Security and Privacy in IoT Using Machine Learning and Blockchain

Security and privacy of the users have become significant concerns due to the involvement of the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate outputs from large complex databases, where the generated outputs can be used to predict and detect vulnerabilities in IoT-based systems. Furthermore, Blockchain (BC) techniques are becoming popular in modern IoT applications to solve security and privacy issues. Several studies have been conducted on either ML algorithms or BC techniques. However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and privacy issues using ML algorithms and BC techniques. In this paper, we provide a summary of research efforts made in the past few years, starting from 2008 to 2019, addressing security and privacy issues using ML algorithms and BC techniques in the IoT domain. First, we discuss and categorize various security and privacy threats reported in the past twelve years in the IoT domain. We then classify the literature on security and privacy efforts based on ML algorithms and BC techniques in the IoT domain. Finally, we identify and illuminate several challenges and future research directions using ML algorithms and BC techniques to address security and privacy issues in the IoT domain.

[1]  William H. Press,et al.  Numerical recipes in C (2nd ed.): the art of scientific computing , 1992 .

[2]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[3]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Charles Elkan,et al.  Differential Privacy and Machine Learning: a Survey and Review , 2014, ArXiv.

[5]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[6]  Takehisa Yairi,et al.  Anomaly Detection Using Autoencoders with Nonlinear Dimensionality Reduction , 2014, MLSDA'14.

[7]  Xiangjian He,et al.  Detection of Denial-of-Service Attacks Based on Computer Vision Techniques , 2015, IEEE Transactions on Computers.

[8]  Yuancheng Li,et al.  A Hybrid Malicious Code Detection Method based on Deep Learning , 2015 .

[9]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[10]  Miroslaw Malek,et al.  A Friend or a Foe? Detecting Malware using Memory and CPU Features , 2016, SECRYPT.

[11]  Salil S. Kanhere,et al.  Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.

[12]  Georgios Kambourakis,et al.  Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset , 2016, IEEE Communications Surveys & Tutorials.

[13]  Jong-Hyouk Lee,et al.  Blockchain-based secure firmware update for embedded devices in an Internet of Things environment , 2016, The Journal of Supercomputing.

[14]  Je-Won Kang,et al.  A Novel Intrusion Detection Method Using Deep Neural Network for In-Vehicle Network Security , 2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring).

[15]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[16]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.

[17]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[18]  Xiangjian He,et al.  Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm , 2016, IEEE Transactions on Computers.

[19]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[20]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[21]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[22]  Yutao Ma,et al.  Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey , 2017, IEEE Network.

[23]  Xiaoxia Liu,et al.  Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM , 2017, IEEE Journal of Biomedical and Health Informatics.

[24]  Ilias Politis,et al.  Enhancing SDN security for IoT-related deployments through blockchain , 2017, 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).

[25]  Young-Sik Jeong,et al.  DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks , 2017, IEEE Communications Magazine.

[26]  N. Kshetri Blockchain's roles in strengthening cybersecurity and protecting privacy , 2017 .

[27]  Guillaume Chapron,et al.  The environment needs cryptogovernance , 2017, Nature.

[28]  Yan Zhang,et al.  Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains , 2017, IEEE Transactions on Industrial Informatics.

[29]  Beng Chin Ooi,et al.  BLOCKBENCH: A Framework for Analyzing Private Blockchains , 2017, SIGMOD Conference.

[30]  Jian Weng,et al.  Machine Learning-Based Malicious Application Detection of Android , 2017, IEEE Access.

[31]  Ahmet M. Kondoz,et al.  Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[32]  Sachin Shetty,et al.  Towards data assurance and resilience in IoT using blockchain , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[33]  Yuval Elovici,et al.  CIoTA: Collaborative IoT Anomaly Detection via Blockchain , 2018, ArXiv.

[34]  Tiago M. Fernández-Caramés,et al.  A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.

[35]  Richa Singh,et al.  Unravelling Robustness of Deep Learning based Face Recognition Against Adversarial Attacks , 2018, AAAI.

[36]  Shreyas Sen,et al.  RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[37]  S. Mercy Shalinie,et al.  Design of cognitive fog computing for intrusion detection in Internet of Things , 2018, Journal of Communications and Networks.

[38]  Xiangliang Zhang,et al.  CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[39]  Yidong Li,et al.  DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features , 2018, IEEE Access.

[40]  Francesco Longo,et al.  Blockchain-Based IoT-Cloud Authorization and Delegation , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).

[41]  Naveen K. Chilamkurti,et al.  Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.

[42]  Richa Singh,et al.  Are Image-Agnostic Universal Adversarial Perturbations for Face Recognition Difficult to Detect? , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[43]  Madeline Carr,et al.  Standardising a moving target: The development and evolution of IoT security standards , 2018, IoT 2018.

[44]  Pin Lv,et al.  BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation , 2018, IEEE Access.

[45]  Antonio Puliafito,et al.  Blockchain and IoT Integration: A Systematic Survey , 2018, Sensors.

[46]  Liang Xiao,et al.  Secure Mobile Crowdsensing with Deep Learning , 2018, ArXiv.

[47]  PRADIP KUMAR SHARMA,et al.  A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT , 2018, IEEE Access.

[48]  Wei Cai,et al.  A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.

[49]  Jianfeng Ma,et al.  A Novel Dynamic Android Malware Detection System With Ensemble Learning , 2018, IEEE Access.

[50]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[51]  Aloknath De,et al.  Continuous Security in IoT Using Blockchain , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[52]  Jeffrey D. Tew,et al.  The applicability of blockchain in the Internet of Things , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[53]  Jong-Hyouk Lee,et al.  BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.

[54]  Gang Qu,et al.  A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.

[55]  Youakim Badr,et al.  Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions , 2018, Sensors.

[56]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[57]  Mohammed Anbar,et al.  Comparison of Classification Algorithms on ICMPv6-Based DDoS Attacks Detection , 2018, Lecture Notes in Electrical Engineering.

[58]  Antônio Augusto Fröhlich,et al.  IoT Data Integrity Verification for Cyber-Physical Systems Using Blockchain , 2018, 2018 IEEE 21st International Symposium on Real-Time Distributed Computing (ISORC).

[59]  Debdeep Mukhopadhyay,et al.  Adversarial Attacks and Defences: A Survey , 2018, ArXiv.

[60]  Ke Xiao,et al.  A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications , 2018, IEEE Access.

[61]  Liyuan Liu,et al.  Deep learning approach for cyberattack detection , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[62]  Jun Li,et al.  Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM , 2018, IEEE Communications Magazine.

[63]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[64]  Tommaso Melodia,et al.  Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.

[65]  Félix J. García Clemente,et al.  A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.

[66]  Richa Singh,et al.  SmartBox: Benchmarking Adversarial Detection and Mitigation Algorithms for Face Recognition , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[67]  Davor Svetinovic,et al.  Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams , 2018, IEEE Transactions on Dependable and Secure Computing.

[68]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[69]  Qingju Wang,et al.  When Intrusion Detection Meets Blockchain Technology: A Review , 2018, IEEE Access.

[70]  Qi Xia,et al.  GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid , 2018, IEEE Access.

[71]  Jemal H. Abawajy,et al.  Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.

[72]  Khaled Salah,et al.  Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters , 2018, IEEE Access.

[73]  Quanyan Zhu,et al.  Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[74]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[75]  Yue Wang,et al.  Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G , 2017, IET Commun..

[76]  Yury Yanovich,et al.  Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare , 2015, Oncotarget.

[77]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[78]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[79]  Nallapaneni Manoj Kumar,et al.  Blockchain technology for security issues and challenges in IoT , 2018 .

[80]  Yuguang Fang,et al.  Preserving Model Privacy for Machine Learning in Distributed Systems , 2018, IEEE Transactions on Parallel and Distributed Systems.

[81]  Hong Song,et al.  Securing Insulin Pump System Using Deep Learning and Gesture Recognition , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[82]  Muhammad Ikram,et al.  Incognito: A Method for Obfuscating Web Data , 2018, WWW.

[83]  Xiaojiang Du,et al.  Consortium Blockchain-Based Malware Detection in Mobile Devices , 2018, IEEE Access.

[84]  Fabien A. P. Petitcolas,et al.  A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.

[85]  Rajiv Ranjan,et al.  IoTChain: Establishing Trust in the Internet of Things Ecosystem Using Blockchain , 2018, IEEE Cloud Computing.

[86]  Kwangjo Kim,et al.  Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection , 2018, IEEE Transactions on Information Forensics and Security.

[87]  Gihan J. Mendis,et al.  Blockchain as a Service: An Autonomous, Privacy Preserving, Decentralized Architecture for Deep Learning , 2018, ArXiv.

[88]  Qiang Fu,et al.  Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning , 2018, IEEE Network.

[89]  Pascal Bouvry,et al.  Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning , 2018, Advances in Intelligent Systems and Computing.

[90]  Paul Rad,et al.  Blockchain Design for Trusted Decentralized IoT Networks , 2018, 2018 13th Annual Conference on System of Systems Engineering (SoSE).

[91]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[92]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[93]  Yu Wang,et al.  A Scalable Blockchain Framework for Secure Transactions in IoT , 2019, IEEE Internet of Things Journal.

[94]  Witold Pedrycz,et al.  Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch , 2019, Inf. Fusion.

[95]  Weixian Liao,et al.  Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.

[96]  Hui Li,et al.  Blockchain-Based Secure Time Protection Scheme in IoT , 2019, IEEE Internet of Things Journal.

[97]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[98]  Kim-Kwang Raymond Choo,et al.  An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things , 2019, IEEE Internet of Things Journal.

[99]  Jinjun Chen,et al.  Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..

[100]  Mubashir Husain Rehmani,et al.  Applications of Blockchains in the Internet of Things: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[101]  Wei Ni,et al.  Survey on blockchain for Internet of Things , 2019, Comput. Commun..

[102]  Kevin Kam Fung Yuen,et al.  Towards a Cybersecurity Investment Assessment method using Primitive Cognitive Network Process , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).

[103]  Michele Colajanni,et al.  Authorization Transparency for Accountable Access to IoT Services , 2019, 2019 IEEE International Congress on Internet of Things (ICIOT).

[104]  Kanchana Thilakarathna,et al.  A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists , 2019, AsiaCCS.

[105]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[106]  Mohammad Al-Rubaie,et al.  Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.

[107]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[108]  João Paulo Papa,et al.  Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.

[109]  Weizhong Yan,et al.  On Accurate and Reliable Anomaly Detection for Gas Turbine Combustors: A Deep Learning Approach , 2015, Annual Conference of the PHM Society.

[110]  W. Price,et al.  Privacy in the age of medical big data , 2019, Nature Medicine.

[111]  S. Dunn,et al.  Data Privacy Laws Response to Ransomware Attacks: A Multi-Jurisdictional Analysis , 2019, Regulating New Technologies in Uncertain Times.

[112]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[113]  Muhammad Ikram,et al.  DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling , 2019, ICETE.

[114]  Mayank Vatsa,et al.  DeepRing: Protecting Deep Neural Network With Blockchain , 2019, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).

[115]  Mohsen Guizani,et al.  Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities , 2019, IEEE Internet of Things Journal.

[116]  Mohammed Samaka,et al.  Security Services Using Blockchains: A State of the Art Survey , 2018, IEEE Communications Surveys & Tutorials.

[117]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[118]  Richa Singh,et al.  Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition , 2019, International Journal of Computer Vision.

[119]  K. N. Manjunath,et al.  Secured image transmission in medical imaging applications—A survey , 2019 .

[120]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[121]  Weixin Xie,et al.  Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.

[122]  Peng Jiang,et al.  A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..

[123]  Syed Ali Hassan,et al.  Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.

[124]  Anwar ul Haque,et al.  Decentralized Transfer Learning using Blockchain & IPFS for Deep Learning , 2020, 2020 International Conference on Information Networking (ICOIN).

[125]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[126]  Vallipuram Muthukkumarasamy,et al.  Immutable autobiography of smart cars leveraging blockchain technology , 2020, Knowl. Eng. Rev..

[127]  Mohammad Eshghi,et al.  Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology , 2020, The Journal of Supercomputing.

[128]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[129]  Luca Oneto,et al.  Low-Resource Footprint, Data-Driven Malware Detection on Android , 2020, IEEE Transactions on Sustainable Computing.

[130]  Yue Zhang,et al.  DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive , 2019, IEEE Transactions on Dependable and Secure Computing.

[131]  Jianfeng Ma,et al.  PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys , 2018, IEEE Transactions on Services Computing.

[132]  Elizabeth S. Bentley,et al.  Identification of Wearable Devices with Bluetooth , 2018, IEEE Transactions on Sustainable Computing.

[133]  Jin Wei,et al.  A Blockchain-Powered Decentralized and Secure Computing Paradigm , 2018, IEEE Transactions on Emerging Topics in Computing.