Abstract
The use of the Internet of things (IoT) devices is growing rapidly in the current industrial market. Integrating these devices into the network system has subjected the information to Cybersecurity attacks putting the market of IoT technology at risk. As a result, accurate protection algorithms and efficient monitoring systems need to be developed. This paper proposes a new framework design relays on a stochastic measurement of determining parameters based on a novel adaptive deep learning (ADL) algorithm for industrial manufacturing such as transportation, energy. The new framework will be designed to incorporate an element of randomness as opposed to deterministic frameworks. The implemented method considered the network forensic systems and intrusion detection (ID); therefore, the prediction model is set up to alert the administrator about the system status. The framework is proposed based on five prioritized protection stages. The developed model tested on the Bot-IoT dataset, which is well-structured and valid for training, as confirmed by literature. The result has shown the ability to simulate the IoT network traffic along with risk assessment against different types of attacks by using the ADL algorithm. The new framework will be designed to improve computational efficiency by being able to adjust their structure based on the inputs. The research contributions are that it will help in the development of an algorithm which can minimize traffic accidents, improve traffic flow, minimize energy wastes, and save costs of controlling traffic flow. Findings show that using this new algorithm has 100% accuracy, which makes it an excellent choice for the detection of threats and errors.
Similar content being viewed by others
References
Abdur, M., Habib, S., Ali, M., & Ullah, S. (2017). Security issues in the internet of things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/ijacsa.2017.080650
Afandi, F., & Sarno, R. (2020). Android application for advanced security system based on voice recognition, biometric authentication, and internet of things. In Proceeding - ICoSTA 2020: 2020 International Conference on Smart Technology and Applications: Empowering Industrial IoT by Implementing Green Technology for Sustainable Development. https://doi.org/10.1109/ICoSTA48221.2020.1570615292.
Al Shorman, A., Faris, H., & Aljarah, I. (2020). Unsupervised intelligent system based on one class support vector machine and Grey Wolf optimization for IoT botnet detection. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01387-y
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys and Tutorials, 17(4), 2347–2376. https://doi.org/10.1109/COMST.2015.2444095
Alharam, A. K., & El-Madany, W. (2017). Complexity of cyber security architecture for IoT healthcare industry: A comparative study. In Proceedings - 2017 5th International Conference on Future Internet of Things and Cloud Workshops, W-FiCloud 2017, https://doi.org/10.1109/FiCloudW.2017.100.
Almiani, M., AbuGhazleh, A., Al-Rahayfeh, A., Atiewi, S., & Razaque, A. (2020). Deep recurrent neural network for IoT intrusion detection system. Simulation Modelling Practice and Theory. https://doi.org/10.1016/j.simpat.2019.102031
Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., & Ming, H. (2019). AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019, https://doi.org/10.1109/CCWC.2019.8666450.
Asante, M., & Akomea-Agyin, K. (2008). Analysis of Security Vulnerabilities in Wifi-Protected Access Pre-Shared Key (WPA-PSK/ WPA2-PSK). International Research Journal of Engineering and Technology.
Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications. https://doi.org/10.1007/s11277-011-0288-5
Chatfield, A. T., & Reddick, C. G. (2019). A framework for Internet of Things-enabled smart government: A case of IoT cybersecurity policies and use cases in U.S. federal government. Gov. Inf. Q., 2019, https://doi.org/10.1016/j.giq.2018.09.007.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2014.2300753
De Coninck, E., Verbelen, T., Vankeirsbilck, B., Bohez, S., Leroux, S., & Simoens, P. (2015). DIANNE: Distributed artificial neural networks for the internet of things. In M4IOT 2015 - Proceedings of the 2nd ACM Workshop on Middleware for Context-Aware Applications in the IoT, in conjunction with ACM/IFIP/USENIX ACM International Middleware Conference. https://doi.org/10.1145/2836127.2836130.
Djenna, A., & Saidouni, D. E. (2019). Cyber attacks classification in IoT-based-healthcare infrastructure. In 2018 2nd Cyber Security in Networking Conference, CSNet 2018. https://doi.org/10.1109/CSNET.2018.8602974.
E. | E. P. R. Service (2020). Blockchain for supply chains and international trade. [Online]. Available: https://www.europarl.europa.eu/RegData/etudes/STUD/2020/641544/EPRS_STU(2020)641544_EN.pdf.
Elijah, O., Rahman, T. A., Orikumhi, I., Leow, C. Y., & Hindia, M. N. (2018). An overview of internet of things (IoT) and data analytics in agriculture: benefits and challenges. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2844296
Evans, M. (2018). IoT will have the most impact on business in the next five years, survey says. [Online]. Available: https://www.forbes.com/sites/michelleevans1/2018/05/31/iot-will-have-the-most-impact-on-business-in-the-next-five-years-survey-says/?sh=6165a8a15a3d.
Gao, Z., & Wang, X. (2019). Deep learning. In EEG Signal Processing and Feature Extraction.
Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential solutions. Comput. Networks. https://doi.org/10.1016/j.comnet.2019.107094
Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things. https://doi.org/10.1016/j.iot.2019.100059
Hodo, E. et al. (2016). Threat analysis of IoT networks using artificial neural network intrusion detection system. In 2016 International Symposium on Networks, Computers and Communications, ISNCC 2016, https://doi.org/10.1109/ISNCC.2016.7746067.
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks. https://doi.org/10.1007/s11276-014-0761-7
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection. https://doi.org/10.1016/j.ijcip.2019.01.001
Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Generation Computer Systems, 100, 779–796. https://doi.org/10.1016/j.future.2019.05.041
Kumagai, K. (2020). Anomaly detection of pedestrian flow: A machine learning method for monitoring-data of visitors to a building. Collective Dynamics. https://doi.org/10.17815/cd.2020.31
Lecun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature. https://doi.org/10.1038/nature14539
Lezzi, M., Lazoi, M., & Corallo, A. (2018). Cybersecurity for Industry 4.0 in the current literature: A reference framework. Computers in Industry, 103, 97–110. https://doi.org/10.1016/j.compind.2018.09.004
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2017.2683200
Liou, S. W., Kurniadi, D., Zheng, B. R., Xie, W. Q., Tien, C. J., & Jong, G. J. (2018). Classification of biomedical signal on IoT platform using support vector machine. In Proceedings of 4th IEEE International Conference on Applied System Innovation 2018, ICASI 2018, https://doi.org/10.1109/ICASI.2018.8394304.
Ltd, W. S. S. (2020a). Emerging Consensus for an Industrial Control System (ICS) Security Approach,” Whitepapers & eBooks
Ltd, W. S. S. (2020b). Unidirectional Cloud Connect,” IIoT While Eliminating Risks of Cyberattack, 2020. https://waterfall-security.com/unidirectional-cloudconnect/.
Lu, Y., & Da Xu, L. (2019). Internet of things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2869847
Mahmoud R., Yousuf, T., Aloul, F., & Zualkernan, I. (2016). “Internet of things (IoT) security: Current status, challenges and prospective measures. In 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015. https://doi.org/10.1109/ICITST.2015.7412116.
Manvi, S. S., & Krishna Shyam, G. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2013.10.004
Mukkamala, S., Sung, A., & Abraham, A. (2005). Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools. Enhancing Computer Security with Smart Technology
Nasiri, S., Sadoughi, F., Tadayon, M. H., & Dehnad, A. (2019). Security requirements of internet of things-based healthcare system: A survey study. Acta Informatica Medica. https://doi.org/10.5455/aim.2019.27.253-258
Ngu, A. H., Gutierrez, M., Metsis, V., Nepal, S., & Sheng, Q. Z. (2017). IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2016.2615180
Nord, J. H., Koohang, A., & Paliszkiewicz, J. (2019). The Internet of Things: Review and theoretical framework. Expert Systems with Applications, 133, 97–108. https://doi.org/10.1016/j.eswa.2019.05.014
Pahl, C. (2015). Containerization and the PaaS Cloud. IEEE Cloud Computing. https://doi.org/10.1109/MCC.2015.51
Rezaei, R., Chiew, T. K., Lee, S. P., & Shams Aliee, Z. (2014). A semantic interoperability framework for software as a service systems in cloud computing environments. Expert Systems with Applications. https://doi.org/10.1016/j.eswa.2014.03.020
Serror, M., Henze, M., Hack, S., Schuba, M., & Wehrle, K. (2018). Towards in-network security for smart homes. ACM International Conference Proceeding Series. https://doi.org/10.1145/3230833.3232802
Siemens, “Cybersecurity at Siemens,” security for all businesses, 2020. https://new.siemens.com/global/en/company/topic-areas/cybersecurity.html.
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications. https://doi.org/10.1016/j.jnca.2014.01.014
Yoon, S., Park, H., & Yoo, H. S. (2015). Security issues on smarthome in IoT environment. Lecture Notes in Electrical Engineering. https://doi.org/10.1007/978-3-662-45402-2_97
Yılmaz, E. N., & Gönen, S. (2018). Attack detection/prevention system against cyber attack in industrial control systems. Computers & Security. https://doi.org/10.1016/j.cose.2018.04.004
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alattas, K., Mardani, A. A novel extended Internet of things (IoT) Cybersecurity protection based on adaptive deep learning prediction for industrial manufacturing applications. Environ Dev Sustain 24, 9464–9480 (2022). https://doi.org/10.1007/s10668-021-01835-w
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10668-021-01835-w