IoT Network Traffic Security Management Analysis
Keywords:
IOT Traffic Management, Federated Learning, Intrusion Detection, Artificial Intelligence, Machine LearningAbstract
The swift expansion of Internet of Things (IoT) devices has resulted in an unparalleled surge in network traffic, hence presenting noteworthy obstacles for the administration of security. This study examines the approaches used today to analyse and secure Internet of Things (IoT) network traffic, emphasising the critical role that machine learning (ML) and artificial intelligence (AI) techniques play in this process. These technologies provide strong solutions for dynamic and expansive IoT environments by improving anomaly detection, predictive maintenance, and real-time threat response.
Though they have potential, there are still a few drawbacks. The intricacy and diversity of Internet of Things networks pose difficulties for the standardisation of security standards. Furthermore, the incorporation of AI/ML models requires large amounts of data for training, which might present privacy issues and require a significant amount of processing power. The implementation of AI/ML models is further complicated by their vulnerability to adversarial attacks.
Future research should concentrate on creating AI/ML algorithms that are adaptable and lightweight for IoT devices with limited resources. Standardised frameworks that guarantee security and interoperability across various IoT systems should also be prioritised. Important research issues include federated learning to address data privacy concerns and strengthening the resilience of AI/ML models against adversarial threats. The next generation of IoT network security solutions can be more secure, efficient, and effective by addressing these restrictions.
Downloads
References
M.Sadeeq, M. A., Zeebaree, S. R. M., Qashi, R., Ahmed, S. H., & Jacksi, K. (2018). Internet of Things Security: A Survey. 2018 International Conference on Advanced Science and Engineering (ICOASE). doi:10.1109/icoase.2018.8548785
Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134. doi:10.1016/j.jnca.2014.01.014
Aqeel, Muhammad & Ali, Fahad & Iqbal, Muhammad waseem & Rana, Toqir & Arif, Muhammad & Auwul, Md. (2022). A Review of Security and Privacy Concerns in the Internet of Things (IoT). Journal of Sensors. 2022. 1-20. 10.1155/2022/5724168.
Andrade, R. O., Yoo, S. G., Tello-Oquendo, L., & Ortiz-Garces, I. (2020). A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access, 8, 228922–228941. doi:10.1109/access.2020.3046442
Choo, K.-K. R., Gai, K., Chiaraviglio, L., & Yang, Q. (2020). A Multidisciplinary Approach to Internet of Things (IoT) Cybersecurity and Risk Management. Computers & Security, 102136. doi:10.1016/j.cose.2020.102136
Habib M. Alshuwaikhat, Yusuf A. Aina, Lolwah Binsaedan,Analysis of the implementation of urban computing in smart cities: A framework for the transformation of Saudi cities,Heliyon,Volume 8, Issue 10,2022,e11138, ISSN 2405-8440,https://doi.org/10.1016/j.heliyon.2022.e11138. (https://www.sciencedirect.com/science/article/pii/S2405844022024264)
Stephan Berger, Olga Bürger, Maximilian Röglinger, Attacks on the Industrial Internet of Things – Development of a multi-layer Taxonomy, Computers & Security,Volume 93,2020,101790,ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101790. (https://www.sciencedirect.com/science/article/pii/S0167404820300754)
Affia, A.-a.O.; Finch, H.; Jung, W.; Samori, I.A.; Potter, L.; Palmer, X.-L. IoT Health Devices: Exploring Security Risks in the Connected Landscape. IoT 2023, 4, 150-182. https://doi.org/10.3390/iot4020009
Aditya Gaur, Bryan Scotney, Gerard Parr, Sally McClean, Smart City Architecture and its Applications Based on IoT,Procedia Computer Science,Volume 52,2015,Pages 1089-1094,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2015.05.122. (https://www.sciencedirect.com/science/article/pii/S1877050915009229)
Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci, Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions,Internet of Things and Cyber-Physical Systems,Volume 4,2024,Pages 1-18,ISSN 2667-3452,https://doi.org/10.1016/j.iotcps.2023.06.003. (https://www.sciencedirect.com/science/article/pii/S2667345223000366)
Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani,IoT malicious traffic identification using wrapper-based feature selection mechanisms,Computers & Security, Volume 94,2020,101863,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101863. (https://www.sciencedirect.com/science/article/pii/S0167404820301358)
Philip Menard, Gregory J. Bott,Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment,Computers & Security,Volume 95,2020,101856, ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101856. (https://www.sciencedirect.com/science/article/pii/S0167404820301280)
Eric Ke Wang, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari, Muhammad Khurram Khan,Proof of X-repute blockchain consensus protocol for IoT systems,Computers & Security, Volume 95,2020,101871,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101871. (https://www.sciencedirect.com/science/article/pii/S0167404820301449)
S. Chakrabarty and D. W. Engels, "A secure IoT architecture for Smart Cities," 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2016, pp. 812-813, doi: 10.1109/CCNC.2016.7444889
Harish Kumar, Manoj Kumar Singh, M.P. Gupta, Jitendra Madaan,Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework,Technological Forecasting and Social Change,Volume 153,2020, 119281, ISSN 0040-1625,https://doi.org/10.1016/j.techfore.2018.04.024. (https://www.sciencedirect.com/science/article/pii/S004016251731394X)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.