Securing IoT Using Supervised Machine Learning

  • Conference paper
  • First Online:
Artificial Intelligence of Things (ICAIoT 2023)

Abstract

IoT today is ubiquitous. Its growth has reached a stage where the number of connected devices is growing exponentially daily, raising various security issues of great importance to all stakeholders. Implementing security schemes on IoT devices poses a considerable challenge because of their heterogeneous and restricted existence. Machine learning is already an intricate part of several IoT applications, and it eliminates human errors and enables IoT infrastructure to generate real-time insights to reach its full potential. To protect IoT services from being targeted and raise security awareness throughout all aspects of the network, machine learning algorithms are now explored to address the critical security issues of IoT. Deploying a learned model-based security approach is dynamic and holistically effective as a solution. Supervised machine learning methods have been proposed as a promising approach for IoT security due to their ability to detect and classify malicious data. This paper provides a comprehensive overview of supervised machine learning methods used for IoT security, including various classifiers and data engineering techniques. We have further demonstrated how effectively the performance can be increased by deploying various data engineering methods to improve the overall model performance in terms of accuracy and time consumed. Both these play a crucial role in providing dynamic and real-time services. Overall, this paper aims to raise awareness of the potential of supervised machine learning for IoT security and guide researchers and practitioners in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Saran, N., Kesswani, N.: A comparative study of supervised machine learning classifiers for intrusion detection in internet of things. Proc. Comput. Sci. 218, 2049–2057 (2023). https://doi.org/10.1016/j.procs.2023.01.181

    Article  Google Scholar 

  2. Tekin, N., Acar, A., Aris, A., Uluagac, A.S., Gungor, V.C.: Energy consumption of on-device machine learning models for IoT intrusion detection. Internet Things 21, 100670 (2023). https://doi.org/10.1016/j.iot.2022.100670

    Article  Google Scholar 

  3. Farooq, U., Tariq, N., Asim, M., Baker, T., Al-Shamma’a, A.: Machine learning and the Internet of Things security: solutions and open challenges. J. Parallel Distrib. Comput. 62, 89–104 (2022). https://doi.org/10.1016/j.jpdc.2022.01.015

  4. Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet Things 14, 100365 (2021). https://doi.org/10.1016/j.iot.2021.100365

    Article  Google Scholar 

  5. Mohanta, B.K., Jena, D., Satapathy, U., Patnaik, S.: Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things. 11, 100227 (2020). https://doi.org/10.1016/j.iot.2020.100227

    Article  Google Scholar 

  6. Hussain, F., Hussain, R., Hassan, S.A., Hossain, E.: Machine Learning in IoT Security: Current Solutions and Future Challenges. ar**v:1904.05735 [cs, stat]. (2019)

  7. Moh, M., Raju, R.: Machine learning techniques for security of Internet of Things (IoT) and fog computing systems. In: 2018 International Conference on High Performance Computing Simulation (HPCS), pp. 709–715 (2018). https://doi.org/10.1109/HPCS.2018.00116

  8. Zantalis, F., Koulouras, G., Karabetsos, S., Kandris, D.: A review of machine learning and IoT in smart transportation. Future Internet 11, 94 (2019). https://doi.org/10.3390/fi11040094

    Article  Google Scholar 

  9. Shanthamallu, U.S., Spanias, A., Tepedelenlioglu, C., Stanley, M.: A brief survey of machine learning methods and their sensor and IoT applications. In: 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA), pp. 1–8 (2017). https://doi.org/10.1109/IISA.2017.8316459

  10. Duarte, D., Ståhl, N.: Machine learning: a concise overview. In: Said, A., Torra, V. (eds.) Data Science in Practice. SBD, vol. 46, pp. 27–58. Springer, Cham (2019). https://doi.org/10.1007/978-3-319-97556-6_3

  11. Sharma, S.K., Wang, X.: Toward massive machine type communications in ultra-dense cellular IoT networks: current issues and machine learning-assisted solutions. IEEE Commun. Surv. Tutor. 22, 426–471 (2020). https://doi.org/10.1109/COMST.2019.2916177

    Article  Google Scholar 

  12. **ao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning: how do IoT devices use AI to enhance security? IEEE Sig. Process. Mag. 35, 41–49 (2018). https://doi.org/10.1109/MSP.2018.2825478

    Article  Google Scholar 

  13. Kotstein, S., Decker, C.: Reinforcement learning for IoT interoperability. In: 2019 IEEE International Conference on Software Architecture Companion (ICSA-C), pp. 11–18 (2019). https://doi.org/10.1109/ICSA-C.2019.00010

  14. Al-Garadi, M.A., Mohamed, A., Al-Ali, A.K., Du, X., Ali, I., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Commun. Surv. Tutor. 22, 1646–1685 (2020). https://doi.org/10.1109/COMST.2020.2988293

    Article  Google Scholar 

  15. Iqbal, S., Qureshi, S.: A top-down survey on securing IoT with machine learning: goals, recent advances and challenges. IJWMC 22, 38 (2022). https://doi.org/10.1504/IJWMC.2022.122484

    Article  Google Scholar 

  16. Moustafa, N.: UNSW_NB15 dataset (2019). https://ieee-dataport.org/documents/unswnb15-dataset

  17. Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS), pp. 1–6 (2015). https://doi.org/10.1109/MilCIS.2015.7348942

  18. Yang, L., Shami, A.: On hyperparameter optimization of machine learning algorithms: theory and practice. Neurocomputing 415, 295–316 (2020). https://doi.org/10.1016/j.neucom.2020.07.061

    Article  Google Scholar 

  19. Muhajir, D., Akbar, M., Bagaskara, A., Vinarti, R.: Improving classification algorithm on education dataset using hyperparameter tuning. Proc. Comput. Sci. 197, 538–544 (2022). https://doi.org/10.1016/j.procs.2021.12.171

    Article  Google Scholar 

  20. Weerts, H.J.P., Mueller, A.C., Vanschoren, J.: Importance of Tuning Hyperparameters of Machine Learning Algorithms. http://arxiv.org/abs/2007.07588 (2020)

  21. Patel, H., Singh Rajput, D., Thippa Reddy, G., Iwendi, C., Kashif Bashir, A., Jo, O.: A review on classification of imbalanced data for wireless sensor networks. Int. J. Distrib. Sens. Netw. 16, 1550147720916404 (2020). https://doi.org/10.1177/1550147720916404

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sania Iqbal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Iqbal, S., Qureshi, S. (2024). Securing IoT Using Supervised Machine Learning. In: Challa, R.K., et al. Artificial Intelligence of Things. ICAIoT 2023. Communications in Computer and Information Science, vol 1929. Springer, Cham. https://doi.org/10.1007/978-3-031-48774-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-48774-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-48773-6

  • Online ISBN: 978-3-031-48774-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation