A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

被引:620
作者
Al-Garadi, Mohammed Ali [1 ]
Mohamed, Amr [1 ]
Al-Ali, Abdulla Khalid [1 ]
Du, Xiaojiang [2 ]
Ali, Ihsan [3 ]
Guizani, Mohsen [1 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[3] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
关键词
Machine learning; Internet of Things; Tutorials; Electronic mail; Classification algorithms; Encryption; Deep learning; machine learning; Internet of Things security; security based intelligence; IoT big~data; NETWORK ANOMALY DETECTION; NAIVE BAYES CLASSIFIER; OF-THE-ART; INTRUSION DETECTION; HEALTH-CARE; BIG DATA; DATA ANALYTICS; CHALLENGES; ISSUES; ATTACKS;
D O I
10.1109/COMST.2020.2988293
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network and application security for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to effectively secure the IoT ecosystem. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory novelty to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.
引用
收藏
页码:1646 / 1685
页数:40
相关论文
共 289 条
[1]   An end-to-end secure key management protocol for e-health applications [J].
Abdmeziem, Mohammed Riyadh ;
Tandjaoui, Djamel .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 :184-197
[2]   Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks [J].
Abomhara, Mohamed ;
Køien, Geir M. .
Journal of Cyber Security and Mobility, 2015, 4 (01) :65-88
[3]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[4]   A novel SVM-kNN-PSO ensemble method for intrusion detection system [J].
Aburomman, Abdulla Amin ;
Reaz, Mamun Bin Ibne .
APPLIED SOFT COMPUTING, 2016, 38 :360-372
[5]  
Adetunmbi A.O., 2008, International Journal of Computing and ICT Research, V2, P60
[6]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[7]   Survey on Anomaly Detection using Data Mining Techniques [J].
Agrawal, Shikha ;
Agrawal, Jitendra .
KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 :708-713
[8]   The role of big data analytics in Internet of Things [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Hashem, Ibrahim Abaker Targio ;
Khan, Imran ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Imran, Muhammad ;
Vasilakos, Athanasios V. .
COMPUTER NETWORKS, 2017, 129 :459-471
[9]   Secure and dependable software defined networks [J].
Akhunzada, Adnan ;
Gani, Abdullah ;
Anuar, Nor Badrul ;
Abdelaziz, Ahmed ;
Khan, Muhammad Khurram ;
Hayat, Amir ;
Khan, Samee U. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 :199-221
[10]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114