Skip to main content
Log in

Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The term "Internet of things (IoT)” refers to a network in which data from all connected devices may be gathered, analyzed, and modified as per requirements to offer new services. IoT devices require a constant Internet connection to exchange data. The volume and speed of data continue to grow quickly with the expansion of IoT devices nowadays. IoT systems frequently use messaging protocols to exchange IoT data. IoT security must be established using advanced techniques as it is vulnerable to many threats. The primary objectives of IoT security are to protect customer privacy, data integrity, and confidentiality, as well as the security of assets and IoT devices and the accessibility of services provided by an IoT ecosystem. In this regard, the IoT must meet user demands while consuming the least number of resources, including money, vitality, and time. The proposed research work is organized into numerous categories to make it easier for researchers and readers to solve and understand security problems in IOT devices. The categories “Features” are identified from available literature, and a specific criterion is adopted for choosing alternatives. The entropy approach to determine criterion relevance by calculating features weights is utilized. The second method “EDAS” approach is used and the alternatives are sorted chronologically based on the criterion weights for easy identification and selection of an effective alternative. Finally, all alternatives are precisely analyzed and ranked. Using our research method, various appropriate features are extracted and are evaluated to solve security issue within IoT devices. The most significant features are ranked to help researchers and manufacturers to focus on security-related issues in IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Data availability

The dataset used for this study is available on reasonable request from the corresponding author.

References

  1. Whitmore A, Agarwal A, Da Xu L (2015) The Internet of Things—a survey of topics and trends. Inf Syst Front 17:261–274

    Article  Google Scholar 

  2. Feki MA et al (2013) The internet of things: the next technological revolution. Computer 46(2):24–25

    Article  Google Scholar 

  3. Mosenia A, Jha NK (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602

    Article  Google Scholar 

  4. Ray PP (2018) A survey on Internet of Things architectures. J King Saud Univ-Comput Inf Sci 30(3):291–319

    Google Scholar 

  5. Perera C et al (2014) A survey on internet of things from industrial market perspective. IEEE Access 2:1660–1679

    Article  Google Scholar 

  6. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58:49–69

    Article  Google Scholar 

  7. Li S, Xu LD, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17:243–259

    Article  Google Scholar 

  8. Wortmann F, Flüchter K (2015) Internet of things: technology and value added. Bus Inf Syst Eng 57:221–224

    Article  Google Scholar 

  9. Zanella A et al (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32

    Article  Google Scholar 

  10. Zheng J et al (2011) The internet of things [Guest Editorial]. IEEE Commun Mag 49(11):30–31

    Article  Google Scholar 

  11. Cao J, Zhu T, Ma R, Guo Z, Zhang Y, Li H (2022) A software-based remote attestation scheme for internet of things devices. IEEE Trans Dependable Secure Comput 20:1422–1434

    Article  Google Scholar 

  12. Guo Y, Xie H, Wang C, Jia X (2021) Enabling privacy-preserving geographic range query in fog-enhanced iot services. IEEE Trans Dependable Secure Comput 19(5):3401–3416

    Article  Google Scholar 

  13. Hayat RF, Aurangzeb S, Aleem M, Srivastava G, Lin JC (2022) ML-DDoS: a blockchain-based multilevel DDoS mitigation mechanism for IoT environments. IEEE Trans Eng Manag. https://doi.org/10.1109/TEM.2022.3170519

    Article  Google Scholar 

  14. Heer T et al (2011) Security challenges in the IP-based internet of things. Wirel Pers Commun 61:527–542

    Article  Google Scholar 

  15. Xing L (2020) Reliability in Internet of Things: current status and future perspectives. IEEE Internet Things J 7(8):6704–6721

    Article  Google Scholar 

  16. Baldini G et al (2018) Ethical design in the internet of things. Sci Eng Ethics 24:905–925

    Article  PubMed  Google Scholar 

  17. Sanislav T et al (2021) Energy harvesting techniques for internet of things (IoT). IEEE Access 9:39530–39549

    Article  Google Scholar 

  18. Neisse R et al (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76

    Article  Google Scholar 

  19. Lv Z (2020) Virtual reality in the context of Internet of Things. Neural Comput Appl 32(13):9593–9602

    Article  Google Scholar 

  20. Kumar S, Tiwari P, Zymbler M (2019) Internet of Things is a revolutionary approach for future technology enhancement: a review. J Big Data 6(1):1–21

    Article  Google Scholar 

  21. Khan HU, Sohail M, Ali F, Nazir S, Ghadi YY, Ullah I (2023) Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Phys Commun 1(59):102084

    Article  Google Scholar 

  22. Golmaryami M, Taheri R, Pooranian Z, Shojafar M, Xiao P (2022) SETTI: a self-supervised adversarial malware detection architecture in an IoT environment. ACM Trans Multimed Comput Commun Appl 18(2):1–21

    Article  Google Scholar 

  23. Ali MS et al (2018) Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tutor 21(2):1676–1717

    Article  Google Scholar 

  24. Sun C (2012) Application of RFID technology for logistics on internet of things. AASRI Proc 1:106–111

    Article  Google Scholar 

  25. George G, Thampi SM (2020) Combinatorial analysis for securing IoT-assisted Industry 4.0 applications from vulnerability-based attacks. IEEE Trans Ind Inform 18(1):3–15

    Article  Google Scholar 

  26. Alam S, Chowdhury MM, Noll J (2011) Interoperability of security-enabled internet of things. Wirel Pers Commun 61:567–586

    Article  Google Scholar 

  27. Mezzanotte P et al (2021) Innovative RFID sensors for Internet of Things applications. IEEE J Microw 1(1):55–65

    Article  Google Scholar 

  28. Huckle S et al (2016) Internet of things, blockchain and shared economy applications. Proc Comput Sci 98:461–466

    Article  Google Scholar 

  29. Tsai C-W, Lai C-F, Vasilakos AV (2014) Future internet of things: open issues and challenges. Wirel Netw 20:2201–2217

    Article  Google Scholar 

  30. Brooks C et al (2018) A component architecture for the internet of things. Proc IEEE 106(9):1527–1542

    Article  Google Scholar 

  31. Liang F et al (2019) Machine learning for security and the internet of things: the good, the bad, and the ugly. IEEE Access 7:158126–158147

    Article  Google Scholar 

  32. Al-Qaseemi SA, Almulhim HA, Almulhim MF, and Chaudhry SR (2016) IoT Architecture Challenges and Issues: Lack of Standardization. In: 2016 Future Technologies Conference (FTC), pp. 731–738. IEEE

  33. Khan HU, Sohail M, Nazir S (2022) Features-based IoT security authentication framework using statistical aggregation, entropy, and MOORA approaches. IEEE Access 10:109326–109339

    Article  Google Scholar 

  34. Abellana DPM, Roxas RR, Lao DM, Mayol PE, Lee S (2022) Ensemble feature selection in binary machine learning classification: A novel application of the evaluation based on distance from average solution (EDAS) method. Math Probl Eng 2022:1–13

    Article  Google Scholar 

Download references

Funding

This research received no external funding.

Author information

Authors and Affiliations

Authors

Contributions

I.U. was involved in conceptualization, data curation, methodology, and hardware. I.U., A.N., and F.A. were involved in formal analysis. I.U. and A.N. contributed to software; S.N. was involved in supervision; F.A. and Y.Y.G. were involved in visualization; I.U. and F.A. were involved in writing—original draft; and A.N., F.A., S.N., Y.Y.G., and N.A. were involved in writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Asra Noor.

Ethics declarations

Conflict of interest

The authors declare no conflict of interests.

Ethical approval

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, I., Noor, A., Nazir, S. et al. Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features. J Supercomput 80, 5870–5899 (2024). https://doi.org/10.1007/s11227-023-05685-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05685-3

Keywords

Navigation