Abstract
The Internet of things (IoT) is widely used to implement different applications like smart home, smart health care, smart city, and smart farming system. The development of large smart devices/sensors enables smart technologies making it possible to implement the smart application in real time. The IoT system has security challenges like authentication, data privacy, access control, and intrusion detection system. Similarly, the computation of the sensed information from the environment is a challenging task. The computation must perform using distributed or decentralized architecture to overcome the centralized system difficulty. In a distributed/decentralized system when multiple nodes participate in a computational process, there is the risk of mutual consensus problem, malicious node detection, or data modification attacks. In this paper, the authors have identified machine learning as a solution to address some of the existing security and computational challenges. The paper also explained the implementation platform available for the integration of IoT with machine learning.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27
Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), pp 180–187. IEEE
Jaiswal K, Sobhanayak S, Mohanta BK, Jena D (2017) IoT-cloud based framework for patient’s data collection in smart healthcare system using raspberry-pi. In: 2017 International conference on electrical and computing technologies and applications (ICECTA), pp 1–4. IEEE
Hassan WH (2019) Current research on Internet of things (iot) security: a survey. Comput Netw 148:283–294
Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Sec Appl 38:8–27
Salman O, Elhajj I, Chehab A, Kayssi A (2018) IoT survey: an SDN and fog computing perspective. Comput Netw 143:221–246
Čolaković A, Hadžialić M (2018) Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks 144:17–39
Canedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST), pp 219–222. IEEE
Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. arXiv:1801.06275
Fernandez Molanes R, Amarasinghe K, Rodriguez-Andina J, Manic M (2018) Deep learning and reconfigurable platforms in the internet of things: challenges and opportunities in algorithms and hardware. IEEE Ind Electron Mag 12(2)
Hussain F, Hussain R, Hassan SA, Hossain E (2019) Machine learning in IoT security: current solutions and future challenges. arXiv:1904.05735
Zantalis F, Koulouras G, Karabetsos S, Kandris D (2019) A review of machine learning and IoT in smart transportation. Future Internet 11(4):94
Satapathy U, Mohanta BK, Panda SS, Sobhanayak S, Jena D (2019) A secure framework for communication in internet of things application using hyperledger based blockchain. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT), pp. 1–7. IEEE
Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D (2019) DecAuth: decentralized authentication scheme for IoT device using ethereum blockchain. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 558–563. IEEE
Satapathy U, Mohanta BK, Jena D, Sobhanayak S (2018) An ECC based lightweight authentication protocol for mobile phone in smart home. In: 2018 IEEE 13th international conference on industrial and information systems (ICIIS), pp 303–308. IEEE
Santhadevi D, Janet B (2018) Security challenges in computing system, communication technology and protocols in IoT system. In: 2018 international conference on circuits and systems in digital enterprise technology (ICCSDET), pp 1–7. IEEE
Dey MR, Satapathy U, Bhanse P, Mohanta BK, Jena D (2019) MagTrack: detecting road surface condition using smartphone sensors and machine learning. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 2485–2489. IEEE
Pavani K, Damodaram A (2013) Intrusion detection using MLP for MANETs, pp 440–444
Kulkarni RV, Venayagamoorthy GK (2009) Neural network based secure media access control protocol for wireless sensor networks. In: 2009 international joint conference on neural networks, pp 1680–1687. IEEE
Xiao L, Xie C, Chen T, Dai H, Poor HV (2016) A mobile offloading game against smart attacks. IEEE Access 4:2281–2291
Xiao L, Yan Q, Lou W, Chen G, Hou YT (2013) Proximity-based security techniques for mobile users in wireless networks. IEEE Trans Inf Foren Sec 8(12):2089–2100
Xiao L, Li Y, Han G, Liu G, Zhuang W (2016) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047
Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786
Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41–49
Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Li C, Wang G (2012) A light-weight commodity integrity detection algorithm based on Chinese remainder theorem. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp 1018–1023. IEEE
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
Oulhiq R, Ibntahir S, Sebgui M, Guennoun Z (2015) A fingerprint recognition framework using artificial neural network. In: 2015 10th international conference on intelligent systems: theories and applications (SITA), pp 1–6. IEEE
Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89
Brun O, Yin Y, Gelenbe E (2018) Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Proc Comput Sci 134:458–463
Hashimoto N, Ozawa S, Ban T, Nakazato J, Shimamura J (2018) A darknet traffic analysis for IoT malwares using association rule learning. Proc Comput Sci 144:118–123
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohanta, B.K., Satapathy, U., Jena, D. (2021). Addressing Security and Computation Challenges in IoT Using Machine Learning. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_7
Download citation
DOI: https://doi.org/10.1007/978-981-15-4218-3_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4217-6
Online ISBN: 978-981-15-4218-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)