Machine Learning in IoT Security: Current Solutions and Future Challenges

The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. However, the unique characteristics of IoT nodes render the existing solutions insufficient to encompass the entire security spectrum of the IoT networks. Machine Learning (ML) and Deep Learning (DL) techniques, which are able to provide embedded intelligence in the IoT devices and networks, can be leveraged to cope with different security problems. In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. We then shed light on the gaps in these security solutions that call for ML and DL approaches. Finally, we discuss in detail the existing ML and DL solutions for addressing different security problems in IoT networks. We also discuss several future research directions for ML- and DL-based IoT security.

[1]  Pooja Jadav,et al.  Fuzzy logic based faulty node detection in Wireless Sensor Network , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).

[2]  Fatima. Hussain Internet of Things: Building Blocks and Business Models , 2017 .

[3]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[4]  Vijay Varadharajan,et al.  A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection , 2019, IEEE Communications Surveys & Tutorials.

[5]  Naveen K. Chilamkurti,et al.  Distributed attack detection scheme using deep learning approach for Internet of Things , 2017, Future Gener. Comput. Syst..

[6]  Abbas Javed,et al.  Intelligent Intrusion Detection in Low-Power IoTs , 2016, ACM Trans. Internet Techn..

[7]  Wei Xiang,et al.  Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.

[8]  Hicham Lakhlef,et al.  Internet of things security: A top-down survey , 2018, Comput. Networks.

[9]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[10]  Atul Prakash,et al.  Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? , 2017, IEEE Security & Privacy.

[11]  Pieter C. van den Toorn,et al.  A brief survey , 2012 .

[12]  Syed Ali Hassan,et al.  Machine Learning for Resource Management in Cellular and IoT Networks: Potentials, Current Solutions, and Open Challenges , 2019, IEEE Communications Surveys & Tutorials.

[13]  Xiaoqing Han,et al.  Review on the research and practice of deep learning and reinforcement learning in smart grids , 2018, CSEE Journal of Power and Energy Systems.

[14]  Xiaojiang Du,et al.  A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security , 2018, IEEE Communications Surveys & Tutorials.

[15]  Laurence T. Yang,et al.  A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.

[16]  Jin Li,et al.  The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..

[17]  Lianbing Deng,et al.  Information security model of block chain based on intrusion sensing in the IoT environment , 2018, Cluster Computing.

[18]  Han Yu,et al.  Energy-efficient and security-optimized AES hardware design for ubiquitous computing* , 2008 .

[19]  Weihua Zhuang,et al.  PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[20]  Jin Ye,et al.  A DDoS Attack Detection Method Based on SVM in Software Defined Network , 2018, Secur. Commun. Networks.

[21]  Prachi Shukla,et al.  ML-IDS: A machine learning approach to detect wormhole attacks in Internet of Things , 2017, 2017 Intelligent Systems Conference (IntelliSys).

[22]  Marenglen Biba,et al.  Machine learning for intrusion detection in MANET: a state-of-the-art survey , 2015, Journal of Intelligent Information Systems.

[23]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[24]  Shrideep Pallickara,et al.  NEPTUNE: Real Time Stream Processing for Internet of Things and Sensing Environments , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS).

[25]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[26]  Sven Dietrich,et al.  Security Challenges and Opportunities of Software-Defined Networking , 2017, IEEE Security & Privacy.

[27]  Malay K. Pakhira,et al.  A Linear Time-Complexity k-Means Algorithm Using Cluster Shifting , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[28]  Andreas Spanias,et al.  A brief survey of machine learning methods and their sensor and IoT applications , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).

[29]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[30]  David M. Eyers,et al.  Twenty Security Considerations for Cloud-Supported Internet of Things , 2016, IEEE Internet of Things Journal.

[31]  GardinerJoseph,et al.  On the Security of Machine Learning in Malware C&C Detection , 2016 .

[32]  Abdelouahid Derhab,et al.  MalDozer: Automatic framework for android malware detection using deep learning , 2018, Digit. Investig..

[33]  Xianbin Wang,et al.  Machine Intelligence Techniques for Next-Generation Context-Aware Wireless Networks , 2018, ArXiv.

[34]  Ali Dehghantanha,et al.  A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[35]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[36]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[37]  Asaf Shabtai,et al.  MDGAN: Boosting Anomaly Detection Using Multi-Discriminator Generative Adversarial Networks , 2018, ArXiv.

[38]  Wei Cai,et al.  A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.

[39]  Guangxia Xu,et al.  SDN-Based Data Transfer Security for Internet of Things , 2018, IEEE Internet of Things Journal.

[40]  Gabriel Dulac-Arnold,et al.  Challenges of Real-World Reinforcement Learning , 2019, ArXiv.

[41]  Sukumar Mishra,et al.  Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks , 2018, Journal of Medical Systems.

[42]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[43]  Myung-Sup Kim,et al.  Linear SVM-Based Android Malware Detection for Reliable IoT Services , 2014, J. Appl. Math..

[44]  Robert H. Deng,et al.  Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.

[45]  Amir Masoud Rahmani,et al.  Internet of Things applications: A systematic review , 2019, Comput. Networks.

[46]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[47]  Elisa Bertino,et al.  Botnets and Internet of Things Security , 2017, Computer.

[48]  Harsh Kupwade Patil,et al.  Big Data Security and Privacy Issues in Healthcare , 2014, 2014 IEEE International Congress on Big Data.

[49]  Yixian Yang,et al.  Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things , 2017, IEEE Access.

[50]  Pei-Yu Chiang,et al.  Cloud-Based Fine-Grained Health Information Access Control Framework for LightweightIoT Devices with Dynamic Auditing andAttribute Revocation , 2018, IEEE Transactions on Cloud Computing.

[51]  Altair Olivo Santin,et al.  A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems , 2018, Comput. Secur..

[52]  Mohsen Guizani,et al.  Semisupervised Deep Reinforcement Learning in Support of IoT and Smart City Services , 2018, IEEE Internet of Things Journal.

[53]  Wenchang Shi,et al.  A survey on internet of things security from data perspectives , 2019, Comput. Networks.

[54]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[55]  Zhuzhong Qian,et al.  AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks , 2017, J. Parallel Distributed Comput..

[56]  Sergey Levine,et al.  MBMF: Model-Based Priors for Model-Free Reinforcement Learning , 2017, ArXiv.

[57]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[58]  Shaohan Hu,et al.  Deep Learning for the Internet of Things , 2018, Computer.

[59]  Francesco Palmieri,et al.  Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT , 2018, Comput. Secur..

[60]  Oscar Novo,et al.  Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.

[61]  Qihui Wu,et al.  A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.

[62]  Naveen K. Chilamkurti,et al.  Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing , 2018, IEEE Communications Magazine.

[63]  Nick Feamster,et al.  Machine Learning DDoS Detection for Consumer Internet of Things Devices , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[64]  Hongxin Hu,et al.  Rallying Adversarial Techniques against Deep Learning for Network Security , 2019, 2021 IEEE Symposium Series on Computational Intelligence (SSCI).

[65]  Roberto Baldoni,et al.  Survey on the Usage of Machine Learning Techniques for Malware Analysis , 2017, Comput. Secur..

[66]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[67]  Mingyang Li,et al.  Poster Abstract: Unsupervised Anomaly Detection via Generative Adversarial Networks , 2019, 2019 18th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).

[68]  Sugata Sanyal,et al.  Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.

[69]  F. Richard Yu,et al.  A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[70]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[71]  Lei Shi,et al.  MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.

[72]  Yi Shi,et al.  IoT Network Security from the Perspective of Adversarial Deep Learning , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[73]  Jong Hyuk Park,et al.  Semi-supervised learning based distributed attack detection framework for IoT , 2018, Appl. Soft Comput..

[74]  Rong Zheng,et al.  Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.

[75]  Athanasios V. Vasilakos,et al.  Software-Defined Networking for Internet of Things: A Survey , 2017, IEEE Internet of Things Journal.

[76]  Fidel Paniagua Diez,et al.  Modeling XACML Security Policies Using Graph Databases , 2017, IT Professional.

[77]  Jaime Lloret Mauri,et al.  Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks , 2015, Comput. J..

[78]  Arputharaj Kannan,et al.  A comprehensive presentation to XACML , 2013 .

[79]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[80]  Mohammed Anbar,et al.  Internet of Things (IoT) communication protocols: Review , 2017, 2017 8th International Conference on Information Technology (ICIT).

[81]  Johannes Fürnkranz,et al.  A Survey of Preference-Based Reinforcement Learning Methods , 2017, J. Mach. Learn. Res..

[82]  Ajmal Mian,et al.  Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey , 2018, IEEE Access.

[83]  Walaa Hamouda,et al.  A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems , 2018, IEEE Communications Surveys & Tutorials.

[84]  Kun Yang,et al.  A DDoS Attack Detection and Mitigation With Software-Defined Internet of Things Framework , 2018, IEEE Access.

[85]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[86]  Amos Azaria,et al.  Behavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in Imbalanced Data , 2014, IEEE Transactions on Computational Social Systems.

[87]  Rodrigo Roman,et al.  On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks , 2013, IEEE Communications Surveys & Tutorials.

[88]  Zhaohui Tang,et al.  Taxonomy on malware evasion countermeasures techniques , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[89]  Joshua B. Tenenbaum,et al.  Building machines that learn and think like people , 2016, Behavioral and Brain Sciences.

[90]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[91]  Ali A. Ghorbani,et al.  Application of deep learning to cybersecurity: A survey , 2019, Neurocomputing.

[92]  S. Thamarai Selvi,et al.  DDoS detection and analysis in SDN-based environment using support vector machine classifier , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).

[93]  Sergey Levine,et al.  Model-Based Value Estimation for Efficient Model-Free Reinforcement Learning , 2018, ArXiv.

[94]  Abishi Chowdhury,et al.  A survey study on Internet of Things resource management , 2018, J. Netw. Comput. Appl..

[95]  Miriam A. M. Capretz,et al.  Machine Learning With Big Data: Challenges and Approaches , 2017, IEEE Access.

[96]  Vangelis Gazis,et al.  A Survey of Standards for Machine-to-Machine and the Internet of Things , 2017, IEEE Communications Surveys & Tutorials.

[97]  Mohsen Guizani,et al.  Internet-of-things-based smart environments: state of the art, taxonomy, and open research challenges , 2016, IEEE Wireless Communications.

[98]  Vasiliy Krundyshev,et al.  Evaluation of GAN Applicability for Intrusion Detection in Self-Organizing Networks of Cyber Physical Systems , 2018, 2018 International Russian Automation Conference (RusAutoCon).

[99]  Marc G. Bellemare,et al.  Distributional Reinforcement Learning with Quantile Regression , 2017, AAAI.

[100]  Parvez Ahammad,et al.  SoK: Applying Machine Learning in Security - A Survey , 2016, ArXiv.

[101]  F. Richard Yu,et al.  Automatically synthesizing DoS attack traces using generative adversarial networks , 2019, Int. J. Mach. Learn. Cybern..

[102]  Mohammed S. Alam,et al.  Random Forest Classification for Detecting Android Malware , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[103]  Jerker Delsing,et al.  An authentication and access control framework for CoAP-based Internet of Things , 2014, IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society.

[104]  Byung-Seo Kim,et al.  Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.

[105]  Abhijit Mondal,et al.  A reliable, multi-path, connection oriented and independent transport protocol for IoT networks , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[106]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[107]  Ai Yano,et al.  IoT fault management platform with device virtualization , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[108]  José M. F. Moura,et al.  A Deep Learning Approach to IoT Authentication , 2018, 2018 IEEE International Conference on Communications (ICC).

[109]  Wan Haslina Hassan,et al.  Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.

[110]  Bin Yu,et al.  A cloud-assisted malware detection and suppression framework for wireless multimedia system in IoT based on dynamic differential game , 2018, China Communications.

[111]  Zhu Han,et al.  PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead , 2018, IEEE Transactions on Wireless Communications.

[112]  Atul Prakash,et al.  Robust Physical-World Attacks on Machine Learning Models , 2017, ArXiv.

[113]  Indrajit Banerjee,et al.  Non-parametric sequence-based learning approach for outlier detection in IoT , 2017, Future Gener. Comput. Syst..

[114]  Bruno Volckaert,et al.  Scheduling framework for distributed intrusion detection systems over heterogeneous network architectures , 2018, J. Netw. Comput. Appl..

[115]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[116]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[117]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[118]  Haoyang Yu,et al.  Exploiting ICN for Realizing Service-Oriented Communication in IoT , 2016, IEEE Communications Standards.

[119]  M. V. Vijayakumar,et al.  Reinforcement Learning Algorithms: Survey and Classification , 2017 .

[120]  Amir Hussain,et al.  Applications of Deep Learning and Reinforcement Learning to Biological Data , 2017, IEEE Transactions on Neural Networks and Learning Systems.

[121]  Alexey Finogeev,et al.  Information attacks and security in wireless sensor networks of industrial SCADA systems , 2017, J. Ind. Inf. Integr..

[122]  Andrew H. Sung,et al.  Intrusion Detection Systems Using Adaptive Regression Splines , 2004, ICEIS.

[123]  Munam Ali Shah,et al.  E-Lithe: A Lightweight Secure DTLS for IoT , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).

[124]  Sakir Sezer,et al.  Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).

[125]  Aziz Mohaisen,et al.  Breaking graph-based IoT malware detection systems using adversarial examples: poster , 2019, WiSec.

[126]  Sherali Zeadally,et al.  Autonomous Cars: Research Results, Issues, and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[127]  Sidi-Mohammed Senouci,et al.  A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology , 2016, 2016 IEEE International Conference on Communications (ICC).

[128]  Luis Muñoz-González,et al.  Poisoning Attacks with Generative Adversarial Nets , 2019, ArXiv.

[129]  Cristina Alcaraz,et al.  A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services , 2018, IEEE Communications Surveys & Tutorials.

[130]  Maryline Laurent-Maknavicius,et al.  Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.

[131]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[132]  Seddik Bri,et al.  High speed efficient advanced encryption standard implementation , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).

[133]  Anthony Skjellum,et al.  Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[134]  Ioannis G. Askoxylakis,et al.  Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[135]  Walid Saad,et al.  Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity , 2016, IEEE Access.

[136]  Igor Radusinovic,et al.  Software-Defined Fog Network Architecture for IoT , 2016, Wireless Personal Communications.

[137]  Eduardo Alchieri,et al.  Evaluation of Distributed Denial of Service threat in the Internet of Things , 2016, 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA).

[138]  Ivan Marsá-Maestre,et al.  Applying an Unified Access Control for IoT-based Intelligent Agent Systems , 2015, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA).

[139]  Mesud Hadzialic,et al.  Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues , 2018, Comput. Networks.

[140]  Steven C. H. Hoi,et al.  Malicious URL Detection using Machine Learning: A Survey , 2017, ArXiv.

[141]  Amit P. Sheth,et al.  Machine learning for Internet of Things data analysis: A survey , 2017, Digit. Commun. Networks.

[142]  Yanfang Ye,et al.  Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense , 2017, 2017 European Intelligence and Security Informatics Conference (EISIC).

[143]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[144]  Kouichi Sakurai,et al.  One Pixel Attack for Fooling Deep Neural Networks , 2017, IEEE Transactions on Evolutionary Computation.

[145]  Howon Kim,et al.  Long Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[146]  João Paulo Papa,et al.  Internet of Things: A survey on machine learning-based intrusion detection approaches , 2019, Comput. Networks.

[147]  Nicholas D. Lane,et al.  DeepEar: robust smartphone audio sensing in unconstrained acoustic environments using deep learning , 2015, UbiComp.

[148]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[149]  Ted H. Szymanski Security and Privacy for a Green Internet of Things , 2017, IT Professional.

[150]  Archan Misra,et al.  Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks , 2018, Computer.

[151]  Solmaz Niknam,et al.  Federated Learning for Wireless Communications: Motivation, Opportunities, and Challenges , 2019, IEEE Communications Magazine.

[152]  Zhifeng Zhao,et al.  AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks , 2018, IEEE Internet of Things Journal.

[153]  Xin Chen,et al.  An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.

[154]  Natalija Vlajic,et al.  IoT as a Land of Opportunity for DDoS Hackers , 2018, Computer.

[155]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[156]  Heekuck Oh,et al.  On Secure and Privacy-Aware Sybil Attack Detection in Vehicular Communications , 2014, Wirel. Pers. Commun..

[157]  Lianbing Deng,et al.  Mobile network intrusion detection for IoT system based on transfer learning algorithm , 2018, Cluster Computing.

[158]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[159]  Vern Paxson,et al.  An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.

[160]  Hongbo Liu,et al.  Smart User Authentication through Actuation of Daily Activities Leveraging WiFi-enabled IoT , 2017, MobiHoc.

[161]  Ouajdi Korbaa,et al.  A survey on attacks in Internet of Things based networks , 2017, 2017 International Conference on Engineering & MIS (ICEMIS).

[162]  Hong Wen,et al.  Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things , 2018, IEEE Internet of Things Journal.

[163]  Nour Moustafa,et al.  Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions , 2019, IEEE Access.

[164]  Abdullah Al-Dujaili,et al.  Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).

[165]  Saeid Nahavandi,et al.  System Design Perspective for Human-Level Agents Using Deep Reinforcement Learning: A Survey , 2017, IEEE Access.

[166]  Michalis Faloutsos,et al.  Behavioral anomaly detection of malware on home routers , 2017, 2017 12th International Conference on Malicious and Unwanted Software (MALWARE).

[167]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[168]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[169]  Yuval Elovici,et al.  N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders , 2018, IEEE Pervasive Computing.

[170]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[171]  Reid G. Simmons,et al.  Complexity Analysis of Real-Time Reinforcement Learning , 1993, AAAI.

[172]  Denis Reilly,et al.  An access control management protocol for Internet of Things devices , 2017, Netw. Secur..

[173]  Lei Yang,et al.  Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices , 2014, MobiCom.

[174]  I. Johnstone,et al.  Sparse Principal Components Analysis , 2009, 0901.4392.

[175]  Marc Peter Deisenroth,et al.  Deep Reinforcement Learning: A Brief Survey , 2017, IEEE Signal Processing Magazine.

[176]  Tao Jiang,et al.  Deep learning for wireless physical layer: Opportunities and challenges , 2017, China Communications.

[177]  Manuel López Martín,et al.  Adversarial environment reinforcement learning algorithm for intrusion detection , 2019, Comput. Networks.

[178]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[179]  Alagan Anpalagan,et al.  Resource allocation and congestion control in clustered M2M communication using Q‐learning , 2017, Trans. Emerg. Telecommun. Technol..

[180]  Walid Saad,et al.  Generative Adversarial Networks for Distributed Intrusion Detection in the Internet of Things , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[181]  Yue Tan,et al.  Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges , 2019, IEEE Communications Surveys & Tutorials.

[182]  Patrick D. McDaniel,et al.  Machine Learning in Adversarial Settings , 2016, IEEE Security & Privacy.

[183]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[184]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[185]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[186]  Carl A. Gunter,et al.  Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps , 2017, ACSAC.

[187]  Martin Hasler,et al.  Distributed machine learning in networks by consensus , 2014, Neurocomputing.

[188]  Ganesh K. Venayagamoorthy,et al.  Neural network based secure media access control protocol for wireless sensor networks , 2009, 2009 International Joint Conference on Neural Networks.

[189]  Jürgen Schmidhuber,et al.  World Models , 2018, ArXiv.

[190]  Gaurav Bansod,et al.  Implementation of a New Lightweight Encryption Design for Embedded Security , 2015, IEEE Transactions on Information Forensics and Security.

[191]  Weizhi Meng,et al.  Intrusion Detection in the Era of IoT: Building Trust via Traffic Filtering and Sampling , 2018, Computer.

[192]  Miika Komu,et al.  Capillary networks - bridging the cellular and IoT worlds , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[193]  Jemal H. Abawajy,et al.  Identifying cyber threats to mobile-IoT applications in edge computing paradigm , 2018, Future Gener. Comput. Syst..

[194]  Terrance E. Boult,et al.  A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions , 2016, IEEE Communications Surveys & Tutorials.

[195]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[196]  Kouichi Sakurai,et al.  Lightweight Classification of IoT Malware Based on Image Recognition , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[197]  Chunhua Jin,et al.  Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..

[198]  Anton O. Prokofiev,et al.  A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[199]  Debayan Das,et al.  RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.

[200]  Tommaso Melodia,et al.  Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking , 2018, IEEE Internet of Things Journal.

[201]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[202]  Luca Veltri,et al.  IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.

[203]  Sherali Zeadally,et al.  Autonomous Cars: Social and Economic Implications , 2018, IT Professional.

[204]  Yuval Elovici,et al.  Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..

[205]  Kangbin Yim,et al.  Malware Obfuscation Techniques: A Brief Survey , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[206]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[207]  Ahmad-Reza Sadeghi,et al.  Security and privacy challenges in industrial Internet of Things , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[208]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[209]  André C. Drummond,et al.  A Survey of Random Forest Based Methods for Intrusion Detection Systems , 2018, ACM Comput. Surv..

[210]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[211]  Wei Dong,et al.  Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks , 2015, IEEE Transactions on Industrial Informatics.

[212]  Bo Li,et al.  Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach , 2017, Comput. Secur..

[213]  Rama Chellappa,et al.  Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models , 2018, ICLR.

[214]  Mianxiong Dong,et al.  Deep Reinforcement Scheduling for Mobile Crowdsensing in Fog Computing , 2019, ACM Trans. Internet Techn..

[215]  Zilong Ye,et al.  Secure the internet of things with challenge response authentication in fog computing , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).

[216]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[217]  James Moos IoT, Malware and Security , 2017 .

[218]  Mianxiong Dong,et al.  Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.

[219]  Long Hu,et al.  Privacy-aware service placement for mobile edge computing via federated learning , 2019, Inf. Sci..

[220]  Goran Vojkovic Will the GDPR slow down development of smart cities? , 2018, 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[221]  Chao Li,et al.  Privacy in Internet of Things: From Principles to Technologies , 2018, IEEE Internet of Things Journal.

[222]  Fagen Li,et al.  Efficient certificateless access control for industrial Internet of Things , 2017, Future Gener. Comput. Syst..