Learning Approaches For Security and Privacy in Internet of Things
Learning Approaches For Security and Privacy in Internet of Things
1 Introduction
The Internet of Things (IoT) has enabled everything and anything to be connected
to the internet. By transforming how people use technology, it has caused a multi-
media revolution in the physical world that surrounds it. Supervisory surveillance,
gadgets, commercial vehicles and medical equipment, alarms, fluorescent lamps,
refrigerators, aircraft, pet supplies, smart TVs, and electronic set-tops boxes can
now be connected to the internet through IoT [1]. Industrial applications are becom-
ing more complex and broader as science and technology advance. Many vital pro-
cesses that rely on technology have large-scale control systems in place to keep
them running normally [2]. The Internet of Things (IoT) is a network of uniquely
recognizable, embedded computing equipment that can send and receive data with-
out contact between people-to-people or people-to-computer relations [3].
Many countries have identified cybersecurity as a key national policy concern.
The financial consequences of cybersecurity and cyber warfare are rising as IoT-
based devices are incorporated into intellectual production and marketing, cities,
advanced transmission networks, intelligent networks, and more elements of
T. Daniya (*)
Department of CSE (AI & ML), GMR Institute of Technology, Rajam, India
e-mail: daniya.t@gmrit.edu.in
M. Geetha
Department of Information Technology, S.A Engineering College, Chennai, Tamilnadu, India
V. Sarveshwaran
Department of Computational Intelligence, SRM Institute of Science and Technology,
Kattankulathur, Chengalpattu, Chennai, Tamilnadu, India
C. M. Babu
Department of CSE, B V Raju Institute of Technology, Narsapur, Telangana, India
Cybersecurity Attacks
Consumer data security breaches, along with major cybersecurity assaults net-
works around the world, have caused IoT users to lose faith in distributors who do
not undertake the precautions necessary to secure its applications [5]. The problem
of IoT networks is cybersecurity, which is a key worldwide problem that necessi-
tates a comprehensive evaluation by either the academic or the manufacturing sec-
tors [6]. Human involvement elevates it to a Cyber-Physical-Human System, also
CPHS, which can be regulated by a human [7].
In CPHS, understanding, validating, and defending such structures are difficult
due to the difficulty of modeling human behavior. Spam and phishing emails,
exploitation of the web address of the network, replication assaults, and denial of
service attacks, in which cyber criminal’s elements, error-prone, and malicious peo-
ple block honest messages from secure broadcast communication, are all threats to
the CPHS [8].
Cyber-Physical System (CPS) can carry out self-confidence, self-adjustments,
and decisions [9]. The way to implement CPS’ environmental tier function is
through machine-to-machine (M2M) communications. In M2M, both wired and
Learning Approaches for Security and Privacy in Internet of Things 65
This section, discusses the cyber security-based machine learning on IoT including
various attacks, security, and privacy in cybersecurity.
Sarker et al. [16] analyzed that the prominence of Internet-of-Things (IoT) and the
huge extension of the communications systems, as well as numerous applications,
have recently paid enormous attention to cybersecurity problems today. Thus, it
66 T. Daniya et al.
classification. A group of five dense neural networks with CNN and ExtraTrees as a
meta-learner is the best performance possible.
Subburaj et al. [20] aimed to investigate and examine various means of protect-
ing websites from SQL attacks through injection. Machine learning algorithms have
been used to detect such attacks in this research project. Machine learning (ML)
algorithms are algorithms that can learn from the given data and deduce interesting
dataset outcomes. The technology was used to detect malicious code through SQL
code as data and ML algorithms. This research project has established a machine
learning model that can predict potential attacks.
Shafiq et al. [21] proposed a hybrid algorithm and a new model architecture to
addressed this issue. The BoT-IoT recognition dataset is first applied, and its 44
effective functions for machine learning algorithms are selected from a variety of
features. Then five efficient machine-learning algorithms are chosen to recognize
malicious and anomalous traffic and also to pick the most commonly used metrics
for ML algorithms. A bijective soft set approach and algorithm are explored to iden-
tify which ML algorithm is successful and should be used to determine IoT anomaly
and traffic intrusion. This has used the proposed algorithm based on a bijective soft
set approach that effectively detects attacks.
Katzir et al. [22] proposed an adverse detection method durability based on a
supervised model of machine learning. Emphasis on multisensory fusion systems
for systematic description of adversarial resilience is given. The Model Robustness
Score (MRB), a measure for assessing the relative resilience of various designs, is
also established, and two new algorithms for the selection of adversary classifiers
are also proposed. The first algorithm only selects features that cannot be realisti-
cally altered by the opponent; the second algorithm controls the durability versus
the precision compromise. Ultimately, the strategy to real-life malware classifica-
tion with a comprehensive, up-to-date body of benign and malware executables was
assessed. The ability to use adversely aware feature selection to create more robust
classifiers has also been shown, and the empirical evidence supporting ensemble
algorithms inherent resilience compared with single model algorithms is provided.
Li et al. [28] analyzed that safety approach and smart control system for solar ther-
mal use are of great functional significance in the advancement of Energy Internet
of Things (EIoT), which aims to optimize operational performance and enables
intelligent dynamic change. Computational fluid dynamics modeling was utilized
for the analysis of the solar energy output mechanism for buildings combined with
solar water heating systems. A machine-based approach to predict energy conver-
sion is proposed. This paper proposed a new EIoT platform for the cyber protection
analysis based on machine learning and implements the temperature control plat-
form. The EIoT method showed a high success with the Extreme Gradient Boosting
68 T. Daniya et al.
been shown in this analysis. To illustrate the assault-presented strategy, all the ridic-
ulous keyboard information developed via defensive tool and the user’s actual key-
board information feedback were collected and the threats to cyber protection of
keyboard information were evaluated based on the offensive method of machine
learning. This confirmed that an opponent got 96.2% accurate keyboard data even
though the attack technique, which prevents the keyboard data exposure from
attacking, is being used.
Karimipour et al. [33] analyzed that intelligent grid technology improves electri-
cal grid reliability, safety, and performance. Its strong relationships on digital com-
munication technology moreover create new security flaws, which must be taken
into account for secure and economical power distribution. In this article, a statisti-
cal association between measurements is proposed for an unsupervised detection of
anomalies. The objective is to design an anomaly detector that can discriminate
between a perturbation and an intelligent cyber-attack. It ideals with larger intelli-
gent smart grids. The proposed approach uses symbolic dynamic filters (SDF) as a
functional extraction to minimize computation complexity and to detect causal
interactions between subsystems.
Yin et al. [34] discussed that a cybersecurity solution-based groundbreaking
strategy to the intrusion detection mechanism in which a malicious operation in
Supervision Control and Data Acquisition (SCADA) systems targets the Distributed
Network Protocol (DNP3). Due to the extreme connections between industrial con-
trol systems and the outside Internet world using IoT technologies, information and
communication systems are susceptible to severe and cyber-attacks. In certain cir-
cumstances, cyber-attacks lead to various threats affecting the infrastructure and
continuity of businesses. Owing conventional process systems specificities like
insecure real time protocols, the general-purpose ICT safety mechanisms in SCADA
systems are not completely stable. In this article, a new way of assessing and select-
ing the vulnerability model in various layers using the parsed DNP3 protocol for
machine learning, with additional data containing malware samples, was intro-
duced. In addition, a cyber-attack algorithm was developed that included a method
for classifying and visualizing. In an IoT-based communications environment, the
suggested technique was capable of detecting attacks in real time.
Thakong et al. [35] focused that cybersecurity issues have arisen in many busi-
ness applications in recent times. While researchers previously suggested address-
ing cybersecurity issues, their methodologies frequently replicated training program
to identify datasets of these concerns in non-stationary streaming environments.
The traditional approaches can worsen the adaptive solution to avoid these problems
in dynamic environments. The paper proposed to use the hierarchical structure of
the network to fix these issues in a dynamic environment to create a one-pass throw
away learning environment. In addition, new principles of learning in the form of
recursive functions have been implemented to accelerate the computation time and
to preserve a minimum space complexity for streaming data. In order to minimize
the time of preparation, knowledge gain-based feature selection was also employed.
70 T. Daniya et al.
In this segment, comparison table for various attacks, security, and privacy authen-
tication in Cybersecurity-based machine learning approaches can be depicted below:
• Future work can evaluate IntruDTree model efficacy through accumulating huge
amounts of datasets with larger sizes of IoT protection and by measuring their
effectiveness in the area of cybersecurity at application level.
• The IoT device can accumulate latest security details with larger sizes and con-
struct a safe system handled by data through learning technology in future.
• As future work, the intention is to study an authentic MQTT dataset to evaluate
its characteristics and how these can help to unmark legitimate and malicious
MQTT traffic.
• In order to offer valuable knowledge to malware analysts, the use of explanatory
artificial intelligence (XAI) strategy to decipher the results of deep learning mod-
els for malware detection would be implemented in future. It also plans to inves-
tigate the architectures of group learning and to do more tests on broader malware
databases. This seeks to enhance the classification potential and precision of the
ensemble learning algorithm by refining and validating the model design for
many malware datasets in future work.
• For future work, a prototype that examines the conceptual safety requirements of
the overall strategy will expand the proposed structure. In addition, the TP2SF
architecture will be studied to integrate deep learning and edge computing in
smart cities. This will take into account a blockchain network-allowed edge and
deep learning in the intelligent city. This incorporation will help to improve the
safety and privacy demands of developing intelligent cities.
• Moreover, interactive and distributed machine-based learning systems are not
investigated. On distributed and heterogeneous devices, IoT needs ML-based
solutions. Such strategies must work together and do not rely on centrally trained
results. Federated learning will in this respect be seen as a basis for such methods.
72 T. Daniya et al.
• This will in the future strengthen the mathematical integration to describe vari-
ous machine learning tasks and unsupervised machine learning cases in a cor-
rect way.
• The strategy to distributed multisensory SIEMs is to be tested in the future.
These systems use a wide range of independent sensors that improve detection
capacity. Today’s major challenge among modern SIEMs is how to decrease
false alerts so that safety professionals use these systems more efficiently. The
forensic analysis showed signs of the attack, which were initially ignored due to
the large number of false alarms in virtually every public-ally documented attack
on a larger organization. Thus, the purpose of this paradigm is to test strategy and
to verify that an intruder is unable to increase the number of proven false warns
intentionally.
• In the future, a 6G device is designed to increase scalability and reliability, very
low latency and low energy use. However, there may be restrictions on current
blockchain consensus algorithms about scalability, durability, latency, and
energy consumption. Implementing blockchains to achieve key design features,
such as fault tolerance, safety, low latency, and decentralization at the same time
creates significant challenges to scalability and confidence, one of 6G systems’
main objectives. In order to profit from the deployment of blockchain in 6G sys-
tems, a new consensus algorithm, which offers increased reliability and scalabil-
ity while offering tradeoffs between intrusion detection, protection and delay,
should be suggested.
5 Conclusion
In some domains like IoT, cybersecurity has historically been one of the key issues
of ICT and is even more important. This paper surveyed the state of the art of the
existing researches in Cybersecurity-based machine learning approaches on Internet
of things. It analyzed the various attacks in cybersecurity including malware attack,
cross-site scripting attack, DoS attack, etc. Also, this article surveyed the security
and privacy authentication in cybersecurity. Then the comparison table was ana-
lyzed with advantages and disadvantages. Finally, the future research directions
were discussed in IoT-based on cybersecurity. As a result, cybersecurity will prog-
ress and become more critical as the intelligent world proliferates on machine learn-
ing approaches in IoT.
References
1. K. Kimani, V. Oduol, K. Langat, Cyber security challenges for IoT-based smart grid networks.
Int. J. Crit. Infrastruct. Prot. 25, 36–49 (2019)
2. M.M. Rana, R. Bo, IoT-based cyber-physical communication architecture: Challenges and
research directions. IET Cyber-Physical Systems: Theory & Applications 5(1), 25–30 (2020)
Learning Approaches for Security and Privacy in Internet of Things 73
3. S. Tanwar, S. Tyagi, S. Kumar, The role of internet of things and smart grid for the devel-
opment of a smart city, in Intelligent Communication and Computational Technologies,
(Springer, Singapore, 2018), pp. 23–33
4. P. Radanliev, D. De Roure, S. Cannady, R.M. Montalvo, R. Nicolescu, M. Huth, Economic
impact of IoT cyber risk-analysing past and present to predict the future developments in IoT
risk analysis and IoT cyber insurance (2018)
5. A. Jain, T. Singh, Security challenges and solutions of IoT ecosystem, in Information and
Communication Technology for Sustainable Development, (Springer, Singapore, 2020),
pp. 259–270
6. S. Tweneboah-Koduah, K.E. Skouby, R. Tadayoni, Cyber security threats to IoT applications
and service domains. Wirel. Pers. Commun. 95(1), 169–185 (2017)
7. S.K. Sowe, E. Simmon, K. Zettsu, F. de Vaulx, I. Bojanova, Cyber-physical-human systems:
Putting people in the loop. IT Prof 18(1), 10–13 (2016)
8. S.A. Kumar, B. Bhargava, R. Macêdo, G. Mani, Securing iot-based cyber-physical human sys-
tems against collaborative attacks, in 2017 IEEE International Congress on Internet of Things
(ICIOT), (IEEE, 2017, June), pp. 9–16
9. Y. Jiang, S. Yin, O. Kaynak, Data-driven monitoring and safety control of industrial cyber-
physical systems: Basics and beyond. IEEE Access 6, 47374–47384 (2018)
10. K.M. Renuka, S. Kumari, D. Zhao, L. Li, Design of a secure password-based authentica-
tion scheme for M2M networks in IoT enabled cyber-physical systems. IEEE Access 7,
51014–51027 (2019)
11. B. Ali, A.I. Awad, Cyber and physical security vulnerability assessment for IoT-based smart
homes. Sensors 18(3), 817 (2018)
12. P. Radanliev, D.C. De Roure, R. Nicolescu, M. Huth, R.M. Montalvo, S. Cannady, P. Burnap,
Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102,
14–22 (2018)
13. P. Radanliev, D. De Roure, S. Cannady, R. Mantilla Montalvo, R. Nicolescu, M. Huth,
Analysing IoT cyber risk for estimating IoT cyber insurance, in Living in the Internet of Things:
Cybersecurity of the IoT-2018. IET Conference Proceedings, (The Institution of Engineering
and Technology, London, 2018)
14. S. Velliangiri, K.K. Kasaraneni, Machine Learning and Deep Learning in cyber security for
IoT, in ICDSMLA 2019, (Springer, Singapore, 2020), pp. 975–981
15. K. Kandasamy, S. Srinivas, K. Achuthan, V.P. Rangan, IoT cyber risk: A holistic analysis of
cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J. Inf.
Secur. 2020, 1–18 (2020)
16. I.H. Sarker, Y.B. Abushark, F. Alsolami, A.I. Khan, Intrudtree: A machine learning based
cyber security intrusion detection model. Symmetry 12(5), 754 (2020)
17. I.H. Sarker, CyberLearning: Effectiveness analysis of machine learning security modeling
to detect cyber-anomalies and multi-attacks. Internet of Things 14, 100393 (2021)
18. N.F. Syed, Z. Baig, A. Ibrahim, C. Valli, Denial of service attack detection through machine
learning for the IoT. J. Inf. Telecommun 4(4), 482–503 (2020)
19. R. Damaševičius, A. Venčkauskas, J. Toldinas, Š. Grigaliūnas, Ensemble-based classifica-
tion using neural networks and machine learning models for windows PE malware detection.
Electronics 10(4), 485 (2021)
20. V.H. Subburaj, B.A. Pham, Cybersecurity: Using Machine Learning Algorithms to Detect
SQL Injection Attacks (2020)
21. M. Shafiq, Z. Tian, Y. Sun, X. Du, M. Guizani, Selection of effective machine learning algo-
rithm and Bot-IoT attacks traffic identification for internet of things in smart city. Futur. Gener.
Comput. Syst. 107, 433–442 (2020)
22. Z. Katzir, Y. Elovici, Quantifying the resilience of machine learning classifiers used for cyber
security. Expert Syst. Appl. 92, 419–429 (2018)
23. E. Anthi, L. Williams, M. Rhode, P. Burnap, A. Wedgbury, Adversarial attacks on machine
learning cybersecurity defences in industrial control systems. J. Inf. Secur. Appl. 58,
102717 (2021)
74 T. Daniya et al.
24. A. Bilen, A.B. Özer, Cyber-attack method and perpetrator prediction using machine learning
algorithms. PeerJ Comput. Sci 7, e475 (2021)
25. V.K. Singh, M. Govindarasu, A cyber-physical anomaly detection for wide-area protection
using machine learning. IEEE Transactions on Smart Grid. PP, 1 (2021)
26. I. Tariq, M.A. Sindhu, R.A. Abbasi, A.S. Khattak, O. Maqbool, G.F. Siddiqui, Resolving
cross-site scripting attacks through genetic algorithm and reinforcement learning. Expert Syst.
Appl. 168, 114386 (2021)
27. M. Ghiasi, M. Dehghani, T. Niknam, A. Kavousi-Fard, P. Siano, H.H. Alhelou, Cyber-attack
detection and cyber-security enhancement in smart DC-microgrid based on blockchain tech-
nology and Hilbert Huang transform. IEEE Access 9, 29429–29440 (2021)
28. Q. Li, L. Zhang, R. Zhou, Y. Xia, W. Gao, Y. Tai, Machine learning-based stealing attack of
the temperature monitoring system for the energy Internet of Things. Secur. Commun. Netw
2021, 1 (2021)
29. P. Kumar, G.P. Gupta, R. Tripathi, TP2SF: A trustworthy privacy-preserving secured frame-
work for sustainable smart cities by leveraging blockchain and machine learning. J. Syst.
Archit. 115, 101954 (2021)
30. S. Zhu, V. Saravanan, B. Muthu, Achieving data security and privacy across healthcare applica-
tions using cyber security mechanisms. Electron. Libr. 38, 979 (2020)
31. S. Liu, S. You, H. Yin, Z. Lin, Y. Liu, W. Yao, L. Sundaresh, Model-free data authentication for
cyber security in power systems. IEEE Trans. Smart Grid 11(5), 4565–4568 (2020)
32. S. Velliangiri, An enhanced multimedia video surveillance security using wavelet encryption
framework. J. Mobile Multimed 15(3), 239–254 (2020)
33. H. Karimipour, A. Dehghantanha, R.M. Parizi, K.K.R. Choo, H. Leung, A deep and scalable
unsupervised machine learning system for cyber-attack detection in large-scale smart grids.
IEEE Access 7, 80778–80788 (2019)
34. S. Velliangira, J. Premalata, A novel forgery detection in image frames of the videos using
enhanced convolutional neural network in face images. Comput. Model. Eng. Sci 125(2),
625–645 (2020)
35. M. Thakong, S. Phimoltares, S. Jaiyen, C. Lursinsap, One-pass-throw-away learning for
cybersecurity in streaming non-stationary environments by dynamic stratum network. PLoS
One 13(9), e0202937 (2018)
36. M. Kalinin, V. Krundyshev, P. Zegzhda, Cybersecurity risk assessment in Smart City infra-
structures. Mach. Des. 9(4), 78 (2021)
37. W. Serrano, The blockchain random neural network for cybersecure IoT and 5G infrastructure
in smart cities. J. Netw. Comput. Appl. 175, 102909 (2021)
38. J. Zhang, Y. Zhao, J. Wang, B. Chen, FedMEC: Improving efficiency of differentially private
federated learning via mobile edge computing. Mobile Netw. Appl 25(6), 2421–2433 (2020)
39. S. Latif, Z. Idrees, J. Ahmad, L. Zheng, Z. Zou, A blockchain-based architecture for secure and
trustworthy operations in the industrial Internet of Things. J. Ind. Inf. Integr. 21, 100190 (2021)
40. W. Abramson, A.J. Hall, P. Papadopoulos, N. Pitropakis, W.J. Buchanan, A distributed trust
framework for privacy-preserving machine learning, in International Conference on Trust and
Privacy in Digital Business, (Springer, Cham, 2020, Sept), pp. 205–220