Skip to main content

A Review of IoT Security Solutions Using Machine Learning and Deep Learning

  • Conference paper
  • First Online:
Proceedings of Data Analytics and Management (ICDAM 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 787))

Included in the following conference series:

  • 117 Accesses

Abstract

The Internet of Things (IoT) is a rapidly developing field, projected to connect 22 billion smart devices in a global market worth 1567 billion USD by 2025. The integrated and multidisciplinary nature of these resource-constrained devices responsible for construction of IoT systems renders them susceptible to security attacks. Conventional methods of ensuring security are relatively inefficient as the types, surfaces and severity of attacks continue to evolve. Promising alternatives offered by machine learning (ML) and deep learning (DL) can be employed to embed intelligence in the system, by facilitating the detection of compromised security. In this survey paper, a discussion of IoT infrastructure, security concerns, types and surfaces of attacks prefaces a systematic, layer-wise review of the ML/DL models and frameworks to ensure system security. We also present the current challenges and prospective directions of research concerning the utilization of ML/DL techniques in offering system security in an IoT environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdallah A, Shen X (2017) Lightweight security and privacy preserving scheme for smart grid customer-side networks. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2015.2463742

    Article  Google Scholar 

  2. Abdmeziem MR, Tandjaoui D (2015) An end-to-end secure key management protocol for e-health applications. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2015.03.030

  3. Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag. https://doi.org/10.1109/MCOM.2018.1700332

  4. Abomhara M, Køien GM (2015) Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J Cyber Sec Mob. https://doi.org/10.13052/jcsm2245-1439.414

  5. Aditya Sai Srinivas T, Manivannan SS (2020) Prevention of hello flood attack in IoT using combination of deep learning with improved rider optimization algorithm. Comput Commun. https://doi.org/10.1016/j.comcom.2020.03.031

  6. Ahmadi H, Arji G, Shahmoradi L, Safdari R, Nilashi M, Alizadeh M (2019) The application of internet of things in healthcare: a systematic literature review and classification. https://doi.org/10.1007/s10209-018-0618-4

  7. Ahmed AIA, Ab Hamid SH, Gani A, Khan S, Khan MK (2019) Trust and reputation for Internet of Things: fundamentals, taxonomy, and open research challenges. https://doi.org/10.1016/j.jnca.2019.102409

  8. Ahmed E, Yaqoob I, Hashem IAT, Khan I, Ahmed AIA, Imran M, Vasilakos AV (2017) The role of big data analytics in Internet of Things. Comput Netw. https://doi.org/10.1016/j.comnet.2017.06.013

  9. Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2016.03.006

  10. Airehrour D, Gutierrez JA, Ray SK (2019) SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2018.03.021

    Article  Google Scholar 

  11. Akhunzada A, Gani A, Anuar NB, Abdelaziz A, Khan MK, Hayat A, Khan SU (2016) Secure and dependable software defined networks. https://doi.org/10.1016/j.jnca.2015.11.012

  12. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2015.2444095

    Article  Google Scholar 

  13. Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2020.2988293

  14. Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. https://doi.org/10.1016/j.jnca.2017.04.002

  15. Allahham MS, Abdellatif AA, Mohamed A, Erbad A, Yaacoub E, Guizani M (2020) I-SEE: intelligent, secure and energy-efficient techniques for medical data transmission using deep reinforcement learning. IEEE Internet Things J. https://doi.org/10.1109/jiot.2020.3027048

    Article  Google Scholar 

  16. Altawy R, Youssef AM (2016) Security tradeoffs in cyber physical systems: a case study survey on implantable medical devices. IEEE Access. https://doi.org/10.1109/ACCESS.2016.2521727

  17. Aminanto ME, Choi R, Tanuwidjaja HC, Yoo PD, Kim K (2017) Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans Inform Forensics Sec. https://doi.org/10.1109/TIFS.2017.2762828

  18. Aminanto ME, Kim K (2018) Improving detection of Wi-Fi impersonation by fully unsupervised deep learning. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). https://doi.org/10.1007/978-3-319-93563-8_18

  19. Ammar M, Russello G, Crispo B (2018) Internet of Things: a survey on the security of IoT frameworks. J Inform Sec Appl. https://doi.org/10.1016/j.jisa.2017.11.002

    Article  Google Scholar 

  20. Amouri A, Alaparthy VT, Morgera SD (2020) A machine learning based intrusion detection system for mobile internet of things. Sensors (Switzerland). https://doi.org/10.3390/s20020461

    Article  Google Scholar 

  21. Andrea I, Chrysostomou C, Hadjichristofi G (2016) Internet of Things: security vulnerabilities and challenges. In: Proceedings of IEEE symposium on computers and communications. https://doi.org/10.1109/ISCC.2015.7405513

  22. Anu P, Vimala S (2018) A survey on sniffing attacks on computer networks. In: Proceedings of 2017 international conference on intelligent computing and control, I2C2 2017. https://doi.org/10.1109/I2C2.2017.8321914

  23. Aref MA, Jayaweera SK, Machuzak S (2017) Multi-agent reinforcement learning based cognitive anti-jamming. In: IEEE wireless communications and networking conference, WCNC (2017). https://doi.org/10.1109/WCNC.2017.7925694

  24. Asghari P, Rahmani AM, Javadi HHS (2018) Service composition approaches in IoT: a systematic review. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.07.013

    Article  Google Scholar 

  25. Asghari P, Rahmani AM, Javadi HHS (2019) Internet of Things applications: a systematic review. Comput Netw. https://doi.org/10.1016/j.comnet.2018.12.008

    Article  Google Scholar 

  26. Ashibani Y, Mahmoud QH (2017) Cyber physical systems security: analysis, challenges and solutions. Comput Secur. https://doi.org/10.1016/j.cose.2017.04.005

    Article  Google Scholar 

  27. Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Comput Netw. https://doi.org/10.1016/j.comnet.2010.05.010

    Article  MATH  Google Scholar 

  28. Azmoodeh A, Dehghantanha A, Choo KKR (2019) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Sustain Comput. https://doi.org/10.1109/TSUSC.2018.2809665

    Article  Google Scholar 

  29. Bahtiyar Š, Ufuk Çağlayan M (2012) Extracting trust information from security system of a service. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2011.10.002

  30. Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R (2018) Detecting poisoning attacks on machine learning in IoT environments. In: Proceedings of 2018 IEEE international congress on internet of things, ICIOT 2018—Part of the 2018 IEEE world congress on services. https://doi.org/10.1109/ICIOT.2018.00015

  31. Bertino E, Islam N (2017) Botnets and internet of things security. Computer. https://doi.org/10.1109/MC.2017.62

    Article  Google Scholar 

  32. Bose T, Bandyopadhyay S, Ukil A, Bhattacharyya A, Pal A (2015) Why not keep your personal data secure yet private in IoT? Our lightweight approach. In: 2015 IEEE 10th international conference on intelligent sensors, sensor networks and information processing, ISSNIP 2015. https://doi.org/10.1109/ISSNIP.2015.7106942

  33. Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun. https://doi.org/10.1016/j.comcom.2016.12.001

    Article  Google Scholar 

  34. Camara C, Peris-Lopez P, Tapiador JE (2015) Security and privacy issues in implantable medical devices: a comprehensive survey. https://doi.org/10.1016/j.jbi.2015.04.007

  35. Campioni F, Choudhury S, Al-Turjman F (2019) Scheduling RFID networks in the IoT and smart health era. J Ambient Intell Humaniz Comput 10(10):4043–4057. https://doi.org/10.1007/s12652-019-01221-5

    Article  Google Scholar 

  36. Canedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust, PST 2016. https://doi.org/10.1109/PST.2016.7906930

  37. Chatterjee B, Das D, Maity S, Sen S (2019) RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2849324

    Article  Google Scholar 

  38. Chen Z, Ma N, Liu B (2015) Lifelong learning for sentiment classification. In: ACL-IJCNLP 2015—53rd annual meeting of the association for computational linguistics and the 7th ernational joint conference on natural language processing of the Asian federation of natural language processing, proceedings of the conference. https://doi.org/10.3115/v1/p15-2123

  39. Cherry S (2005) Secrets and lies: digital security in a networked world [Books]. IEEE Spectr. https://doi.org/10.1109/mspec.2000.873914

    Article  Google Scholar 

  40. Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust Comput. https://doi.org/10.1007/s10586-018-1847-2

    Article  Google Scholar 

  41. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for Internet of Things. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.08.043

    Article  Google Scholar 

  42. Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for consumer internet of things devices. In: Proceedings of 2018 IEEE symposium on security and privacy workshops, SPW 2018. https://doi.org/10.1109/SPW.2018.00013

  43. Elazhary H (2019) Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: disambiguation and research directions. https://doi.org/10.1016/j.jnca.2018.10.021

  44. Fadlullah ZM, Tang F, Mao B, Kato N, Akashi O, Inoue T, Mizutani K (2017) State-of-the-art deep learning: evolving machine intelligence toward tomorrow’s intelligent network traffic control systems. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2017.2707140

    Article  MATH  Google Scholar 

  45. Fang H, Wang X, Hanzo L (2019) Learning-aided physical layer authentication as an intelligent process. IEEE Trans Commun. https://doi.org/10.1109/TCOMM.2018.2881117

  46. Fang S, Wang T, Liu Y, Zhao S, Lu Z (2019) Entrapment for wireless eavesdroppers. In: Proceedings of IEEE INFOCOM. https://doi.org/10.1109/INFOCOM.2019.8737394

  47. Farris I, Taleb T, Khettab Y, Song J (2019) A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2018.2862350

    Article  Google Scholar 

  48. Faruki P, Bharmal A, Laxmi V, Ganmoor V, Gaur MS, Conti M, Rajarajan M (2015) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2014.2386139

    Article  Google Scholar 

  49. Fatima-Tuz-Zahra, Jhanjhi NZ, Brohi SN, Malik NA (2019) Proposing a rank and wormhole attack detection framework using machine learning. In: MACS 2019—13th international conference on mathematics, actuarial science, computer science and statistics, proceedings. https://doi.org/10.1109/MACS48846.2019.9024821

  50. Gope P, Sikdar B (2019) Privacy-aware authenticated key agreement scheme for secure smart grid communication. IEEE Trans Smart Grid. https://doi.org/10.1109/TSG.2018.2844403

    Article  Google Scholar 

  51. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2013.01.010

    Article  Google Scholar 

  52. Guo X, Lin H, Li Z, Peng M (2019) Deep-reinforcement-learning-based QoS-aware secure routing for SDN-IoT. IEEE Internet Things J. https://doi.org/10.1109/jiot.2019.2960033

  53. Gusmeroli S, Haller S, Harrison M, Kalaboukas K, Tomasella M, Vermesan O, Wouters K (2009) Vision and challenges for realizing the internet of things

    Google Scholar 

  54. Haider SA, Adil MN, Zhao MJ (2020) Optimization of secure wireless communications for IoT networks in the presence of eavesdroppers. Comput Commun. https://doi.org/10.1016/j.comcom.2020.02.027

    Article  Google Scholar 

  55. Hajiheidari S, Wakil K, Badri M, Navimipour NJ (2019) Intrusion detection systems in the Internet of things: a comprehensive investigation. https://doi.org/10.1016/j.comnet.2019.05.014

  56. Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: ICASSP, IEEE international conference on acoustics, speech and signal processing—Proceedings. https://doi.org/10.1109/ICASSP.2017.7952524

  57. Heuser A, Zohner M (2012) Intelligent machine homicide. https://doi.org/10.1007/978-3-642-29912-4_18

  58. Hiromoto RE, Haney M, Vakanski A (2017) A secure architecture for IoT with supply chain risk management. In: Proceedings of the 2017 IEEE 9th international conference on intelligent data acquisition and advanced computing systems: technology and applications, IDAACS 2017. https://doi.org/10.1109/IDAACS.2017.8095118

  59. Hodo E, Bellekens X, Hamilton A, Dubouilh PL, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: 2016 international symposium on networks, computers and communications, ISNCC 2016. https://doi.org/10.1109/ISNCC.2016.7746067

  60. Hong T, Liu C, Kadoch M (2019) Machine learning based antenna design for physical layer security in ambient backscatter communications. Wirel Commun Mob Comput. https://doi.org/10.1155/2019/4870656

    Article  Google Scholar 

  61. Huang J, Zhang X, Tan L, Wang P, Liang B (2014) AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction. In: Proceedings of international conference on software engineering. https://doi.org/10.1145/2568225.2568301

  62. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2020.2986444

    Article  Google Scholar 

  63. Islam SM, Kwak D, Kabir MH, Hossain M, Kwak KS (2015) The internet of things for health care: a comprehensive survey. IEEE Access. https://doi.org/10.1109/ACCESS.2015.2437951

    Article  Google Scholar 

  64. Jordan MI, Mitchell TM (2015) Machine learning: trends, perspectives, and prospects. https://doi.org/10.1126/science.aaa8415

  65. Jung B, Han I, Lee S (2001) Security threats to Internet: a Korean multi-industry investigation. Inform Manage. https://doi.org/10.1016/S0378-7206(01)00071-4

    Article  Google Scholar 

  66. Kamel SOM, Elhamayed SA (2020) Mitigating the impact of IoT routing attacks on power consumption in IoT healthcare environment using convolutional neural network. Int J Comput Netw Inform Sec. https://doi.org/10.5815/ijcnis.2020.04.02

  67. Karimipour H, Dinavahi V (2017) Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2786584

    Article  Google Scholar 

  68. Kaur G, Tomar P, Singh P (2018) Internet of things and big data analytics toward next-generation intelligence

    Google Scholar 

  69. Kaur N, Verma S, Kavita (2018) A survey of routing protocols in wireless sensor networks. Int J Eng Technol (UAE)

    Google Scholar 

  70. Khraisat A, Gondal I, Vamplew P, Kamruzzaman J (2019) Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecurity. https://doi.org/10.1186/s42400-019-0038-7

    Article  Google Scholar 

  71. Kim J, Shim M, Hong S, Shin Y, Choi E (2020) Intelligent detection of iot botnets using machine learning and deep learning. Appl Sci (Switzerland) 10(19):1–22. https://doi.org/10.3390/app10197009

    Article  Google Scholar 

  72. Kimani K, Oduol V, Langat K (2019) Cyber security challenges for IoT-based smart grid networks. Int J Crit Infrastruct Prot. https://doi.org/10.1016/j.ijcip.2019.01.001

  73. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer. https://doi.org/10.1109/MC.2017.201

    Article  Google Scholar 

  74. Lane ND, Bhattacharya S, Georgiev P, Forlivesi C, Jiao L, Qendro L, Kawsar F (2016) DeepX: a software accelerator for low-power deep learning inference on mobile devices. In: 2016 15th ACM/IEEE international conference on information processing in sensor networks, IPSN 2016—Proceedings. https://doi.org/10.1109/IPSN.2016.7460664

  75. Lei L, Tan Y, Zheng K, Liu S, Zhang K, Shen X (2020) Deep reinforcement learning for autonomous internet of things: model, applications and challenges. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2020.2988367

    Article  Google Scholar 

  76. Leloglu E (2017) A review of security concerns in internet of things. J Comput Commun. https://doi.org/10.4236/jcc.2017.51010

    Article  Google Scholar 

  77. Lerman L, Bontempi G, Markowitch O (2015) A machine learning approach against a masked AES: reaching the limit of side-channel attacks with a learning model. J Crypto-graph Eng. https://doi.org/10.1007/s13389-014-0089-3

    Article  Google Scholar 

  78. Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw. https://doi.org/10.1109/MNET.2018.1700202

    Article  Google Scholar 

  79. Li J, Zhao H, Chen X, Chu Z, Zhen L, Jiang J, Pervaiz H (2020) Secrecy wireless-powered sensor networks for internet of things. Wirel Commun Mob Comput 2020:1–12. https://doi.org/10.1155/2020/8859264

    Article  Google Scholar 

  80. Liang N (2020) Security transmission and storage of internet of things information based on blockchain. IOP Conf Ser Mater Sci Eng 750:012164. Institute of Physics Publishing. https://doi.org/10.1088/1757-899X/750/1/012164

  81. Liao RF, Wen H, Chen S, Xie F, Pan F, Tang J, Song H (2020) Multiuser physical layer authentication in internet of things with data augmentation. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2960099

    Article  Google Scholar 

  82. Liu J, Zhang C, Fang Y (2018) EPIC: a differential privacy framework to defend smart homes against internet traffic analysis. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2799820

    Article  Google Scholar 

  83. Lopez J, Roman R, Alcaraz C (2009) Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). https://doi.org/10.1007/978-3-642-03829-7_10

  84. Machuzak S, Jayaweera SK (2016) Reinforcement learning based anti-jamming with wideband autonomous cognitive radios. In: 2016 IEEE/CIC international conference on communications in China, ICCC 2016. https://doi.org/10.1109/ICCChina.2016.7636793

  85. Maghrebi H, Portigliatti T, Prouff E (2016) Breaking cryptographic implementations using deep learning techniques. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). https://doi.org/10.1007/978-3-319-49445-6_1

  86. Makhdoom I, Abolhasan M, Lipman J, Liu RP, Ni W (2019) Anatomy of threats to the internet of things. IEEE Commun Surveys Tutorials. https://doi.org/10.1109/COMST.2018.2874978

    Article  Google Scholar 

  87. Makkar A, Kumar N (2020) An efficient deep learning-based scheme for web spam detection in IoT environment. Future Gener Comput Syst. https://doi.org/10.1016/j.future.2020.03.004

  88. Marjani M, Nasaruddin F, Gani A, Karim A, Hashem IAT, Siddiqa A, Yaqoob I (2017) Big IoT data analytics: architecture, opportunities, and open research challenges. IEEE Access. https://doi.org/10.1109/ACCESS.2017.2689040

    Article  Google Scholar 

  89. McLaughlin N, Del Rincon JM, Kang BJ, Yerima S, Miller P, Sezer S, Safaei Y, Trickel E, Zhao Z, Doupe A, Ahn GJ (2017) Deep android malware detection. In: CODASPY 2017—Proceedings of the 7th ACM conference on data and application security and privacy. https://doi.org/10.1145/3029806.3029823

  90. Mendez Mena D, Papapanagiotou I, Yang B (2018) Internet of things: Survey on security. https://doi.org/10.1080/19393555.2018.1458258

  91. Mikołajczyk A, Grochowski M (2018) Data augmentation for improving deep learning in image classification problem. In: 2018 international interdisciplinary PhD workshop, IIPhDW 2018. https://doi.org/10.1109/IIPHDW.2018.8388338

  92. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. https://doi.org/10.1016/j.adhoc.2012.02.016

  93. Mishra AK, Tripathy AK, Puthal D, Yang LT (2019) Analytical model for sybil attack phases in internet of things. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2843769

    Article  Google Scholar 

  94. Mishra P, Pilli ES, Varadharajan V, Tupakula U (2017) Intrusion detection techniques in cloud environment: a survey. https://doi.org/10.1016/j.jnca.2016.10.015

  95. Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for IoT big data and streaming analytics: a survey. https://doi.org/10.1109/COMST.2018.2844341

  96. Mohammadi S, Mirvaziri H, Ghazizadeh-Ahsaee M, Karimipour H (2019) Cyber intrusion detection by combined feature selection algorithm. J Inform Sec Appl. https://doi.org/10.1016/j.jisa.2018.11.007

    Article  Google Scholar 

  97. Moosavi SR, Nguyen Gia T, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) 6th international conference on ambient systems, networks and technologies (ANT 2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci

    Google Scholar 

  98. Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput. https://doi.org/10.1109/TETC.2016.2606384

    Article  Google Scholar 

  99. Namvar N, Saad W, Bahadori N, Kelley B (2016) Jamming in the internet of things: a game-theoretic perspective. In: 2016 IEEE global communications conference, GLOBECOM 2016—Proceedings. https://doi.org/10.1109/GLOCOM.2016.7841922

  100. Neerugatti V, Reddy ARM (2019) Machine learning based technique for detection of rank attack in RPL based internet of things networks. Int J Innov Technol Explor Eng. https://doi.org/10.35940/ijitee.I3044.0789S319

    Article  Google Scholar 

  101. Nobakht M, Sivaraman V, Boreli R (2016) A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow. In: Proceedings of 2016 11th international conference on availability, reliability and security, ARES 2016. https://doi.org/10.1109/ARES.2016.64

  102. Nord JH, Koohang A, Paliszkiewicz J (2019) The Internet of Things: review and theoretical framework. https://doi.org/10.1016/j.eswa.2019.05.014

  103. Nweke HF, Teh YW, Al-garadi MA, Alo UR (2018) Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: state of the art and research challenges. https://doi.org/10.1016/j.eswa.2018.03.056

  104. Ozay M, Esnaola I, Yarman Vural FT, Kulkarni SR, Poor HV (2016) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst. https://doi.org/10.1109/TNNLS.2015.2404803

    Article  MathSciNet  Google Scholar 

  105. Rana R (2017) Man-in-the-middle attack. Int J Rec Adv Eng Res. https://doi.org/10.24128/ijraer.2017.bc45wx

    Article  Google Scholar 

  106. Rayan Z, Alfonse M, Salem ABM (2018) Machine learning approaches in smart health. Procedia Comput Sci. https://doi.org/10.1016/j.procs.2019.06.052

  107. Razzaque MA, Milojevic-Jevric M, Palade A, Cla S (2016) Middleware for internet of things: a survey. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2015.2498900

    Article  Google Scholar 

  108. ur Rehman A, Rehman SU, Raheem H (2019) Sinkhole attacks in wireless sensor networks: a survey. Wirel Pers Commun. https://doi.org/10.1007/s11277-018-6040-7

  109. Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw. https://doi.org/10.1109/MNET.2017.1700030

    Article  Google Scholar 

  110. Restuccia F, D’Oro S, Melodia T (2018) Securing the internet of things in the age of machine learning and software-defined networking. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2018.2846040

    Article  Google Scholar 

  111. Riahi Sfar A, Natalizio E, Challal Y, Chtourou Z (2018) A roadmap for security challenges in the Internet of Things. Dig Commun Netw. https://doi.org/10.1016/j.dcan.2017.04.003

    Article  Google Scholar 

  112. Rieback MR, Crispo B, Tanenbaum AS (2006) Is your cat infected with a computer virus? In: Proceedings of fourth annual IEEE international conference on pervasive computing and communications, PerCom 2006. https://doi.org/10.1109/PERCOM.2006.32

  113. Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw. https://doi.org/10.1016/j.comnet.2012.12.018

    Article  Google Scholar 

  114. Saggi MK, Jain S (2018) A survey towards an integration of big data analytics to big insights for value-creation. Inf Process Manage. https://doi.org/10.1016/j.ipm.2018.01.010

    Article  Google Scholar 

  115. Saied A, Overill RE, Radzik T (2016) Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing. https://doi.org/10.1016/j.neucom.2015.04.101

    Article  Google Scholar 

  116. Senigagliesi L, Baldi M, Gambi E (2020) Physical layer authentication techniques based on machine learning with data compression. In: 2020 IEEE conference on communications and network security, CNS 2020. https://doi.org/10.1109/CNS48642.2020.9162280

  117. Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. https://doi.org/10.1155/2017/9324035

  118. Sezer OB, Dogdu E, Ozbayoglu AM (2018) Context-aware computing, learning, and big data in internet of things: a survey. https://doi.org/10.1109/JIOT.2017.2773600

  119. Shi C, Liu J, Liu H, Chen Y (2017) Smart User authentication through actuation of daily activities leveraging wifi-enabled IoT. In: Proceedings of the international symposium on mobile ad hoc networking and computing (MobiHoc). https://doi.org/10.1145/3084041.3084061

  120. Shukla P (2018) ML-IDS: a machine learning approach to detect wormhole attacks in Internet of Things. In: 2017 intelligent systems conference, IntelliSys 2017. https://doi.org/10.1109/IntelliSys.2017.8324298

  121. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in Internet of things: the road ahead. https://doi.org/10.1016/j.comnet.2014.11.008

  122. Singh A, Payal A, Bharti S (2019) A walkthrough of the emerging IoT paradigm: visualizing inside functionalities, key features, and open issues. https://doi.org/10.1016/j.jnca.2019.06.013

  123. Spachos P, Papapanagiotou I, Plataniotis KN (2018) Microlocation for smart buildings in the era of the Internet of Things: a survey of technologies, techniques, and approaches. IEEE Sig Process Mag. https://doi.org/10.1109/MSP.2018.2846804

    Article  Google Scholar 

  124. Srivastava S, Singh M, Gupta S (2018) Wireless sensor network: a survey. In: 2018 international conference on automation and computational engineering, ICACE 2018. https://doi.org/10.1109/ICACE.2018.8687059

  125. Steinhubl SR, Muse ED, Topol EJ (2015) The emerging field of mobile health. https://doi.org/10.1126/scitranslmed.aaa3487

  126. Su J, Vargas DV, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evol Comput. https://doi.org/10.1109/TEVC.2019.2890858

    Article  Google Scholar 

  127. Su X, Zhang D, Li W, Zhao K (2016) A deep learning approach to android malware feature learning and detection. In: Proceedings of 15th IEEE international conference on trust, security and privacy in computing and communications, 10th IEEE international conference on big data science and engineering and 14th IEEE international symposium on parallel and distributed Proce. https://doi.org/10.1109/TrustCom.2016.0070

  128. Suma N, Samson SR, Saranya S, Shanmugapriya G, Subhashri R (2017) IOT based smart agriculture monitoring system. Int J Rec Innov Trends Comput Commun

    Google Scholar 

  129. Suthaharan S (2014) Big data classification: problems and challenges in network intrusion prediction with machine learning. Perform Eval Rev. https://doi.org/10.1145/2627534.2627557

  130. Syed NF, Baig Z, Ibrahim A, Valli C (2020) Denial of service attack detection through machine learning for the IoT. J Inform Telecommun. https://doi.org/10.1080/24751839.2020.1767484

    Article  Google Scholar 

  131. Tahsien SM, Karimipour H, Spachos P (2020) Machine learning based solutions for security of Internet of Things (IoT): a survey. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2020.102630

    Article  Google Scholar 

  132. Tarricone L, Grosinger J (2020) Augmented RFID technologies for the internet of things and beyond. Sensors 20(4):987. https://doi.org/10.3390/s20040987

    Article  Google Scholar 

  133. Thamilarasu G, Chawla S (2019) Towards deep-learning-driven intrusion detection for the internet of things. Sensors (Switzerland). https://doi.org/10.3390/s19091977

    Article  Google Scholar 

  134. Thing VL (2017) IEEE 802.11 network anomaly detection and attack classification: a deep learning approach. In: IEEE wireless communications and networking conference, WCNC. https://doi.org/10.1109/WCNC.2017.7925567

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anamika Chauhan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chauhan, A., Sharma, K. (2023). A Review of IoT Security Solutions Using Machine Learning and Deep Learning. In: Swaroop, A., Polkowski, Z., Correia, S.D., Virdee, B. (eds) Proceedings of Data Analytics and Management. ICDAM 2023. Lecture Notes in Networks and Systems, vol 787. Springer, Singapore. https://doi.org/10.1007/978-981-99-6550-2_10

Download citation

Publish with us

Policies and ethics