IoT Network Traffic Security Management Analysis

Authors

  • Ranjana, Sarvottam Dixit, Pooja Tripathi

Keywords:

IOT Traffic Management, Federated Learning, Intrusion Detection, Artificial Intelligence, Machine Learning

Abstract

The swift expansion of Internet of Things (IoT) devices has resulted in an unparalleled surge in network traffic, hence presenting noteworthy obstacles for the administration of security. This study examines the approaches used today to analyse and secure Internet of Things (IoT) network traffic, emphasising the critical role that machine learning (ML) and artificial intelligence (AI) techniques play in this process. These technologies provide strong solutions for dynamic and expansive IoT environments by improving anomaly detection, predictive maintenance, and real-time threat response.

Though they have potential, there are still a few drawbacks. The intricacy and diversity of Internet of Things networks pose difficulties for the standardisation of security standards. Furthermore, the incorporation of AI/ML models requires large amounts of data for training, which might present privacy issues and require a significant amount of processing power. The implementation of AI/ML models is further complicated by their vulnerability to adversarial attacks.

Future research should concentrate on creating AI/ML algorithms that are adaptable and lightweight for IoT devices with limited resources. Standardised frameworks that guarantee security and interoperability across various IoT systems should also be prioritised. Important research issues include federated learning to address data privacy concerns and strengthening the resilience of AI/ML models against adversarial threats. The next generation of IoT network security solutions can be more secure, efficient, and effective by addressing these restrictions.

Downloads

Download data is not yet available.

References

M.Sadeeq, M. A., Zeebaree, S. R. M., Qashi, R., Ahmed, S. H., & Jacksi, K. (2018). Internet of Things Security: A Survey. 2018 International Conference on Advanced Science and Engineering (ICOASE). doi:10.1109/icoase.2018.8548785

Yan, Z., Zhang, P., & Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Applications, 42, 120–134. doi:10.1016/j.jnca.2014.01.014

Aqeel, Muhammad & Ali, Fahad & Iqbal, Muhammad waseem & Rana, Toqir & Arif, Muhammad & Auwul, Md. (2022). A Review of Security and Privacy Concerns in the Internet of Things (IoT). Journal of Sensors. 2022. 1-20. 10.1155/2022/5724168.

Andrade, R. O., Yoo, S. G., Tello-Oquendo, L., & Ortiz-Garces, I. (2020). A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access, 8, 228922–228941. doi:10.1109/access.2020.3046442

Choo, K.-K. R., Gai, K., Chiaraviglio, L., & Yang, Q. (2020). A Multidisciplinary Approach to Internet of Things (IoT) Cybersecurity and Risk Management. Computers & Security, 102136. doi:10.1016/j.cose.2020.102136

Habib M. Alshuwaikhat, Yusuf A. Aina, Lolwah Binsaedan,Analysis of the implementation of urban computing in smart cities: A framework for the transformation of Saudi cities,Heliyon,Volume 8, Issue 10,2022,e11138, ISSN 2405-8440,https://doi.org/10.1016/j.heliyon.2022.e11138. (https://www.sciencedirect.com/science/article/pii/S2405844022024264)

Stephan Berger, Olga Bürger, Maximilian Röglinger, Attacks on the Industrial Internet of Things – Development of a multi-layer Taxonomy, Computers & Security,Volume 93,2020,101790,ISSN 0167-4048, https://doi.org/10.1016/j.cose.2020.101790. (https://www.sciencedirect.com/science/article/pii/S0167404820300754)

Affia, A.-a.O.; Finch, H.; Jung, W.; Samori, I.A.; Potter, L.; Palmer, X.-L. IoT Health Devices: Exploring Security Risks in the Connected Landscape. IoT 2023, 4, 150-182. https://doi.org/10.3390/iot4020009

Aditya Gaur, Bryan Scotney, Gerard Parr, Sally McClean, Smart City Architecture and its Applications Based on IoT,Procedia Computer Science,Volume 52,2015,Pages 1089-1094,ISSN 1877-0509, https://doi.org/10.1016/j.procs.2015.05.122. (https://www.sciencedirect.com/science/article/pii/S1877050915009229)

Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, Sandeep Jagtap, Mohammad Iranmanesh, Salem Alghamdi, Yaser Alhasawi, Yasanur Kayikci, Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions,Internet of Things and Cyber-Physical Systems,Volume 4,2024,Pages 1-18,ISSN 2667-3452,https://doi.org/10.1016/j.iotcps.2023.06.003. (https://www.sciencedirect.com/science/article/pii/S2667345223000366)

Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani,IoT malicious traffic identification using wrapper-based feature selection mechanisms,Computers & Security, Volume 94,2020,101863,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101863. (https://www.sciencedirect.com/science/article/pii/S0167404820301358)

Philip Menard, Gregory J. Bott,Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment,Computers & Security,Volume 95,2020,101856, ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101856. (https://www.sciencedirect.com/science/article/pii/S0167404820301280)

Eric Ke Wang, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari, Muhammad Khurram Khan,Proof of X-repute blockchain consensus protocol for IoT systems,Computers & Security, Volume 95,2020,101871,ISSN 0167-4048,https://doi.org/10.1016/j.cose.2020.101871. (https://www.sciencedirect.com/science/article/pii/S0167404820301449)

S. Chakrabarty and D. W. Engels, "A secure IoT architecture for Smart Cities," 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2016, pp. 812-813, doi: 10.1109/CCNC.2016.7444889

Harish Kumar, Manoj Kumar Singh, M.P. Gupta, Jitendra Madaan,Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework,Technological Forecasting and Social Change,Volume 153,2020, 119281, ISSN 0040-1625,https://doi.org/10.1016/j.techfore.2018.04.024. (https://www.sciencedirect.com/science/article/pii/S004016251731394X)

Downloads

Published

09.07.2024

How to Cite

Ranjana. (2024). IoT Network Traffic Security Management Analysis. International Journal of Intelligent Systems and Applications in Engineering, 12(22s), 1717 –. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/6788

Issue

Section

Research Article