You are on page 1of 12

Mansoura University

Faculty of Computers and Information


Computer Science Department

Research Proposal for Master’s Degree

Securing Internet of Things Systems

using Machine Learning

‫أنظمة ان نت اﻷش اء استخدام تعلم اﻵلة‬ ‫تأم‬

Submitted By

Dina Skawky Samir El-helw

Supervisors

Assoc. Prof. Taher Tawfik Hamza

Computer Science Department, Mansoura University,


Egypt

1
Asst. Prof. Mohamed Handosa

Computer Science Department, Mansoura University,


Egypt

Abstract: The Internet of Things is one of the rapidest

technologies in the last period used in several applications.

Things are joined wirelessly or wired to transfer process and

various calculate in actual time. Internet of things application

comes with safety and privacy challenges for the reason that

existing traditional protocols of security are not suitable for

internet of things devices. In this proposal we present a

describe to summary of internet of things technology and

devices and its several scope of application. So, in our research

we aim to apply the three basic of Machine Learning

techniques to solve the security problem of the Internet of

Things technology and devices.

Keywords: Internet of things , Privacy, Security, Machine

2
Learning, attack.

Introduction: The Internet of Things is a system of intelligent

things as a network joined with each other wirelessly or wired

in a various environment to transfer information on the

internet , process and various calculate in actual time. Internet

of things applications are google maps, agriculture

devices ,smart city, home, hospital and moving system.

Internet of things devices are growing at a tremendous speed

as the total population of the world exceeds.

3
Figure 1: Schematic diagram of a typical Machine
learning to solve the security problem of the Internet of
Things.

Problem Statement: Internet of things devices are growing

as a tremendous speed exceeds the total population of the

4
world, the objective of this research is to solve the security and

privacy problems of the Internet of Things technology and

devices based on machine learning.

Related work: In 2016, J. Canedo et al, proposed in [J. Canedo

and A. Skjellum, 2016] Machine learning technology is used in

internet of things gateway to safe iot applications and devices.

use artificial neural network technique to discover variances on

the internet of things edge. In 2018, L. Xiao, et al, [X. Wan al.,

2018] techniques of machine learning are used to verify the

safety case in the internet of things system. The secrecy case

such as safe verification, information security, and protected

offloading. In 2020, Prajoy Podder, et al .Proposed in [M.

Rubaiyat Hossain Mondal et al., 2020] check the Safety attacks

of Internet of Things. In 2021, Tanujay Saha , et al . Proposed

in [Najwa Aaraj et al., 2021]discover Smart Hacking Lines based

5
on Machine Learning technology.

Proposed Methodology: A proposed methodology depends

on using machine learning in the security and privacy problems

of internet of things. to detect hateful actions in internet of

things feat real internet of things traffic flow with the network

level-specific spasms, using an approach to machine learning

recognized a Device Oriented.

Research Timeline Plan: The following table summarized


6
the plan to finish the research within 24 months

Task Expected
Duration [24
Months].
⦁ Literature Review. [3 Months]
⦁ Write a Survey on the research topic. [2 Months]
⦁ Collecting and training on the required [2 Months]
software tools and technologies.
⦁ Design a framework of the applied algorithms [2 Months]
within SVM.
⦁ Build an initial Prototype of the designed [3 Months]
framework.
⦁ Evaluate the prototype through experiments [1 Months]
and collect the Results.
⦁ Do any required Enhancements on the [2 Months]
Prototype and re-evaluate it.
⦁ Write A Research Paper. [2 Months]
⦁ Write and submit the Thesis. [3 Months]

8. References:
⦁ Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey
on IoT security: Challenges and solution using machine learning,
artificial intelligence and blockchain technology. Internet of Things, 11,
100227.

⦁ Malhotra, P., Singh, Y., Anand, P., Bangotra, D. K., Singh, P. K., &
Hong, W. C. (2021). Internet of Things: Evolution, Concerns and
Security Challenges. Sensors, 21(5), 1809.

⦁ Mohanta, B. K., & Jena, D. (2021). Internet of Things Security Using

7
Machine Learning. In Advances in Machine Learning and
Computational Intelligence (pp. 129-136). Springer, Singapore.

⦁ Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security
techniques based on machine learning: How do IoT devices use AI to
enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.

⦁ Liu, Y., Wang, J., Li, J., Niu, S., & Song, H. (2021). Machine learning
for the detection and identification of internet of things (iot) devices: A
survey. arXiv preprint arXiv:2101.10181.

⦁ Li, Q., Zhang, L., Zhou, R., Xia, Y., Gao, W., & Tai, Y. (2021). Machine
Learning-Based Stealing Attack of the Temperature Monitoring System
for the Energy Internet of Things. Security and Communication
Networks, 2021.

⦁ Podder, P., Mondal, M., Bharati, S., & Paul, P. K. (2021). Review on
the security threats of internet of things. arXiv preprint
arXiv:2101.05614.

⦁ Zaman, S., Alhazmi, K., Aseeri, M., Ahmed, M. R., Khan, R. T., Kaiser,
M. S., & Mahmud, M. (2021). Security threats and artificial intelligence
based countermeasures for internet of things networks: a
comprehensive survey. IEEE Access.

⦁ Selim, G. E. I., Hemdan, E. E. D., Shehata, A. M., & El-Fishawy, N. A.


(2021). Anomaly events classification and detection system in critical
industrial internet of things infrastructure using machine learning
algorithms. Multimedia Tools and Applications, 80(8), 12619-12640.

⦁ Saha, T., Aaraj, N., Ajjarapu, N., & Jha, N. K. (2021). SHARKS: Smart
Hacking Approaches for RisK Scanning in Internet-of-Things and
Cyber-Physical Systems based on Machine Learning. IEEE
Transactions on Emerging Topics in Computing.

⦁ Colakovi´c, M. Hadˇziali´c, Internet of things (iot): A review of enabling ˇ

8
technologies, challenges, and open research issues, Computer Networks
144 (2018) 17–39.

⦁ D. Mocrii, Y. Chen, P. Musilek, IoT-based smart homes: A review of


system architecture, software, communications, privacy and security,
Internet of Things 1 (2018) 81–98.

⦁ Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, W. Zhao, A survey on


internet of things: Architecture, enabling technologies, security and
privacy, and applications, IEEE Internet of Things Journal 4 (5) (2017)
1125–1142.

⦁ Y. Yang, L. Wu, G. Yin, L. Li, H. Zhao, A survey on security and


privacy issues in internet-of-things, IEEE Internet of Things Journal 4
(5) (2017) 1250–1258.

⦁ F. A. Alaba, M. Othman, I. A. T. Hashem, F. Alotaibi, Internet of things


security: A survey, Journal of Network and Computer Applications 88
(2017) 10–28.

⦁ P. I. R. Grammatikis, P. G. Sarigiannidis, I. D. Moscholios, Securing


the internet of things: challenges, threats and solutions, Internet of
Things.

⦁ K. Das, S. Zeadally, D. He, Taxonomy and analysis of security


protocols for internet of things, Future Generation Computer Systems
89 (2018) 110–125.

⦁ V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, B. Sikdar, A


survey on iot security: Application areas, security threats, and solution
architectures, IEEE Access 7 (2019) 82721–82743.

⦁ Al-Hasnawi, S. M. Carr, A. Gupta, Fog-Based Local and Remote Policy


Enforcement for Preserving Data Privacy in the Internet of Things,
Internet of Things (2019) 100069.

9
⦁ R. Casado-Vara, P. Chamoso, F. De la Prieta, J. Prieto, J. M.
Corchado, Non-linear adaptive closed-loop control system for improved
efficiency in IoT-blockchain management, Information Fusion 49
(2019) 227–239.

⦁ Anand, P.; Singh, Y.; Selwal, A.; Singh, P.K.; Felseghi, R.A.; Raboaca,
M.S. IoVT: Internet of Vulnerable Things? Threat Architecture, Attack
Surfaces, and Vulnerabilities in Internet of Things and Its Applications
towards Smart Grids. Energies 2020, 13, 4813.

⦁ Anand, P.; Singh, Y.; Selwal, A. Internet of Things (IoT): Vulnerabilities


and Remediation Strategies. In Lecture Notes in Electrical
Engineering; Springer: Singapore, 2021; pp. 265–273.

⦁ Anand, P.; Singh, Y.; Selwal, A.; Alazab, M.; Tanwar, S.; Kumar, N. IoT
Vulnerability Assessment for Sustainable Computing: Threats, Current
Solutions, and Open Challenges. IEEE Access 2020, 8,
168825–168853.

⦁ Rana, B.; Singh, Y.; Singh, P.K. A systematic survey on internet of


things: Energy efficiency and interoperability perspective. Trans.
Emerg. Telecommun. Technol. 2020, 1–41.

⦁ Butun, I.; Osterberg, P.; Song, H. Security of the Internet of Things:


Vulnerabilities, Attacks, and Countermeasures. IEEE Commun. Surv.
Tutor. 2020, 22, 616–644.

⦁ Ahmad, R.; Alsmadi, I. Machine learning approaches to IoT security: A


systematic literature review. Internet Things 2021, 14, 100365.

⦁ M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan, R. Jain, Machine


learning based network vulnerability analysis of industrial internet of
things. IEEE IoT J. (2019)

⦁ Gupta, The IoT Hacker’s Handbook. Springer, 2019.

10
⦁ K. Liu, M. Yang, Z. Ling, H. Yan, Y. Zhang, X. Fu, and W. Zhao, “On
manually reverse engineering communication protocols of linux based
iot systems,” arXiv preprint arXiv:2007.11981, 2020

⦁ F. Hussain, R. Hussain, S. A. Hassan et al., “Machine learning in IoT


security: current solutions and future challenges,” IEEE
Communications Surveys & Tutorials, vol. 99, 2020.

⦁ Khosravi MR, Samadi S (2019) Reliable data aggregation in internet of


ViSAR vehicles using chained dualphase adaptive interpolation and
data embedding. IEEE Internet Things J 7(4):2603–2610

⦁ Khosravi MR, Samadi S (2019, 2019) Efficient payload


communications for IoT-enabled ViSAR vehicles using discrete cosine
transform-based quasi-sparse bit injection. EURASIP J Wirel Commun
Netw (1):262

⦁ Laso PM, Brosset D, Puentes J (2017) Dataset of anomalies and


malicious acts in a cyber-physical subsystem. Data Br 14:186–191.

⦁ B.K. Mohanta, D. Jena, S.S. Panda, S. Sobhanayak, Blockchain


technology: a survey on applications and security privacy challenges.
IoT, 100107 (2019)

⦁ M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan, R. Jain, Machine


learning based network vulnerability analysis of industrial internet of
things. IEEE IoT J. (2019)

⦁ Hahn, D.A.; Munir, A.; Behzadan, V. Security and Privacy Issues in


Intelligent Transportation Systems: Classification and Challenges.
IEEE Intell. Transp. Syst. Mag. 2021

⦁ S. Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, “Deep learning


IEEE Communications Magazine, vol. 56, no. 9, pp. 146–152, 2018

11
⦁ Y. Shi, K. Davaslioglu, Y. E. Sagduyu, W. C. Headley, M. Fowler, and
G. Green, “Deep learning for rf signal classification in unknown and
dynamic spectrum environments,” in 2019 IEEE International
Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE,
2019, pp. 1–10.

⦁ N. Manju, B. S. Harish, and V. Prajwal, “Ensemble feature selection


and classification of internet traffic using XGBoost classifier,”
International Journal of Computer Network & Information Security, vol.
11, no. 7, 2019.

⦁ P. Yan and Z. Yan, ``A survey on dynamic mobile malware detection,''


Softw. Qual. J., vol. 26, no. 3, pp. 891-919, 2018.

⦁ D. A. F. Saraiva, V. R. Q. Leithardt, D. de Paula, A. S. Mendes, G. V.


González, and P. Crocker, ‘‘PRISEC: Comparison of symmetric key
algorithms for IoT devices,’’ Sensors, vol. 19, no. 19, p. 4312, Oct.
2019

⦁ . P. Bhatt, L. Raja, and S. Sharma, ‘‘Light-weighted cryptographic


algorithms for energy efficient applications,’’ J. Discrete Math. Sci.
Cryptogr., vol. 23, no. 2, pp. 643–650, Feb. 2020.

⦁ M. H. A. Banna, K. A. Taher, M. S. Kaiser, M. Mahmud, M. S. Rahman,


A. S. M. S. Hosen, and G. H. Cho, ‘‘Application of artificial intelligence
in predicting earthquakes: State-of-the-art and future challenges,’’
IEEE Access, vol. 8, pp. 192880–192923, 2020.

12

You might also like