scispace - formally typeset
Open AccessJournal ArticleDOI

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

TLDR
A comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems and presents the opportunities, advantages and shortcomings of each method.
Abstract
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network and application security for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to effectively secure the IoT ecosystem. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory novelty to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.

read more

Citations
More filters
Journal ArticleDOI

The Future of Healthcare Internet of Things: A Survey of Emerging Technologies

TL;DR: The Internet of Nano Things and Tactile Internet are driving the innovation in the H-IoT applications and the future course for improving the Quality of Service (QoS) using these new technologies are identified.
Journal ArticleDOI

Machine Learning in IoT Security: Current Solutions and Future Challenges

TL;DR: This paper systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks, and sheds light on the gaps in these security solutions that call for ML and DL approaches.
Journal ArticleDOI

An IoT-based framework for early identification and monitoring of COVID-19 cases

TL;DR: It is believed that real-time symptom data would allow these five algorithms to provide effective and accurate identification of potential cases of COVID-19, and the framework would then document the treatment response for each patient who has contracted the virus.
Posted Content

A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions.

TL;DR: A comprehensive survey on blockchain for big data, focusing on up-to-date approaches, opportunities, and future directions is provided, including blockchain for secure big data acquisition, data storage, data analytics, and data privacy preservation.
Journal ArticleDOI

Effective Attack Detection in Internet of Medical Things Smart Environment Using a Deep Belief Neural Network

TL;DR: This work has proposed a deep learning-based method Deep Belief Network (DBN) algorithm model for the intrusion detection system and produced better results in all the parameters in relation to accuracy, recall, precision, F1-score, and detection rate.
References
More filters
Journal ArticleDOI

Random Forests

TL;DR: Internal estimates monitor error, strength, and correlation and these are used to show the response to increasing the number of features used in the forest, and are also applicable to regression.
Proceedings Article

ImageNet Classification with Deep Convolutional Neural Networks

TL;DR: The state-of-the-art performance of CNNs was achieved by Deep Convolutional Neural Networks (DCNNs) as discussed by the authors, which consists of five convolutional layers, some of which are followed by max-pooling layers, and three fully-connected layers with a final 1000-way softmax.
Journal ArticleDOI

Deep learning

TL;DR: Deep learning is making major advances in solving problems that have resisted the best attempts of the artificial intelligence community for many years, and will have many more successes in the near future because it requires very little engineering by hand and can easily take advantage of increases in the amount of available computation and data.
Book

The Nature of Statistical Learning Theory

TL;DR: Setting of the learning problem consistency of learning processes bounds on the rate of convergence ofLearning processes controlling the generalization ability of learning process constructing learning algorithms what is important in learning theory?
Journal ArticleDOI

Generative Adversarial Nets

TL;DR: A new framework for estimating generative models via an adversarial process, in which two models are simultaneously train: a generative model G that captures the data distribution and a discriminative model D that estimates the probability that a sample came from the training data rather than G.
Related Papers (5)
Trending Questions (2)
How is the effectiveness of ML-driven security measures evaluated in IoT?

The paper does not specifically mention how the effectiveness of ML-driven security measures is evaluated in IoT.

Are there trade-offs between scalability and effectiveness when implementing ML for IoT security?

Yes, there may be trade-offs between scalability and effectiveness when implementing machine learning for IoT security.