300 355
Full Length Article
Fusion: Practice and Applications
Volume 13 , Issue 1, PP: 147-161 , | Cite this article as | XML | Html |PDF

Title

A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems

  Mustafa Al-Tahee 1 * ,   Marwa s. mahdi hussin 2 ,   Mohammed Jameel Alsalhy 3 ,   Hussein Alaa Diame 4 ,   Noor Hanoon Haroon 5 ,   Salem Saleh Bafjaish 6 ,   Mohammed Nasser Al-Mhiqani 7

1  Medical Instruments Engineering Techniques, Al-Farahidi University, Baghdad, Iraq
    (Mustafa Al-Tahee@Uoalfarahidi.Edu.Iq)

2  Computer Technologies Engineering, Al-Turath University College, Baghdad,Iraq
    (Marwa.Saad@Turath.Edu.Iq)

3  Department Of Medical Devices Engineering Technologies, National University Of Science And Technology, Dhi Qar, Nasiriyah, Liaq
    (Sahi@Nust.Edu.Iq)

4  Technical Computer Engineering Department, Al-Kunooze University College, Basrah, Iraq
    (Hussein. Alaa@ Kunoozu.Edu. Iq)

5  Department Of Computer Technical Engineering, Technical Engineering College, Al-Ayen University, Thi- Qar, Iraq
    (Noor@Alayen.Edu.Iq)

6  College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar
    (Salem.Bafjaish@gmail.com)

7  Keele University (KU), Keele, United Kingdom, Staffordshire, ST5 5AA,
    (Almohaiqny@gmail.com)


Doi   :   https://doi.org/10.54216/FPA.130112

Received: April 05, 2023 Revised: June 26, 2023 Accepted: September 08, 2023

Abstract :

In a recent scenario, the Internet of Things (IoT) enables the Integration of disparate home automation systems into a unified network that can be managed from a single device, such as a smartphone. Connections to the Internet that aren't secure: A lack of security standards may make the Internet of Things devices vulnerable to assault, including hacking. Though current designs may address some security concerns inherent to the Internet of Things, most solutions suffer from two significant flaws. This only addresses a single threat at the level of IoT-edge architecture and cannot be expanded to deal with new threats as misunderstood obstacles. Second, its core operations are trustworthy and seldom require additional hardware to implement the advised security measures. The AI-SM-IoT framework is a three-tiered system incorporating security components based on AI motors into every IoT stack that communicates with the network's edge. AI motors were also added as a new transmission layer. This study suggests an AI-based security method for IoT environments (AI-SM-IoT system). This concept was based on the periphery of a network of AI-enabled security components for IoT disaster preparedness. The architecture recommends three main modules: cyber threat searching, intelligent firewalls for online applications, and cybercrime information. Based on the idea of the "cyberspace killing chain," the modules given detect, identify, and continue to identify the stage of an assault life cycle. It describes each long-term security in the suggested framework and demonstrates its usefulness in applications facing various risks. A distinct layer of AI-SM-IoT services is used to deliver artificial intelligence (AI) safety modules to address each risk in the boundaries layer. The architectural freedom from the project's essential regions and comparatively low latency, which offers safety as a service rather than an embedded network edge on the Internet of Things design, contrasted with the system framework's earlier designs. Based on the administration score of the IoT platform, throughput, security, and working time, it evaluated the proposed method

Keywords :

Internet of Things; Security; Artificial Intelligence; Fog Computing; Sensors

References :

[1]    Oniani, S., Marques, G., Barnovi, S., Pires, I. M., & Bhoi, A. K. (2021). Artificial Intelligence for the Internet of Things and Enhanced Medical Systems. In Bio-inspired Neurocomputing (pp. 43-59). Springer, Singapore.

[2]    Su, J., Chu, X., & Kadry, S. (2020). Internet-of-Things-Assisted Smart System 4.0 Framework Using Simulated Routing Procedures. Sustainability, 12(15), 6119.

[3]    Abd El-Latif, A. A., Abd-El-Atty, B., Mazurczyk, W., Fung, C., & Venegas-Andraca, S. E. (2020). Secure data encryption based on quantum walks for 5G Internet of Things scenario. IEEE Transactions on Network and Service Management, 17(1), 118-131.

[4]    Chakraborty, N., Li, J. Q., Mondal, S., Luo, C., Wang, H., Alazab, M., ... & Pan, Y. (2020). On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in the Internet of Things. IEEE Internet of Things Journal, 8(5), 3255-3267.

[5]    Jaber, M.M., 2015. Barriers faces telemedicine implementation in the developing countries : toward building iraqi telemedicine framework. ARPN Journal of Engineering and Applied Sciences, 10(4), pp.1562–1567.

[6]    Zheng, W., Muthu, B., & Kadry, S. N. (2021). Research on the design of analytical communication and information model for teaching resources with cloud‐sharing platform. Computer Applications in Engineering Education, 29(2), 359-369.

[7]    Wang, W., Jackson Samuel, R. D., & Hsu, C. H. (2021). Prediction architecture of deep learning assisted short long term neural network for advanced traffic critical prediction system using remote sensing data. European Journal of Remote Sensing, 54(sup2), 65-76.

[8]    Rauf, H. T., Gao, J., Almadhor, A., Arif, M., & Nafis, M. T. (2021). Enhanced bat algorithm for COVID-19 short-term forecasting using optimized LSTM. Soft Computing, 1-11.

[9]    Ali, M.H., Zolkipli, M.F., Mohammed, M.A., and Jaber, M.M., 2017. Enhance of extreme learning machine-genetic algorithm hybrid based on intrusion detection system. Journal of Engineering and Applied Sciences, 12(16).

[10] Amudha, G., & Narayanasamy, P. (2018). Distributed location and trust based replica detection in wireless sensor networks. Wireless Personal Communications, 102(4), 3303-3321

[11] Nguyen, T. N., Le, V. V., Chu, S. I., Liu, B. H., & Hsu, Y. C. (2021). Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. Wireless Personal Communications, 1-26.

[12] Kumar, P. M., & Seon, H. C. (2021). Internet of things-based digital video intrusion for intelligent monitoring approach. Arabian Journal for Science and Engineering, 1-11.

[13] Manickam, A., Jiang, J., Zhou, Y., Sagar, A., Soundrapandiyan, R., & Samuel, R. D. J. (2021). Automated pneumonia detection on chest X-ray images: A deep learning approach with different optimizers and transfer learning architectures. Measurement, 184, 109953.

[14] Ali, M.H., Jaber, M.M., Abd, S.K., Rehman, A., Awan, M.J., Vitkutė-Adžgauskienė, D., Damaševičius, R., and Bahaj, S.A., 2022. Harris Hawks Sparse Auto-Encoder Networks for Automatic Speech Recognition System. Applied Sciences (Switzerland), 12(3).

[15] Amudha, G. (2021). Dilated Transaction Access and Retrieval: Improving the Information Retrieval of Blockchain-Assimilated Internet of Things Transactions. Wireless Personal Communications, 1-21.

[16] Gheisari, M., Najafabadi, H. E., Alzubi, J. A., Gao, J., Wang, G., Abbasi, A. A., & Castiglione, A. (2021). OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Generation Computer Systems, 123, 1-13.

[17] Hussein, A.F., ALZubaidi, A.K., Habash, Q.A., and Jaber, M.M., 2019. An adaptive biomedical data managing scheme based on the blockchain technique. Applied Sciences (Switzerland), 9(12).

[18]  Singh, S., Sharma, P. K., Yoon, B., Shojafar, M., Cho, G. H., & Ra, I. H. (2020). Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustainable Cities and Society, 63, 102364.

[19] Javaid, N., Sher, A., Nasir, H., & Guizani, N. (2018). Intelligence in IoT-based 5G networks: Opportunities and challenges. IEEE Communications Magazine, 56(10), 94-100.

[20] Mao, B., Kawamoto, Y., & Kato, N. (2020). AI-based joint optimization of QoS and security for 6G energy harvesting Internet of Things. IEEE Internet of Things Journal, 7(8), 7032-7042.

[21] Mendhurwar, S., & Mishra, R. (2021). Integration of social and IoT technologies: an architectural framework for digital transformation and cyber security challenges. Enterprise Information Systems, 15(4), 565-584.

[22] Mukherjee, A., Goswami, P., Yang, L., Tyagi, S. K. S., Samal, U. C., & Mohapatra, S. K. (2020). A deep neural network-based clustering technique for secure IIoT. Neural Computing and Applications, 32(20), 16109-16117.

[23] Vimal, S., Khari, M., Crespo, R. G., Kalaivani, L., Dey, N., & Kaliappan, M. (2020). Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT-based cognitive radio networks. Computer Communications, 154, 481-490.

[24] Alqaralleh, B. A., Vaiyapuri, T., Parvathy, V. S., Gupta, D., Khanna, A., & Shankar, K. (2021). Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Personal and Ubiquitous Computing, 1-11.

[25] Jamal, A. A., Majid, A. A. M., Konev, A., Kosachenko, T., & Shelupanov, A. (2021). A review on security analysis of cyber-physical systems using Machine learning. Materials Today: Proceedings.

[26] Cui, Z., Fei, X. U. E., Zhang, S., Cai, X., Cao, Y., Zhang, W., & Chen, J. (2020). A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, 13(2), 241-251.

[27] Aldhaheri, S., Alghazzawi, D., Cheng, L., Barnawi, A., & Alzahrani, B. A. (2020). Artificial Immune Systems approaches to secure the Internet of things: A systematic review of the literature and recommendations for future research. Journal of Network and Computer Applications, 157, 102537.

[28] Poniszewska-Maranda, A., Kaczmarek, D., Kryvinska, N., & Xhafa, F. (2019). Studying usability of AI in the IoT systems/paradigm through embedding NN techniques into mobile smart service systems. Computing, 101(11), 1661-1685.

[29] Zaidan, A. A., & Zaidan, B. B. (2020). A review on the intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations. Artificial Intelligence Review, 53(1), 141-165.

[30] Kumar, P., Kumar, R., Gupta, G. P., & Tripathi, R. (2021). A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing. Transactions on Emerging Telecommunications Technologies, 32(6), e4112.

[31] Sultana, T., & Wahid, K. A. (2019). IoT-guard: Event-driven fog-based video surveillance system for real-time security management. IEEE Access, 7, 134881-134894.

[32] Li, D., Deng, L., Liu, W., & Su, Q. (2020). Improving communication precision of IoT through behavior-based learning in a smart city environment. Future Generation Computer Systems, 108, 512-520.

[33] Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, 40281-40306.

[34] Saeed, V. A. (2024). A Framework for Recognition of Facial Expression Using HOG Features. International Journal of Mathematics, Statistics, and Computer Science, 2, 1–8. https://doi.org/10.59543/ijmscs.v2i.7815

[35] Mohammed, M.A., Lakhan, A., Abdulkareem, K.H., Zebari, D.A., Nedoma, J., Martnek, R., Kadry, S. and Garcia-Zapirain, B., 2023. Homomorphic federated learning schemes enabled pedestrian and vehicle detection system. Internet of Things, p.100903.

[36] Dinçer, H. Yüksel, S. & Eti, S.(2023). Identifying the Right Policies for Increasing the Efficiency of the Renewable Energy Transition With a Novel Fuzzy Decision-Making Model. Journal of Soft Computing and Decision Analytics, 1(1), 50-62. https://doi.org/10.31181/jscda1120234


Cite this Article as :
Style #
MLA Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani. "A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems." Fusion: Practice and Applications, Vol. 13, No. 1, ,PP. 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)
APA Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani. (). A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems. Journal of Fusion: Practice and Applications, 13 ( 1 ), 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)
Chicago Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani. "A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems." Journal of Fusion: Practice and Applications, 13 no. 1 (): 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)
Harvard Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani. (). A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems. Journal of Fusion: Practice and Applications, 13 ( 1 ), 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)
Vancouver Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani. A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems. Journal of Fusion: Practice and Applications, (); 13 ( 1 ): 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)
IEEE Mustafa Al-Tahee, Marwa s. mahdi hussin, Mohammed Jameel Alsalhy, Hussein Alaa Diame, Noor Hanoon Haroon, Salem Saleh Bafjaish, Mohammed Nasser Al-Mhiqani, A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems, Journal of Fusion: Practice and Applications, Vol. 13 , No. 1 , () : 147-161 (Doi   :  https://doi.org/10.54216/FPA.130112)