Enhancing IoT Security: A Synergy of Machine Learning, Artificial Intelligence, and Blockchain

Authors

  • Ahmad Anwar bin Zainuddin International Islamic University Malaysia
  • Haziqah Sairin International Islamic University Malaysia
  • Izzah Atirah Mazlan International Islamic University Malaysia
  • Nur Najma Aisyah Muslim International Islamic University Malaysia
  • Wan Afiqah Syahmina Wan Sabarudin International Islamic University Malaysia

Keywords:

Internet of Things (IoT) Artificial Intelligence (AI) Machine Learning (ML) Blockchain technology Cybersecurity Privacy Data storage Cyberattacks K-nearest neighbour

Abstract

With the advancement of technological age, the growth of technology not only affecting the network and security but also the Internet of Things (IoT), this invites the need for robust cybersecurity solutions become increasingly important. To further enhance the existing safety mechanisms used in the IoT industry, the assimilation of Machine Learning (ML) with Artificial Intelligence (AI) along with the technology of blockchain can further offers a high potential solution in order to face the challenges faced in the IoT security. ML and AI algorithms can enhance the detection and prevention by reviewing variety of data, recognizing patterns and predicting the potential vulnerabilities of the cyber threats in IoT. Blockchain, on the other hand, provides a decentralized and tamper-proof platform for secure data storage and transactions. By leveraging these technologies, IoT systems can achieve a sustainable security, ensuring the protection of sensitive and important information as well as protecting the Confidentiality, Availability, and Integrity (CIA) triad of the infrastructure of the network. This research incorporates the variety of machine learning approaches, including the trees of decision, the K-nearest neighbours, the artificial neural networks, convolutional neural networks, the support of vector machines, Bayesian networks, ensemble classifiers, genetic programming, logistic regression as well as the deep learning tactics. Through this, the deriving insights of raw data can then help these technologies to aim and create a modern and dynamically improved security solutions for the evolving landscape of IoT devices. Future research should focus these upcoming issues in order to fully comprehend potential of ML applications in security intelligence of IoT.

 

References

F. Liang, W. G. Hatcher, W. Liao, W. Gao, and W. Yu, “Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly,” IEEE Access, vol. 7, pp. 158126–158147, 2019, doi: 10.1109/ACCESS.2019.2948912.

M. Kuzlu, C. Fair, and O. Guler, “Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity,” Discov. Internet Things, vol. 1, no. 1, p. 7, Dec. 2021, doi: 10.1007/s43926-020-00001-4.

A. V. Lv Pradeepika Verma, Yousef Farhaoui, Zhihan, Ed., Emerging Real-World Applications of Internet of Things. Boca Raton: CRC Press, 2022. doi: 10.1201/9781003304203.

M. Abdullahi et al., “Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review,” Electronics, vol. 11, no. 2, p. 198, Jan. 2022, doi: 10.3390/electronics11020198.

B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology,” Internet Things, vol. 11, p. 100227, Sep. 2020, doi: 10.1016/j.iot.2020.100227.

F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine Learning in IoT Security: Current Solutions and Future Challenges,” IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1686–1721, 2020, doi: 10.1109/COMST.2020.2986444.

I. H. Sarker, A. I. Khan, Y. B. Abushark, and F. Alsolami, “Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions,” Mob. Netw. Appl., vol. 28, no. 1, pp. 296–312, Feb. 2023, doi: 10.1007/s11036-022-01937-3.

R. Ali, A. Ali, F. Iqbal, A. M. Khattak, and S. Aleem, “A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber Security,” in Big Data and Security, vol. 1210, Y. Tian, T. Ma, and M. K. Khan, Eds., in Communications in Computer and Information Science, vol. 1210. , Singapore: Springer Singapore, 2020, pp. 584–593. doi: 10.1007/978-981-15-7530-3_44.

A. Aldhaheri, F. Alwahedi, M. A. Ferrag, and A. Battah, “Deep learning for cyber threat detection in IoT networks: A review,” Internet Things Cyber-Phys. Syst., vol. 4, pp. 110–128, Jan. 2024, doi: 10.1016/j.iotcps.2023.09.003.

T. A. Al-Amiedy, M. Anbar, B. Belaton, A. H. H. Kabla, I. H. Hasbullah, and Z. R. Alashhab, “A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things,” Sensors, vol. 22, no. 9, p. 3400, Apr. 2022, doi: 10.3390/s22093400.

“Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence - PubMed.” Accessed: Jan. 02, 2024. [Online]. Available: https://pubmed.ncbi.nlm.nih.gov/37190648/

C. Iwendi, S. U. Rehman, A. R. Javed, S. Khan, and G. Srivastava, “Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures,” ACM Trans. Internet Technol., vol. 21, no. 3, pp. 1–22, Aug. 2021, doi: 10.1145/3448614.

M. A. Al-Garadi, A. Mohamed, A. K. Al-Ali, X. Du, I. Ali, and M. Guizani, “A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security,” IEEE Commun. Surv. Tutor., vol. 22, no. 3, pp. 1646–1685, 2020, doi: 10.1109/COMST.2020.2988293.

S. M. Tahsien, H. Karimipour, and P. Spachos, “Machine learning based solutions for security of Internet of Things (IoT): A survey,” J. Netw. Comput. Appl., vol. 161, p. 102630, Jul. 2020, doi: 10.1016/j.jnca.2020.102630.

N. Alhalafi and P. Veeraraghavan, “Privacy and Security Challenges and Solutions in IOT: A review,” IOP Conf. Ser. Earth Environ. Sci., vol. 322, no. 1, p. 012013, Aug. 2019, doi: 10.1088/1755-1315/322/1/012013.

K. A. P. Da Costa, J. P. Papa, C. O. Lisboa, R. Munoz, and V. H. C. De Albuquerque, “Internet of Things: A survey on machine learning-based intrusion detection approaches,” Comput. Netw., vol. 151, pp. 147–157, Mar. 2019, doi: 10.1016/j.comnet.2019.01.023.

Z. Chen et al., “Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats,” ACM Comput. Surv., vol. 55, no. 5, pp. 1–37, May 2023, doi: 10.1145/3530812.

A. Javed, M. Awais, M. Shoaib, K. S. Khurshid, and M. Othman, “Machine learning and deep learning approaches in IoT,” PeerJ Comput. Sci., vol. 9, p. e1204, Feb. 2023, doi: 10.7717/peerj-cs.1204.

M. A. Amanullah et al., “Deep learning and big data technologies for IoT security,” Comput. Commun., vol. 151, pp. 495–517, Feb. 2020, doi: 10.1016/j.comcom.2020.01.016.

M. Bettayeb, O. A. Waraga, M. A. Talib, Q. Nasir, and O. Einea, “IoT Testbed Security: Smart Socket and Smart Thermostat,” in 2019 IEEE Conference on Application, Information and Network Security (AINS), Nov. 2019, pp. 18–23. doi: 10.1109/AINS47559.2019.8968694.

“Smart Sensors: Analysis of Different Types of IoT Sensors | IEEE Conference Publication | IEEE Xplore.” Accessed: Jan. 02, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8862778?casa_token=66y8Ga6lTo8AAAAA:zJwrxbxYWt5fBfLwKJRHxB_EgQV1FO3_9ejp1ogjUhCeOcMsdgGcUhkzX69Ef4whxdjjU9rVzRTt8g

A. Chatterjee and B. S. Ahmed, “IoT anomaly detection methods and applications: A survey,” Internet Things, vol. 19, p. 100568, Aug. 2022, doi: 10.1016/j.iot.2022.100568.

“What is IoT (Internet of Things) and How Does it Work? | Definition from TechTarget.” Accessed: Jan. 02, 2024. [Online]. Available: https://www.techtarget.com/iotagenda/definition/Internet-of-Things-IoT

T. Zhang, L. Gao, C. He, M. Zhang, B. Krishnamachari, and S. Avestimehr, “Federated Learning for Internet of Things: Applications, Challenges, and Opportunities”.

“Explainable AI and Deep Autoencoders Based Security Framework for IoT Network Attack Certainty (Extended Abstract) | SpringerLink.” Accessed: Jan. 02, 2024. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-031-21311-3_8

“Machines | Free Full-Text | Engineering Applications of Artificial Intelligence in Mechanical Design and Optimization.” Accessed: Jan. 02, 2024. [Online]. Available: https://www.mdpi.com/2075-1702/11/6/577

“Sustainability | Free Full-Text | Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity.” Accessed: Jan. 02, 2024. [Online]. Available: https://www.mdpi.com/2071-1050/15/18/13369

“A next-generation IoT-based collaborative framework for electronics assembly | The International Journal of Advanced Manufacturing Technology.” Accessed: Jan. 02, 2024. [Online]. Available: https://link.springer.com/article/10.1007/s00170-017-1561-x

“IoT in Healthcare: applications, benefits & Challenges.” Accessed: Jan. 02, 2024. [Online]. Available: https://www.peerbits.com/blog/internet-of-things-healthcare-applications-benefits-and-challenges.html

“An Intelligent End–Edge–Cloud Architecture for Visual IoT-Assisted Healthcare Systems | IEEE Journals & Magazine | IEEE Xplore.” Accessed: Jan. 02, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9328531?casa_token=4TvqmNwHchAAAAAA:RC60PR9uYIQXbrxmwbaHaw8-ofEwQWnd94NOfnT1O44IO4U_RrsrsnmTR4Me6SX30WUKNuDQnFim8Q

Dynamic security approach

Downloads

Published

2024-02-29

How to Cite

bin Zainuddin, A. A., Sairin, H., Mazlan, I. A., Muslim, N. N. A., & Wan Sabarudin, W. A. S. (2024). Enhancing IoT Security: A Synergy of Machine Learning, Artificial Intelligence, and Blockchain. Data Science Insights, 2(1). Retrieved from http://citedness.com/index.php/jdsi/article/view/11