Skip to main content

Addressing Security and Computation Challenges in IoT Using Machine Learning

  • Conference paper
  • First Online:
Advances in Distributed Computing and Machine Learning

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 127))

Abstract

The Internet of things (IoT) is widely used to implement different applications like smart home, smart health care, smart city, and smart farming system. The development of large smart devices/sensors enables smart technologies making it possible to implement the smart application in real time. The IoT system has security challenges like authentication, data privacy, access control, and intrusion detection system. Similarly, the computation of the sensed information from the environment is a challenging task. The computation must perform using distributed or decentralized architecture to overcome the centralized system difficulty. In a distributed/decentralized system when multiple nodes participate in a computational process, there is the risk of mutual consensus problem, malicious node detection, or data modification attacks. In this paper, the authors have identified machine learning as a solution to address some of the existing security and computational challenges. The paper also explained the implementation platform available for the integration of IoT with machine learning.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu X, Zhao M, Li S, Zhang F, Trappe W (2017) A security framework for the internet of things in the future internet architecture. Future Internet 9(3):27

    Article  Google Scholar 

  2. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE symposium on computers and communication (ISCC), pp 180–187. IEEE

    Google Scholar 

  3. Jaiswal K, Sobhanayak S, Mohanta BK, Jena D (2017) IoT-cloud based framework for patient’s data collection in smart healthcare system using raspberry-pi. In: 2017 International conference on electrical and computing technologies and applications (ICECTA), pp 1–4. IEEE

    Google Scholar 

  4. Hassan WH (2019) Current research on Internet of things (iot) security: a survey. Comput Netw 148:283–294

    Article  Google Scholar 

  5. Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Sec Appl 38:8–27

    Google Scholar 

  6. Salman O, Elhajj I, Chehab A, Kayssi A (2018) IoT survey: an SDN and fog computing perspective. Comput Netw 143:221–246

    Article  Google Scholar 

  7. Čolaković A, Hadžialić M (2018) Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks 144:17–39

    Article  Google Scholar 

  8. Canedo J, Skjellum A (2016) Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST), pp 219–222. IEEE

    Google Scholar 

  9. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning. arXiv:1801.06275

  10. Fernandez Molanes R, Amarasinghe K, Rodriguez-Andina J, Manic M (2018) Deep learning and reconfigurable platforms in the internet of things: challenges and opportunities in algorithms and hardware. IEEE Ind Electron Mag 12(2)

    Google Scholar 

  11. Hussain F, Hussain R, Hassan SA, Hossain E (2019) Machine learning in IoT security: current solutions and future challenges. arXiv:1904.05735

  12. Zantalis F, Koulouras G, Karabetsos S, Kandris D (2019) A review of machine learning and IoT in smart transportation. Future Internet 11(4):94

    Article  Google Scholar 

  13. Satapathy U, Mohanta BK, Panda SS, Sobhanayak S, Jena D (2019) A secure framework for communication in internet of things application using hyperledger based blockchain. In: 2019 10th international conference on computing, communication and networking technologies (ICCCNT), pp. 1–7. IEEE

    Google Scholar 

  14. Mohanta BK, Sahoo A, Patel S, Panda SS, Jena D, Gountia D (2019) DecAuth: decentralized authentication scheme for IoT device using ethereum blockchain. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 558–563. IEEE

    Google Scholar 

  15. Satapathy U, Mohanta BK, Jena D, Sobhanayak S (2018) An ECC based lightweight authentication protocol for mobile phone in smart home. In: 2018 IEEE 13th international conference on industrial and information systems (ICIIS), pp 303–308. IEEE

    Google Scholar 

  16. Santhadevi D, Janet B (2018) Security challenges in computing system, communication technology and protocols in IoT system. In: 2018 international conference on circuits and systems in digital enterprise technology (ICCSDET), pp 1–7. IEEE

    Google Scholar 

  17. Dey MR, Satapathy U, Bhanse P, Mohanta BK, Jena D (2019) MagTrack: detecting road surface condition using smartphone sensors and machine learning. In: TENCON 2019-2019 IEEE region 10 conference (TENCON), pp 2485–2489. IEEE

    Google Scholar 

  18. Pavani K, Damodaram A (2013) Intrusion detection using MLP for MANETs, pp 440–444

    Google Scholar 

  19. Kulkarni RV, Venayagamoorthy GK (2009) Neural network based secure media access control protocol for wireless sensor networks. In: 2009 international joint conference on neural networks, pp 1680–1687. IEEE

    Google Scholar 

  20. Xiao L, Xie C, Chen T, Dai H, Poor HV (2016) A mobile offloading game against smart attacks. IEEE Access 4:2281–2291

    Article  Google Scholar 

  21. Xiao L, Yan Q, Lou W, Chen G, Hou YT (2013) Proximity-based security techniques for mobile users in wireless networks. IEEE Trans Inf Foren Sec 8(12):2089–2100

    Article  Google Scholar 

  22. Xiao L, Li Y, Han G, Liu G, Zhuang W (2016) PHY-layer spoofing detection with reinforcement learning in wireless networks. IEEE Trans Veh Technol 65(12):10037–10047

    Article  Google Scholar 

  23. Ozay M, Esnaola I, Vural FTY, Kulkarni SR, Poor HV (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786

    Article  MathSciNet  Google Scholar 

  24. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal Process Mag 35(5):41–49

    Article  Google Scholar 

  25. Xiao L, Wan X, Han Z (2017) PHY-layer authentication with multiple landmarks with reduced overhead. IEEE Trans Wirel Commun 17(3):1676–1687

    Article  Google Scholar 

  26. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  27. Li C, Wang G (2012) A light-weight commodity integrity detection algorithm based on Chinese remainder theorem. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications, pp 1018–1023. IEEE

    Google Scholar 

  28. Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

    Article  Google Scholar 

  29. Oulhiq R, Ibntahir S, Sebgui M, Guennoun Z (2015) A fingerprint recognition framework using artificial neural network. In: 2015 10th international conference on intelligent systems: theories and applications (SITA), pp 1–6. IEEE

    Google Scholar 

  30. Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for IoT. Appl Soft Comput 72:79–89

    Article  Google Scholar 

  31. Brun O, Yin Y, Gelenbe E (2018) Deep learning with dense random neural network for detecting attacks against iot-connected home environments. Proc Comput Sci 134:458–463

    Article  Google Scholar 

  32. Hashimoto N, Ozawa S, Ban T, Nakazato J, Shimamura J (2018) A darknet traffic analysis for IoT malwares using association rule learning. Proc Comput Sci 144:118–123

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhabendu Kumar Mohanta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohanta, B.K., Satapathy, U., Jena, D. (2021). Addressing Security and Computation Challenges in IoT Using Machine Learning. In: Tripathy, A., Sarkar, M., Sahoo, J., Li, KC., Chinara, S. (eds) Advances in Distributed Computing and Machine Learning. Lecture Notes in Networks and Systems, vol 127. Springer, Singapore. https://doi.org/10.1007/978-981-15-4218-3_7

Download citation

Publish with us

Policies and ethics