Security Protocols Using Artificial Intelligence to Prevent Internet of Things Attacks

Authors

  • Mukesh Rajput Assistant Professor, School of Engineering and Computer, Dev Bhoomi Uttarakhand University, Uttarakhand, India,
  • Feon Jaison Assistant Professor, Department of Computer Science and IT, Jain(Deemed-to-be University), Bangalore-27, India
  • Aaditya Jain Assistant Professor, College of Computing Science and Information Technology, Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, India
  • Rajeev Mathur Professor, School of Engineering & Technology, Jaipur National University, Jaipur, India

Keywords:

Internet of Things (IoT), anomaly detection, security risks, Bird Swarm-Optimized artificial neural networks (BSO-ANN)

Abstract

Intelligent towns and cities, medical care, and automation in industries have all reaped countless benefits from the Internet of Things (IoT) devices quick proliferation. Although anomaly detection is essential for safeguarding the integrity and dependability of IoT systems, the widespread implementation of connected devices also brings new security problems. Bird Swarm-Optimized artificial neural networks (BSO-ANN) are a unique anomaly detection framework presented in this study for IoT contexts. The BSO approach enables the model to look for an ideal network configuration that improves anomaly detection accuracy by mimicking the collective actions of birds in a swarm. The BSO-ANN approach's ability to detect anomalies was assessed using the UNSW-NB15 dataset. The findings show that the BSO-ANN algorithm detects several types of irregularities in IoT systems with impressive precision, recall, accuracy, and f1-measure parameters. This work can act as a basis for creating sophisticated anomaly detection methods to defend IoT networks against new security risks.

Downloads

Download data is not yet available.

References

Iwendi, C., Rehman, S.U., Javed, A.R., Khan, S. and Srivastava, G., 2021. Sustainable security for the Internet of Things using artificial intelligence architectures. ACM Transactions on Internet Technology (TOIT), 21(3), pp.1-22.

Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F. and Abdulkadir, S.J., 2022. Detecting cybersecurity attacks in the internet of things using artificial intelligence methods: A systematic literature review. Electronics, 11(2), p.198.

Kuzlu, M., Fair, C. and Guler, O., 2021. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of Things, 1, pp.1-14.

Mohanta, B.K., Jena, D., Satapathy, U. and Patnaik, S., 2020. Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things, 11, p.100227.

Thakre, B., Thakre, R., Timande, S., & Sarangpure, V. (2021). An Efficient Data Mining Based Automated Learning Model to Predict Heart Diseases. Machine Learning Applications in Engineering Education and Management, 1(2), 27–33. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/17

Sarker, I.H., Khan, A.I., Abushark, Y.B. and Alsolami, F., 2022. Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions, and research directions. Mobile Networks and Applications, pp.1-17.

Balakrishnan, N., Rajendran, A., Pelusi, D. and Ponnusamy, V., 2021. Deep Belief Network enhanced intrusion detection system to prevent security breaches in the Internet of Things. Internet of Things, 14, p.100112.

Bostami, B., Ahmed, M. and Choudhury, S., 2019. False data injection attacks in the Internet of Things. Performability in Internet of Things, pp.47-58.

Malhotra, P., Singh, Y., Anand, P., Bangotra, D.K., Singh, P.K. and Hong, W.C., 2021. Internet of things: Evolution, concerns, and security challenges. Sensors, 21(5), p.1809.

Ibrahim, S. S. ., & Ravi, G. . (2023). Deep learning based Brain Tumour Classification based on Recursive Sigmoid Neural Network based on Multi-Scale Neural Segmentation. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2s), 77–86. https://doi.org/10.17762/ijritcc.v11i2s.6031

Pacheco, J., Benitez, V.H., Felix-Herran, L.C. and Satam, P., 2020. Artificial neural networks-based intrusion detection system for Internet of Things fog nodes. IEEE Access, 8, pp.73907-73918.

Ghazal, T.M., 2021. Internet of Things with artificial intelligence for health care security. Arabian Journal for Science and Engineering.

Mishra, N. and Pandya, S., 2021. Internet of Things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access, 9, pp.59353-59377.

Li, Y., Zuo, Y., Song, H. and Lv, Z., 2021. Deep learning in the security of Internet of Things. IEEE Internet of Things Journal, 9(22), pp.22133-22146.

Khraisat, A. and Alazab, A., 2021. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, pp.1-27.

Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J. and Alazab, A., 2019. A novel ensemble of hybrid intrusion detection systems for detecting Internet of Things attacks. Electronics, 8(11), p.1210.

Khraisat, A., Gondal, I., Vamplew, P., Kamruzzaman, J. and Alazab, A., 2019. A novel ensemble of hybrid intrusion detection systems for detecting Internet of Things attacks. Electronics, 8(11), p.1210.

Popoola, S.I., Adebisi, B., Hammoudeh, M., Gui, G. and Gacanin, H., 2020. Hybrid deep learning for botnet attack detection in the internet-of-things networks. IEEE Internet of Things Journal, 8(6), pp.4944-4956.

Khilar, R., Mariyappan, K., Christo, M.S., Amutharaj, J., Anitha, T., Rajendran, T. and Batu, A., 2022. Artificial intelligence-based security protocols to resist attacks in the Internet of Things. Wireless Communications and Mobile Computing, 2022.

Downloads

Published

11.07.2023

How to Cite

Rajput, M. ., Jaison, F. ., Jain, A. ., & Mathur, R. . (2023). Security Protocols Using Artificial Intelligence to Prevent Internet of Things Attacks. International Journal of Intelligent Systems and Applications in Engineering, 11(8s), 129–134. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3031