一种新的物联网架构,威胁评估及其分类与机器学习解决方案

Oliva Debnath, Saptarshi Debnath, Sreyashi Karmakar, MD Tausif Mallick, Himadri Nath Saha
{"title":"一种新的物联网架构,威胁评估及其分类与机器学习解决方案","authors":"Oliva Debnath, Saptarshi Debnath, Sreyashi Karmakar, MD Tausif Mallick, Himadri Nath Saha","doi":"10.32604/jiot.2023.039391","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT, such as Cloud computing, machine learning techniques, and lightweight encryption techniques. This paper presents a detailed analysis of the security requirements, attack surfaces, and security solutions available for IoT networks and suggests an innovative IoT architecture. The Seven-Layer Architecture in IoT provides decent attack detection accuracy. According to the level of risk they pose, the security threats in each of these layers have been properly categorized, and the essential evaluation criteria have been developed to evaluate the various threats. Also, Machine Learning algorithms like Random Forest and Support Vector Machines, etc., and Deep Learning algorithms like Artificial Neural Networks, Q Learning models, etc., are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.","PeriodicalId":488829,"journal":{"name":"Journal on internet of things","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions\",\"authors\":\"Oliva Debnath, Saptarshi Debnath, Sreyashi Karmakar, MD Tausif Mallick, Himadri Nath Saha\",\"doi\":\"10.32604/jiot.2023.039391\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT, such as Cloud computing, machine learning techniques, and lightweight encryption techniques. This paper presents a detailed analysis of the security requirements, attack surfaces, and security solutions available for IoT networks and suggests an innovative IoT architecture. The Seven-Layer Architecture in IoT provides decent attack detection accuracy. According to the level of risk they pose, the security threats in each of these layers have been properly categorized, and the essential evaluation criteria have been developed to evaluate the various threats. Also, Machine Learning algorithms like Random Forest and Support Vector Machines, etc., and Deep Learning algorithms like Artificial Neural Networks, Q Learning models, etc., are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.\",\"PeriodicalId\":488829,\"journal\":{\"name\":\"Journal on internet of things\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal on internet of things\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.32604/jiot.2023.039391\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal on internet of things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32604/jiot.2023.039391","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)将在不久的将来对我们的社会和经济生活产生重大影响。许多物联网(IoT)应用程序旨在自动执行多项任务,因此非活动物理对象可以独立于其他对象运行。然而,物联网设备也很容易受到攻击,主要是因为它们缺乏必要的内置安全性来阻止攻击者。为了创建端到端安全的物联网环境,必须对物联网系统的结构进行必要的调整。因此,目前使用的物联网设计并不能完全支持物联网中已经取得的所有进步,包括云计算、机器学习技术和轻量级加密技术等复杂功能。本文详细分析了物联网网络的安全需求、攻击面和安全解决方案,并提出了一种创新的物联网架构。物联网中的七层架构提供了不错的攻击检测精度。根据它们构成的风险级别,对每一层中的安全威胁进行了适当的分类,并制定了基本的评估标准来评估各种威胁。此外,机器学习算法(如随机森林和支持向量机等)以及深度学习算法(如人工神经网络,Q学习模型等)的实施是为了克服对不同物联网架构层构成安全漏洞的最具破坏性的威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions
The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT, such as Cloud computing, machine learning techniques, and lightweight encryption techniques. This paper presents a detailed analysis of the security requirements, attack surfaces, and security solutions available for IoT networks and suggests an innovative IoT architecture. The Seven-Layer Architecture in IoT provides decent attack detection accuracy. According to the level of risk they pose, the security threats in each of these layers have been properly categorized, and the essential evaluation criteria have been developed to evaluate the various threats. Also, Machine Learning algorithms like Random Forest and Support Vector Machines, etc., and Deep Learning algorithms like Artificial Neural Networks, Q Learning models, etc., are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Suitability and Sustainability of Rainwater Quality Monitoring System in Cistern for Domestic Use A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1