The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence

Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems. Evolutionary computation combining with other computational intelligence will play an important role for cybersecurity, such as artificial immune mechanism for IoT security architecture, data mining/fusion in IoT enabled cyber physical systems, and data driven cybersecurity. This paper provides an overview of security challenges in IoT enabled cyber-physical systems and what evolutionary computation and other computational intelligence technology could contribute for the challenges. The overview could provide clues and guidance for research in IoT security with computational intelligence.

[1]  Martin Christopher,et al.  Logistics and supply chain management : creating value-adding networks , 2005 .

[2]  Zbigniew Kotulski,et al.  Optimization of TLS security protocol using the adaptable security model , 2009, Ann. UMCS Informatica.

[3]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[4]  Eugene Fink,et al.  Detection of Internet scam using logistic regression , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[5]  Yen-Kuang Chen,et al.  Challenges and opportunities of internet of things , 2012, 17th Asia and South Pacific Design Automation Conference.

[6]  Spiros Mancoridis,et al.  Using code metric histograms and genetic algorithms to perform author identification for software forensics , 2007, GECCO '07.

[7]  Bing Liu,et al.  Review spam detection , 2007, WWW '07.

[8]  Sadie Creese,et al.  SuperIdentity: Fusion of Identity across Real and Cyber Domains , 2012 .

[9]  Laurence T. Yang,et al.  Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[10]  Lei Ren,et al.  Cloud manufacturing: a new manufacturing paradigm , 2014, Enterp. Inf. Syst..

[11]  Hu-Chen Liu,et al.  Material selection using an interval 2-tuple linguistic VIKOR method considering subjective and objective weights , 2013 .

[12]  Wei Li,et al.  Using Genetic Algorithm for Network Intrusion Detection , 2004 .

[13]  Yan Zhu,et al.  Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain , 2007 .

[14]  Tim Oates,et al.  Detecting Spam Blogs: A Machine Learning Approach , 2006, AAAI.

[15]  Bob Rudis,et al.  Data-Driven Security: Analysis, Visualization and Dashboards , 2014 .

[16]  Sulaiman Al Amro,et al.  Evolutionary Computation in Computer Security and Forensics: An Overview , 2012, Computational Intelligence for Privacy and Security.

[17]  Kagermann Henning Recommendations for implementing the strategic initiative INDUSTRIE 4.0 , 2013 .

[18]  Padmini Srinivasan,et al.  Spam detection in online classified advertisements , 2011, WebQuality '11.

[19]  Sébastien Marcel,et al.  Bi-Modal Face and Speech Authentication: a BioLogin Demonstration System , 2006 .

[20]  Michael Wagner,et al.  Audio-visual multimodal fusion for biometric person authentication and liveness verification , 2006 .

[21]  Tanupriya Choudhury,et al.  Securing the Internet of Things: A proposed framework , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[22]  Oscar Cordón,et al.  Craniofacial Superimposition in Forensic Identification using Genetic Algorithms , 2007, Third International Symposium on Information Assurance and Security.

[23]  A. Sima Etaner-Uyar,et al.  Detection of DDoS Attacks via an Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm , 2010, EvoApplications.

[24]  Anil K. Jain,et al.  Likelihood Ratio-Based Biometric Score Fusion , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Konstantin Tretyakov,et al.  Machine Learning Techniques in Spam Filtering , 2004 .