Abstract
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at high risk and cause harm to the affiliated users. This paper emphasizes such potential security challenges and proposes possible solutions in the field of IoT Security, mostly focusing on automated or adaptive networks. Considering the fact that IoT became widely adopted, the intricacies in the security field tend to grow expeditiously. Therefore, it is necessary for businesses to adopt new security protocols and to the notion of automated network security practices driven by analytic and intelligence, to ensure a prompt response to attacks there by protecting the privacy and data integrity of users. The main prospect of this paper is to highlight some extensive reviews on standardizing security solutions by means of adaptive networks, a programmable environment that is driven by analytical and intelligence which expands on the autonomous networking concepts and transforms static networks into a dynamic environment. Furthermore, this paper also inspects some of the Machine Learning techniques that can be used to enhance security and compares different techniques to find the best fit to IoT.
Article PDF
Avoid common mistakes on your manuscript.
References
N.M. Karie, N.M. Sahri, P. Haskell-Dowland, IoT threat detection advances, challenges and future directions, 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), IEEE, Sydney, NSW, Australia, 2020, pp. 22–29.
M. Hamdi, H. Abie, Game-based adaptive security in the internet of things for ehealth, 2014 IEEE International Conference on Communications (ICC), IEEE, Sydney, NSW, Australia, 2014, pp. 920–925.
U. Farooq, N. Ul Hasan, I. Baig, N. Shehzad, Efficient adaptive framework for securing the Internet of Things devices, J. Wireless Com. Network. 2019 (2019), 210. [4] E.K. Wang, T.Y. Wu, C.M. Chen, Y. Ye, Z. Zhang, F. Zou, MDPAS: Markov decision process based adaptive security for sensors in internet of things, in: H. Sun, C.Y. Yang, C.W. Lin, J.S. Pan, V. Snasel, A. Abraham (Eds.), Genetic and Evolutionary Computing, Springer, Cham, 2011, pp. 389–397.
E.K. Wang, T.Y. Wu, C.M. Chen, Y. Ye, Z. Zhang, F. Zou, MDPAS: Markov decision process based adaptive security for sensors in internet of things, in: H. Sun, C.Y. Yang, C.W. Lin, J.S. Pan, V. Snasel, A. Abraham (Eds.), Genetic and Evolutionary Computing, Springer, Cham, 2011, pp. 389–397.
G. Gallopeni, B. Rodrigues, M. Franco, B. Stiller, A practical analysis on Mirai Botnet traffic, 2020 IFIP Networking Conference (Networking), IEEE, Paris, France, 2020, pp. 667–668.
S. Cook, DDoS attack statistics and facts for 2018-2021, Available from: https://www.comparitech.com/blog/information-security/ddos-statistics-facts/.
U. Farooq, M. Faisal Aslam, Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGA, J. King Saud Univ. Comput. Inf. Sci. 29 (2017), 295–302.
J. Zhang, Z. Wang, Z. Yang, Q. Zhang, Proximity based IoT device authentication, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, IEEE, Atlanta, GA, USA, 2017, pp. 1–9.
M.U. Farooq, M. Waseem, A. Khairi, S. Mazhar, A critical analysis on the security concerns of internet of things (IoT), Int. J. Comput. Appl. 111 (2015), 1–6.
M.M. Shurman, R.M. Khrais, A.A. Yateem, IoT denial-of-service attack detection and prevention using hybrid IDS, 2019 International Arab Conference on Information Technology (ACIT), IEEE, Al Ain, United Arab Emirates, 2019, pp. 252–254.
I. Makarenko, S. Semushin, S. Suhai, S.M. Ahsan Kazmi, A. Oracevic, R. Hussain, A comparative analysis of cryptographic algorithms in the internet of things, 2020 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), IEEE, Moscow, Russia, 2020, pp. 1–8.
D.A.F. Saraiva, V.R.Q. Leithardt, D. de Paula, A.S. Mendes, G.V. González, P. Crocker, PRISEC: comparison of symmetric key algorithms for IoT devices. Sensors (Basel) 19 (2019), 4312.
R. Nataraj, Adaptive security architecture, Available from: https://medium.com/@rk-root/adaptive-security-architecture-4c152a0164a.
M.M. Hossain, M. Fotouhi, R. Hasan, Towards an analysis of security issues, challenges, and open problems in the internet of things, 2015 IEEE World Congress on Services, IEEE, New York, NY, USA, 2015, pp. 21–28.
D. Pandey, P. Pandey, Approximate Q-learning: an introduction, 2010 Second International Conference on Machine Learning and Computing, IEEE, Bangalore, India, 2010, pp. 317–320.
L. Xiao, Q. Yan, W. Lou, G. Chen, Y. Thomas Hou, Proximity-based security techniques for mobile users in wireless networks, IEEE Trans. Inform. Forensics Security 8 (2013), 2089–2100.
P.M. Varela, J. Hong, T. Ohtsuki, X. Qin, IGMM-based co-localization of mobile users with ambient radio signals, IEEE Internet Things J. 4 (2017), 308–319.
L. Xiao, X. Wan, X. Lu, Y. Zhang, D. Wu, IoT security techniques based on machine learning: how do IoT devices use AI to enhance security?, IEEE Signal Process. Mag. 35 (2018), 41–49.
L. Xiao, Y. Li, G. Han, G. Liu, W. Zhuang, PHY-layer spoofing detection with reinforcement learning in wireless networks, IEEE Trans. Veh. Technol. 65 (2016), 10037–10047.
L. Xiao, X. Wan, Z. Han, PHY-layer authentication with multiple landmarks with reduced overhead, IEEE Trans. Wirel. Commun. 17 (2018), 1676–1687.
I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, H. Ming, AD-IoT: anomaly detection of IoT cyberattacks in smart city using machine learning, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), IEEE, Las Vegas, NV, USA, 2019, pp. 305–310,
V. Justin, N. Marathe, N. Dongre, Hybrid IDS using SVM classifier for detecting DoS attack in MANET application, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Palladam, India, 2017, pp. 775–778.
R. Ravinder Reddy, B. Kavya, Y. Ramadevi, A survey on SVM classifiers for intrusion detection, Int. J. Comput. Appl. 98 (2014), 38–44.
P. Illavarason, B. Kamachi Sundaram, A study of intrusion detection system using machine learning classification algorithm based on different feature selection approach, 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE, Palladam, India, 2019, pp. 295–299.
K. Rani, H. Roopa, V. Vani, Prediction of network intrusion using an efficient feature selection method, 2019 International Conference on Intelligent Computing and Control Systems (ICCS), IEEE, Madurai, India, 2019, pp. 597–601.
W. Zhou, Y. Cao, H. Qi, J. Wang, An effective network intrusion detection framework based on learning to hash, 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), IEEE, Tianjin, China, 2019, pp. 489–493.
I. Ramadhan, P. Sukarno, M.A. Nugroho, Comparative analysis of K-nearest neighbor and decision tree in detecting distributed denial of service, 2020 8th International Conference on Information and Communication Technology (ICoICT), IEEE, Yogyakarta, Indonesia, 2020, pp. 1–4.
J. Wang, Q. Yang, D. Ren, An intrusion detection algorithm based on decision tree technology, 2009 Asia-Pacific Conference on Information Processing, IEEE, Shenzhen, China, 2009, pp. 333–335.
S.L. Salzberg, C4.5: programs for machine learning by J. Ross Quinlan. Morgan Kaufmann Publisher, Inc., 1993, Mach. Learn. 16 (1994), 235–240.
S.M. Taghavinejad, M. Taghavinejad, L. Shahmiri, M. Zavvar, M.H. Zavvar, Intrusion detection in IoT-based smart grid using hybrid decision tree, 2020 6th International Conference on Web Research (ICWR), IEEE, Tehran, Iran, 2020, pp. 152–156.
G.A. Mills-Tettey, A. Stentz, M.B. Dias, The dynamic Hungarian algorithm for the assignment problem with changing costs, Technical Report, Robotics Institute, Carnegie Mellon University, Pittsburgh, PA, 2007.
C. Musca, E. Mirica, R. Deaconescu, Detecting and analyzing zero-day attacks using honeypots, 2013 19th International Conference on Control Systems and Computer Science, IEEE, Bucharest, Romania, 2013, pp. 543–548.
R. Vishwakarma, A.K. Jain, A honeypot with machine learning based detection framework for defending IoT based Botnet DDoS attacks, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, Tirunelveli, India, 2019, pp. 1019–1024.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC 4.0 license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Goli, T., Kim, Y. A Survey on Securing IoT Ecosystems and Adaptive Network Vision. Int J Netw Distrib Comput 9, 75–85 (2021). https://doi.org/10.2991/ijndc.k.210617.001
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijndc.k.210617.001