Securing Internet of Things (IoT) with machine learning

被引:46
|
作者
Zeadally, Sherali [1 ,3 ]
Tsikerdekis, Michail [2 ]
机构
[1] Univ Kentucky, Coll Commun & Informat, 315 Little Lib Bldg, Lexington, KY 40506 USA
[2] Western Washington Univ, Dept Comp Sci, Bellingham, WA 98225 USA
[3] Univ Kentucky, Bldg Coll Commun & Informat, Lexington, KY 40506 USA
关键词
attack; internet of things; machine learning; security; INTRUSION DETECTION; SENSOR; NETWORKS;
D O I
10.1002/dac.4169
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Advances in hardware, software, communication, embedding computing technologies along with their decreasing costs and increasing performance have led to the emergence of the Internet of Things (IoT) paradigm. Today, several billions of Internet-connected devices are part of the IoT ecosystem. IoT devices have become an integral part of the information and communication technology (ICT) infrastructure that supports many of our daily activities. The security of these IoT devices has been receiving a lot of attention in recent years. Another major recent trend is the amount of data that is being produced every day which has reignited interest in technologies such as machine learning and artificial intelligence. We investigate the potential of machine learning techniques in enhancing the security of IoT devices. We focus on the deployment of supervised, unsupervised learning techniques, and reinforcement learning for both host-based and network-based security solutions in the IoT environment. Finally, we discuss some of the challenges of machine learning techniques that need to be addressed in order to effectively implement and deploy them so that they can better protect IoT devices.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Machine Learning Approaches for Securing Internet of Things
    Kadale, Nilam K.
    Prasad, Jayashree R.
    Prasad, Rajesh S.
    2019 IEEE PUNE SECTION INTERNATIONAL CONFERENCE (PUNECON), 2019,
  • [2] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [3] Securing the Internet of Things (IoT): A Security Taxonomy for IoT
    Rizvi, Syed
    Pfeffer, Joseph, III
    Kurtz, Andrew
    Rizvi, Mohammad
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168
  • [4] The Integrating Application of Machine learning and Internet of Things (IoT)
    Chen, Yanda
    PROCEEDINGS OF THE ADVANCES IN MATERIALS, MACHINERY, ELECTRICAL ENGINEERING (AMMEE 2017), 2017, 114 : 755 - 758
  • [5] A Changing Landscape: Securing the Internet of Things (IoT)
    Jha, Sanjay
    2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [6] Securing internet of things using machine and deep learning methods: a survey
    Ghaffari, Ali
    Jelodari, Nasim
    Pouralish, Samira
    Derakhshanfard, Nahide
    Arasteh, Bahman
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (07): : 9065 - 9089
  • [7] Bacterial prediction using internet of things (IoT) and machine learning
    Khurshid, Hamza
    Mumtaz, Rafia
    Alvi, Noor
    Haque, Ayesha
    Mumtaz, Sadaf
    Shafait, Faisal
    Ahmed, Sheraz
    Malik, Muhammad Imran
    Dengel, Andreas
    ENVIRONMENTAL MONITORING AND ASSESSMENT, 2022, 194 (02)
  • [8] Bacterial prediction using internet of things (IoT) and machine learning
    Hamza Khurshid
    Rafia Mumtaz
    Noor Alvi
    Ayesha Haque
    Sadaf Mumtaz
    Faisal Shafait
    Sheraz Ahmed
    Muhammad Imran Malik
    Andreas Dengel
    Environmental Monitoring and Assessment, 2022, 194
  • [9] On the Application of IOT (Internet of Things) for Securing Industrial Threats
    Usman, Muhammad
    Abbas, Nazar
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 37 - 40
  • [10] Securing Data Provenance in Internet of Things (IoT) Systems
    Baracaldo, Nathalie
    Bathen, Luis Angel D.
    Ozugha, Roqeeb O.
    Engel, Robert
    Tata, Samir
    Ludwig, Heiko
    SERVICE-ORIENTED COMPUTING - ICSOC 2016 WORKSHOPS, 2017, 10380 : 92 - 98