Abstract

Internet of Things (IoTs) are set to revolutionize our lives and are widely being adopted nowadays. The IoT devices have a range of applications including smart homes, smart industrial networks and healthcare. Since these devices are responsible for generating and handling large amounts of sensitive data, the security of the IoT devices always poses a challenge. It is observed that a security breach could effect individuals and eventually the world at large. Artificial intelligence (AI), on the other hand, has found many applications and is widely being explored in providing security specifically for IoT devices. Malicious insider attack is the biggest security challenge associated with the IoT devices. Although, most of the research in IoT security has pondered on the means of preventing illegal and unauthorized access to systems and information; unfortunately, the most destructive malicious insider attacks that are usually a consequence of internal exploitation within an IoT network remains unaddressed. Therefore, the focus of this research is to detect malicious insider attacks in the IoT environment using AI. This research presents a lightweight approach for detecting insider attacks and has the capability of detecting anomalies originating from incoming data sensors in resource constrained IoT environments. The results and comparison show that the proposed approach achieves better accuracy as compared to the state of the art in terms of: a) improved attack detection accuracy; b) minimizing false positives; and c) reducing the computational overhead.

Highlights

  • We live in an era where everything and everyone is interconnected through physical devices and physical objects

  • A detailed analysis is done based on the results gathered by simulating the proposed technique in comparison with simulation-based results acquired from existing distance measurement techniques

  • Internet of Things (IoT) offers tremendous benefits including on-demand availability of networked devices, these devices are prone to security threats

Read more

Summary

Introduction

We live in an era where everything and everyone is interconnected through physical devices and physical objects. These embedded devices and objects interact over the internet. The IoT devices have many advantages that mainly include automated data gathering, monitoring and control in an efficient and effective manner. IoT devices have to offer many benefits, they are prone to security and privacy attacks. These security and privacy risks and concerns limit the adoption of the IoT devices on full scale especially in mission critical settings where sensitive data is involved.

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call