Research Article
Design a framework for IoT- Identification, Authentication and Anomaly detection using Deep Learning: A Review
@ARTICLE{10.4108/eetsc.v7i1.2067, author={Aimen Shoukat and Muhammad Abul Hassan and Muhammad Rizwan and Muhammad Imad and Farhatullah and Syed Haider Ali and Sana Ullah}, title={Design a framework for IoT- Identification, Authentication and Anomaly detection using Deep Learning: A Review}, journal={EAI Endorsed Transactions on Smart Cities}, volume={7}, number={1}, publisher={EAI}, journal_a={SC}, year={2022}, month={1}, keywords={IOT, DL, ML, Challenges, IoT Applications}, doi={10.4108/eetsc.v7i1.2067} }
- Aimen Shoukat
Muhammad Abul Hassan
Muhammad Rizwan
Muhammad Imad
Farhatullah
Syed Haider Ali
Sana Ullah
Year: 2022
Design a framework for IoT- Identification, Authentication and Anomaly detection using Deep Learning: A Review
SC
EAI
DOI: 10.4108/eetsc.v7i1.2067
Abstract
The Internet of Things (IoT) connects billions of smart gadgets so that they may communicate with one another without the need for human intervention. With an expected 50 billion devices by the end of 2020, it is one of the fastest-growing industries in computer history. On the one hand, IoT technologies are critical in increasing a variety of real-world smart applications that can help people live better lives. The cross-cutting nature of IoT systems, on the other hand, has presented new security concerns due to the diverse components involved in their deployment. For IoT devices and their inherent weaknesses, security techniques such as encryption, authentication, permissions, network monitoring, \& application security are ineffective. To properly protect the IoT ecosystem, existing security solutions need to be strengthened. Machine learning and deep learning (ML/DL) have come a long way in recent years, and machine intelligence has gone from being a laboratory curiosity to being used in a variety of significant applications. The ability to intelligently monitor IoT devices is an important defense against new or negligible assaults. ML/DL are effective data exploration techniques for learning about 'normal' and 'bad' behavior in IoT devices and systems. Following a comprehensive literature analysis on Machine Learning methods as well as the importance of IoT security within the framework of different sorts of potential attacks, multiple DL algorithms have been evaluated in terms of detecting attacks as well as anomaly detection in this work. We propose a taxonomy of authorization and authentication systems in the Internet of Things based on the review, with a focus on DL-based schemes. The authentication security threats and problems for IoT are thoroughly examined using the taxonomy supplied. This article provides an overview of projects that involve the use of deep learning to efficiently and automatically provide IoT applications.
Copyright © 2023 Aimen Shoukat et al., licensed to EAI. This is an open access article distributed under the terms of the CC BYNC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.