A systematic review on Deep Learning approaches for IoT security

被引:60
作者
Aversano, Lerina [1 ]
Bernardi, Mario Luca [1 ]
Cimitile, Marta [2 ]
Pecori, Riccardo [1 ]
机构
[1] Univ Sannio, Dept Engn, Via Traiano 9, I-82100 Benevento, BN, Italy
[2] Unitelma Sapienza Univ, Viale Regina Elena 295, I-00161 Rome, Italy
关键词
Internet of Things; Security; Systematic review; Deep Learning; ATTACK DETECTION; INTRUSION DETECTION; BIG DATA; ARTIFICIAL-INTELLIGENCE; NEURAL-NETWORK; DATA ANALYTICS; INTERNET; THINGS; DEVICES; CHALLENGES;
D O I
10.1016/j.cosrev.2021.100389
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The constant spread of smart devices in many aspects of our daily life goes hand in hand with the ever-increasing demand for appropriate mechanisms to ensure they are resistant against various types of threats and attacks in the Internet of Things (IoT) environment. In this context, Deep Learning (DL) is emerging as one of the most successful and suitable techniques to be applied to different IoT security aspects. This work aims at systematically reviewing and analyzing the research landscape about DL approaches applied to different IoT security scenarios. The contributions we reviewed are classified according to different points of view into a coherent and structured taxonomy in order to identify the gap in this pivotal research area. The research focused on articles related to the keywords 'deep learning', 'security' and 'Internet of Things' or 'IoT' in four major databases, namely IEEEXplore, ScienceDirect, SpringerLink, and the ACM Digital Library. We selected and reviewed 69 articles in the end. We have characterized these studies according to three main research questions, namely, the involved security aspects, the used DL network architectures, and the engaged datasets. A final discussion highlights the research gaps still to be investigated as well as the drawbacks and vulnerabilities of the DL approaches in the IoT security scenario. (C) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:18
相关论文
共 137 条
[1]   The role of big data analytics in Internet of Things [J].
Ahmed, Ejaz ;
Yaqoob, Ibrar ;
Hashem, Ibrahim Abaker Targio ;
Khan, Imran ;
Ahmed, Abdelmuttlib Ibrahim Abdalla ;
Imran, Muhammad ;
Vasilakos, Athanasios V. .
COMPUTER NETWORKS, 2017, 129 :459-471
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security [J].
Al-Garadi, Mohammed Ali ;
Mohamed, Amr ;
Al-Ali, Abdulla Khalid ;
Du, Xiaojiang ;
Ali, Ihsan ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :1646-1685
[4]   Identification of malicious activities in industrial internet of things based on deep learning models [J].
AL-Hawawreh, Muna ;
Moustafa, Nour ;
Sitnikova, Elena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :1-11
[5]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[6]   Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions [J].
Aleesa, A. M. ;
Zaidan, B. B. ;
Zaidan, A. A. ;
Sahar, Nan M. .
NEURAL COMPUTING & APPLICATIONS, 2020, 32 (14) :9827-9858
[7]  
Alexander R, 2012, TECHNICAL REPORT, DOI 10.17487/RFC6550
[8]   Intrusion detection in Edge-of-Things computing [J].
Almogren, Ahmad S. .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 137 :259-265
[9]   Enforcing security in Internet of Things frameworks: A Systematic Literature Review [J].
Aly, Mohab ;
Khomh, Foutse ;
Haoues, Mohamed ;
Quintero, Alejandro ;
Yacout, Soumaya .
INTERNET OF THINGS, 2019, 6
[10]   Deep learning and big data technologies for IoT security [J].
Amanullah, Mohamed Ahzam ;
Habeeb, Riyaz Ahamed Ariyaluran ;
Nasaruddin, Fariza Hanum ;
Gani, Abdullah ;
Ahmed, Ejaz ;
Nainar, Abdul Salam Mohamed ;
Akim, Nazihah Md ;
Imran, Muhammad .
COMPUTER COMMUNICATIONS, 2020, 151 :495-517