IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?

被引:372
|
作者
Xiao, Liang [1 ,2 ,3 ,4 ]
Wan, Xiaoyue [5 ]
Lu, Xiaozhen [1 ]
Zhang, Yanyong [6 ,7 ,8 ]
Wu, Di [9 ,10 ,11 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Fujian, Peoples R China
[2] Princeton Univ, Princeton, NJ 08544 USA
[3] Virginia Tech, Blacksburg, VA 24061 USA
[4] Univ Maryland, College Pk, MD 20742 USA
[5] Xiamen Univ, Xiamen, Fujian, Peoples R China
[6] Rutgers State Univ, Elect & Comp Engn Dept, North Brunswick, NJ USA
[7] Wireless Informat Networking Lab, North Brunswick, NJ USA
[8] Nokia Res Ctr, Beijing, Peoples R China
[9] NYU, Polytech Inst, Dept Comp Sci & Engn, Brooklyn, NY USA
[10] Sun Yat Sen Univ, Guangzhou, Guangdong, Peoples R China
[11] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou, Guangdong, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
CHALLENGES; INTERNET; STRATEGIES; PROTOCOL; PRIVACY; GAME;
D O I
10.1109/MSP.2018.2825478
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services, has to protect user privacy and address attacks such as spoofing attacks, denial of service (DoS) attacks, jamming, and eavesdropping. We investigate the attack model for IoT systems and review the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL). ML-based IoT authentication, access control, secure offloading, and malware detection schemes to protect data privacy are the focus of this article. We also discuss the challenges that need to be addressed to implement these ML-based security schemes in practical IoT systems.
引用
收藏
页码:41 / 49
页数:9
相关论文
共 50 条
  • [1] Machine Learning for IoT Devices Security Reinforcement
    Ea, Philippe
    Xiang, Jiahui
    Salem, Osman
    Mehaoua, Ahmed
    MACHINE LEARNING FOR NETWORKING, MLN 2023, 2024, 14525 : 1 - 13
  • [2] "If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices
    Gopalakrishna, Nikhil Krishna
    Anandayuvaraj, Dharun
    Detti, Annan
    Bland, Forrest Lee
    Rahaman, Sazzadur
    Davis, James C.
    2022 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON SOFTWARE ENGINEERING RESEARCH AND PRACTICES FOR THE IOT (SERP4IOT 2022), 2022, : 1 - 8
  • [3] IoT Security and Machine Learning
    Almalki, Sarah
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 103 - 114
  • [4] Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
    Ince, Kenan
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1117 - 1130
  • [5] Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
    Kenan Ince
    International Journal of Information Security, 2024, 23 : 1117 - 1130
  • [6] Using machine learning algorithms to enhance IoT system security
    El-Sofany, Hosam
    El-Seoud, Samir A.
    Karam, Omar H.
    Bouallegue, Belgacem
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [7] Machine Learning Techniques for Enhanced Intrusion Detection in IoT Security
    Hakami, Hanadi
    Faheem, Muhammad
    Bashir Ahmad, Majid
    IEEE ACCESS, 2025, 13 : 31140 - 31158
  • [8] Machine Learning Security Allocation in IoT
    Karthika, P.
    Babu, R. Ganesh
    Nedumaran, A.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 474 - 478
  • [9] Evaluation of Security Techniques in Heterogeneous IoT Devices
    Mosca, Eduardo
    Ribeiro, Silvio
    Urbano, Arthur
    Silva, Danielle S.
    Gomes, Rafael L.
    PROCEEDINGS OF 2022 11TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, LADC 2022, 2022, : 91 - 94
  • [10] A Review of Data Security and Cryptographic Techniques in IoT based devices
    Mustafa, Ghulam
    Ashraf, Rehan
    Mirza, Muhammad Ayzed
    Jamil, Abid
    Muhammad
    ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,