Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey

被引:66
作者
Zaman, Shakila [1 ]
Alhazmi, Khaled [2 ]
Aseeri, Mohammed A. [3 ]
Ahmed, Muhammad Raisuddin [4 ]
Khan, Risala Tasin [5 ]
Kaiser, M. Shamim [5 ]
Mahmud, Mufti [6 ,7 ,8 ]
机构
[1] Brac Univ, Dept Comp Sci & Engn, Dhaka 1212, Bangladesh
[2] King Abdulaziz City Sci & Technol KACST, Natl Ctr Robot & Internet Things Technol, Commun & Informat Technol Res Inst, Riyadh 11442, Saudi Arabia
[3] King Abdulaziz City Sci & Technol KACST, Commun & Informat Technol Res Inst, Natl Ctr Telecommun & Def Syst Technol, Riyadh 11442, Saudi Arabia
[4] Mil Technol Coll, Radio & Radar Commun, Muscat 111, Oman
[5] Jahangirnagar Univ, Inst Informat Technol, Dhaka 1342, Bangladesh
[6] Nottingham Trent Univ, Dept Comp Sci, Nottingham NG11 8NS, England
[7] Nottingham Trent Univ, Med Technol Innovat Facil, Nottingham NG11 8NS, England
[8] Nottingham Trent Univ, Comp & Informat Res Ctr, Nottingham NG11 8NS, England
关键词
Security; Internet of Things; Encryption; Artificial intelligence; Cryptography; Protocols; Computer crime; Fuzzy logic; machine leaning; attack vector; IoT protocols; IoT applications; DISTRIBUTED ATTACK DETECTION; INTRUSION DETECTION SYSTEM; MALWARE DETECTION; IOT; COMMUNICATION; FRAMEWORK; AUTHENTICATION; ARCHITECTURE; PROTOCOLS; TRUST;
D O I
10.1109/ACCESS.2021.3089681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/objects, such as people, devices, infrastructure, and makes our daily lives simpler, safer, and fruitful. Being part of a large network of heterogeneous devices, these nodes are typically resource-constrained and became the weakest link to the cyber attacker. Classical encryption techniques have been employed to ensure the data security of the IoT network. However, high-level encryption techniques cannot be employed in IoT devices due to the limitation of resources. In addition, node security is still a challenge for network engineers. Thus, we need to explore a complete solution for IoT networks that can ensure nodes and data security. The rule-based approaches and shallow and deep machine learning algorithms- branches of Artificial Intelligence (AI)- can be employed as countermeasures along with the existing network security protocols. This paper presented a comprehensive layer-wise survey on IoT security threats, and the AI-based security models to impede security threats. Finally, open challenges and future research directions are addressed for the safeguard of the IoT network.
引用
收藏
页码:94668 / 94690
页数:23
相关论文
共 167 条
[1]   A Comprehensive Study of Security and Privacy Guidelines, Threats, and Countermeasures: An IoT Perspective [J].
Abdul-Ghani, Hezam Akram ;
Konstantas, Dimitri .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (02)
[2]  
Agrawal R, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P6423, DOI 10.1109/ICASSP.2018.8462513
[3]   IoT-enabled smart appliances under industry 4.0: A case study [J].
Aheleroff, Shohin ;
Xu, Xun ;
Lu, Yuqian ;
Aristizabal, Mauricio ;
Pablo Velasquez, Juan ;
Joa, Benjamin ;
Valencia, Yesid .
ADVANCED ENGINEERING INFORMATICS, 2020, 43
[4]   Application of Artificial Intelligence in Predicting Earthquakes: State-of-the-Art and Future Challenges [J].
Al Banna, Md. Hasan ;
Abu Taher, Kazi ;
Kaiser, M. Shamim ;
Mahmud, Mufti ;
Rahman, Md. Sazzadur ;
Hosen, A. S. M. Sanwar ;
Cho, Gi Hwan .
IEEE ACCESS, 2020, 8 :192880-192923
[5]   Towards Artificial Intelligence Driven Emotion Aware Fall Monitoring Framework Suitable for Elderly People with Neurological Disorder [J].
Al Nahian, M. Jaber ;
Ghosh, Tapotosh ;
Uddin, Mohammed Nasir ;
Islam, Md Maynul ;
Mahmud, Mufti ;
Kaiser, M. Shamim .
BRAIN INFORMATICS, BI 2020, 2020, 12241 :275-286
[6]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[7]  
Al-Odat Z. A., 2019, ARXIV190806086
[8]   Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol [J].
Alaiz-Moreton, Hector ;
Aveleira-Mata, Jose ;
Ondicol-Garcia, Jorge ;
Luis Munoz-Castaneda, Angel ;
Garcia, Isaias ;
Benavides, Carmen .
COMPLEXITY, 2019, 2019
[9]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[10]   Application of Convolutional Neural Network in Segmenting Brain Regions from MRI Data [J].
Ali, Hafsa Moontari ;
Kaiser, M. Shamim ;
Mahmud, Mufti .
BRAIN INFORMATICS, 2019, 11976 :136-146