Industrial Internet-of-Things Security Enhanced With Deep Learning Approaches for Smart Cities

被引:47
作者
Magaia, Naercio [1 ]
Fonseca, Ramon [2 ]
Muhammad, Khan [3 ]
Segundo, Afonso H. Fontes N. [4 ,5 ]
Lira Neto, Aloisio Vieira [6 ]
de Albuquerque, Victor Hugo C. [2 ]
机构
[1] Univ Lisbon, Fac Sci, Dept Comp Sci, LASIGE, P-1749016 Lisbon, Portugal
[2] ARMTEC Tecnol Robot, BR-60150000 Fortaleza, Ceara, Brazil
[3] Sejong Univ, Dept Software, Seoul 143747, South Korea
[4] Chalmers Univ Technol, Dept Comp Sci & Engn, S-41296 Gothenburg, Sweden
[5] Univ Gothenburg, Dept Comp Sci & Engn, S-40530 Gothenburg, Sweden
[6] Policia Rodoviaria Fed, BR-60864012 Fortaleza, Ceara, Brazil
关键词
Smart cities; Sensors; Security; Intelligent sensors; Business; Sensor systems; Malware; Deep learning (DL); Industrial Internet of Things (IIoT); Internet of Things (IoT); security; smart cities; INTRUSION DETECTION; REFERENCE MODEL; IOT; MECHANISM; SYSTEMS; AUTHENTICATION; CHALLENGES; MANAGEMENT; BLOCKCHAIN;
D O I
10.1109/JIOT.2020.3042174
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The significant evolution of the Internet of Things (IoT) enabled the development of numerous devices able to improve many aspects in various fields in the industry for smart cities where machines have replaced humans. With the reduction in manual work and the adoption of automation, cities are getting more efficient and smarter. However, this evolution also made data even more sensitive, especially in the industrial segment. The latter has caught the attention of many hackers targeting Industrial IoT (IIoT) devices or networks, hence the number of malicious software, i.e., malware, has increased as well. In this article, we present the IIoT concept and applications for smart cities, besides also presenting the security challenges faced by this emerging area. We survey currently available deep learning (DL) techniques for IIoT in smart cities, mainly deep reinforcement learning, recurrent neural networks, and convolutional neural networks, and highlight the advantages and disadvantages of security-related methods. We also present insights, open issues, and future trends applying DL techniques to enhance IIoT security.
引用
收藏
页码:6393 / 6405
页数:13
相关论文
共 84 条
[1]   Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach [J].
Alasmary, Hisham ;
Khormali, Aminollah ;
Anwar, Afsah ;
Park, Jeman ;
Choi, Jinchun ;
Abusnaina, Ahmed ;
Awad, Amro ;
Nyang, Daehun ;
Mohaisen, Aziz .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8977-8988
[2]   Industrial Control Systems: Cyberattack trends and countermeasures [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Zeadally, Sherali .
COMPUTER COMMUNICATIONS, 2020, 155 :1-8
[3]   Consumer IoT: Security Vulnerability Case Studies and Solutions [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Sikdar, Biplab ;
Choo, Kim-Kwang Raymond .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) :17-25
[4]   Blockchain Applications for Industry 4.0 and Industrial IoT: A Review [J].
Alladi, Tejasvi ;
Chamola, Vinay ;
Parizi, Reza M. ;
Choo, Kim-Kwang Raymond .
IEEE ACCESS, 2019, 7 :176935-176951
[5]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[6]  
[Anonymous], 2017, P IEEE NETW JUN
[7]   Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning [J].
Azmoodeh, Amin ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01) :88-95
[8]   M2M Security: Challenges and Solutions [J].
Barki, Amira ;
Bouabdallah, Abdelmadjid ;
Gharout, Said ;
Traore, Jacques .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1241-1254
[9]   A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems [J].
Benkhelifa, Elhadj ;
Welsh, Thomas ;
Hamouda, Walaa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3496-3509
[10]   Verifying Internet of Things Safety and Security in Physical Spaces [J].
Celik, Z. Berkay ;
McDaniel, Patrick ;
Tan, Gang ;
Babun, Leonardo ;
Uluagac, A. Selcuk .
IEEE SECURITY & PRIVACY, 2019, 17 (05) :30-38