Machine Learning in IoT Security Current Issues and Future Prospects
Machine Learning in IoT Security Current Issues and Future Prospects
Abstract:
The Internet of Things (IoT) connects techniques that can be used to improve IoT
billions of intelligent devices that can security solutions. It describes the many
communicate with each other without possible attack surfaces of IoT systems, the
human intervention. With an estimated 50 potential risks associated with each surface,
billion devices by the end of 2020, it is one and lists unique or newly established IoT
of the fastest growing areas of computing security threats. It then details the ML / DL
history. On the other hand, IoT technology approach to IoT security, highlighting the
is essential to the advancement of various potential, strengths, and weaknesses of each
real-world intelligent applications that can method. Learn about the possibilities and
improve people's quality of life. However, challenges of using machine learning and
the interdisciplinary components involved in deep learning for IoT security. These
networking and deploying IoT systems raise opportunities and challenges may be used as
new security concerns. Encryption, future research paths.
authentication, access control, network Keywords—Deep Learning, Machine
security, and application security solutions Learning, Internet of Things Security,
are worthless when it comes to IoT devices Security based Intelligence, IoT Big Data,
and their inherent shortcomings. Therefore, Attacks, Privacy
existing security measures need to be
updated to properly protect the IoT I. Introduction
environment. Machine learning and deep The Internet of Things (IoT) is defined as a
learning (ML / DL) have evolved network of interconnected and dispersed
dramatically in recent years, and machine embedded systems that interact via wired or
intelligence has evolved from laboratory wireless communication methods (Novo et
curiosity to viable machines. An important al. , 2015). It is also described as an
defense against new or zero-day attacks is environment network of physical objects,
the ability to intelligently monitor IoT having comparatively little computational
devices. ML / DL is a powerful data capacity for data acquisition, processing,
exploration technique for revealing memory, and communication, incorporating
"normal" and "bad" behavior in the context electronics (including sensors and
of IoT components and devices. Therefore, actuators), software programs, and
machine learning and deep learning networking. IoT items are smart appliances
technologies are important not only to like smart light bulbs, smart adapters, smart
enable secure device communication, but meters, smart refrigerators, smart ovens, air
also to transform IoT security into a conditioners, temperature sensors, smoke
security-based intelligence system. The detectors, IP cameras, etc Clients that have
purpose of this study is to provide a updated items such as smartphones will also
comprehensive overview of recent advances comes under this category, Examples of
in machine learning and deep learning modern smart appliances include. This
global scale bring new difficult situations to
control the devices, the volume of generated ones. For successful and safe systems, the
data, storage and communications, and, of IoT systems need to move from just enabling
course, processing and security and secure communication of the devices to
privacy.There is great literature available in security intelligent supported.
the following domains of the IoT:
architecture, communications, protocols, Figure 1
applications, security, and privacy, among Illustration of the potential role of ML/DL
others (Alfuqaha et al., 2015) (Granjal, in IoT security
Monteiro, Silva, 2015).software, and The key research question of this survey is
network connections. Smart appliances such listed as follows:
as smart light bulbs, smart adapters, smart • In earlier studies, what strategies were
meters, smart refrigerators, smart ovens, air employed to solve IoT security issues
conditioners, temperature sensors, smoke using Machine Learning?
detectors, and IP cameras are examples of • What are the different IOT security
IoT items, as are more modern devices such treats?
as smartphones. The large scale of IoT • How might the arrangement of those
networks creates new challenging featured treat be handled utilizing
conditions in terms of device control, sheer machine learning?
volume of data, storage, communication,
processing, and protection and privacy. II. Iot Security Threats
Extensive research has been conducted on IoT devices, on the whole, function in a
several areas of the IoT (architecture, variety of settings to achieve a variety of
communications, protocols, applications, goals. As a result, balancing security
security, privacy, etc. ) (Alfuqahaet al. , requirements with the IoT framework's large
2015) (Granjal, Monteiro, Silva, 2015). This attack surface is difficult. As a result, an
is because the amount of data produced by unauthorized person might get access to
IoT devices is extraordinarily large, and these devices. Because of their limited
conventional data acquisition, storage, and computation and power capabilities, IoT
analysis methods may not operate at this devices are unable to maintain complicated
level. In addition, the proliferation of data by security frameworks (Abomhara and Kien,
IoT paves a new channel that traditional data 2015). Obtaining the IoT framework in this
processing systems cannot exhaust. In this manner is a confusing and challenging
respect, Machine Learning (ML) is effort.
considered one of the most suitable
paradigms of computing for offering local A. Threats in IoT
intelligence at IoT devices (Saeid, Rezvan There are two types of security threats: cyber
and Barekatain, 2018). It can also be defined and physical. Cyber risks are further divided
as an ability of a smart device to modify or into passive and active categories. The
manage a state or perform an action as a dangers are briefly discussed in the next
result of an existing or gained awareness, sections.
which is also believed to be an essential part
of an IoT system. From Figure 1 it is 1) Cyber Threats
observed that the credence of monitoring Passive threats: Eavesdropping through
IoT devices can provide an intelligent level communication channels or the network is a
answer to new or zero raw attacks. Secondly, passive danger. An attacker can use
due to the ability to learn instances of eavesdropping to obtain data from sensors,
unknown new assaults and forecast them, follow sensor owners, or do both. On the
ML/DL algorithms may help anticipate new black market, the collection of valuable
attacks as they are mutations of previous personal information, particularly personal
III. To provide some context, they split Iii. Iot Security and Machine Learning.
out two particular areas of focus: In this section, we discuss various machine
IOT Security and Machine LearningIn this learning algorithms and their applicability in
section, we briefly describe main machine IoT applications. A. Basic Machine
learning algorithms and how they may be Learning Algorithms The ML algorithms
used in IoT systems.A. Basic of Machine can be categorized as supervised,
Learning Algorithmstical components in the unsupervised, semi-supervised and
commercial acceptance of IoT Reinforcement learning algorithms.
administrations and applications. The Supervised Learning: Supervised learning
current Internet is a magnet for security is utilized when specified objectives are
attacks ranging from simple hacks to stated to be achieved from a given input. The
corporate-level all-around constructed data is labeled initially in this type of
security breaches that have negatively learning.
impacted a variety of businesses, including Unsupervised Learning: The environment
medical services and commerce. The just provides inputs for unsupervised
limitations of IoT devices, as well as the learning, with no specific goals in mind. It
environment in which they operate, provide may investigate similarities among
additional challenges for the security of both unlabeled data and organize it into various
applications and devices. Until now, security categories without requiring labeled data.
and protection concerns in the IoT area have Semi-supervised Learning: In the preceding
been widely investigated from many two kinds, either all of the observations in
perspectives, such as correspondent the dataset have no labels or all of the
security, data security, protection, technical observations have labels. Semi-supervised
security, character the executives, malware learning is somewhere in the middle.
research, and so on (Ray et al., 2016). Reinforcement Learning: No explicit goals
C. Gaps in the Existing Security are established in Reinforcement Learning
Solution for IoT Networks. It is critical to (RL), and the operator learns via feedback
investigate the fundamental causes of after observing the environment. It does
security and privacy concerns in order to some acts and made a decision based on the
successfully use IoT. More specifically, the reward it receives.
word IoT has been hurled out of previous D. Machine Learning Techniques Used
technologies, therefore it's critical to identify in IoT Security
whether the security concerns in IoT are new As indicated in Table I, we will explore
or a rehash of prior technologies' legacy. several machine learning techniques
(Fernandes and Eykholt, 2017) compared concentrating on the underpinning security
and contrasted the security concerns faced and privacy issues in IoT networks.
by IoT and conventional IT devices. They Authorization, threat detection and
also concentrated on concerns about mitigation, Dispersed Denial of Service
privacy. Software, hardware, network, and (DDoS) assaults, anomaly and detection
applications are the key driving forces in techniques, and malware analysis are all
arguing about similarities and differences. things we examine.
The security challenges in the conventional
IT sector and the IoT are fundamentally TABLE I
comparable, according to these Machine Learning Techniques Used In
categorization. However, the IoT's main Iot Security
worry is resource limits, which make it Machine Learning Algorithm Description
difficult to adapt existing advanced security Naivebayes
solutions to IoT networks. It's a classification technique that can be
applied in both binary and multi-class