skip to main content
research-article

Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

Published:16 June 2021Publication History
Skip Abstract Section

Abstract

In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.

References

  1. Reza Ahmadi, Karim Jahed, and Juergen Dingel. 2019. mCUTE: A model-level concolic unit testing engine for UML state machines. In Proceedings of the 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE’19). IEEE, 1182–1185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alif Ahmed, Farimah Farahmandi, and Prabhat Mishra. 2018. Directed test generation using concolic testing on RTL models. In Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE’18). IEEE, 1538–1543.Google ScholarGoogle ScholarCross RefCross Ref
  3. Alif Ahmed and Prabhat Mishra. 2017. QUEBS: Qualifying event based search in concolic testing for validation of RTL models. In Proceedings of the 2017 IEEE International Conference on Computer Design (ICCD’17). IEEE, 185–192.Google ScholarGoogle ScholarCross RefCross Ref
  4. Waleed Alnumay, Uttam Ghosh, and Pushpita Chatterjee. 2019. A Trust-Based predictive model for mobile ad hoc network in internet of things. Sensors 19, 6 (2019), 1467.Google ScholarGoogle ScholarCross RefCross Ref
  5. Joseph Henry Anajemba, Yue Tang, Celestine Iwendi, Akpesiri Ohwoekevwo, Gautam Srivastava, and Ohyun Jo. 2020. Realizing efficient security and privacy in IoT networks. Sensors 20, 9 (2020), 2609.Google ScholarGoogle ScholarCross RefCross Ref
  6. Isha Batra, Sahil Verma, Arun Malik, Uttam Ghosh, Joel J.P.C. Rodrigues, Gia Nhu Nguyen, ASM Hosen, Vinayagam Mariappan, et al. 2020. Hybrid logical security framework for privacy preservation in the green internet of things. Sustainability 12, 14 (2020), 5542.Google ScholarGoogle ScholarCross RefCross Ref
  7. Sooyoung Cha, Seongjoon Hong, Junhee Lee, and Hakjoo Oh. 2018. Automatically generating search heuristics for concolic testing. In Proceedings of the 40th International Conference on Software Engineering. 1244–1254. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mingjian Cui, Jianhui Wang, and Meng Yue. 2019. Machine learning-based anomaly detection for load forecasting under cyberattacks. IEEE Trans. Smart Grid 10, 5 (2019), 5724–5734.Google ScholarGoogle ScholarCross RefCross Ref
  9. Straight Edge. 2020. 5 Top Cybersecurity Threats & Their Solutions for 2020. Retrieved from https://www.straightedgetech.com/5-top-cybersecurity-threats-and-their-solutions-for-2020/. Google ScholarGoogle Scholar
  10. Jamal El Hachem, Ali Sedaghatbaf, Elena Lisova, and Aida Causevic. 2019. Using bayesian networks for a cyberattacks propagation analysis in systems-of-systems. In Proceedings of the 2019 26th Asia-Pacific Software Engineering Conference (APSEC’19). IEEE, 363–370.Google ScholarGoogle ScholarCross RefCross Ref
  11. Mojtaba Eskandari, Zaffar Haider Janjua, Massimo Vecchio, and Fabio Antonelli. 2020. Passban IDS: An intelligent anomaly based intrusion detection system for IoT edge devices. IEEE Internet of Things Journal 7, 8 (2020), 6882–6897.Google ScholarGoogle ScholarCross RefCross Ref
  12. Adrien Facon, Sylvain Guilley, Xuan-Thuy Ngo, and Thomas Perianin. 2019. Hardware-enabled AI for embedded security: A new paradigm. In Proceedings of the 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom’19). IEEE, 80–84.Google ScholarGoogle ScholarCross RefCross Ref
  13. Gregory Falco, Arun Viswanathan, Carlos Caldera, and Howard Shrobe. 2018. A master attack methodology for an AI-based automated attack planner for smart cities. IEEE Access 6 (2018), 48360–48373. DOI:10.1109/ACCESS.2018.2867556Google ScholarGoogle ScholarCross RefCross Ref
  14. Ian J. Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler, Dong-Hyun Lee, et al. 2015. Challenges in representation learning: A report on three machine learning contests. Neur. Netw. 64 (2015), 59–63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ai Gu, Zhenyu Yin, Yue Li, and Suo Li. 2018. Research on safety and security of cyber physical machine tool system. In Proceedings of the 2018 IEEE International Conference on Information and Automation (ICIA’18). IEEE, 1669–1673.Google ScholarGoogle ScholarCross RefCross Ref
  16. Zhitao Guan, Jing Li, Longfei Wu, Yue Zhang, Jun Wu, and Xiaojiang Du. 2017. Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE IoT J. 4, 6 (2017), 1934–1944.Google ScholarGoogle Scholar
  17. Zhitao Guan, Yue Zhang, Longfei Wu, Jun Wu, Jing Li, Yinglong Ma, and Jingjing Hu. 2019. APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J. Netw. Comput. Appl. 125 (2019), 82–92.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hanan Hindy, Ethan Bayne, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, and Xavier Bellekens. 2020. Machine learning based IoT intrusion detection system: An MQTT case study. arXiv:2006.15340. Retrieved from https://arxiv.org/abs/2006.15340.Google ScholarGoogle Scholar
  19. ASM Sanwar Hosen, Saurabh Singh, Pradip Kumar Sharma, Uttam Ghosh, Jin Wang, In-Ho Ra, and Gi Hwan Cho. 2020. Blockchain-based transaction validation protocol for a secure distributed IoT network. IEEE Access (2020).Google ScholarGoogle Scholar
  20. Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy, Rajesh Kaluri, Gautam Srivastava, and Ohyun Jo. 2020. KeySplitWatermark: Zero watermarking algorithm for software protection against cyber-attacks. IEEE Access 8 (2020), 72650–72660.Google ScholarGoogle ScholarCross RefCross Ref
  21. Celestine Iwendi, Gautam Srivastava, Suleman Khan, and Praveen Kumar Reddy Maddikunta. 2020. Cyberbullying detection solutions based on deep learning architectures. Multimedia Syst. (2020), 1–14.Google ScholarGoogle Scholar
  22. Raghudeep Kannavara, Christopher J. Havlicek, Bo Chen, Mark R. Tuttle, Kai Cong, Sandip Ray, and Fei Xie. 2015. Challenges and opportunities with concolic testing. In Proceedings of the 2015 National Aerospace and Electronics Conference (NAECON’15). IEEE, 374–378.Google ScholarGoogle ScholarCross RefCross Ref
  23. Ghassan Kbar and Ammar Alazab. 2019. A comprehensive protection method for securing the organization’s network against cyberattacks. In Proceedings of the 2019 Cybersecurity and Cyberforensics Conference (CCC’19). IEEE, 118–122.Google ScholarGoogle ScholarCross RefCross Ref
  24. Kush Khanna, Bijaya Ketan Panigrahi, and Anupam Joshi. 2017. AI-based approach to identify compromised meters in data integrity attacks on smart grid. IET Gener. Transm. Distrib. 12, 5 (2017), 1052–1066.Google ScholarGoogle ScholarCross RefCross Ref
  25. Nakhyun Kim, Seulgi Lee, Hyeisun Cho, Byun-Ik Kim, and MoonSeog Jun. 2018. Design of a cyber threat information collection system for cyber attack correlation. In Proceedings of the 2018 International Conference on Platform Technology and Service (PlatCon’18). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  26. Taeksu Kim, Jonghyun Park, Igor Kulida, and Yoonkyu Jang. 2014. Concolic testing framework for industrial embedded software. In Proceedings of the 2014 21st Asia-Pacific Software Engineering Conference, Vol. 2. IEEE, 7–10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yunho Kim, Yunja Choi, and Moonzoo Kim. 2018. Precise concolic unit testing of C programs using extended units and symbolic alarm filtering. In Proceedings of the 40th International Conference on Software Engineering. 315–326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Yunho Kim, Dongju Lee, Junki Baek, and Moonzoo Kim. 2019. Concolic testing for high test coverage and reduced human effort in automotive industry. In Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP’19). IEEE, 151–160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, and Jun Zheng. 2019. A CMA-ES-Based adversarial attack on black-box deep neural networks. IEEE Access 7 (2019), 172938–172947.Google ScholarGoogle ScholarCross RefCross Ref
  30. Hongbo Li, Sihuan Li, Zachary Benavides, Zizhong Chen, and Rajiv Gupta. 2018. COMPI: Concolic testing for MPI applications. In Proceedings of the 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS’18). IEEE, 865–874.Google ScholarGoogle ScholarCross RefCross Ref
  31. Hongliang Liang, Zhengyu Li, Minhuan Huang, and Xiaoxiao Pei. 2017. A novel method makes concolic system more effective. In Proceedings of the 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud’17). IEEE, 243–248.Google ScholarGoogle ScholarCross RefCross Ref
  32. Bin Lin, Kai Cong, Zhenkun Yang, Zhigang Liao, Tao Zhan, Christopher Havlicek, and Fei Xie. 2018. Concolic testing of SystemC designs. In Proceedings of the 2018 19th International Symposium on Quality Electronic Design (ISQED’18). IEEE, 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  33. Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, and Wu Yang. 2019. Making knowledge tradable in edge-AI enabled IoT: A consortium blockchain-based efficient and incentive approach. IEEE Trans. Industr. Inf. 15, 12 (2019), 6367–6378.Google ScholarGoogle ScholarCross RefCross Ref
  34. A Tawalbeh Lo’ai, Hala Tawalbeh, Houbing Song, and Yaser Jararweh. 2017. Intrusion and attacks over mobile networks and cloud health systems. In Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’17). IEEE, 13–17.Google ScholarGoogle Scholar
  35. Yuxiang Ma, Yulei Wu, Jingguo Ge, and LI Jun. 2018. An architecture for accountable anonymous access in the Internet-of-Things network. IEEE Access 6 (2018), 14451–14461.Google ScholarGoogle ScholarCross RefCross Ref
  36. Rupak Majumdar and Koushik Sen. 2007. Hybrid concolic testing. In Proceedings of the 29th International Conference on Software Engineering (ICSE’07). IEEE, 416–426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wataru Matsuda, Mariko Fujimoto, Tomomi Aoyama, and Takuho Mitsunaga. 2019. Cyber security risk assessment on industry 4.0 using ICS testbed with AI and Cloud. In Proceedings of the 2019 IEEE Conference on Application, Information and Network Security (AINS’19). IEEE, 54–59.Google ScholarGoogle ScholarCross RefCross Ref
  38. Patrick McAfee, Mohamed Wiem Mkaouer, and Daniel E. Krutz. 2017. CATE: Concolic Android testing using Java pathfinder for Android applications. In Proceedings of the 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering and Systems (MOBILESoft’17). IEEE, 213–214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, and Eryk Dutkiewicz. 2018. Cyberattack detection in mobile cloud computing: A deep learning approach. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC’18). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  40. Ian Perera, Jena Hwang, Kevin Bayas, Bonnie Dorr, and Yorick Wilks. 2018. Cyberattack prediction through public text analysis and mini-theories. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data’18). IEEE, 3001–3010.Google ScholarGoogle ScholarCross RefCross Ref
  41. Sonal Pinto and Michael S. Hsiao. 2017. RTL functional test generation using factored concolic execution. In Proceedings of the 2017 IEEE International Test Conference (ITC’17). IEEE, 1–10.Google ScholarGoogle Scholar
  42. Xiao Qu and Brian Robinson. 2011. A case study of concolic testing tools and their limitations. In Proceedings of the 2011 International Symposium on Empirical Software Engineering and Measurement. IEEE, 117–126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Pritam Roy, Sagar Chaki, and Pankaj Chauhan. 2019. High coverage concolic equivalence checking. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE’19). IEEE, 462–467.Google ScholarGoogle ScholarCross RefCross Ref
  44. Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi, and Gautam Srivastava. 2019. Security aspects of internet of things aided smart grids: A bibliometric survey. In Internet of Things. 100111.Google ScholarGoogle Scholar
  45. Prinkle Sharma, Hong Liu, Honggang Wang, and Shelley Zhang. 2017. Securing wireless communications of connected vehicles with artificial intelligence. In Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST’17). IEEE, 1–7.Google ScholarGoogle ScholarCross RefCross Ref
  46. Jose Costa Sapalo Sicato, Sushil Kumar Singh, Shailendra Rathore, and Jong Hyuk Park. 2020. A comprehensive analyses of intrusion detection system for IoT environment. J. Inf. Process. Syst. 16, 4 (2020), 975–990.Google ScholarGoogle Scholar
  47. Gautam Srivastava, Reza M. Parizi, and Ali Dehghantanha. 2020. The future of blockchain technology in healthcare internet of things security. In Blockchain Cybersecurity, Trust and Privacy. Springer, 161–184.Google ScholarGoogle Scholar
  48. Youcheng Sun, Xiaowei Huang, Daniel Kroening, James Sharp, Matthew Hill, and Rob Ashmore. 2019. DeepConcolic: Testing and debugging deep neural networks. In Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion’19). IEEE, 111–114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Syeda Manjia Tahsien, Hadis Karimipour, and Petros Spachos. 2020. Machine learning based solutions for security of Internet of Things (IoT): A survey. J. Netw. Comput. Appl. (2020), 102630.Google ScholarGoogle Scholar
  50. Muhammad Tariq, Muhammad Adnan, Gautam Srivastava, and Herald Vincent Poor. 2020. Instability detection and prevention in smart grids under asymmetric faults. (unpublished).Google ScholarGoogle Scholar
  51. Xinyu Wang, Jun Sun, Zhenbang Chen, Peixin Zhang, Jingyi Wang, and Yun Lin. 2018. Towards optimal concolic testing. In Proceedings of the 40th International Conference on Software Engineering. 291–302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Weizhong Yan, Lalit K. Mestha, and Masoud Abbaszadeh. 2019. Attack detection for securing cyber physical systems. IEEE IoT J. 6, 5 (2019), 8471–8481.Google ScholarGoogle Scholar
  53. Zhongjiang Yao, Jingguo Ge, Yulei Wu, and Linjie Jian. 2019. A privacy preserved and credible network protocol. J. Parallel Distrib. Comput. 132 (2019), 150–159.Google ScholarGoogle ScholarCross RefCross Ref
  54. Bo Yin, Hao Yin, Yulei Wu, and Zexun Jiang. 2020. FDC: A secure federated deep learning mechanism for data collaborations in the internet of things. IEEE Internet of Things 7, 7 (2020), 6348–6359.Google ScholarGoogle ScholarCross RefCross Ref
  55. K. Yu, L. Tan, X. Shang, J. Huang, G. Srivastava, and P. Chatterjee. 2020. Efficient and privacy-preserving medical research support platform against COVID-19: A blockchain-based approach. IEEE Consumer Electronics Magazine 10, 2 (2020), 111–120. DOI:https://doi.org/10.1109/MCE.2020.3035520Google ScholarGoogle ScholarCross RefCross Ref
  56. Yiyun Zhou, Meng Han, Liyuan Liu, Jing Selena He, and Yan Wang. 2018. Deep learning approach for cyberattack detection. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’18). IEEE, 262–267.Google ScholarGoogle ScholarCross RefCross Ref
  57. Yuchen Zhou, Yang Liu, and Shiyan Hu. 2017. Smart home cyberattack detection framework for sponsor incentive attacks. IEEE Trans. Smart Grid 10, 2 (2017), 1916–1927.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Internet Technology
          ACM Transactions on Internet Technology  Volume 21, Issue 3
          August 2021
          522 pages
          ISSN:1533-5399
          EISSN:1557-6051
          DOI:10.1145/3468071
          • Editor:
          • Ling Liu
          Issue’s Table of Contents

          Copyright © 2021 Association for Computing Machinery.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 June 2021
          • Accepted: 1 January 2021
          • Revised: 1 October 2020
          • Received: 1 July 2020
          Published in toit Volume 21, Issue 3

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!