Skip to main content

2023 | OriginalPaper | Buchkapitel

Role of Machine Learning and Deep Learning Applications in the Internet of Things (IoT) Security

verfasst von : S. Feslin Anish Mon, G. Maria Jones, S. Godfrey Winster

Erschienen in: Artificial Intelligence in IoT and Cyborgization

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) would contain a severe, well organized, and economical and communication effect in our everyday life. Links in IoT channels usually controlled by resources, where cyber-attacks are more likely. Extensive works have proposed to access security and secret issues on IoT channels to address these problems. However, the new characteristics of IoT links are not sufficient to link the top security concerns of IoT systems to present descriptions. Machine Learning (ML) and Deep Learning (DL) methods could give more knowledge of IoT devices that could help overcome different previous security issues. In this chapter, we properly debated security specifications and present security solutions for IoT systems. Then, we provide in-depth of the present ML and DL methods related to additional safety in IoT systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Liu Y, Pi D (2017) A novel Kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11(8) Liu Y, Pi D (2017) A novel Kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11(8)
2.
Zurück zum Zitat Modiri E, Azmoodeh A, Dehghantanha A, Karimipour H (2018) Fuzzy pattern tree for edge attack detection and categorization. J Syst Archit 9:1–15 Modiri E, Azmoodeh A, Dehghantanha A, Karimipour H (2018) Fuzzy pattern tree for edge attack detection and categorization. J Syst Archit 9:1–15
3.
Zurück zum Zitat Karimipour H, Dinavahi V (2017) On false data injection attack against dynamic state estimation on smart power grids. In: 2017 IEEE international conference on smart energy grid engineering (SEGE). IEEE, pp 388–393 Karimipour H, Dinavahi V (2017) On false data injection attack against dynamic state estimation on smart power grids. In: 2017 IEEE international conference on smart energy grid engineering (SEGE). IEEE, pp 388–393
4.
Zurück zum Zitat Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for the consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 29–35 Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for the consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 29–35
5.
Zurück zum Zitat Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 635–638 Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 635–638
6.
Zurück zum Zitat Gondhi NK, Gupta A (2017) Survey on machine learning-based scheduling in cloud computing. In: Proceedings of the 2017 international conference on intelligent systems, metaheuristics & swarm intelligence, pp 57–61 Gondhi NK, Gupta A (2017) Survey on machine learning-based scheduling in cloud computing. In: Proceedings of the 2017 international conference on intelligent systems, metaheuristics & swarm intelligence, pp 57–61
7.
Zurück zum Zitat Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184–1199CrossRef Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184–1199CrossRef
8.
Zurück zum Zitat Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in the internet of things. In: 2017 IEEE 15th international conference on dependable, autonomic and secure computing, 15th international conference on pervasive intelligence and computing, 3rd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, pp 836–843 Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in the internet of things. In: 2017 IEEE 15th international conference on dependable, autonomic and secure computing, 15th international conference on pervasive intelligence and computing, 3rd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, pp 836–843
9.
Zurück zum Zitat Xie M, Huang M, Bai Y, Hu Z (2017) The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things. J Electr Comput Eng Xie M, Huang M, Bai Y, Hu Z (2017) The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things. J Electr Comput Eng
10.
Zurück zum Zitat Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2087–2091 Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2087–2091
11.
Zurück zum Zitat Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687CrossRef Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687CrossRef
12.
Zurück zum Zitat Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560CrossRef Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560CrossRef
13.
Zurück zum Zitat Shi C, Liu J, Liu H, Chen Y (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing, pp 1–10 Shi C, Liu J, Liu H, Chen Y (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing, pp 1–10
14.
Zurück zum Zitat Kiran BN, Radheshyam SG, Sagar N, Balthar SA, Shrinath (2018) Security for IoT systems using machine learning. Int J Adv Res Innov Ideas Educ (IJRIIE) 4(2):2707–2710 Kiran BN, Radheshyam SG, Sagar N, Balthar SA, Shrinath (2018) Security for IoT systems using machine learning. Int J Adv Res Innov Ideas Educ (IJRIIE) 4(2):2707–2710
15.
Zurück zum Zitat Alam MS, Husain D, Naqvi SK, Kumar P (2018) IOT security through machine learning and homographic encryption technique. In: International conference on new trends in engineering & technology (ICNTET), Chennai Alam MS, Husain D, Naqvi SK, Kumar P (2018) IOT security through machine learning and homographic encryption technique. In: International conference on new trends in engineering & technology (ICNTET), Chennai
16.
Zurück zum Zitat Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R (2018) Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on the internet of things (ICIOT). IEEE, pp 57–64 Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R (2018) Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on the internet of things (ICIOT). IEEE, pp 57–64
17.
Zurück zum Zitat Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using in-depth learning approach for the internet of things. Futur Gener Comput Syst 82:761–768CrossRef Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using in-depth learning approach for the internet of things. Futur Gener Comput Syst 82:761–768CrossRef
18.
Zurück zum Zitat Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184 Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184
19.
Zurück zum Zitat Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp 506–509 Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp 506–509
20.
Zurück zum Zitat Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for IoT system based on a transfer learning algorithm. Clust Comput 22(4):9889–9904CrossRef Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for IoT system based on a transfer learning algorithm. Clust Comput 22(4):9889–9904CrossRef
21.
Zurück zum Zitat Khan F et al (2020) A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 8:119710–119719 Khan F et al (2020) A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 8:119710–119719
22.
Zurück zum Zitat Khan F et al (2020) Detecting malicious URLs using binary classification through Ada boost algorithm. Int J Electr Comput Eng 10:2088–8708 Khan F et al (2020) Detecting malicious URLs using binary classification through Ada boost algorithm. Int J Electr Comput Eng 10:2088–8708
Metadaten
Titel
Role of Machine Learning and Deep Learning Applications in the Internet of Things (IoT) Security
verfasst von
S. Feslin Anish Mon
G. Maria Jones
S. Godfrey Winster
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-4303-6_3

Premium Partner