) Analysis and triage of advanced hacking groups targeting western countries criticalnational infrastructure: APT28, RED October, and Regin. In: Gritzalis D, Theocharidou M, Stergiopoulos G (eds) Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Springer, Cham Mwiki H, Dargahi T, Dehghantanha A, Choo KKR (2019) Analysis and triage of advanced hacking groups targeting western countries criticalnational infrastructure: APT28, RED October, and Regin. In: Gritzalis D, Theocharidou M, Stergiopoulos G (eds) Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Springer, Cham
60.
go back to reference Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo KK, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics. techniques, and procedures. J Inf Process Syst 15(4):865–889 Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo KK, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics. techniques, and procedures. J Inf Process Syst 15(4):865–889
61.
go back to reference Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design
62.
go back to reference Bhuyan P, Ray A, Mohapatra DP (2015) A service-oriented architecture (SOA) framework component for verification of choreography. In: Jain L, Behera H, Mandal J, Mohapatra D (eds) Computational intelligence in data mining. Smart Innovation, Systems and Technologies, vol 3. Springer, New Delhi Bhuyan P, Ray A, Mohapatra DP (2015) A service-oriented architecture (SOA) framework component for verification of choreography. In: Jain L, Behera H, Mandal J, Mohapatra D (eds) Computational intelligence in data mining. Smart Innovation, Systems and Technologies, vol 3. Springer, New Delhi
63.
go back to reference Guan L, Liu P, Xing X, Ge X, Zhang S, Yu M, Jaeger T (2017) Trustshadow: secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. ACM, pp 488–501 Guan L, Liu P, Xing X, Ge X, Zhang S, Yu M, Jaeger T (2017) Trustshadow: secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. ACM, pp 488–501
64.
go back to reference Tiburski RT, Moratelli CR, Johann SF, Neves MV, de Matos E, Amaral LA, Hessel F (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73 Tiburski RT, Moratelli CR, Johann SF, Neves MV, de Matos E, Amaral LA, Hessel F (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73
65.
go back to reference Ahmed AIA, Gani A, Hamid SHA, Abdelmaboud A, Syed HJ, Habeeb Mohamed RAA, Ali I (2019) Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access 7:155472–155488 Ahmed AIA, Gani A, Hamid SHA, Abdelmaboud A, Syed HJ, Habeeb Mohamed RAA, Ali I (2019) Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access 7:155472–155488
66.
go back to reference Woo MW, Lee J, Park K (2018) A reliable IoT system for personal healthcare devices. Future Gener Comput Syst 78:626–640 Woo MW, Lee J, Park K (2018) A reliable IoT system for personal healthcare devices. Future Gener Comput Syst 78:626–640
Metadata
Title
AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things
Authors
Hamed HaddadPajouh
Raouf Khayami
Ali Dehghantanha
Kim-Kwang Raymond Choo
Reza M. Parizi
Publication date
25-02-2020
Publisher
Springer London
Published in
Neural Computing and Applications / Issue 20/2020
Print ISSN: 0941-0643
Electronic ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-020-04772-3

Other articles of this Issue 20/2020

Neural Computing and Applications 20/2020 Go to the issue

S.I. : Recent Advances in Deep Learning for Medical Image Processing

Brain tumor detection based on extreme learning

Premium Partner