B. Durga Neelima
B. Durga Neelima
2
Assistant Professor, Department of Computer Science, Avanthi Degree & PG College, Osmania
University, Hyderabad, India.
ABSTRACT
The Internet of Things (IoT), which enables the connectivity of billions of things that can share data without
centralized coordination, is one of the most promising technologies now in use. It is quite challenging to maintain
such a big amount of data because continuing security must be guaranteed. AI is the technique utilized to increase
the IoT's effectiveness. The data that IoT devices gather can be more valuable, thanks to AI. By utilizing this
knowledge, better products and services that cater to client wants can be produced. This paper on Artificial
Intelligence for the Internet of Things addresses a number of significant issues and themes, including the design,
development, and evaluation of novel methodologies based on the use of AI solutions.
1. INTRODUCTION
IoT plays a vital role in our everyday lives and has a position in many households and enterprises in the newly
developing era of modern technology [1]. The Internet of Things (IoT) is a network of digital and analog
equipment and computer devices with unique identifiers (UIDs) that can exchange data automatically. In terms of
device connectivity, the IoT idea has offered the world a greater degree of accessibility, integrity, availability,
scalability, confidentiality, and interoperability. Due to a lack of security standards, IoTs are vulnerable to
cyberattacks. Cyberattacks on the Internet of Things (IoT) have been around for a very long time. The size and
complexity of these attacks, however, have increased. Nearly every object in the physical world will soon be
equipped with "smart" technology, from connected refrigerators to connected cars to connected IoT medical
devices. Each of these devices adds a new point of entry to the network and raises the stakes in terms of security
and privacy [ 3]. We will need artificial intelligence to make these gadgets "secure and smart". Additionally, we
must consider connected IoT devices' evolution across industries, where they are pervasive in all aspects of daily
life, from manufacturing to supply networks, and why a "security by design" approach should be used because
any one component can be compromised and to stop the entire ecosystem from being abused. Due to the complex
algorithms that identify aberrant behaviour and allow it to go unreported, this has led to a surge in the usage of AI
by cyberattackers [4]. With the development of IoT technologies, AI has attracted a lot of interest. With this
expansion, IoT cybersecurity apps have started to leverage AI technologies like decision trees, linear regression,
machine learning, support vector machines, and neural networks to be able to identify risks and prospective
assaults. In three survey-style sections, this review paper examines a range of issues related to cybersecurity, the
Internet of Things (IoT), artificial intelligence (AI), and how they all relate to one another. It also offers a thorough
analysis of cyberattacks against IoT devices and suggests AI-based defences against these attacks.
3.1 Botnets
More sophisticated equipment and computers have operating system mechanisms built into them. They are
often function-focused devices, lacking, for instance, the storage capacity or computational capability of
computers. In light of this, hackers frequently view IoT devices as simple attack vectors that they can quickly
exploit. One IoT device would not be significantly affected by malware installation, but infecting several IoT
devices enables attackers to create botnets, armies of compromised devices that launch assaults on other
networked systems. Attackers can direct their zombie devices to carry out assaults like flooding th e network
with traffic or transmitting spam by using botnets to do their bidding.
The greatest defence against botnets is to make sure all IoT devices are properly protected. This entails
updating firmware, changing default passwords, and restricting access to the device. Companies should also
have a strategy in place for detecting and handling DDoS assaults.
3.2 Ransomware
IoT devices aren't immune to ransomware threats just because they don't frequently store important data
locally. In most cases, ransomware attacks on IoT devices restrict the devices' essential operation rather than
encrypting data and demanding payment from an enterprise. That may entail turning off an industrial gadget
that is essential to running a business or blocking a camera or microphone from cap turing the feed it is focused
on. Businesses should make sure that all IoT devices are adequately protected in order to safeguard against
ransomware. This entails restricting access to the hardware, updating the firmware, and changing any default
passwords. Companies should also have a strategy in place for detecting and handling ransomware threats.
3.4 Invisibility
Because IoT device connections to the network are multiplying quickly, asset inventories frequently fall
behind, giving rise to the proverb "you can't protect what you can't see." Security teams may monitor the
traffic that passes through IoT devices in detail in order to see any unusual patterns, threats, and indicators of
active assaults when IoT devices are visible. Using network discovery tools to identify the networked devices
is an important step, even though it isn't the first one. Starting with the list of gadgets you are already familiar
with is recommended. Without a doubt, you are aware of your most precious and significant assets. Starting
there and safeguarding those devices is an important initial step, and using what you learn with those devices
can aid in your decision-making when selecting the tools you need and formulating your overall strategy.
4. AI IMPORTANCE IN CYBERSECURITY
The emergence of remote work practices and the interconnectedness of endpoints provide unique
cybersecurity difficulties. A contemporary, AI-driven endpoint response and detection solution that can
proactively block and isolate malware and ransomware attacks and advance endpoint security into a zero-trust
environment is required to tackle them. AI-based solutions make use of machine learning algorithms that can
quickly identify and address both known and unidentified dangers. Machine learning algorithms are used in
I-based solutions to quickly identify and address both known and unidentified threats.
REFERENCES
[1] Rouse M. What is IoT (Internet of Things) and how does it work? IoT Agenda, TechTarget.
http://www.internetofthingsagenda.techtarget.com/defnition/Internet-of-Things-IoT.
[2] Lu Y, Xu LD. Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE
Internet Things J. 2019;6(2):2103–15.
[3] Common cyber attacks in the IoT. https://www.globalsign.com/en/blog/common-cyber-attacks-in-the-iot.
[4] Pendse A. Transforming cybersecurity with the Artificial Intelligence and Machine Learning: view.
https://ciso.economictimes.indiatimes.com/news/transforming-cybersecuritywith-ai-and-ml/67899197
[5] IoT Attacks: 6 Security Risks To Be Aware Of, https://www.byos.io/blog/iot-attacks.
[6] Lakhani. A, The role of artificial intelligence in Internet of Things and Operational Technology Security
https://www.csoonline.com/article/566503/the-role-of-artificial-intelligence-in-iot-and-ot-security.html
[7] Zargar, S. T., Joshi, J., & Tipper, D. (2013). A survey of defence mechanisms against distributed denial of
service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), 2046-2069.
[8] Yan, Q., et al. (2015). Software-defined networking (SDN) and distributed denial of service (DDoS) attacks
in cloud computing environments: A survey, some research issues, and challenges. IEEE communications
surveys & tutorials, 18(1), 602-622.