体育赛事投注记录

advertisement

Addressing Security and Computation Challenges in IoT Using Machine Learning

  • Bhabendu Kumar MohantaEmail author
  • Utkalika Satapathy
  • Debasish Jena
Conference paper
  • 21 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 127)

Abstract

体育赛事投注记录the internet of things (iot) is widely used to implement different applications like smart home, smart health care, smart city, and smart farming system. the development of large smart devices/sensors enables smart technologies making it possible to implement the smart application in real time. the iot system has security challenges like authentication, data privacy, access control, and intrusion detection system. similarly, the computation of the sensed information from the environment is a challenging task. the computation must perform using distributed or decentralized architecture to overcome the centralized system difficulty. in a distributed/decentralized system when multiple nodes participate in a computational process, there is the risk of mutual consensus problem, malicious node detection, or data modification attacks. in this paper, the authors have identified machine learning as a solution to address some of the existing security and computational challenges. the paper also explained the implementation platform available for the integration of iot with machine learning.

Keywords

Security Computation Machine learning Secure communication IoT 

References

  1. 1.
    Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27
  2. 2.
    Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), pp 180–187. IEEE
  3. 3.
    Jaiswal K, Sobhanayak S, Mohanta BK, Jena D (2017) IoT-cloud based framework for patient’s data collection in smart healthcare system using raspberry-pi. In: 2017 International conference on electrical and computing technologies and applications (ICECTA), pp 1–4. IEEE
  4. 4.
    Hassan WH (2019) Current research on Internet of things (iot) security: a survey. Comput Netw 148:283–294
  5. 5.
    Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Sec Appl 38:8–27
  6. 6.
    Salman O, Elhajj I, Chehab A, Kayssi A (2018) IoT survey: an SDN and fog computing perspective. Comput Netw 143:221–246
  7. 7.
    Čolaković A, Hadžialić M (2018) Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks 144:17–39
  8. 8.
    Canedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST), pp 219–222. IEEE
  9. 9.
    Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning.
  10. 10.
    Fernandez Molanes R, Amarasinghe K, Rodriguez-Andina J, Manic M (2018) Deep learning and reconfigurable platforms in the internet of things: challenges and opportunities in algorithms and hardware. IEEE Ind Electron Mag 12(2)
  11. 11.
    Hussain F, Hussain R, Hassan SA, Hossain E (2019) Machine learning in IoT security: current solutions and future challenges.
  12. 12.
    Zantalis F, Koulouras G, Karabetsos S, Kandris D (2019) A review of machine learning and IoT in smart transportation. Future Internet 11(4):94
  13. 13.
    Satapathy U, Mohanta BK, Panda SS, Sobhanayak S, Jena D (2019) A secure framework for communication in internet of things application using hyperledger based blockchain. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT), pp. 1–7. IEEE
  14. 14.
    Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D (2019) DecAuth: decentralized authentication scheme for IoT device using ethereum blockchain. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 558–563. IEEE
  15. 15.
    Satapathy U, Mohanta BK, Jena D, Sobhanayak S (2018) An ECC based lightweight authentication protocol for mobile phone in smart home. In: 2018 IEEE 13th international conference on industrial and information systems (ICIIS), pp 303–308. IEEE
  16. 16.
    Santhadevi D, Janet B (2018) Security challenges in computing system, communication technology and protocols in IoT system. In: 2018 international conference on circuits and systems in digital enterprise technology (ICCSDET), pp 1–7. IEEE
  17. 17.
    Dey MR, Satapathy U, Bhanse P, Mohanta BK, Jena D (2019) MagTrack: detecting road surface condition using smartphone sensors and machine learning. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 2485–2489. IEEE
  18. 18.
    Pavani K, Damodaram A (2013) Intrusion detection using MLP for MANETs, pp 440–444
  19. 19.
    Kulkarni RV, Venayagamoorthy GK (2009) Neural network based secure media access control protocol for wireless sensor networks. In: 2009 international joint conference on neural networks, pp 1680–1687. IEEE
  20. 20.
    Xiao L, Xie C, Chen T, Dai H, Poor HV (2016) A mobile offloading game against smart attacks. IEEE Access 4:2281–2291
  21. 21.
    Xiao L, Yan Q, Lou W, Chen G, Hou YT (2013) Proximity-based security techniques for mobile users in wireless networks. IEEE Trans Inf Foren Sec 8(12):2089–2100
  22. 22.
    Xiao L, Li Y, Han G, Liu G, Zhuang W (2016) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047
  23. 23.
    Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786
  24. 24.
    Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41–49
  25. 25.
    Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687
  26. 26.
    Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
  27. 27.
    Li C, Wang G (2012) A light-weight commodity integrity detection algorithm based on Chinese remainder theorem. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp 1018–1023. IEEE
  28. 28.
    Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
  29. 29.
    Oulhiq R, Ibntahir S, Sebgui M, Guennoun Z (2015) A fingerprint recognition framework using artificial neural network. In: 2015 10th international conference on intelligent systems: theories and applications (SITA), pp 1–6. IEEE
  30. 30.
    Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89
  31. 31.
    Brun O, Yin Y, Gelenbe E (2018) Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Proc Comput Sci 134:458–463
  32. 32.
    Hashimoto N, Ozawa S, Ban T, Nakazato J, Shimamura J (2018) A darknet traffic analysis for IoT malwares using association rule learning. Proc Comput Sci 144:118–123

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Bhabendu Kumar Mohanta
    • 1
    Email author
  • Utkalika Satapathy
    • 1
  • Debasish Jena
    • 1
  1. 1.Information Security LaboratoryIIIT BhubaneswarOdishaIndia

Personalised recommendations