Skip to main content

2021 | OriginalPaper | Buchkapitel

Internet of Things Security Using Machine Learning

verfasst von : Bhabendu Kumar Mohanta, Debasish Jena

Erschienen in: Advances in Machine Learning and Computational Intelligence

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is growing rapidly in the last decade. The number of interconnected smart devices has already crossed the total world’s population. The data generated by these devices are huge. The IoT is used in different applications like smart monitoring, healthcare system, smart home, where sensitive information is shared among users. Security and privacy are some of the major challenges in IoT applications. Some traditional security and cryptographic techniques are tried to address some of the issues exist in the IoT system. Due to resource constraints, IoT devices are more vulnerable to the outside world. The processing and computing the sensitive data is one of the challenges in IoT application. In this work, the authors identify the security issue present in the IoT system. Later identified machine learning can be addressed some of the security issues exist in IoT applications. From the analysis, authors found out that the machine learning integrated with IoT makes the system more secure, and processing becomes more efficient using machine learning algorithms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat X. Liu, M. Zhao, S. Li, F. Zhang, W. Trappe, A security framework for the internet of things in the future internet architecture. Future Internet 9(3), 27 (2017)CrossRef X. Liu, M. Zhao, S. Li, F. Zhang, W. Trappe, A security framework for the internet of things in the future internet architecture. Future Internet 9(3), 27 (2017)CrossRef
2.
Zurück zum Zitat I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of Things: security vulnerabilities and challenges, in 2015 IEEE Symposium on Computers and Communication (ISCC) (IEEE, 2015), pp. 180–187 I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of Things: security vulnerabilities and challenges, in 2015 IEEE Symposium on Computers and Communication (ISCC) (IEEE, 2015), pp. 180–187
3.
Zurück zum Zitat W.H. Hassan, Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019)CrossRef W.H. Hassan, Current research on internet of things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019)CrossRef
4.
Zurück zum Zitat M. Ammar, G. Russello, B. Crispo, Internet of things: a survey on the security of IoT frameworks. J. Inf. Sec. Appl. 38, 8–27 (2018) M. Ammar, G. Russello, B. Crispo, Internet of things: a survey on the security of IoT frameworks. J. Inf. Sec. Appl. 38, 8–27 (2018)
5.
Zurück zum Zitat O. Salman, I. Elhajj, A. Chehab, A. Kayssi, IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221–246 (2018)CrossRef O. Salman, I. Elhajj, A. Chehab, A. Kayssi, IoT survey: an SDN and fog computing perspective. Comput. Netw. 143, 221–246 (2018)CrossRef
6.
Zurück zum Zitat A. Olakovi, M. Hadiali, Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018) A. Olakovi, M. Hadiali, Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17–39 (2018)
7.
Zurück zum Zitat J. Canedo, A. Skjellum, Using machine learning to secure IoT systems, in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (IEEE, 2016), pp. 219–222 J. Canedo, A. Skjellum, Using machine learning to secure IoT systems, in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (IEEE, 2016), pp. 219–222
9.
Zurück zum Zitat R. Fernandez Molanes, K. Amarasinghe, J. Rodriguez-Andina, M. Manic, Deep learning and reconfigurable platforms in the internet of things: challenges and opportunities in algorithms and hardware. IEEE Ind. Electron. Mag. 12(2) (2018) R. Fernandez Molanes, K. Amarasinghe, J. Rodriguez-Andina, M. Manic, Deep learning and reconfigurable platforms in the internet of things: challenges and opportunities in algorithms and hardware. IEEE Ind. Electron. Mag. 12(2) (2018)
10.
Zurück zum Zitat F. Hussain, R. Hussain, S.A. Hassan, E. Hossain, Machine learning in IoT security: current solutions and future challenges (2019). arXiv:1904.05735 F. Hussain, R. Hussain, S.A. Hassan, E. Hossain, Machine learning in IoT security: current solutions and future challenges (2019). arXiv:​1904.​05735
11.
Zurück zum Zitat F. Zantalis, G. Koulouras, S. Karabetsos, D. Kandris, A review of machine learning and IoT in smart transportation. Future Internet 11(4), 94 (2019)CrossRef F. Zantalis, G. Koulouras, S. Karabetsos, D. Kandris, A review of machine learning and IoT in smart transportation. Future Internet 11(4), 94 (2019)CrossRef
12.
Zurück zum Zitat McGinthy, J. M., Wong, L. J., Michaels, A. J. (2019). Groundwork for Neural Network-Based Specific Emitter Identification Authentication for IoT. IEEE Inter- net of Things Journal McGinthy, J. M., Wong, L. J., Michaels, A. J. (2019). Groundwork for Neural Network-Based Specific Emitter Identification Authentication for IoT. IEEE Inter- net of Things Journal
13.
Zurück zum Zitat V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A sur- vey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A sur- vey on IoT security: Application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019)CrossRef
14.
Zurück zum Zitat M. Moh, R. Raju, Machine learning techniques for security of internet of things (IoT) and fog computing systems, in 2018 International Conference on High Performance Computing Simulation (HPCS) (IEEE, 2018), pp. 709–715 M. Moh, R. Raju, Machine learning techniques for security of internet of things (IoT) and fog computing systems, in 2018 International Conference on High Performance Computing Simulation (HPCS) (IEEE, 2018), pp. 709–715
15.
Zurück zum Zitat P.M. Shakeel, S. Baskar, V.S. Dhulipala, S. Mishra, M.M. Jaber, Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 42(10), 186 (2018)CrossRef P.M. Shakeel, S. Baskar, V.S. Dhulipala, S. Mishra, M.M. Jaber, Maintaining security and privacy in health care system using learning based deep-Q-networks. J. Med. Syst. 42(10), 186 (2018)CrossRef
16.
Zurück zum Zitat M. Nivaashini, P. Thangaraj, A framework of novel feature set extraction based intrusion detection system for internet of things using hybrid machine learning algorithms, in 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (IEEE, 2018), pp. 44–49 M. Nivaashini, P. Thangaraj, A framework of novel feature set extraction based intrusion detection system for internet of things using hybrid machine learning algorithms, in 2018 International Conference on Computing, Power and Communication Technologies (GUCON) (IEEE, 2018), pp. 44–49
17.
Zurück zum Zitat Y. Meidan, M. Bohadana, A. Shabtai, J.D. Guarnizo, M. Ochoa, N.O. Tippenhauer, Y. Elovici, ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis, in Proceedings of the Symposium on Applied Computing (ACM, 2017), pp. 506–509 Y. Meidan, M. Bohadana, A. Shabtai, J.D. Guarnizo, M. Ochoa, N.O. Tippenhauer, Y. Elovici, ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis, in Proceedings of the Symposium on Applied Computing (ACM, 2017), pp. 506–509
18.
Zurück zum Zitat F. Restuccia, S. DOro, T. Melodia, Securing the internet of things in the age of machine learning and software-defined networking. IEEE IoT J. 5(6), 4829–4842 (2018) F. Restuccia, S. DOro, T. Melodia, Securing the internet of things in the age of machine learning and software-defined networking. IEEE IoT J. 5(6), 4829–4842 (2018)
19.
Zurück zum Zitat F. Shaikh, E. Bou-Harb, J. Crichigno, N. Ghani, A machine learning model for classifying unsolicited IoT devices by observing network telescopes, in 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC) (IEEE, 2018), pp. 938–943 F. Shaikh, E. Bou-Harb, J. Crichigno, N. Ghani, A machine learning model for classifying unsolicited IoT devices by observing network telescopes, in 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC) (IEEE, 2018), pp. 938–943
20.
Zurück zum Zitat L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Signal Process. Mag. 35(5), 41–49 (2018)CrossRef
21.
Zurück zum Zitat A. Gondalia, D. Dixit, S. Parashar, V. Raghava, A. Sengupta, V.R. Sarobin, IoT-based healthcare monitoring system for war soldiers using machine learning. Proc. Comput. Sci. 133, 1005–1013 (2018)CrossRef A. Gondalia, D. Dixit, S. Parashar, V. Raghava, A. Sengupta, V.R. Sarobin, IoT-based healthcare monitoring system for war soldiers using machine learning. Proc. Comput. Sci. 133, 1005–1013 (2018)CrossRef
22.
Zurück zum Zitat N. Wang, T. Jiang, S. Lv, L. Xiao, Physical-layer authentication based on extreme learning machine. IEEE Commun. Lett. 21(7), 1557–1560 (2017)CrossRef N. Wang, T. Jiang, S. Lv, L. Xiao, Physical-layer authentication based on extreme learning machine. IEEE Commun. Lett. 21(7), 1557–1560 (2017)CrossRef
23.
Zurück zum Zitat M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan, R. Jain, Machine learning based network vulnerability analysis of industrial internet of things. IEEE IoT J. (2019) M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan, R. Jain, Machine learning based network vulnerability analysis of industrial internet of things. IEEE IoT J. (2019)
24.
Zurück zum Zitat E. Hossain, I. Khan, F. Un-Noor, S.S. Sikander, M.S.H. Sunny, Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access 7, 13960–13988 (2019)CrossRef E. Hossain, I. Khan, F. Un-Noor, S.S. Sikander, M.S.H. Sunny, Application of big data and machine learning in smart grid, and associated security concerns: a review. IEEE Access 7, 13960–13988 (2019)CrossRef
25.
Zurück zum Zitat U. Jayasinghe, G.M. Lee, T.W. Um, Q. Shi, Machine learning based trust computational model for iot services. IEEE Trans. Sustain. Comput. 4(1), 39–52 (2018)CrossRef U. Jayasinghe, G.M. Lee, T.W. Um, Q. Shi, Machine learning based trust computational model for iot services. IEEE Trans. Sustain. Comput. 4(1), 39–52 (2018)CrossRef
26.
Zurück zum Zitat L. Wei, W. Luo, J. Weng, Y. Zhong, X. Zhang, Z. Yan, Machine learning-based malicious application detection of android. IEEE Access 5, 25591–25601 (2017)CrossRef L. Wei, W. Luo, J. Weng, Y. Zhong, X. Zhang, Z. Yan, Machine learning-based malicious application detection of android. IEEE Access 5, 25591–25601 (2017)CrossRef
27.
Zurück zum Zitat B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: a survey on applications and security privacy challenges. IoT, 100107 (2019) B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain technology: a survey on applications and security privacy challenges. IoT, 100107 (2019)
Metadaten
Titel
Internet of Things Security Using Machine Learning
verfasst von
Bhabendu Kumar Mohanta
Debasish Jena
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-5243-4_11

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.