DEVELOPING ROBUST CYBER SECURITY PROTOCOLS FOR IOT NETWORKS USING AI
Keywords:
Smart Environments, IoT Ecosystems, CybersecurityAbstract
The exponential expansion of the IoT ecosystem has sparked major cybersecurity worries, despite the fact that it offers unmatched connectivity and ease. The inherent computational limits, extensive distribution, and the heterogeneity of IoT devices are a few of the elements that give rise to these challenges. It is critical to incorporate new technologies into the constantly evolving IoT landscape in order to address these difficulties. Concerning the security of the Internet of Things (IoT), the quickly developing field of machine learning (ML) holds great potential. The widespread use of Internet of Things (IoT) devices has increased cyber dangers in the modern digital age. The Internet of Things (IoT) presents a variety of security risks to these devices, such as encryption, malware, ransomware, and botnets. ttackers can compromise system integrity and demand ransom payments by exploiting and manipulating critical data, which these devices are vulnerable to. Building on lessons learnt from previous cyberattacks, strong cybersecurity protocols are critically important, especially in today's Smart Environments. Our research introduces a new methodology and framework for detecting and countering malware threats in the IoT ecosystem utilising AI approaches in a variety of dispersed contexts. Enhancing security measures in Smart Environments and making them more resilient against future threats, this unique technology proactively monitors network traffic data to detect potential dangers. In order to determine how effective our method was, we ran extensive performance and concurrency tests on the deep neural network (DNN) model that was running on IoT devices. The results showed that there was little effect on power consumption, CPU utilisation, physical memory usage, and network bandwidth, which was very encouraging. When we implemented the DNN model on some IoT gateways, we found that the network bandwidth increased by less than 30 kb/s and that the CPU consumption increased by barely 2%. In addition, the implemented model resulted in an average 13.5% increase in power consumption, even if the memory utilisation for Raspberry Pi devices stayed at 0.2 GB. Not only that, but our ML models showed off some rather impressive detection accuracy rates—roughly 93% accuracy on both datasets and an F1-score of 92%. Our technique successfully identifies dangers in Smart Environments, leading to improved cybersecurity in IoT ecosystems.
References
A. Djenna, S. Harous, D.E. Saidouni, Internet of things meet internet of threats: New concern cyber security issues of critical cyber infrastructure, Appl. Sci. 11 (10) (2021) 4580.
E. Sisinni, A. Saifullah, S. Han, U. Jennehag, M. Gidlund, Industrial internet of things: Challenges, opportunities, and directions, IEEE Trans. Ind. Inform. 14 (11) (2018) 4724–4734, http://dx.doi.org/10.1109/TII.2018.2852491.
L.S. Vailshery, Statista, 2022, [Online]. Available: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/, Accessed on May 20, 2023.
Y. Lu, L. Da Xu, Internet of things (IoT) cybersecurity research: A review of current research topics, IEEE Internet Things J. 6 (2) (2018) 2103–2115.
A.R. Khan, M. Kashif, R.H. Jhaveri, R. Raut, T. Saba, S.A. Bahaj, Deep learning for intrusion detection and security of Internet of things (IoT): current analysis, challenges, and possible solutions, Secur. Commun. Netw. 2022 (2022).
I. Ullah, Q.H. Mahmoud, Design and development of RNN anomaly detection model for IoT networks, IEEE Access 10 (2022) 62722–62750, http: //dx.doi.org/10.1109/ACCESS.2022.3176317.
P. Sethi, S.R. Sarangi, Internet of things: architectures, protocols, and applications, J. Electr. Comput. Eng. 2017 (2017).
N. Abosata, S. Al-Rubaye, G. Inalhan, C. Emmanouilidis, Internet of things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications, Sensors 21 (11) (2021) 3654.
M. Burhan, R.A. Rehman, B. Khan, B.-S. Kim, IoT elements, layered architectures and security issues: A comprehensive survey, Sensors 18 (9) (2018) 2796.
S. Bajpai, K. Sharma, B.K. Chaurasia, Intrusion detection framework in IoT networks, SN Comput. Sci. 4 (4) (2023) 350.
M.H.P. Rizi, S.A.H. Seno, A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city, Internet Things (2022) 100584.
D. Nanthiya, P. Keerthika, S. Gopal, S. Kayalvizhi, T. Raja, R.S. Priya, SVM based ddos attack detection in IoT using IoT-23 botnet dataset, in: 2021 Innovations in Power and Advanced Computing Technologies (I-PACT), IEEE, 2021, pp. 1–7.
M. Ibrahim, A. Continella, A. Bianchi, AOT-Attack on Things: A security analysis of IoT firmware updates, in: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023.
T. Suleski, M. Ahmed, W. Yang, E. Wang, A review of multi-factor authentication in the Internet of Healthcare Things, Digit. Health 9 (2023) 20552076231177144.
M.I. Zakaria, M.N. Norizan, M.M. Isa, M.F. Jamlos, M. Mustapa, Comparative analysis on virtual private network in the internet of things gateways, Indones. J. Electr. Eng. Comput. Sci. 28 (1) (2022) 488–497.
A. Javadpour, P. Pinto, F. Ja’fari, W. Zhang, DMAIDPS: A distributed multi-agent intrusion detection and prevention system for cloud IoT environments, Cluster Comput. 26 (1) (2023) 367–384.
A. Khraisat, A. Alazab, A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges, Cybersecurity 4 (2021) 1–27.
A. Awajan, A novel deep learning-based intrusion detection system for IoT networks, Computers 12 (2) (2023) 34.
N. Yadav, S. Pande, A. Khamparia, D. Gupta, Intrusion detection system on IoT with 5G network using deep learning, Wirel. Commun. Mob. Comput. 2022 (2022) 1–13.
M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L.F. Capretz, S.J. Abdulkadir, Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review, Electronics 11 (2) (2022) 198.
T. Saba, A. Rehman, T. Sadad, H. Kolivand, S.A. Bahaj, Anomaly-based intrusion detection system for IoT networks through deep learning model, Comput. Electr. Eng. 99 (2022) 107810.
H. Asgharzadeh, A. Ghaffari, M. Masdari, F.S. Gharehchopogh, Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced capuchin search algorithm, J. Parallel Distrib. Comput. (2023).
S.M. Kasongo, A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework, Comput. Commun. 199 (2023) 113–125.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Harish Narne (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.