IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
Top Cited Papers
- 31 August 2018
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Signal Processing Magazine
- Vol. 35 (5), 41-49
- https://doi.org/10.1109/MSP.2018.2825478
Abstract
The Internet of things (IoT), which integrates a variety of devices into networks to provide advanced and intelligent services, has to protect user privacy and address attacks such as spoofing attacks, denial of service (DoS) attacks, jamming, and eavesdropping. We investigate the attack model for IoT systems and review the IoT security solutions based on machine-learning (ML) techniques including supervised learning, unsupervised learning, and reinforcement learning (RL). ML-based IoT authentication, access control, secure offloading, and malware detection schemes to protect data privacy are the focus of this article. We also discuss the challenges that need to be addressed to implement these ML-based security schemes in practical IoT systems.Keywords
This publication has 29 references indexed in Scilit:
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion DetectionIEEE Communications Surveys & Tutorials, 2015
- Improving learning and adaptation in security games by exploiting information asymmetryPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Machine Learning Methods for Attack Detection in the Smart GridIEEE Transactions on Neural Networks and Learning Systems, 2015
- Human-level control through deep reinforcement learningNature, 2015
- Evaluation of machine learning classifiers for mobile malware detectionSoft Computing, 2014
- A Vision of IoT: Applications, Challenges, and Opportunities With China PerspectiveIEEE Internet of Things Journal, 2014
- A survey on trust management for Internet of ThingsJournal of Network and Computer Applications, 2014
- Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learningPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- On the features and challenges of security and privacy in distributed internet of thingsComputer Networks, 2013
- In-network outlier detection in wireless sensor networksKnowledge and Information Systems, 2012