IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?

被引:372
作者
Xiao, Liang [1 ,2 ,3 ,4 ]
Wan, Xiaoyue [5 ]
Lu, Xiaozhen [1 ]
Zhang, Yanyong [6 ,7 ,8 ]
Wu, Di [9 ,10 ,11 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Fujian, Peoples R China
[2] Princeton Univ, Princeton, NJ 08544 USA
[3] Virginia Tech, Blacksburg, VA 24061 USA
[4] Univ Maryland, College Pk, MD 20742 USA
[5] Xiamen Univ, Xiamen, Fujian, Peoples R China
[6] Rutgers State Univ, Elect & Comp Engn Dept, North Brunswick, NJ USA
[7] Wireless Informat Networking Lab, North Brunswick, NJ USA
[8] Nokia Res Ctr, Beijing, Peoples R China
[9] NYU, Polytech Inst, Dept Comp Sci & Engn, Brooklyn, NY USA
[10] Sun Yat Sen Univ, Guangzhou, Guangdong, Peoples R China
[11] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou, Guangdong, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
CHALLENGES; INTERNET; STRATEGIES; PROTOCOL; PRIVACY; GAME;
D O I
10.1109/MSP.2018.2825478
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services, has to protect user privacy and address attacks such as spoofing attacks, denial of service (DoS) attacks, jamming, and eavesdropping. We investigate the attack model for IoT systems and review the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL). ML-based IoT authentication, access control, secure offloading, and malware detection schemes to protect data privacy are the focus of this article. We also discuss the challenges that need to be addressed to implement these ML-based security schemes in practical IoT systems.
引用
收藏
页码:41 / 49
页数:9
相关论文
共 30 条
[1]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[2]  
Andrea I, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P180, DOI 10.1109/ISCC.2015.7405513
[3]  
Aref M. A., 2017, 2017 IEEE WIRELESS C, P1
[4]   In-network outlier detection in wireless sensor networks [J].
Branch, Joel W. ;
Giannella, Chris ;
Szymanski, Boleslaw ;
Wolff, Ran ;
Kargupta, Hillol .
KNOWLEDGE AND INFORMATION SYSTEMS, 2013, 34 (01) :23-54
[5]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[6]   A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective [J].
Chen, Shanzhi ;
Xu, Hui ;
Liu, Dake ;
Hu, Bo ;
Wang, Hucheng .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04) :349-359
[7]  
Firner Bernhard., 2011, Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, P337, DOI DOI 10.1145/2070942.2070978
[8]  
Gwon Y, 2013, IEEE CONF COMM NETW, P28, DOI 10.1109/CNS.2013.6682689
[9]  
Han GA, 2017, INT CONF ACOUST SPEE, P2087, DOI 10.1109/ICASSP.2017.7952524
[10]  
Kulkarni RV, 2009, IEEE IJCNN, P3437