Skip to main content

Role of Machine Learning and Deep Learning Applications in the Internet of Things (IoT) Security

  • Chapter
  • First Online:
Artificial Intelligence in IoT and Cyborgization

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1103))

  • 91 Accesses

Abstract

The Internet of Things (IoT) would contain a severe, well organized, and economical and communication effect in our everyday life. Links in IoT channels usually controlled by resources, where cyber-attacks are more likely. Extensive works have proposed to access security and secret issues on IoT channels to address these problems. However, the new characteristics of IoT links are not sufficient to link the top security concerns of IoT systems to present descriptions. Machine Learning (ML) and Deep Learning (DL) methods could give more knowledge of IoT devices that could help overcome different previous security issues. In this chapter, we properly debated security specifications and present security solutions for IoT systems. Then, we provide in-depth of the present ML and DL methods related to additional safety in IoT systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu Y, Pi D (2017) A novel Kernel SVM algorithm with game theory for network intrusion detection. KSII Trans Internet Inf Syst 11(8)

    Google Scholar 

  2. Modiri E, Azmoodeh A, Dehghantanha A, Karimipour H (2018) Fuzzy pattern tree for edge attack detection and categorization. J Syst Archit 9:1–15

    Google Scholar 

  3. Karimipour H, Dinavahi V (2017) On false data injection attack against dynamic state estimation on smart power grids. In: 2017 IEEE international conference on smart energy grid engineering (SEGE). IEEE, pp 388–393

    Google Scholar 

  4. Doshi R, Apthorpe N, Feamster N (2018) Machine learning DDoS detection for the consumer internet of things devices. In: 2018 IEEE security and privacy workshops (SPW). IEEE, pp 29–35

    Google Scholar 

  5. Chang Y, Li W, Yang Z (2017) Network intrusion detection based on random forest and support vector machine. In: 2017 IEEE international conference on computational science and engineering (CSE) and IEEE international conference on embedded and ubiquitous computing (EUC), vol 1. IEEE, pp 635–638

    Google Scholar 

  6. Gondhi NK, Gupta A (2017) Survey on machine learning-based scheduling in cloud computing. In: Proceedings of the 2017 international conference on intelligent systems, metaheuristics & swarm intelligence, pp 57–61

    Google Scholar 

  7. Amiri F, Yousefi MR, Lucas C, Shakery A, Yazdani N (2011) Mutual information-based feature selection for intrusion detection systems. J Netw Comput Appl 34(4):1184–1199

    Article  Google Scholar 

  8. Zhao S, Li W, Zia T, Zomaya AY (2017) A dimension reduction model and classifier for anomaly-based intrusion detection in the internet of things. In: 2017 IEEE 15th international conference on dependable, autonomic and secure computing, 15th international conference on pervasive intelligence and computing, 3rd international conference on big data intelligence and computing and cyber science and technology congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, pp 836–843

    Google Scholar 

  9. Xie M, Huang M, Bai Y, Hu Z (2017) The anonymization protection algorithm based on fuzzy clustering for the ego of data in the internet of things. J Electr Comput Eng

    Google Scholar 

  10. Han G, Xiao L, Poor HV (2017) Two-dimensional anti-jamming communication based on deep reinforcement learning. In: 2017 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 2087–2091

    Google Scholar 

  11. Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687

    Article  Google Scholar 

  12. Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560

    Article  Google Scholar 

  13. Shi C, Liu J, Liu H, Chen Y (2017) Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT. In: Proceedings of the 18th ACM international symposium on mobile ad hoc networking and computing, pp 1–10

    Google Scholar 

  14. Kiran BN, Radheshyam SG, Sagar N, Balthar SA, Shrinath (2018) Security for IoT systems using machine learning. Int J Adv Res Innov Ideas Educ (IJRIIE) 4(2):2707–2710

    Google Scholar 

  15. Alam MS, Husain D, Naqvi SK, Kumar P (2018) IOT security through machine learning and homographic encryption technique. In: International conference on new trends in engineering & technology (ICNTET), Chennai

    Google Scholar 

  16. Baracaldo N, Chen B, Ludwig H, Safavi A, Zhang R (2018) Detecting poisoning attacks on machine learning in IoT environments. In: 2018 IEEE international congress on the internet of things (ICIOT). IEEE, pp 57–64

    Google Scholar 

  17. Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using in-depth learning approach for the internet of things. Futur Gener Comput Syst 82:761–768

    Article  Google Scholar 

  18. Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi AR, Tarkoma S (2017) IoT sentinel: automated device-type identification for security enforcement in IoT. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, pp 2177–2184

    Google Scholar 

  19. Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp 506–509

    Google Scholar 

  20. Deng L, Li D, Yao X, Cox D, Wang H (2019) Mobile network intrusion detection for IoT system based on a transfer learning algorithm. Clust Comput 22(4):9889–9904

    Article  Google Scholar 

  21. Khan F et al (2020) A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 8:119710–119719

    Google Scholar 

  22. Khan F et al (2020) Detecting malicious URLs using binary classification through Ada boost algorithm. Int J Electr Comput Eng 10:2088–8708

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Feslin Anish Mon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mon, S.F.A., Jones, G.M., Winster, S.G. (2023). Role of Machine Learning and Deep Learning Applications in the Internet of Things (IoT) Security. In: Dhanaraj, R.K., Rawal, B.S., Krishnamoorthi, S., Balusamy, B. (eds) Artificial Intelligence in IoT and Cyborgization. Studies in Computational Intelligence, vol 1103. Springer, Singapore. https://doi.org/10.1007/978-981-99-4303-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4303-6_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4302-9

  • Online ISBN: 978-981-99-4303-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics