Data-Driven Learning Models for Internet of Things Security: Emerging Trends, Applications, Challenges and Future Directions

被引:0
作者
Alimi, Oyeniyi Akeem [1 ]
机构
[1] Durban Univ Technol, Dept Informat Syst, ZA-4001 Durban, South Africa
关键词
machine learning; deep learning; reinforcement learning; denial of service; IoT intrusion analysis dataset; cyberattacks; intruder detection system; Internet of Things; IoT architecture; INTRUSION DETECTION; IOT; ATTACKS;
D O I
10.3390/technologies13050176
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The prospect of integrating every object under a unified infrastructure, which provides humans with the possibility to monitor, access, and control objects and systems, has played a significant role in the geometric growth of the Internet of Things (IoT) paradigm, across various applications. However, despite the numerous possibilities that the IoT paradigm offers, security and privacy within and between the different interconnected devices and systems are integral to the long-term growth of IoT networks. Various sophisticated intrusions and attack variants have continued to plague the sustainability of IoT technologies and networks. Thus, effective methodologies for the prompt identification, detection, and mitigation of these menaces are priorities for stakeholders. Recently, data-driven artificial intelligence (AI) models have been considered effective in numerous applications. Hence, in recent literature studies, various single and ensemble AI subset models, such as deep learning and reinforcement learning models, have been proposed, resulting in effective decision-making for the secured operation of IoT networks. Considering the growth trends, this study presents a critical review of recently published articles whereby learning models were proposed for IoT security analysis. The aim is to highlight emerging IoT security issues, current conventional strategies, methodology procedures, achievements, and also, importantly, the limitations and research gaps identified in those specific IoT security analysis studies. By doing so, this study provides a research-based resource for scholars researching IoT and general industrial control systems security. Finally, some research gaps, as well as directions for future studies, are discussed.
引用
收藏
页数:29
相关论文
共 149 条
[1]   Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset [J].
Abdalgawad, N. ;
Sajun, A. ;
Kaddoura, Y. ;
Zualkernan, I. A. ;
Aloul, F. .
IEEE ACCESS, 2022, 10 :6430-6441
[2]  
Ahli A., 2023, P 2023 ADV SCI ENG T, P1
[3]  
Ahmad I., 2021, J Robot Control (JRC), V2, P42, DOI [DOI 10.18196/JRC.2150, 10.18196/jrc.2150]
[4]   A Comprehensive Review of the Internet of Things Security [J].
Ahmid, Maroua ;
Kazar, Okba .
JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (03) :289-305
[5]   Landscape of IoT security [J].
Aidoo, Andy ;
Schiller, Eryk ;
Fuhrer, Jara ;
Stahl, Jonathan ;
Ziorjen, Michael ;
Stiller, Burkhard .
COMPUTER SCIENCE REVIEW, 2022, 44
[6]   Transformer-Based Intrusion Detection for IoT Networks [J].
Akuthota, Uday Chandra ;
Bhargava, Lava .
IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05) :6062-6067
[7]  
AL-Akhras M., 2023, Int. J. Data Netw. Sci, V7, P1683, DOI [10.5267/j.ijdns.2023.7.021, DOI 10.5267/J.IJDNS.2023.7.021]
[8]   MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks [J].
Al-Fawa'reh, Mohammad ;
Abu-Khalaf, Jumana ;
Szewczyk, Patryk ;
Kang, James Jin .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (06) :9610-9629
[9]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[10]   Trends in Using IoT with Machine Learning in Health Prediction System [J].
Aldahiri, Amani ;
Alrashed, Bashair ;
Hussain, Walayat .
FORECASTING, 2021, 3 (01) :181-206