Professional Documents
Culture Documents
Submitted By
Supervisors
1
Asst. Prof. Mohamed Handosa
comes with safety and privacy challenges for the reason that
2
Learning, attack.
3
Figure 1: Schematic diagram of a typical Machine
learning to solve the security problem of the Internet of
Things.
4
world, the objective of this research is to solve the security and
the internet of things edge. In 2018, L. Xiao, et al, [X. Wan al.,
5
on Machine Learning technology.
things feat real internet of things traffic flow with the network
Task Expected
Duration [24
Months].
⦁ Literature Review. [3 Months]
⦁ Write a Survey on the research topic. [2 Months]
⦁ Collecting and training on the required [2 Months]
software tools and technologies.
⦁ Design a framework of the applied algorithms [2 Months]
within SVM.
⦁ Build an initial Prototype of the designed [3 Months]
framework.
⦁ Evaluate the prototype through experiments [1 Months]
and collect the Results.
⦁ Do any required Enhancements on the [2 Months]
Prototype and re-evaluate it.
⦁ Write A Research Paper. [2 Months]
⦁ Write and submit the Thesis. [3 Months]
8. References:
⦁ Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey
on IoT security: Challenges and solution using machine learning,
artificial intelligence and blockchain technology. Internet of Things, 11,
100227.
⦁ Malhotra, P., Singh, Y., Anand, P., Bangotra, D. K., Singh, P. K., &
Hong, W. C. (2021). Internet of Things: Evolution, Concerns and
Security Challenges. Sensors, 21(5), 1809.
7
Machine Learning. In Advances in Machine Learning and
Computational Intelligence (pp. 129-136). Springer, Singapore.
⦁ Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security
techniques based on machine learning: How do IoT devices use AI to
enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.
⦁ Liu, Y., Wang, J., Li, J., Niu, S., & Song, H. (2021). Machine learning
for the detection and identification of internet of things (iot) devices: A
survey. arXiv preprint arXiv:2101.10181.
⦁ Li, Q., Zhang, L., Zhou, R., Xia, Y., Gao, W., & Tai, Y. (2021). Machine
Learning-Based Stealing Attack of the Temperature Monitoring System
for the Energy Internet of Things. Security and Communication
Networks, 2021.
⦁ Podder, P., Mondal, M., Bharati, S., & Paul, P. K. (2021). Review on
the security threats of internet of things. arXiv preprint
arXiv:2101.05614.
⦁ Zaman, S., Alhazmi, K., Aseeri, M., Ahmed, M. R., Khan, R. T., Kaiser,
M. S., & Mahmud, M. (2021). Security threats and artificial intelligence
based countermeasures for internet of things networks: a
comprehensive survey. IEEE Access.
⦁ Saha, T., Aaraj, N., Ajjarapu, N., & Jha, N. K. (2021). SHARKS: Smart
Hacking Approaches for RisK Scanning in Internet-of-Things and
Cyber-Physical Systems based on Machine Learning. IEEE
Transactions on Emerging Topics in Computing.
8
technologies, challenges, and open research issues, Computer Networks
144 (2018) 17–39.
9
⦁ R. Casado-Vara, P. Chamoso, F. De la Prieta, J. Prieto, J. M.
Corchado, Non-linear adaptive closed-loop control system for improved
efficiency in IoT-blockchain management, Information Fusion 49
(2019) 227–239.
⦁ Anand, P.; Singh, Y.; Selwal, A.; Singh, P.K.; Felseghi, R.A.; Raboaca,
M.S. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack
Surfaces, and Vulnerabilities in Internet of Things and Its Applications
towards Smart Grids. Energies 2020, 13, 4813.
⦁ Anand, P.; Singh, Y.; Selwal, A.; Alazab, M.; Tanwar, S.; Kumar, N. IoT
Vulnerability Assessment for Sustainable Computing: Threats, Current
Solutions, and Open Challenges. IEEE Access 2020, 8,
168825–168853.
10
⦁ K. Liu, M. Yang, Z. Ling, H. Yan, Y. Zhang, X. Fu, and W. Zhao, “On
manually reverse engineering communication protocols of linux based
iot systems,” arXiv preprint arXiv:2007.11981, 2020
11
⦁ Y. Shi, K. Davaslioglu, Y. E. Sagduyu, W. C. Headley, M. Fowler, and
G. Green, “Deep learning for rf signal classification in unknown and
dynamic spectrum environments,” in 2019 IEEE International
Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE,
2019, pp. 1–10.
12