Managing security in IoT by applying the deep neural network-based security framework

Authors

DOI:

https://doi.org/10.15587/1729-4061.2022.269221

Keywords:

Internet of things, security, artificial intelligence, fog computing, wireless sensors, security threats

Abstract

Security issues and Internet of Things (IoT) risks in several areas are growing steadily with the increased usage of IoT. The systems have developed weaknesses in computer and memory constraints in most IoT operating systems. IoT devices typically cannot operate complicated defense measures because of their poor processing capabilities. A shortage of IoT ecosystems is the most critical impediment to developing a secured IoT device. In addition, security issues create several problems, such as data access control, attacks, vulnerabilities, and privacy protection issues. These security issues lead to affect the originality of the data that cause to affects the data analysis. This research proposes an AI-based security method for the IoT environment (AI-SM-IoT) system to overcome security problems in IoT. This design was based on the edge of the network of AI-enabled security components for IoT emergency preparedness. The modules presented detect, identify and continue to identify the phase of an assault life span based on the concept of the cyberspace killing chain. It outlines each long-term security in the proposed framework and proves its effectiveness in practical applications across diverse threats. In addition, each risk in the borders layer is dealt with by integrating artificial intelligence (AI) safety modules into a separate layer of AI-SM-IoT delivered by services. It contrasted the system framework with the previous designs. It described the architectural freedom from the base areas of the project and its relatively low latency, which provides safety as a service rather than an embedded network edge on the internet-of-things design. It assessed the proposed design based on the administration score of the IoT platform, throughput, security, and working time

Author Biographies

Nabeel Mahdy Haddad, Misan University

PhD, Lecturer

Collage of Education

Hayder Sabah Salih, Iraqi Ministry of Higher Education and Scientific Research

PhD, Director/Head of the Scientific Affairs Section

Department of Private Education

Ban Salman Shukur, Economic Sciences University

PhD, Lecturer

Department of Computer Science

Baghdad College

Sura Khalil Abd, Universiti Tenaga Nasional; Dijlah University College

Doctor of Network and Communication Systems Engineering

Department of Computer Science and Information Technology

Department of Computer Engineering Techniques

Mohammed Hasan Ali, Imam Ja'afar Al-sadiq University

PhD, Lecturer

Department of Computer Systems and Software Engineering

Rami Qais Malik, Al-Mustaqbal University College

PhD, Lecturer

Department of Medical Instrumentation Techniques Engineering

References

  1. Oniani, S., Marques, G., Barnovi, S., Pires, I. M., Bhoi, A. K. (2020). Artificial Intelligence for Internet of Things and Enhanced Medical Systems. Studies in Computational Intelligence, 43–59. doi: https://doi.org/10.1007/978-981-15-5495-7_3
  2. Su, J., Chu, X., Kadry, S., S, R. (2020). Internet-of-Things-Assisted Smart System 4.0 Framework Using Simulated Routing Procedures. Sustainability, 12 (15), 6119. doi: https://doi.org/10.3390/su12156119
  3. El-Latif, A. A. A., Abd-El-Atty, B., Mazurczyk, W., Fung, C., Venegas-Andraca, S. E. (2020). Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario. IEEE Transactions on Network and Service Management, 17 (1), 118–131. doi: https://doi.org/10.1109/tnsm.2020.2969863
  4. Chakraborty, N., Li, J.-Q., Mondal, S., Luo, C., Wang, H., Alazab, M. et al. (2021). On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things. IEEE Internet of Things Journal, 8 (5), 3255–3267. doi: https://doi.org/10.1109/jiot.2020.3025274
  5. Manogaran, G., Mumtaz, S., Mavromoustakis, C. X., Pallis, E., Mastorakis, G. (2021). Artificial Intelligence and Blockchain-Assisted Offloading Approach for Data Availability Maximization in Edge Nodes. IEEE Transactions on Vehicular Technology, 70 (3), 2404–2412. doi: https://doi.org/10.1109/tvt.2021.3058689
  6. Zheng, W., Muthu, B., Kadry, S. N. (2021). Research on the design of analytical communication and information model for teaching resources with cloud‐sharing platform. Computer Applications in Engineering Education, 29 (2), 359–369. doi: https://doi.org/10.1002/cae.22375
  7. Wang, W., Jackson Samuel, R. D., Hsu, C.-H. (2020). Prediction architecture of deep learning assisted short long term neural network for advanced traffic critical prediction system using remote sensing data. European Journal of Remote Sensing, 54 (sup2), 65–76. doi: https://doi.org/10.1080/22797254.2020.1755998
  8. Rauf, H. T., Gao, J., Almadhor, A., Arif, M., Nafis, M. T. (2021). Enhanced bat algorithm for COVID-19 short-term forecasting using optimized LSTM. Soft Computing, 25 (20), 12989–12999. doi: https://doi.org/10.1007/s00500-021-06075-8
  9. Mohamed Shakeel, P., Baskar, S., Sarma Dhulipala, V. R., Mishra, S., Jaber, M. M. (2018). RETRACTED ARTICLE: Maintaining Security and Privacy in Health Care System Using Learning Based Deep-Q-Networks. Journal of Medical Systems, 42 (10). doi: https://doi.org/10.1007/s10916-018-1045-z
  10. Amudha, G., Narayanasamy, P. (2018). Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks. Wireless Personal Communications, 102 (4), 3303–3321. doi: https://doi.org/10.1007/s11277-018-5369-2
  11. Nguyen, T. N., Le, V. V., Chu, S.-I., Liu, B.-H., Hsu, Y.-C. (2021). Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. Wireless Personal Communications, 127 (1), 767–792. doi: https://doi.org/10.1007/s11277-021-08404-4
  12. Malarvizhi Kumar, P., Choong Seon, H. (2021). RETRACTED ARTICLE: Internet of Things-Based Digital Video Intrusion for Intelligent Monitoring Approach. Arabian Journal for Science and Engineering. doi: https://doi.org/10.1007/s13369-021-05902-2
  13. Manickam, A., Jiang, J., Zhou, Y., Sagar, A., Soundrapandiyan, R., Dinesh Jackson Samuel, R. (2021). Automated pneumonia detection on chest X-ray images: A deep learning approach with different optimizers and transfer learning architectures. Measurement, 184, 109953. doi: https://doi.org/10.1016/j.measurement.2021.109953
  14. Sheron, P. S. F., Sridhar, K. P., Baskar, S., Shakeel, P. M. (2019). A decentralized scalable security framework for end‐to‐end authentication of future IoT communication. Transactions on Emerging Telecommunications Technologies, 31 (12). doi: https://doi.org/10.1002/ett.3815
  15. Amudha, G. (2021). Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions. Wireless Personal Communications, 127 (1), 85–105. doi: https://doi.org/10.1007/s11277-021-08094-y
  16. Gheisari, M., Najafabadi, H. E., Alzubi, J. A., Gao, J., Wang, G., Abbasi, A. A., Castiglione, A. (2021). OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Generation Computer Systems, 123, 1–13. doi: https://doi.org/10.1016/j.future.2021.01.028
  17. Nguyen, T. N., Liu, B.-H., Nguyen, N. P., Dumba, B., Chou, J.-T. (2021). Smart Grid Vulnerability and Defense Analysis Under Cascading Failure Attacks. IEEE Transactions on Power Delivery, 36 (4), 2264–2273. doi: https://doi.org/10.1109/tpwrd.2021.3061358
  18. Singh, S., Sharma, P. K., Yoon, B., Shojafar, M., Cho, G. H., Ra, I.-H. (2020). Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustainable Cities and Society, 63, 102364. doi: https://doi.org/10.1016/j.scs.2020.102364
  19. Javaid, N., Sher, A., Nasir, H., Guizani, N. (2018). Intelligence in IoT-Based 5G Networks: Opportunities and Challenges. IEEE Communications Magazine, 56 (10), 94–100. doi: https://doi.org/10.1109/mcom.2018.1800036
  20. Mao, B., Kawamoto, Y., Kato, N. (2020). AI-Based Joint Optimization of QoS and Security for 6G Energy Harvesting Internet of Things. IEEE Internet of Things Journal, 7 (8), 7032–7042. doi: https://doi.org/10.1109/jiot.2020.2982417
  21. Mendhurwar, S., Mishra, R. (2019). Integration of social and IoT technologies: architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 15 (4), 565–584. doi: https://doi.org/10.1080/17517575.2019.1600041
  22. Mukherjee, A., Goswami, P., Yang, L., Sah Tyagi, S. K., Samal, U. C., Mohapatra, S. K. (2020). Deep neural network-based clustering technique for secure IIoT. Neural Computing and Applications, 32 (20), 16109–16117. doi: https://doi.org/10.1007/s00521-020-04763-4
  23. Vimal, S., Khari, M., Crespo, R. G., Kalaivani, L., Dey, N., Kaliappan, M. (2020). Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks. Computer Communications, 154, 481–490. doi: https://doi.org/10.1016/j.comcom.2020.03.004
  24. Alqaralleh, B. A. Y., Vaiyapuri, T., Parvathy, V. S., Gupta, D., Khanna, A., Shankar, K. (2021). Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Personal and Ubiquitous Computing. doi: https://doi.org/10.1007/s00779-021-01543-2
  25. Ahmed Jamal, A., Mustafa Majid, A.-A., Konev, A., Kosachenko, T., Shelupanov, A. (2021). A review on security analysis of cyber physical systems using Machine learning. Materials Today: Proceedings. doi: https://doi.org/10.1016/j.matpr.2021.06.320
  26. Cui, Z., Xue, F., Zhang, S., Cai, X., Cao, Y., Zhang, W., Chen, J. (2020). A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN. IEEE Transactions on Services Computing, 1–1. doi: https://doi.org/10.1109/tsc.2020.2964537
  27. Aldhaheri, S., Alghazzawi, D., Cheng, L., Barnawi, A., Alzahrani, B. A. (2020). Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research. Journal of Network and Computer Applications, 157, 102537. doi: https://doi.org/10.1016/j.jnca.2020.102537
  28. Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N., Xhafa, F. (2018). Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service system. Computing, 101 (11), 1661–1685. doi: https://doi.org/10.1007/s00607-018-0680-z
  29. Zaidan, A. A., Zaidan, B. B. (2018). A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations. Artificial Intelligence Review, 53 (1), 141–165. doi: https://doi.org/10.1007/s10462-018-9648-9
  30. Kumar, P., Kumar, R., Gupta, G. P., Tripathi, R. (2020). A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing. Transactions on Emerging Telecommunications Technologies, 32 (6). doi: https://doi.org/10.1002/ett.4112
  31. Sultana, T., Wahid, K. A. (2019). IoT-Guard: Event-Driven Fog-Based Video Surveillance System for Real-Time Security Management. IEEE Access, 7, 134881–134894. doi: https://doi.org/10.1109/access.2019.2941978
  32. Li, D., Deng, L., Liu, W., Su, Q. (2020). Improving communication precision of IoT through behavior-based learning in smart city environment. Future Generation Computer Systems, 108, 512–520. doi: https://doi.org/10.1016/j.future.2020.02.053
  33. Edge-IIoTset Cyber Security Dataset of IoT & IIoT. Available at: https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot
Managing security in IoT by applying the deep neural network-based security framework

Downloads

Published

2022-12-30

How to Cite

Haddad, N. M., Salih, H. S., Shukur, B. S., Abd, S. K., Ali, M. H., & Malik, R. Q. (2022). Managing security in IoT by applying the deep neural network-based security framework. Eastern-European Journal of Enterprise Technologies, 6(9 (120), 38–50. https://doi.org/10.15587/1729-4061.2022.269221

Issue

Section

Information and controlling system