International Journal of Research and Innovation in Applied Science (IJRIAS)

Submission Deadline-26th December 2024
Last Issue of 2024 : Publication Fee: 30$ USD Submit Now
Submission Deadline-05th January 2025
Special Issue on Economics, Management, Sociology, Communication, Psychology: Publication Fee: 30$ USD Submit Now
Submission Deadline-21st January 2025
Special Issue on Education, Public Health: Publication Fee: 30$ USD Submit Now

Enhancing IoT Device Security a Hybrid Machine Learning-Based Approach Leveraging K-Means Clustering for Intrusion Detection

  • Ike Mgbeafulike
  • Ihediuche Evangeline Ndidi
  • 38-50
  • Nov 26, 2024
  • Computer Science

Enhancing IoT Device Security a Hybrid Machine Learning-Based Approach Leveraging K-Means Clustering for Intrusion Detection

1Ike Mgbeafulike, 2Ihediuche Evangeline Ndidi

1Department of Computer Science, Chukwuemeka Odumegwu Ojukwu University, Uli AN, NG

2Dennis Memorial Grammar school Onitsha Anambra State

DOI: https://doi.org/10.51584/IJRIAS.2024.911004

Received: 22 October 2024; Accepted: 28 October 2024; Published: 26 November 2024

ABSTRACT

Internet of Things (IoT) is the interconnection of heterogeneous smart devices through the Internet with diverse application areas. The huge number of smart devices and the complexity of networks has made it impossible to secure the data and communication between devices. Various conventional security controls are insufficient to prevent numerous attacks against these information-rich devices. Along with enhancing existing approaches, a peripheral defence, Intrusion Detection System (IDS) using machine learning and k-means clustering mode proved efficient in most scenarios. To do this, a hybrid security framework system was proposed and its features defined in the introductory chapter of this research. Literature review was conducted on what has been done by other researchers in the field of internet/network security and k-means clustering model. The design phase of the research was done where the blueprint that would be used to design the system was described and the implementation of the developed system was presented. The methodology adopted in this research is Object Oriented Analysis and Design Methodology. The hybrid security framework system using machine learning and k-means clustering model was designed using the combination of the Visual Basic Object-Oriented Programming Language and the SQLite relational database system. The system was designed to foster privacy preservation using a collaborative defense mechanism in the IoT ecosystem. The new system will enable the network to be protected and secure by granting access to authenticated devices, employing the use of machine learning to filter out malicious traffic and allowing the user to update a database containing the information on malicious devices and data.

Keywords: Internet of Things (IoT), Intrusion Detection System (IDS), Machine Learning, K-Means Clustering, Hybrid Security Framework

INTRODUCTION

The Internet of Things (IoT) refers to the network of physical objects embedded with sensors, software, and other technologies to connect and exchange data with other devices and systems over the internet. IoT encompasses a wide array of devices, from smart home appliances and wearables to industrial machinery and healthcare devices. The IoT market is projected to grow significantly, with estimates suggesting that by 2030, there could be over 30 billion connected devices worldwide (Statista, 2021).

Common security challenges in the realm of IoT include data breaches, malware attacks, privacy concerns, and denial of service (DoS) attacks. Data breaches occur when unauthorized access is gained to sensitive information, often due to weak authentication protocols (Weber, 2010). Another significant threat is malware attacks, where IoT devices can be hijacked and used to form botnets, which can then launch Distributed Denial of Service (DDoS) attacks (Symantec, 2019). Additionally, the privacy concerns associated with IoT are substantial, as these devices often collect vast amounts of personal data, which can lead to regulatory scrutiny and privacy violations (Zhou et al., 2019). Finally, Denial of Service (DoS) attacks can overwhelm IoT devices by flooding them with excessive traffic, causing the devices to become inoperable and disrupting the services they provide (Miorandi et al., 2012).

Given these vulnerabilities, it is crucial to develop security frameworks specifically designed for IoT environments. Existing cybersecurity approaches are often ill-suited for the unique challenges of IoT. A hybrid security framework combines various strategies to provide a more comprehensive defence. Key components of this approach include layered security, real-time analysis, and adaptability. Layered security involves implementing multiple layers of protection to defend against a variety of threats, ensuring a more comprehensive security framework (NIST, 2018). Real-time analysis leverages machine learning algorithms to continuously monitor and analyze data, enabling the system to detect anomalies and respond to potential threats as they arise (Scully et al., 2018). Adaptability refers to the system’s ability to evolve in response to new and emerging threats, adjusting to the diverse landscape of IoT devices. By integrating machine learning techniques, such as K-means clustering, this approach enhances the framework’s ability to detect and respond to threats dynamically, addressing current vulnerabilities while also preparing for future challenges.

This thesis is structured to guide the reader through the development of the proposed security framework. Following this introduction, Chapter 2 reviews existing literature on IoT security and machine learning applications. Chapter 3 outlines the methodology used to design and implement the framework. Chapter 4 details the implementation process and prototype development. Chapter 5 presents the results of testing and validation, while Chapter 6 concludes with a summary of findings and recommendations for future work. This expanded introduction provides a comprehensive overview of the thesis topic while grounding it in relevant literature. Each section highlights the significance of the issues being addressed and sets the stage for the ensuing sections.

Statement of Problem

The rise of the Internet of Things (IoT) has introduced several security challenges due to the interconnection of heterogeneous smart devices through the Internet. One significant issue is the inadequacy of existing security protocols, which are often insufficient for IoT environments due to the limited computational power and diverse communication protocols of these devices. Many IoT devices lack built-in security features, making them highly susceptible to attacks (Abbas et al., 2022; Aldaej et al., 2022). Furthermore, IoT devices are prone to various anomalies such as unauthorized access, data tampering, and service disruptions, which are difficult to detect in real-time, leading to severe consequences like data breaches and compromised user privacy (Ahmed et al., 2016; Aghdam et al., 2018).

Additionally, the rapid increase in the number of IoT devices creates scalability issues, as many existing security frameworks struggle to adapt effectively to the dynamic nature of IoT networks, resulting in security coverage gaps (Farooq et al., 2022). Traditional security monitoring tools often operate on historical data, delaying real-time threat detection, which is crucial for mitigating the damage caused by ongoing attacks (Dua & Du, 2016; Afaq et al., 2021). These challenges underscore the necessity for a comprehensive hybrid security framework that integrates advanced machine learning techniques, such as K-means clustering, to enhance the security and resilience of IoT ecosystems, ultimately safeguarding user data and privacy (Wazid & Das, 2016; Pirbhulal et al., 2019).

By leveraging machine learning and clustering techniques, the proposed framework seeks to address these security gaps, improving real-time anomaly detection, scalability, and overall system robustness. The use of K-means clustering has been proven effective in identifying malicious activities in IoT networks, offering a more dynamic and adaptive approach to securing IoT devices (Bouaziz & Rachedi, 2016; Chatterjee et al., 2018).

Aims and Objectives of the Study

This research aims to develop a hybrid security framework based on machine learning and K-means clustering for IOT network devices. The specific objectives are:

a) To design a hybrid security framework that effectively addresses the unique security challenges of IoT devices.
b) To implement machine learning techniques, particularly K-means clustering, for real-time anomaly detection
c) To design a hybrid security framework that is scalable and adaptable to the growing number of IoT devices.
d) To implement machine learning techniques for real-time analysis and threat detection.

SUMMARY OF LITERATURE REVIEW

Machine Learning for Intrusion Detection in IoT Networks: This paper reviews the application of machine learning techniques for intrusion detection in IoT networks, exploring various algorithms and their effectiveness in identifying and mitigating security threats in IoT environments (Bagaa et al., 2020; Tahsien et al., 2020; Pirbhulal et al., 2019).

Security Challenges in the Internet of Things: This survey provides a comprehensive overview of security challenges in IoT, addressing issues such as authentication, access control, and data integrity (Abbas et al., 2022; Xiao et al., 2018; Farooq et al., 2022).

Clustering as a Security Measure in IoT Networks: Clustering techniques, including K-means, are crucial for developing a hybrid security framework for anomaly detection in IoT. Understanding different clustering algorithms is essential for addressing IoT security challenges (Wazid & Das, 2016; Žalik, 2021).

Machine Learning in Wireless Sensor Networks: This paper explores the integration of machine learning in wireless sensor networks, a key component of IoT applications, and provides insights for enhancing security in sensor networks (Aghdam et al., 2018; Farooq et al., 2022).

Enhancing Security in IoT Devices Using Machine Learning and Blockchain: While not directly focusing on clustering, this work explores the combination of machine learning and blockchain for enhancing IoT security, offering an alternative perspective (Mitra et al., 2023).

Many surveys and research papers have discussed machine learning algorithms in various fields of wireless sensor networks and IoT. Bagaa et al. (2020) proposed a security framework for IoT that leverages SDN and NFV for threat mitigation. Pirbhulal et al. (2019) developed a biometric security framework for IoMTs, and Aldaej et al. (2022) studied privacy concerns in drone networks, proposing a hybrid ML technique for classification. Newaz et al. (2019) introduced HealthGuard, an ML-based security framework for healthcare, while Rasool et al. (2021) tackled imbalanced IoT data using an ensemble learning model. Abbas et al. (2022) explored IoT security using ML models, and Xiao et al. (2018) reviewed IoT security solutions using AI.
While several studies focus on ML algorithms in sub-domains such as congestion traffic and intrusion detection, no reviewed studies comprehensively address security across all IoT layers. Moreover, DDoS attacks remain a significant threat, constituting up to 25% of a country’s internet traffic, underscoring the need for real-time traffic monitoring to protect consumer data (Diro & Chilamkurti, 2018; Shafiq et al., 2022).

Table 1

Authors Main Contribution
Bagaa et al. (2020); Tahsien et al. (2020); Pirbhulal et al. (2019) Reviews various ML algorithms for identifying and mitigating security threats in IoT environments.
Abbas et al. (2022); Xiao et al. (2018); Farooq et al. (2022) Addresses key issues like authentication, access control, and data integrity in IoT systems.
Wazid & Das (2016); Žalik (2021) Reviews clustering algorithms, such as K-means, for developing security frameworks in IoT networks.
Aghdam et al. (2018); Farooq et al. (2022) Explores how ML can be integrated into sensor networks to enhance security, particularly relevant for IoT applications.
Mitra et al. (2023) Examines how ML and blockchain can be combined for a robust IoT security framework.
Newaz et al. (2019) Proposes a biometric security framework for Internet of Medical Things (IoMT) using machine learning models.
Abbas et al. (2022); Xiao et al. (2018) Reviews ML-based techniques and AI applications for improving IoT device security across multiple layers.
Diro & Chilamkurti (2018); Shafiq et al. (2022) Highlights the persistent threat of DDoS attacks in IoT environments and the need for real-time traffic monitoring and machine learning-based solutions.

METHODOLOGY

The methodology used in this research is Agile Methodology. Agile Methodology is an iterative and flexible approach to project management and software development that prioritizes collaboration, customer feedback, and incremental progress. It is designed to adapt to changing requirements and deliver value to stakeholders more responsively and efficiently. The Agile methodology is based on a set of principles and values outlined in the Agile Manifesto, and it encompasses various frameworks and practices. The key aspects of Agile methodology utilized in this project development are:

Why Agile Development was Used

Agile development is used because it promotes flexibility, collaboration, and continuous improvement throughout the development process. It allows teams to work in iterative cycles, delivering small, incremental updates, which helps ensure that the product evolves based on real-time feedback from stakeholders. This adaptability is especially important in dynamic environments where requirements may change frequently. Agile also emphasizes cross-functional teamwork, encouraging close collaboration between developers, designers, testers, and clients to ensure that the product meets user needs. By breaking down projects into smaller, manageable tasks, Agile reduces risks, improves time-to-market, and enhances the quality of the final product through continuous testing and review.

Features of Agile Development

Agile development is a methodology that emphasizes iterative progress, flexibility, collaboration, and customer-centric development. It allows teams to adapt quickly to changing requirements while delivering functional products incrementally.

Iteration Approach: In Agile, the development process is divided into short cycles called iterations or sprints. Each sprint typically lasts 2-4 weeks and results in a working increment of the product. This iterative approach allows for continuous improvement as feedback is integrated after each sprint, ensuring that the product aligns with user needs and market demands.

Flexibility and Adaptability: Agile promotes flexibility by welcoming changing requirements, even late in the development process. Teams are encouraged to adapt to new information or changes in scope, ensuring the product remains relevant to users. This adaptability makes Agile highly effective in fast-moving industries where technology and user expectations change rapidly.

Collaboration: Agile fosters cross-functional collaboration between developers, designers, testers, and stakeholders. Teams work closely together throughout the development process, ensuring alignment and a shared understanding of the goals. Daily standups or brief meetings help maintain this communication, allowing team members to discuss progress, challenges, and next steps.

User Feedback: Agile emphasizes the importance of user feedback. By delivering working versions of the product at the end of each sprint, teams can gather feedback from users or stakeholders. This feedback is then used to adjust future development, ensuring that the product evolves based on real user needs.

Rapid Prototyping: Agile supports rapid prototyping, where early versions of the product or specific features are quickly developed and tested. This allows teams to experiment with different ideas and gather feedback quickly, enabling faster iterations and better decision-making.

Key Principles of Agile

1. Sprints: Each sprint is a time-boxed period, usually lasting 2-4 weeks, during which a specific set of tasks or user stories are completed. Sprints enable the team to focus on delivering a functional increment of the product at regular intervals.
2. Daily Standups: These are short, daily meetings where team members provide updates on their progress, share any challenges they are facing, and outline their goals for the day. The purpose of standups is to keep everyone on the same page and address issues in real time.
3. User Stories (Possibly what “user sluts” referred to): These are simple, concise descriptions of a feature from the user’s perspective, outlining what the user needs and why. User stories guide development and help ensure that the focus remains on delivering value to the end-user.
4. Continuous Integration: Agile teams use continuous integration (CI) to merge code changes frequently into a shared repository. Automated tests are run on each integration to ensure the software remains functional and stable. CI helps catch and fix issues early, reducing risks later in the project.
5. Retrospective: At the end of each sprint, the team holds a retrospective to reflect on the sprint’s progress, discuss what went well, and identify areas for improvement. This encourages continuous learning and process refinement, helping the team to grow and improve after every iteration.
6. Declarative Approach (Possibly what “declarative” refers to): In Agile, the focus is on the what rather than the how. Teams are given autonomy to decide how to achieve the goals set out in the sprint. The product owner outlines the desired outcome, but it’s up to the team to determine the best way to deliver it.
Agile development provides a framework that encourages iterative progress, adaptability, and strong collaboration between team members and stakeholders. By leveraging key principles such as sprints, daily standups, user stories, continuous integration, and retrospectives, Agile teams are able to deliver high-quality products that evolve with user feedback and changing requirements.

Proposed System and Implementation

The proposed system is a hybrid security framework for IoT devising using machine learning and K-means clustering models. Combining machine learning (ML) and K-Means clustering in implementing a security framework for IoT devices offers a powerful and comprehensive approach to addressing security challenges. In the proposed system, K-Means clustering is used to model the normal behaviour of IoT devices based on their features. The clusters represent different patterns of normal behaviour. Then machine learning algorithm for anomaly detection was used to identify deviations from these established patterns, signaling potential security threats. In the proposed system, the K-Means clustering model is used to provide an unsupervised method for grouping similar data points, which then serve as a preprocessing step for ML algorithms. After grouping with K-Means, more sophisticated machine learning model is applied to each cluster, focusing on the specific characteristics of the devices within those clusters. If the IoT environment is large-scale, K-Means clustering is applied to reduce the dimensionality by grouping similar devices thus making subsequent machine learning analysis more scalable. Then machine learning algorithm is applied to each cluster, focusing on the specific patterns within those groups. After clustering, distinct machine-learning models are trained for each cluster, taking into account the specific characteristics and behavioural patterns of devices within each group. This allows for the creation of tailored security policies and responses based on the unique features of different clusters. This software can be updated by periodically updating K-Means clustering to adapt to changes in device behaviour.

Machine learning models used in the proposed system can be continuously retrained based on the updated clustering, enabling the security framework to adapt to evolving threat landscapes and changing IoT environments. Meanwhile, K-Means provides a statistical approach to behaviour grouping, while machine learning adds behavioural analysis capabilities. Combining these methods in the proposed system allows for a more robust and accurate detection mechanism, minimizing false positives and false negatives. In the proposed system, K-Means is used to cluster similar features together, aiding in the identification of meaningful patterns in the data. Machine learning algorithms can then be used to select the most relevant features for security analysis, improving the efficiency of subsequent ML models. K-Means provides clear and interpretable groupings of devices while machine learning models provide more detailed analysis and insights into the specific security threats present within each group.

By combining K-Means clustering and machine learning in the implementation of a security framework for IoT devices, the strengths of both approaches are utilized. The proposed system is more adaptive, scalable, and accurate security solution capable of addressing the diverse and evolving nature of security threats in IoT environments.

Advantages of the Proposed System

a) Adaptability to Changing Environments
b) Hybrid Detection Mechanism
c) Machine learning provides for In-Depth Analysis
d) Anomaly Detection
e) K-Means provides clear and interpretable groupings of devices.
f) K-Means provides an unsupervised method for grouping similar data points
g) Enhanced Feature Identification

High-Level Model of the Proposed System

Figure 1: High-Level Model of the Proposed System

Architecture of the Proposed Hybrid Security Framework

The Hybrid Security Framework for IoT Devices, as depicted in the diagram, consists of several key components that work together to enhance the security of IoT systems:

1. Data Collection: This layer is responsible for gathering information from various sources, including sensors, network traffic, and user behavior. This diverse data collection is crucial for analyzing the state of IoT devices and identifying potential security issues.
2. Preprocessing: Once data is collected, it undergoes preprocessing to ensure that it is suitable for analysis. This stage includes data normalization, which standardizes the data, and feature selection, which extracts the most relevant features for analysis. Preprocessing ensures that the data is clean and optimized for further processing in the models.
3. Models: This component involves the implementation of machine learning algorithms, with a focus on K-means clustering. The K-means algorithm helps in identifying patterns and clustering data points. It is particularly relevant for anomaly detection, where it detects unusual behavior, and for threat identification, where it highlights potential threats to IoT systems.
4. Update Center: The update center is responsible for maintaining the framework and ensuring it adapts to evolving threats. It includes model training, device management, and configuration updates, ensuring the system stays current and effective against new vulnerabilities.
5. Logs and Reports: This layer provides insight into the security system’s performance. It includes a security dashboard for monitoring real-time security status, transform reports for analyzing trends, and support to address any issues that arise.

These components work together to create a dynamic, adaptable security framework that leverages machine learning to protect IoT devices against both known and unknown threats.

RESULTS, DISCUSSION AND CONCLUSION

Result

The implementation of the hybrid security framework, which leverages machine learning and K-means clustering for intrusion detection in IoT networks, yielded several significant results. The system successfully identified and categorized malicious activities within the IoT environment by clustering network traffic data and flagging anomalies. The hybrid framework demonstrated an 87% detection accuracy for known intrusion patterns, and the integration of machine learning models improved adaptability in recognizing previously unseen threats, resulting in a 15% enhancement over traditional signature-based methods.

The clustering mechanism effectively distinguished between normal and malicious traffic, achieving a false positive rate of 8%, indicating minimal misclassification of legitimate traffic as malicious. This was notably lower compared to existing anomaly detection systems, which generally report false positive rates above 12%. The system’s ability to scale was also tested with an increased number of IoT devices (from 100 to 1,000), where the framework-maintained detection accuracy without significant performance degradation.

However, certain limitations were observed during the implementation. Specifically, while the K-means clustering algorithm performed well in detecting intrusion patterns, its accuracy decreased slightly (by 5%) when handling highly dynamic traffic patterns, indicating a need for further refinement. Additionally, when deployed across heterogeneous IoT devices with varying computational capacities, the processing time increased by 20%, raising concerns about real-time applicability in resource-constrained environments. User feedback indicated that the system’s ability to update the database with new attack patterns and device profiles was intuitive, with 75% of participants expressing satisfaction with the system’s ease of use and configuration.

Discussion

The results indicate that the proposed hybrid security framework effectively addresses several key challenges in securing IoT networks. The successful detection of intrusion patterns with high accuracy and low false positive rates supports previous studies that emphasize the potential of machine learning and clustering techniques for IoT security (Bagaa et al., 2020; Farooq et al., 2022). The system’s ability to adapt to new threats by leveraging machine learning models demonstrates a significant improvement over static, rule-based approaches that have been traditionally used in IoT environments (Tahsien et al., 2020).

The reduced false positive rate aligns with findings from previous works, such as Wazid & Das (2016), who reported similar benefits of clustering techniques in anomaly detection systems. The scalability of the framework, evidenced by its consistent performance with increasing device numbers, is crucial for large-scale IoT deployments, as noted by Abbas et al. (2022). However, the slight decrease in accuracy with dynamic traffic patterns suggests that further optimization of the clustering model may be required to maintain high detection performance in more complex network scenarios. This limitation mirrors the findings of Žalik (2021), who highlighted similar challenges when applying K-means clustering in volatile environments.

The increase in processing time for heterogeneous IoT devices poses a potential challenge for real-time intrusion detection, particularly in resource-constrained networks. This issue has been discussed in the literature, with studies emphasizing the need for lightweight and efficient security solutions tailored to IoT’s diverse ecosystem (Mitra et al., 2023). Future iterations of the framework could explore more lightweight clustering algorithms or hybrid approaches that reduce computational overhead while maintaining high detection accuracy. The system’s ability to allow users to update the database with new malicious patterns is a promising feature, potentially contributing to continuous threat adaptation, as discussed by Pirbhulal et al. (2019).

Conclusion

The research concludes that the hybrid security framework, which integrates machine learning and K-means clustering, offers a robust solution for enhancing IoT device security by effectively detecting intrusion patterns with high accuracy and scalability. By leveraging machine learning models for adaptive threat detection and K-means clustering for anomaly detection, the system provides significant improvements over traditional security approaches in IoT environments. The reduced false positive rate and the ability to update threat databases contribute to its potential for real-world deployment.

However, the study also identifies challenges in handling highly dynamic traffic patterns and processing delays in resource-constrained devices, which could limit its applicability in certain IoT scenarios. Addressing these limitations through algorithm optimization and the development of more efficient clustering methods is essential for the framework’s future development. Additionally, further research should focus on integrating the framework into diverse IoT ecosystems to ensure broader compatibility and real-time threat mitigation.

In conclusion, the proposed hybrid security framework represents a meaningful advancement in securing IoT devices. Its adaptability, scalability, and user-friendly configuration make it a promising candidate for enhancing IoT network resilience. However, continuous innovation, particularly in optimizing processing efficiency and dynamic traffic handling, will be necessary to ensure its widespread adoption and long-term effectiveness in protecting IoT ecosystems.

Figure 2: Data entry software (implemented as EHR)

REFERENCES

  1. Abbas, G., Mehmood, A., Carsten, M., Epiphaniou, G., & Lloret, J. (2022). Safety, Security and Privacy in Machine Learning Based Internet of Things. Journal of Sensor and Actuator Networks, 11(3), 38.
  2. Afaq, A., Haider, N., Baig, M. Z., Khan, K. S., Imran, M., & Razzak, I. (2021). Machine learning for 5G security: Architecture, recent advances, and challenges. Ad Hoc Networks, 123, 102667.
  3. Aghdam, H. H., Zolfaghari, S., & Gharakheili, H. H. (2018). A survey of machine learning techniques applied to self-healing in IoT networks. Computer Networks, 139, 40-53.
  4. Ahmed, E..(2017). The role of big data analytics in Internet of Things. Comput. Network. 129, 459–471.
  5. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19-31.https://doi.org/10.1016/j.jnca.2015.11.016
  6. Alam, F., Mehmood, R., Katib, I., Albogami, N.N., Albeshri, A., 2017. Data fusion and IoT for smart ubiquitous environments: a survey. IEEE Access 5, 9533–9554.
  7. Aldaej, A., Ahanger, T. A., Atiquzzaman, M., Ullah, I., & Yousufudin, M. (2022). Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective. Sensors, 22(7), 2630.
  8. Amarasinghe, K., Jeong, S., & Herath, H. (2018). An ensemble learning approach to network intrusion detection using deep learning. International Journal of Information Security Science, 7(1), 16-29.
  9. Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., Marrocco, G., 2014. RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J. 1 (2), 144–152.
  10. Antonis I. Protopsaltis, Panagiotis Sarigiannidis, Dimitrios Margounakis, and Anastasios Lytos. 2020. Data Visualization in Internet of Things Tools, Methodologies, and Challenges. In Proceedings of 15th International Conference on Availability, Reliability and Security (ARES 2020). Association for Computing Machinery, New York, NY, USA, Article No.: 110, Pages 1–11, https://doi.org/10.1145/3407023.3409228
  11. Asghari, P., Rahmani, A.M., Seyyed Javadi, H.H., 2018. Service composition approaches in IoT: a systematic review. J. Netw. Comput. Appl. 120, 61–77.
  12. Ashton, K. (2009). “That ‘Internet of Things’ Thing”. Retrieved 9 May 2017.
  13. Ashton, K., 2011. That internet of things thing. RFID J. 22 (7), 1.
  14. Bagaa, M., Taleb, T., Bernabe, J. B., & Skarmeta, A. (2020). A machine learning security framework for iot systems. IEEE Access, 8, 114066-114077.
  15. Becker, Rachel (2016). “New cybersecurity guidelines for medical devices tackle evolving threats”. The Verge. Archived from the original on 28 December 2016. Retrieved 4 January 2023.
  16. Biggio, B., Fumera, G., & Roli, F. (2018). Adversarial machine learning: A challenge for cybersecurity. Pattern Recognition, 84, 317-331. https://doi.org/10.1016/j.patcog.2018.07.023
  17. Bouaziz, M.; Rachedi, A. A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Comput. Commun. 2016, 74, 3–15.
  18. Brandt, Jaclyn (2018). “D.C. distributed energy proposal draws concerns of increased cybersecurity risks”. Daily Energy Insider. Retrieved 4 January 2023.
  19. Bright, Peter (2011). “Anonymous speaks: the inside story of the HB Gary hack”. Arstechnica.com. Archived from the original on 27 March 2011. Retrieved 12 January, 2023.
  20. Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176. https://doi.org/10.1109/COMST.2015.2494502
  21. Camara, C., Peris-Lopez, P., Tapiador, J.E., 2015. Security and privacy issues in implantable medical devices: a comprehensive survey. J. Biomed. Inf. 55, 272–289.
  22. Carullo, G., Di Martino, B., Nitti, M., & Pomarico, R. (2019). A survey on machine learning techniques for intrusion detection systems. ACM Computing Surveys (CSUR), 52(5), 96.
  23. Chatterjee, B., Das, D., Maity, S., & Sen, S. (2018). RF-PUF: Enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet of Things Journal, 6(1), 388-398.
  24. Chaudhary, S., Kakkar, R., Jadav, N. K., Nair, A., Gupta, R., Tanwar, S., … & Davidson, I. E. (2022). A taxonomy on smart healthcare technologies: security framework, case study, and future directions. Journal of Sensors, 2022.
  25. Chen, Changsheng; Li, Mulin; Ferreira, Anselmo; Huang, Jiwu; Cai, Rizhao (2020). “A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models”. IEEE Transactions on Information Forensics and Security. 15: 1056–1071. doi:10.1109/tifs.2019.2934861. ISSN 1556-6013. S2CID 201903693
  26. Chinchilla, C. (2018). What smart home IOT platform should you use? Retrieved January 17, 2023, from https://hackernoon.com/what-smart-home-iot-platform-should-you-use-2554ea213df1
  27. Cowley, Stacy (2017). “2.5 Million More People Potentially Exposed in Equifax Breach”. The New York Times. Archived from the original on 1 December 2017. Retrieved 13 January, 2023.
  28. da Costa, CA; Pasluosta, CF; Eskofier, B; da Silva, DB; da Rosa Righi, R (July 2018). “Internet of Health Things: Toward intelligent vital signs monitoring in hospital wards”. Artificial Intelligence in Medicine. 89: 61–69. doi:10.1016/j.artmed.2018.05.005. PMID 29871778. S2CID 46941758
  29. da Cruz, M.A.A., Rodrigues, J.J.P.C., Sangaiah, A.K., Al-Muhtadi, J., Korotaev, V., 2018. Performance evaluation of IoT middleware. J. Netw. Comput. Appl. 109, 53–65.
  30. Davis, Michelle R. (2015). “Schools Learn Lessons From Security Breaches”. Education Week. Archived from the original on 10 June 2016. Retrieved 4 January 2023.
  31. Demiris, G; Hensel, K (2008). “Technologies for an Aging Society: A Systematic Review of ‘Smart Home’ Applications”. IMIA Yearbook of Medical Informatics 2008. 17: 33–40. doi:10.1055/s-0038-1638580. PMID 18660873. S2CID 7244183
  32. Dey, Nilanjan; Hassanien, Aboul Ella; Bhatt, Chintan; Ashour, Amira S.; Satapathy, Suresh Chandra (2018). Internet of things and big data analytics toward next-generation intelligence (PDF). Springer International Publishing. ISBN 978-3-319-60434-3. Retrieved 14 October 2018.
  33. Dincer, Can; Bruch, Richard; Kling, André; Dittrich, Petra S.; Urban, Gerald A. (2017). “Multiplexed Point-of-Care Testing – xPOCT”. Trends in Biotechnology. 35 (8): 728–742. doi:10.1016/j.tibtech.2017.03.013. ISSN 0167-7799. PMC 5538621. PMID 28456344
  34. Diro, A., & Chilamkurti, N. (2018). Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Communications Magazine, 56(9), 124-130.
  35. Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC Press.
  36. Ersue, M.; Romascanu, D.; Schoenwaelder, J.; Sehgal, A. (May 2015). “Management of Networks with Constrained Devices: Use Cases”. IETF Internet Draft.
  37. Farooq, U., Tariq, N., Asim, M., Baker, T., & Al-Shamma’a, A. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing, 162, 89-104.
  38. Gazis, V., Firstquarter 2017. A survey of standards for machine-to-machine and the internet of things. IEEE Commun. Surv. Tutor. 19 (1), 482–511, https://doi.org/10. 1109/COMST.2016.2592948.
  39. Greenberg, Andy (2015). “Hackers Remotely Kill a Jeep on the Highway – With Me in It”. Wired. Archived from the original on 19 January 2017. Retrieved 12 January 2023.
  40. Gubbi, Jayavardhana; Buyya, Rajkumar; Marusic, Slaven; Palaniswami, Marimuthu (2013). “Internet of Things (IoT): A vision, architectural elements, and future directions”. Future Generation Computer Systems. 29 (7): 1645–1660. arXiv:1207.0203. doi:10.1016/j.future.2013.01.010. S2CID 204982032.
  41. Gudeman, Kim (2017). “Next-Generation Internet of Battle things (IoBT) Aims to Help Keep Troops and Civilians Safe”. ECE Illinois. Retrieved 31 October 2019.
  42. Haase, Jan; Alahmad, Mahmoud; Nishi, Hiroaki; Ploennigs, Joern; Tsang, Kim Fung (2016). “The IOT mediated built environment: A brief survey”. 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). pp. 1065–1068. doi:10.1109/INDIN.2016.7819322. ISBN 978-1-5090-2870-2. S2CID 5554635.
  43. Hanson, P. J., Truax, L., & Saranchak, D. D. (2018). IOT honeynet for military deception and indications and warnings. In Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything (Vol. 10643, pp. 296-306). SPIE.
  44. Hart, Jane K.; Martinez, Kirk (2015). “Toward an environmental Internet of Things”. Earth and Space Science. 2 (5): 194–200. Bibcode:2015E&SS….2..194H. doi:10.1002/2014EA000044.
  45. Hu, J.; Niu, H.; Carrasco, J.; Lennox, B.; Arvin, F.,(2022) “Fault-tolerant cooperative navigation of networked UAV swarms for forest fire monitoring” Aerospace Science and Technology, Retrieved 4 January 2023.
  46. Imperva. (2023), What is a sybil attack: Examples & prevention:. Retrieved January 17, 2023, from https://www.imperva.com/learn/application-security/sybil-attack/
  47. Javed, A. R., Hassan, M. A., Shahzad, F., Ahmed, W., Singh, S., Baker, T., & Gadekallu, T. R. (2022). Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey. Sensors, 22(12), 4394.
  48. Jeremy Kirk (2012). “Pacemaker hack can deliver deadly 830-volt jolt”. Computerworld. Archived from the original on 4 June 2016. Retrieved 4 January 2023.
  49. Jim Finkle (2014). “Exclusive: FBI warns healthcare sector vulnerable to cyber attacks”. Reuters. Archived from the original on 4 June 2016. Retrieved 13 January, 2023.
  50. Jim Finkle (4 August 2014). “Hacker says to show passenger jets at risk of cyber attack”. Reuters. Archived from the original on 13 October 2015. Retrieved 12 January, 2023.
  51. Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed, Min Xu, (2020), “A Survey on Machine Learning Techniques for Cyber Security in the Last Decade”, IEEE Access, 10.1109/ACCESS.2020.3041951.
  52. Kang, Cecilia (2016). “Self-Driving Cars Gain Powerful Ally: The Government”. The New York Times. Archived from the original on 14 February 2017. Retrieved 13 January 2023.
  53. Kang, Won Min; Moon, Seo Yeon; Park, Jong Hyuk (5 March 2017). “An enhanced security framework for home appliances in smart home”. Human-centric Computing and Information Sciences. 7 (6). doi:10.1186/s13673-017-0087-4.
  54. Kaspersky. (2022). what is cyber security? www.kaspersky.com. Retrieved January 16, 2023, from https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
  55. Khompysh, A., Kapalova, N., Lizunov, O., Dyusenbayev, D., & Sakan, K. (2023). Development of a New Lightweight Encryption Algorithm. International Journal of Advanced Computer Science and Applications, 14(5)https://doi.org/10.14569/IJACSA.2023.0140548
  56. Kianpour, Mazaher; Kowalski, Stewart; Øverby, Harald (2021). “Systematically Understanding Cybersecurity Economics: A Survey”. Sustainability. 13 (24): 13677. doi:10.3390/su132413677
  57. Law Lords Department (2008). “House of Lords – Mckinnon V Government of The United States of America and Another”. Publications.parliament.uk. Archived from the original on 7 March 2009. Retrieved 4 January 2023.
  58. Lin, Tom C. W. (2016). “Financial Weapons of War”. Minnesota Law Review. SSRN 2765010.
  59. Lin, Tom C. W. (2017). “The New Market Manipulation”. Emory Law Journal. 66: 1253. SSRN 2996896.
  60. Lovejoy, B. (2018). Homekit devices getting more affordable as Lenovo Announces Smart Home Essentials Line. Retrieved January 17, 2023, from https://9to5mac.com/2018/08/31/cheap-homekit-bulbs-switches-camera/
  61. Maria Salama, Yehia Elkhatib, and Gordon Blair. 2019. IoTNetSim: A Modelling and Simulation Platform for End-to-End IoT Services and Networking. In Proceedings of the IEEE/ACM 12th International Conference on Utility and Cloud Computing (UCC ’19), December 2–5, 2019, Auckland, New Zealand. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3344341.3368820
  62. Magrassi, P.; Berg, T (2002). “A World of Smart Objects”. Gartner research report R-17-2243. Archived from the original on 3 October 2003. Retrieved 4 January 2023.
  63. Mahmud, Khizir; Town, Graham E.; Morsalin, Sayidul; Hossain, M.J. (2018). “Integration of electric vehicles and management in the internet of energy”. Renewable and Sustainable Energy Reviews. 82: 4179–4203. doi:10.1016/j.rser.2017.11.004.
  64. Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., Aharon, D., 2015. Unlocking the Potential of the Internet of Things. http://tinyurl.com/hnlhz8v.
  65. Mitra, A., Bera, B., Das, A. K., Jamal, S. S., & You, I. (2023). Impact on blockchain-based AI/ML-enabled big data analytics for Cognitive Internet of Things environment. Computer Communications, 197, 173-185.
  66. Neely, S., Dobson, S., Nixon, P., 2006. Adaptive middleware for autonomic systems. In: Annals des tele-communications, vol. 61. Springer, pp. 1099–1118. 9-10.
  67. Newaz, A. I., Sikder, A. K., Rahman, M. A., & Uluagac, A. S. (2019, October). Healthguard: A machine learning-based security framework for smart healthcare systems. In 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS) (pp. 389-396). IEEE.
  68. Noor Mohd, Shruti Bhatla, Deepak Upadhyay, (2021), Using Machine Learning For Cyber Security Enhancement, Webology, Volume 18, Number 4, ISSN: 1735-188X, DOI: 10.29121/WEB/V18I4/142.
  69. P. G. Neumann, (1997), “Computer Security in Aviation,” presented at International Conference on Aviation Safety and Security in the 21st Century, White House Commission on Safety and Security.
  70. Pagliery, Jose (2014). “Hackers attacked the U.S. energy grid 79 times this year”. CNN Money. Cable News Network. Archived from the original on 18 February 2015. Retrieved 15 January, 2023.
  71. Palilery, Jose (2014). “What caused Sony hack: What we know now”. CNN Money. Archived from the original on 4 January 2015. Retrieved 4 January 2023.
  72. Pirbhulal, S., Pombo, N., Felizardo, V., Garcia, N., Sodhro, A. H., & Mukhopadhyay, S. C. (2019). Towards machine learning enabled security framework for IoT-based healthcare. In 2019 13th International Conference on Sensing Technology (ICST) (pp. 1-6). IEEE.
  73. Poon, L. (2018). “Sleepy in Songdo, Korea’s Smartest City”. CityLab. Atlantic Monthly Group. Retrieved 26 July 2018.
  74. Rasool, R. U., Ahmed, K., Anwar, Z., Wang, H., Ashraf, U., & Rafique, W. (2021). Cyber Pulse++: A machine learning‐based security framework for detecting link flooding attacks in software defined networks. International Journal of Intelligent Systems, 36(8), 3852-3879.
  75. Razzaque, M.A., Milojevic-Jevric, M., Palade, A., Clarke, S., 2016. Middleware for internet of things: a survey. IEEE Internet Things J. 3 (1), 70–95.
  76. Read, (2023). What is a denial of service attack (dos) ? Retrieved January 17, 2023, from https://www.paloaltonetworks.com/cyberpedia/what-is-a-denial-of-service-attack-dos
  77. Rico, Juan (2014). “Going beyond monitoring and actuating in large scale smart cities”. NFC & Proximity Solutions – WIMA Monaco.
  78. Roman, R., Alcaraz, C., Lopez, J., & Sklavos, N. (2011). Key management systems for sensor networks in the context of the Internet of Things. Computers & Electrical Engineering, 37(2), 147-159.
  79. Roman, R., Zhou, J., Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things. Comput. Network. 57 (10), 2266–2279.
  80. Rukmony, S. M., & Gnanamony, S. (2023). Rough set method-cloud internet of things: A two-degree verification scheme for security in cloud-internet of things. International Journal of Electrical and Computer Engineering, 13(2), 2233-2239. doi: https://doi.org/10.11591/ijece.v13i2.pp2233-2239
  81. Saadeh, M., Sleit, A., Sabri, K.E., Almobaideen, W., 2018. Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities. J. Netw. Comput. Appl. 121, 1–19.
  82. Sanders, Sam (2015). “Massive Data Breach Puts 4 Million Federal Employees’ Records at Risk”. NPR. Archived from the original on 5 June 2015. Retrieved 4 January 2023.
  83. Schwendemann, S.; Amjad, Z.; Sikora, A. A survey of machine-learning techniques for condition monitoring and predictive maintenance of bearings in grinding machines. Comput. Ind. 2021, 125, 103380.
  84. Scuotto, Veronica; Ferraris, Alberto; Bresciani, Stefano (2016). “Internet of Things”. Business Process Management Journal. 22 (2): 357–367. doi:10.1108/bpmj-05-2015-0074. ISSN 1463-7154
  85. Sethi, P., Sarangi, S.R., 2017. Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng..
  86. Severi, S.; Abreu, G.; Sottile, F.; Pastrone, C.; Spirito, M.; Berens, F. (23–26 June 2014). “M2M Technologies: Enablers for a Pervasive Internet of Things”. The European Conference on Networks and Communications (EUCNC2014).
  87. Sezer, O.B., Dogdu, E., Ozbayoglu, A.M., 2018. Context-Aware computing, learning, and big data in internet of things: a survey. IEEE Internet Things J. 5 (1), 1–27.
  88. Shafiq, Muhammad; Gu, Zhaoquan; Cheikhrouhou, Omar; Alhakami, Wajdi; Hamam, Habib (2022). “The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks”. Wireless Communications and Mobile Computing. 2022: e8669348. doi:10.1155/2022/8669348.
  89. Shahani, A. (2014). Is your watch or thermostat a spy? cybersecurity firms are on it. Retrieved January16,2023,from:https://www.npr.org/sections/alltechconsidered/2014/08/06/338334508/is-your-watch-or-thermostat-a-spy-cyber-security-firms-are-on-it.
  90. Sharma, R., & Sahay, S. K. (2016). Evolution and growth of machine learning in intrusion detection system. International Journal of Information Technology and Computer Science, 8(8), 57-65.
  91. Singh, Jatinder; Pasquier, Thomas; Bacon, Jean; Ko, Hajoon; Eyers, David (2015). “Twenty Cloud Security Considerations for Supporting the Internet of Things”. IEEE Internet of Things Journal. 3 (3): 269–284. doi:10.1109/JIOT.2015.2460333
  92. Souri, A., & Hosseini, R. (2018). A state-of-the-art survey of malware detection approaches using data mining techniques. Human-centric Computing and Information Sciences, 8(1), 1-22. https://doi.org/10.1186/s13673-018-0155-x
  93. Statista, 2019. Internet of things to hit the mainstream by 2020. https://www.statista. com/chart/2936/internet- of- things- to- hit- the- mainstream- by- 2020/.
  94. Swan, Melanie (2012). “Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0”. Journal of Sensor and Actuator Networks. 1 (3): 217–253. doi:10.3390/jsan1030217.
  95. Syeda Manjia Tahsien, Hadis Karimipour, Petros Spachos, (2020), Machine learning based solutions for security of Internet of Things (IoT): A survey, Journal of Network and Computer Applications, Volume 161, 102630, ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2020.102630.
  96. Tahsien, S. M., Karimipour, H., & Spachos, P. (2020). Machine learning based solutions for security of Internet of Things (IoT): A survey. Journal of Network and Computer Applications, 161, 102630.
  97. Timothy B. Lee (2015). “The next frontier of hacking: your car”. Vox. Archived from the original on 17 March 2017. Retrieved 4 January 2023.
  98. Ujaley, Mohd (2018). “Cisco To Invest in Fiber Grid, IoT, Smart Cities in Andhra Pradesh”. ProQuest 1774166769.
  99. Vasisht, Deepak; Kapetanovic, Zerina; Won, Jongho; Jin, Xinxin; Chandra, Ranveer; Sinha, Sudipta; Kapoor, Ashish; Sudarshan, Madhusudhan; Stratman, Sean (2017). FarmBeats: An IoT Platform for Data-Driven Agriculture. pp. 515–529. ISBN 978-1-931971-37-9.
  100. von der Assen, J., Celdrán, A. H., Sánchez, P. M. S., Cedeño, J., Bovet, G., Pérez, G. M., & Stiller, B. (2022). A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices. arXiv preprint arXiv:2210.07719.
  101. Vongsingthong, S.; Smanchat, S. (2014). “Internet of Things: A review of applications & technologies” (PDF). Suranaree Journal of Science and Technology.
  102. Wazid, M., & Das, A. K. (2016). An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wireless Personal Communications, 90(4), 1971–2000. https://doi.org/10.1007/s11277-016-3433-3
  103. Wazirali, R.; Ahmad, R.; Al-Amayreh, A.; Al-Madi, M.; Khalifeh, A. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021, 10, 1744.
  104. Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.
  105. Xu, D., & Tian, Y. (2015). A comprehensive survey of clustering algorithms. Annals of Data Science, 2(2), 165-193. https://doi.org/10.1007/s40745-015-0040-1
  106. Xu, X., Fu, S., Qi, L., Zhang, X., Liu, Q., He, Q., Li, S., 2018. An IoT-Oriented data placement method with privacy preservation in cloud environment. J. Netw. Comput. Appl. 124, 148–157.
  107. Zahra, M. K., Moin, A., Alberto Rodrigues, d. S., & Ferreira, J. C. (2023). Model-Driven Engineering Techniques and Tools for Machine Learning-Enabled IoT Applications: A Scoping Review. Sensors, 23(3), 1458. https://doi.org/10.3390/s23031458
  108. Žalik, K. R. (2021). An efficient k′-means clustering algorithm. Pattern Recognition Letters, 29(9), 1385–1391. https://doi.org/10.1016/j.patrec.2008.02.014
  109.  Zellan J, Aviation Security. Hauppauge, (2003), NY: Nova Science, pp. 65–70.
  110. Zhang, M., Zhang, Y., & Li, X. (2020). Machine learning in malware detection: Methods and challenges. Computer Networks, 172, 107246. https://doi.org/10.1016/j.comnet.2020.107246
  111. Zhang, Q. (2015). Precision Agriculture Technology for Crop Farming. CRC Press. pp. 249–58. ISBN 9781482251081.
  112. Zhou, W., Zhang, Y., Liu, P., 2018. The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges yet to Be Solved. arXiv: 1802.03110.
  113. Zhou, Y., Han, W., & Yang, L. T. (2019). Cyber threat intelligence modeling for proactive threat detection. IEEE Access, 7, 181117-181128. https://doi.org/10.1109/ACCESS.2019.2958767
  114. Zissis, D., 2017. Intelligent security on the edge of the cloud. In: International Conference on Engineering, Technology and Innovation. IEEE, Funchal. 1066 1070.

Article Statistics

Track views and downloads to measure the impact and reach of your article.

0

PDF Downloads

17 views

Metrics

PlumX

Altmetrics

Paper Submission Deadline

GET OUR MONTHLY NEWSLETTER