Abstract

Through three development routes of authentication, communication, and computing, the Internet of Things (IoT) has become a variety of innovative integrated solutions for specific applications. However, due to the openness, extensiveness and resource constraints of IoT, each layer of the three-tier IoT architecture suffers from a variety of security threats. In this work, we systematically review the particularity and complexity of IoT security protection, and then find that Artificial Intelligence (AI) methods such as Machine Learning (ML) and Deep Learning (DL) can provide new powerful capabilities to meet the security requirements of IoT. We analyze the technical feasibility of AI in solving IoT security problems and summarize a general process of AI solutions for IoT security. For four serious IoT security threats: device authentication, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks defense, intrusion detection and malware detection, we summarize representative AI solutions and compare the different algorithms and technologies used by various solutions. It should be noted that although AI provides many new capabilities for the security protection of IoT, it also brings new potential challenges and possible negative effects to IoT in terms of data, algorithm and architecture. In the future, how to solve these challenges can serve as potential research directions.

Highlights

  • The International Telecommunication Union formally proposed the concept of "Internet of Things" at the World Summit on the Information Society (WSIS) in 2005 [1]

  • For four serious Internet of Things (IoT) security threats: device authentication, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks defense, intrusion detection and malware detection, we summarize representative Artificial Intelligence (AI) solutions and compare the different algorithms and technologies used by various solutions

  • Through the analysis of various security problems faced by IoT, it can be found that IoT security problems have some common characteristics which makes IoT security more complex and produces special requirements for security protection that are different from other fields

Read more

Summary

INTRODUCTION

The International Telecommunication Union formally proposed the concept of "Internet of Things" at the World Summit on the Information Society (WSIS) in 2005 [1]. The application service layer processes the data transmitted terminal perception layer include physical entities from the network transport layer and integrates them with representing real things, IoT device entities (sensor devices, various industries to support vertical applications of IoT, identification devices represented by RFID, and positioning / providing rich and specific services for different users in tracking devices represented by GPS), and access platform specific fields, such as smart grids, smart homes, and smart connecting local IoT device network and wide area network. The network transport layer transmits information from the & service subsystems that provide capabilities of data storage, terminal perception layer to the application service layer to analysis and service, as well as operation maintenance &.

ATTRIBUTION ANALYSIS OF IOT SECURITY THREATS
SECURITY THREATS IN THE TERMINAL PERCEPTION LAYER
SECURITY THREATS IN THE NETWORK TRANSPORT LAYER
SECURITY THREATS IN THE APPLICATION SERVICE LAYER
COMMON CHARACTERISTICS AND SPECIAL REQUIREMENTS OF IOT SECURITY
NEW CAPABILITIES PROVIDED BY AI TO IOT SECURITY
The capability of processing large amounts of complex data effectively
The capability of maintaining excellent model accuracy
The capability of providing model robustness and generalization ability
Method
AI SOLUTIONS TO FOUR IOT SECURITY THREATS
GENERAL PROCESS OF AI SOLUTIONS FOR IOT SECURITY
ML Methods Used in Scheme
Method Characteristics
CHALLENGES AND FUTURE DIRECTIONS
FUTURE DIRECTIONS Some of the above-mentioned challenges are inherent in
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call