Explainable AI for Trustworthy Decision-making in IoT Environments

Authors

  • Huma Khan, Sheetal Pradip Patil, Arpit Namdev, Gitanjali Shrivastava, Nagarjuna Karyemsetty, Elangovan Muniyandy, Ankur Gupta

Keywords:

Machine learning, Blockchain, IoT, Predictive analytics

Abstract

Artificial Intelligence (AI) is being widely incorporated into Internet of Things (IoT) contexts, leading to improved automation and efficiency. Given that AI algorithms have a substantial impact on decision-making processes in these intricate ecosystems, it becomes crucial to prioritize their reliability. Explainable AI (XAI) is becoming more important for promoting openness and accountability in decision-making inside the Internet of Things (IoT). Through the provision of explanations that humans can comprehend, explainable artificial intelligence (XAI) improves stakeholders' understanding of the underlying logic and allows for the detection and reduction of any biases or mistakes. This abstract explores the importance of Explainable Artificial Intelligence (XAI) in facilitating reliable decision-making in Internet of Things (IoT) contexts. It highlights the function of XAI in improving transparency, reducing risks, and building trust among stakeholders. This abstract emphasizes the crucial need to include explainability into AI-driven decision-making processes in order to guarantee their dependability and ethical soundness. It does so by thoroughly examining XAI concepts and techniques specifically designed for the problems posed by IoT ecosystems.

Downloads

Download data is not yet available.

References

F. Wahab et al., “An AI-Driven Hybrid Framework for Intrusion Detection in IoT-Enabled E-Health,” Computational Intelligence and Neuroscience, vol. 2022. Hindawi Limited, pp. 1–11, Aug. 21, 2022. doi: 10.1155/2022/6096289.

A. O. Alzahrani and M. J. F. Alenazi, “Designing a Network Intrusion Detection System Based on Machine Learning for Software Defined Networks,” Future Internet, vol. 13, no. 5. MDPI AG, p. 111, Apr. 28, 2021. doi: 10.3390/fi13050111.

Thakur, K., Alqahtani, H., & Kumar, G. (2021). An intelligent algorithmically generated domain detection system. In Computers & Electrical Engineering (Vol. 92, p. 107129).

J. E. Varghese and B. Muniyal, “An Efficient IDS Framework for DDoS Attacks in SDN Environment,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers (IEEE), pp. 69680–69699, 2021. doi: 10.1109/access.2021.3078065.

H. Li, F. Wei, and H. Hu, “Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN,” Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. ACM, Mar. 19, 2019. doi: 10.1145/3309194.3309199.

J. Bhayo, S. A. Shah, S. Hameed, A. Ahmed, J. Nasir, and D. Draheim, “Towards a machine learning-based framework for DDOS attack detection in software-defined IoT (SD-IoT) networks,” Engineering Applications of Artificial Intelligence, vol. 123. Elsevier BV, p. 106432, Aug. 2023. doi: 10.1016/j.engappai.2023.106432.

P. Kumar, R. Kumar, A. Aljuhani, D. Javeed, A. Jolfaei, and A. K. M. N. Islam, “Digital twin-driven SDN for smart grid: A deep learning integrated blockchain for cybersecurity,” Solar Energy, vol. 263. Elsevier BV, p. 111921, Oct. 2023. doi: 10.1016/j.solener.2023.111921.

M. Girdhar, J. Hong, W. Su, A. Herath, and C.-C. Liu, “SDN-Based Dynamic Cybersecurity Framework of IEC-61850 Communications in Smart Grid.” arXiv, 2023. doi: 10.48550/ARXIV.2311.12205

G. Kumar and H. Alqahtani, “Machine Learning Techniques for Intrusion Detection Systems in SDN-Recent Advances, Challenges and Future Directions,” Computer Modeling in Engineering & Sciences, vol. 134, no. 1. Computers, Materials and Continua (Tech Science Press), pp. 89–119, 2023. doi: 10.32604/cmes.2022.020724.

.S. Dahiya, V. Siwach, and H. Sehrawat, “Review of AI Techniques in development of Network Intrusion Detection System in SDN Framework,” 2021 International Conference on Computational Performance Evaluation (ComPE). IEEE, Dec. 01, 2021. doi: 10.1109/compe53109.2021.9752430.

J. Li, Z. Zhao, R. Li, and H. Zhang, “AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 2. Institute of Electrical and Electronics Engineers (IEEE), pp. 2093–2102, Apr. 2019. doi: 10.1109/jiot.2018.2883344.

A. Zaheer, M. Z. Asghar, and A. Qayyum, “Intrusion Detection and Mitigation Framework for SDN Controlled IoTs Network,” 2021 IEEE 18th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET). IEEE, Oct. 11, 2021. doi: 10.1109/honet53078.2021.9615458.

S. K. Dey and M. M. Rahman, "Effects of machine learning approach in flow-based anomaly detection on software-defined networking", Symmetry, vol. 12, no. 1, pp. 7, 2019

M. J. Kaur, V. P. Mishra and P. Maheshwari, "The convergence of digital twin iot and machine learning: transforming data into action" in Digital twin technologies and smart cities., Springer, pp. 3-17, 2020.

N. Shone, T. N. Ngoc, V. D. Phai and Q. Shi, "A deep learning approach to network intrusion detection", IEEE transactions on emerging topics in computational intelligence, vol. 2, no. 1, pp. 41-50, 2018.

N. Satheesh, M. Rathnamma, G. Rajeshkumar, P. V. Sagar, P. Dadheech, S. Dogiwal, et al., "Flow-based anomaly intrusion detection using machine learning model with software defined networking for openflow network", Microprocessors and Microsystems, vol. 79, pp. 103285, 2020

Z. Chen, L.-Y. Duan, S. Wang, Y. Lou, T. Huang, D. O. Wu, et al., "Toward knowledge as a service over networks: A deep learning model communication paradigm", IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1349-1363, 2019.

A. Jarwan, A. Sabbah and M. Ibnkahla, "Data transmission reduction schemes in wsns for efficient iot systems", IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1307-1324, 2019.

X. Tao, Y. Duan, M. Xu, Z. Meng and J. Lu, "Learning qoe of mobile video transmission with deep neural network: A data-driven approach", IEEE Journal on Selected Areas in Communications, vol. 37, no. 6, pp. 1337-1348, 2019.

T. Ubale and A. K. Jain, "Survey on ddos attack techniques and solutions in software-defined network" in Handbook of computer networks and cyber security., Springer, pp. 389-419, 2020.

K. Dushyant, G. Muskan, Annu, A. Gupta, and S. Pramanik, “Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach,” Cyber Security and Digital Forensics. Wiley, pp. 271–293, Jan. 14, 2022. doi: 10.1002/9781119795667.ch12.

J. Ye, X. Cheng, J. Zhu, L. Feng and L. Song, "A ddos attack detection method based on svm in software defined network", Security and Communication Networks, vol. 2018, 2018

T. N. Reddy and K. Annapurani Panaiyappan, "Intrusion detection on software defined networking", International Journal of Engineering and Technology (UAE), vol. 7, pp. 330-332, 2018.

P. R. Kshirsagar, D. H. Reddy, M. Dhingra, D. Dhabliya and A. Gupta, "A Review on Comparative study of 4G, 5G and 6G Networks," 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 2022, pp. 1830-1833, doi: 10.1109/IC3I56241.2022.10073385.

T. A. Tang, D. McLernon, L. Mhamdi, S. A. R. Zaidi and M. Ghogho, "Intrusion detection in sdn-based networks: Deep recurrent neural network approach" in Deep Learning Applications for Cyber Security., Springer, pp. 175-195, 2019

P. R. Kshirsagar, D. H. Reddy, M. Dhingra, D. Dhabliya and A. Gupta, "A Scalable Platform to Collect, Store, Visualize and Analyze Big Data in Real- Time," 2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM), Uttar Pradesh, India, 2023, pp. 1-6, doi: 10.1109/ICIPTM57143.2023.10118183.

V. V. Chellam, S. Praveenkumar, S. B. Talukdar, V. Talukdar, S. K. Jain and A. Gupta, "Development of a Blockchain-based Platform to Simplify the Sharing of Patient Data," 2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM), Uttar Pradesh, India, 2023, pp. 1-6, doi: 10.1109/ICIPTM57143.2023.10118194.

M. V. de Assis, L. F. Carvalho, J. J. Rodrigues, J. Lloret and M. L. Proença, "Near real-time security system applied to sdn environments in iot networks using convolutional neural network", Computers & Electrical Engineering, vol. 86, pp. 106738, 2020.

V. Talukdar, D. Dhabliya, B. Kumar, S. B. Talukdar, S. Ahamad and A. Gupta, "Suspicious Activity Detection and Classification in IoT Environment Using Machine Learning Approach," 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, Himachal Pradesh, India, 2022, pp. 531-535, doi: 10.1109/PDGC56933.2022.10053312.

M. A. Albahar, "Recurrent neural network model based on a new regularization technique for real-time intrusion detection in sdn environments", Security and Communication Networks, vol. 2019, 2019.

V. Jain, S. M. Beram, V. Talukdar, T. Patil, D. Dhabliya and A. Gupta, "Accuracy Enhancement in Machine Learning During Blockchain Based Transaction Classification," 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, Himachal Pradesh, India, 2022, pp. 536-540, doi: 10.1109/PDGC56933.2022.10053213.

H. Yao, D. Fu, P. Zhang, M. Li and Y. Liu, "Msml: A novel multilevel semi-supervised machine learning framework for intrusion detection system", IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1949-1959, 2018.

M. Dhingra, D. Dhabliya, M. K. Dubey, A. Gupta and D. H. Reddy, "A Review on Comparison of Machine Learning Algorithms for Text Classification," 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 2022, pp. 1818-1823, doi: 10.1109/IC3I56241.2022.10072502.

C. A. Catania and C. G. Garino, "Automatic network intrusion detection: Current techniques and open issues", Computers & Electrical Engineering, vol. 38, no. 5, pp. 1062-1072, 2012.

P. R. Kshirsagar, D. H. Reddy, M. Dhingra, D. Dhabliya and A. Gupta, "A Review on Application of Deep Learning in Natural Language Processing," 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 2022, pp. 1834-1840, doi: 10.1109/IC3I56241.2022.10073309.

D. Mandal, A. Shukla, A. Ghosh, A. Gupta and D. Dhabliya, "Molecular Dynamics Simulation for Serial and Parallel Computation Using Leaf Frog Algorithm," 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, Himachal Pradesh, India, 2022, pp. 552-557, doi: 10.1109/PDGC56933.2022.10053161.

P. R. Kshirsagar, D. H. Reddy, M. Dhingra, D. Dhabliya and A. Gupta, "Detection of Liver Disease Using Machine Learning Approach," 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), Uttar Pradesh, India, 2022, pp. 1824-1829, doi: 10.1109/IC3I56241.2022.10073425.

Ramesh, P. S., Vanteru, M. K., Rajinikanth, E., Ramesh, J. V. N., Bhasker, B., & Begum, A. Y. (2023). Design and optimization of feedback controllers for motion control in the manufacturing system for digital twin. SN Computer Science, 4(6), 782.

Ashok, K., Chaturvedi, A., Agarkar, A. A., Ashraf, M., Ramesh, J. V. N., & Ambala, S. (2023). Fuzzy logic and cooperative hybrid least squares for improving network capacity and connectivity in high-density wireless networks. Optical and Quantum Electronics, 55(12), 1042.

Uganya, G., Devi, C. S., Chaturvedi, A., Shankar, B. B., Ramesh, J. V. N., & Kiran, A. (2023). Sub-network modeling and integration for low-light enhancement of aerial images. Optical and Quantum Electronics, 55(11), 984.

Godavarthi, B., Narisetty, N., Gudikandhula, K., Muthukumaran, R., Kapila, D., & Ramesh, J. V. N. (2023). Cloud computing enabled business model innovation. The Journal of High Technology Management Research, 34(2), 100469.

Lakshmi, A. J., Kumar, A., Kumar, M. S., Patel, S. I., Naik, S. L., & Ramesh, J. V. N. (2023). Artificial intelligence in steering the digital transformation of collaborative technical education. The Journal of High Technology Management Research, 34(2), 100467.

Talukdar, S. B., Sharma, K., & Lakshmi, D. (2024). A Review of AI in Medicine. In W. Jaber (Ed.), Artificial Intelligence in the Age of Nanotechnology (pp. 233-259). IGI Global. https://doi.org/10.4018/979-8-3693-0368-9.ch012

Sahoo, S. K., Nalinipriya, G., Srinivasan, P. S., Ramesh, J. V. N., Ramamoorthy, K., & Soleti, N. (2023). Development of a Virtual Reality Model Using Digital Twin for Real-Time Data Analysis. SN Computer Science, 4(5), 549.

Downloads

Published

26.03.2024

How to Cite

Elangovan Muniyandy, Ankur Gupta, H. K. S. P. P. A. N. G. S. N. K. . (2024). Explainable AI for Trustworthy Decision-making in IoT Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1126–1135. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5514

Issue

Section

Research Article