Abstract
The Internet of Things (IoT) would contain a severe, well organized, and economical and communication effect in our everyday life. Links in IoT channels usually controlled by resources, where cyber-attacks are more likely. Extensive works have proposed to access security and secret issues on IoT channels to address these problems. However, the new characteristics of IoT links are not sufficient to link the top security concerns of IoT systems to present descriptions. Machine Learning (ML) and Deep Learning (DL) methods could give more knowledge of IoT devices that could help overcome different previous security issues. In this chapter, we properly debated security specifications and present security solutions for IoT systems. Then, we provide in-depth of the present ML and DL methods related to additional safety in IoT systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Liu Y, Pi D (2017) A novel Kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11(8)
Modiri E, Azmoodeh A, Dehghantanha A, Karimipour H (2018) Fuzzy pattern tree for edge attack detection and categorization. J Syst Archit 9:1–15
Karimipour H, Dinavahi V (2017) On false data injection attack against dynamic state estimation on smart power grids. In: 2017 IEEE international conference on smart energy grid engineering (SEGE). IEEE, pp 388–393
Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for the consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 29–35
Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 635–638
Gondhi NK, Gupta A (2017) Survey on machine learning-based scheduling in cloud computing. In: Proceedings of the 2017 international conference on intelligent systems, metaheuristics & swarm intelligence, pp 57–61
Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184–1199
Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in the internet of things. In: 2017 IEEE 15th international conference on dependable, autonomic and secure computing, 15th international conference on pervasive intelligence and computing, 3rd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, pp 836–843
Xie M, Huang M, Bai Y, Hu Z (2017) The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things. J Electr Comput Eng
Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2087–2091
Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687
Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560
Shi C, Liu J, Liu H, Chen Y (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing, pp 1–10
Kiran BN, Radheshyam SG, Sagar N, Balthar SA, Shrinath (2018) Security for IoT systems using machine learning. Int J Adv Res Innov Ideas Educ (IJRIIE) 4(2):2707–2710
Alam MS, Husain D, Naqvi SK, Kumar P (2018) IOT security through machine learning and homographic encryption technique. In: International conference on new trends in engineering & technology (ICNTET), Chennai
Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R (2018) Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on the internet of things (ICIOT). IEEE, pp 57–64
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using in-depth learning approach for the internet of things. Futur Gener Comput Syst 82:761–768
Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184
Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp 506–509
Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for IoT system based on a transfer learning algorithm. Clust Comput 22(4):9889–9904
Khan F et al (2020) A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 8:119710–119719
Khan F et al (2020) Detecting malicious URLs using binary classification through Ada boost algorithm. Int J Electr Comput Eng 10:2088–8708
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Mon, S.F.A., Jones, G.M., Winster, S.G. (2023). Role of Machine Learning and Deep Learning Applications in the Internet of Things (IoT) Security. In: Dhanaraj, R.K., Rawal, B.S., Krishnamoorthi, S., Balusamy, B. (eds) Artificial Intelligence in IoT and Cyborgization. Studies in Computational Intelligence, vol 1103. Springer, Singapore. https://doi.org/10.1007/978-981-99-4303-6_3
Download citation
DOI: https://doi.org/10.1007/978-981-99-4303-6_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-4302-9
Online ISBN: 978-981-99-4303-6
eBook Packages: EngineeringEngineering (R0)