Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security

Review of the Literature on Using Machine and Deep Learning Techniques to Improve IoT Security

Alex Khang, Yudhvir Singh, Dheerdhwaj Barak
DOI: 10.4018/979-8-3693-6016-3.ch018
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The current work discusses the concept of the internet of things (IoT) and its implications on various domains, highlighting the challenges and security concerns associated with its expansive scope. This review work emphasizes the need for comprehensive security solutions to address the complexities of IoT infrastructure, particularly in the context of emerging threats. This chapter also underscores the importance of integrating security, energy efficiency, software applications, and data analytics in IoT systems. It outlines the evolving landscape of IoT security, including the vulnerabilities and potential consequences of inadequate security measures. Additionally, authors address the intersection of security and privacy concerns within deep learning (DL) and machine learning (ML), discussing various strategies such as homomorphic encryption, differential privacy, trusted execution, and secure multiparty computing. It acknowledges the computational demands of these approaches and the ongoing search for globally harmonized solutions. Finally, authors conclude by highlighting the challenges and strategies in countering adversarial attacks in DL and ML, emphasizing the effectiveness of adversarial training and the multifaceted nature of defense mechanisms.
Chapter Preview
Top

1. Introduction

The networking of various items, such as industrial systems, smart sensors, driverless cars, and more, is known as the Internet of Things (IoT) (Sharma and Singh et al., 2020). In essence, it is a network of physically linked physical items with limited processing, communication, and storage capacity (Hussain, Hussain et al., 2020). These things interact to share, analyse, and acquire data because they are outfitted with embedded electronics (sensors and actuators), network connection, and supporting software (Shafiq and Tian et al., 2020).

In industries including home appliances, personal healthcare, critical agricultural infrastructure, and military settings, the Internet of Things is promoting the development of a wide range of services and applications (Omolara and Alabdulatif et al., 2022). The wide-ranging nature of IoT networks poses novel issues, including the management of these devices, the sheer amount of data, communication, storage, and processing, in addition to concerns pertaining to security and privacy (Omolara and Alabdulatif et al., 2022). User happiness, security, and privacy assurances form the cornerstone of IoT commercialization (Al-Garadi and Mohamed, et al, 2020). By using powerful technologies like as edge computing, software-defined networking (SDN), and cloud computing (CC), attackers may exploit a wider range of vulnerabilities inside the Internet of Things.

As a result, managing security while developing IoT infrastructure has become more complex, necessitating all-encompassing solutions to successfully overcome the security obstacles (Zhang and Yao et al., 2019).It may be difficult to maintain dynamic IoT security standards in the face of the explosion of connected devices. A comprehensive strategy is necessary for solutions to provide the necessary security (Hussain and Hassan et al., 2020). Many Internet of Things (IoT) devices operate autonomously, but they are not under human supervision, which might allow unauthorized physical access (Majid and Habib et al., 2022).

Furthermore, new attack vectors are introduced by the IoT ecosystem. These risks are made possible by the interdependence and connectivity of these systems. As a result, IoT system security is more vulnerable than traditional computer device security. It is inefficient to protect these complex IoT frameworks by depending on antiquated computer paradigms (Attia 2019). Given the scope of their uses, the current state of IoT systems necessitates the quick integration of four fundamental factors into their operations: security, energy efficiency, IoT software applications, and data analytics (Rizvi and Kurtz, et al., 2018). This extension offers multidisciplinary researchers a novel way to look at current IoT issues from different perspectives (Devi and Majumder 2021). But the wide range and interconnectedness of IoT devices, as well as the multiplicity of parts that go into their deployment, have given rise to new security issues. The built-in features of these gadgets provide a number of security risks (Fang and Wang et al., 2022).

In addition, the various phases of IoT provide an abundance of useful data. There might be serious privacy risks if this data is not securely analyzed and sent (Sahu and Mao et al., 2021). Although using pertinent security techniques such as encryption, network security, application security, and access control is essential, it is inadequate and complex for large networks that are entangled with several systems. Every aspect of the Internet of Things platform has inherent weaknesses. A recent example of a unique danger using IoT devices is the “Mirai” botnet, which has been known to cause large distributed denial of service (DDoS) assaults (Jiang and Wen et al., 2020).

Complete Chapter List

Search this Book:
Reset