SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices

Main Article Content

Srikanth Reddy Vutukuru, Srinivasa Chakravarthi Lade

Abstract

This research paper deals with the enhancement of Internet of Things (IoT) security through federated ensemble learning (FEI) and adversarial machine learning (AMLI) algorithms. The proposed approach strives to enhance the security of IoT devices and networks against numerous cyber threats. To address the increasing threat of IoT, the study will utilize advanced machine learning techniques in order to build more resilient defenses for IoT networks. Using the IoT-23_Combined dataset, the study scrutinized an array of IoT attack types, revealing the distribution and frequency of different attack categories. The FEI and AMLI models were trained and tested to detect and mitigate these IoT attacks, with the evaluation metrics being accuracy, precision, recall, and F1 score. The FEI model surpassed the AMLI model, registering superior performance in all metrics, with an accuracy of 87.94% and an F1 score of 88.44%. Concurrently, the study recommends the adoption of system hardening strategies and real-time response measures, including robust authentication methods, secure firmware updates, and security awareness training programs. The assessment of these measures was based on their implementation complexity, potential impact on system performance, and adaptability to changing threats. Conclusively, the research findings illustrate the potential of machine learning to bolster IoT security, suggesting a path towards more proactive defense mechanisms and the creation of a resilient IoT ecosystem. This study holds relevance for entities seeking to fortify their IoT security systems against an evolving threat landscape.

Article Details

Section
Articles
Author Biography

Srikanth Reddy Vutukuru, Srinivasa Chakravarthi Lade

1Srikanth Reddy Vutukuru

2Srinivasa Chakravarthi Lade

1* Corresponding author : Research Scholar, Department of Computer Science and Engineering, Githams University, Vishakhapatnam, Andhra Pradesh, India. Email ID: srireddy.sv@gmail.com

2Assistant Professor, Department of Computer Science and Engineering, Githams University, Vishakhapatnam, Andhra Pradesh, India.Email ID: chakri.ls@gmail.com

Copyright © JES 2023 on-line : journal.esrgroups.org

 

References

Perwej, Y., Haq, K., Parwej, F., Mumdouh, M., & Hassan, M. (2019). The internet of things (IoT) and its application domains. International Journal of Computer Applications, 975(8887), 182.

Abdul-Qawy, A. S., Pramod, P. J., Magesh, E., & Srinivasulu, T. (2015). The internet of things (iot): An overview. International Journal of Engineering Research and Applications, 5(12), 71-82.

Lin, H., & Bergmann, N. W. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.

Plabon Bhandari Abhi, Kristelle Ann R. Torres, Tao Yusoff, & K.Samunnisa. (2023). A Novel Lightweight Cryptographic Protocol for Securing IoT Devices . International Journal of Computer Engineering in Research Trends, 10(10), 24–30.

Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Communications Surveys & Tutorials, 21(3), 2702-2733.

Yang, K., Shi, Y., Zhou, Y., Yang, Z., Fu, L., & Chen, W. (2020). Federated machine learning for intelligent IoT via reconfigurable intelligent surface. IEEE Network, 34(5), 16-22.

Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2020). Machine learning in IoT security: Current solutions and future challenges. IEEE Communications Surveys & Tutorials, 22(3), 1686-1721.

Abou Bakary Ballo, & Diarra Mamadou. (2023). A Comprehensive Study of IoT Security Issues and Protocols . International Journal of Computer Engineering in Research Trends, 10(7), 8–14. https://doi.org/10.22362/ijcert.v10i7.858

Jacob, I. J., & Darney, P. E. (2021). Design of deep learning algorithm for IoT application by image based recognition. Journal of ISMAC, 3(03), 276-290.

Laha, S., Chowdhury, N., & Karmakar, R. (2020, July). How can machine learning impact on wireless network and IoT?–A survey. In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-7). IEEE.

Bezawada , M., & P, V. K. (2023). Comparative Study on Techniques Used for Anomaly Detection in IoT Data. International Journal of Computer Engineering in Research Trends, 10(4), 177–181.

Waseem, S. M., & Roy, S. K. (2022). FPGA implementation of Proximal Policy Optimization algorithm for Edge devices with application to Agriculture Technology. Journal of Ambient Intelligence and Humanized Computing, 1-12.

Hoffman, M., Song, E., Brundage, M. P., & Kumara, S. (2021). Online improvement of condition-based maintenance policy via Monte Carlo tree search. IEEE Transactions on Automation Science and Engineering, 19(3), 2540-2551.

Robbi Rahim, & Abdul wahid. (2023). Advancements in Plant Disease Detection: Integrating Machine Learning, Image Processing, and Precision Agriculture. International Journal of Computer Engineering in Research Trends, 10(8), 19–25.

Khan, H. U., Sohail, M., Ali, F., Nazir, S., Ghadi, Y. Y., & Ullah, I. (2023). Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices. Physical Communication, 59, 102084.

Devi, R. A., & Arunachalam, A. R. (2023). Enhancement of IoT device security using an Improved Elliptic Curve Cryptography algorithm and malware detection utilizing deep LSTM. High-Confidence Computing, 100117.

Alghamdi, R., & Bellaiche, M. (2023). A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks. Computers & Security, 125, 103014.

M, P., & K, D. S. D. (2023). ICN Scheme and Proxy re-encryption for Privacy Data Sharing on the Block Chain. International Journal of Computer Engineering in Research Trends, 10(4), 172–176.

Wang, J., Liu, C., Xu, J., Wang, J., Hao, S., Yi, W., & Zhong, J. (2022). IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning. Security and Communication Networks, 2022

Khan, A. Y., Latif, R., Latif, S., Tahir, S., Batool, G., & Saba, T. (2019). Malicious insider attack detection in IoTs using data analytics. IEEE Access, 8, 11743-11753.

Choi, S. K., Yang, C. H., & Kwak, J. (2018). System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. KSII Transactions on Internet & Information Systems, 12(2).

Sebastian Garcia, Agustin Parmisano, & Maria Jose Erquiaga. (2020). IoT-23: A labeled dataset with malicious and benign IoT network traffic (1.0.0) [Data set]. Zenodo. https://doi.org/10.5281/zenodo.4743746

Rayikanti Anasurya. (2022). Next-Gen Agriculture: Revolutionizing Farming with IoT and Sustainability. International Journal of Computer Engineering in Research Trends, 9(1), 21–27.

Madhuri More, Snehal Mote, Amruta Neel, Poonam Nerkar, & P. S. Hanwate. (2016). Intelligent Device TO Device Communication Using IoT. International Journal of Computer Engineering in Research Trends, 3(4), 187–189.

A A Damayanthi, & Mohammad Riyaz Belgaum. (2022). A Study of Heterogeneity Characteristics over Wireless Sensor Networks. International Journal of Computer Engineering in Research Trends, 9(12), 258–262.

Vani Sri.S, Sneha.S, & Dr.G.Umarani Srikanth. (2018). Power Saving System Using Sensor Over IoT. International Journal of Computer Engineering in Research Trends, 5(2), 25–29.

B.Sindhu Bala, M.Swetha, M.Tamilarasi, & D.Vinodha. (2018). SURVEY ON WOMEN SAFETY USING IOT. International Journal of Computer Engineering in Research Trends, 5(2), 16–24.

Mekala, S., Mallareddy, A., Tandu, R. R., & Radhika, K. (2023, June). Machine Learning and Fuzzy Logic Based Intelligent Algorithm for Energy Efficient Routing in Wireless Sensor Networks. In International Conference on Multi-disciplinary Trends in Artificial Intelligence (pp. 523-533). Cham: Springer Nature Switzerland.

Mahalakshmi, J., Reddy, A. Mallareddy., Sowmya, T., Chowdary, B. V., & Raju, P. R. (2023). Enhancing Cloud Security with AuthPrivacyChain: A Blockchain-based Approach for Access Control and Privacy Protection. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 370-384.