2023
DOI: 10.31449/inf.v47i6.4635
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers

Khawlah M Harahsheh,
Chung-Hao Chen

Abstract: The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about ho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 186 publications
0
3
0
Order By: Relevance
“…The increasing volume and diversity of data in dynamic communication systems demand innovative approaches for efficient operation and optimal performance. From predicting environmental or system status changes to optimizing resource allocation and addressing security threats [ 7 ], ML spans applications like intelligent traffic management [ 8 ] and automatic reconfiguration in communication infrastructure [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…The increasing volume and diversity of data in dynamic communication systems demand innovative approaches for efficient operation and optimal performance. From predicting environmental or system status changes to optimizing resource allocation and addressing security threats [ 7 ], ML spans applications like intelligent traffic management [ 8 ] and automatic reconfiguration in communication infrastructure [ 9 , 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Traditional feature selection methods face optimization difficulties and have high computational complexity [2]. The limitations of IoT devices lead to a higher likelihood of a?acks or flaws in their security protocols [3]. These limitations and challenges of IoT encompass various It becomes imperative to identify and select the most relevant data features to enhance the performance of a machine learning model, particularly for IDSs in IoT devices where securing these environments with conventional algorithms and techniques poses a challenge.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional feature selection methods face optimization difficulties and have high computational complexity [2]. The limitations of IoT devices lead to a higher likelihood of attacks or flaws in their security protocols [3]. These limitations and challenges of IoT encompass various categories, including hardware constraints, software issues, network concerns, and security vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%