Skip to main content

An Efficient IoT Security Solution Using Deep Learning Mechanisms

  • Conference paper
  • First Online:
Intelligent Computing and Applications

Abstract

The Internet has become an inextricable element of human life, and the number of Internet-connected gadgets is rapidly growing. Internet of Things (IoT) gadgets, in particular, has become an integral component of modern life. IoT network participants are generally resource constrained, rendering them vulnerable to cyber-threats. Classic cryptographic techniques have been extensively used to deal with the safety and confidentiality problems in IoT systems in this regard. Due to the exclusive qualities of IoT nodes, available results are unable to cover the complete defense spectrum of IoT networks. However, some difficulties are becoming more prevalent, and their remedies are unclear. The IoT is posing an increasing number of issues in terms of technological security. The Internet of Things, on the other hand, has been shown to be prone to security breaches. To address security concerns, it is critical to establish effective solutions through the progress of the latest technologies or the integration of obtainable technology. Deep learning, a division of machine learning, has previously demonstrated potential for finding security vulnerabilities. IoT devices also generate a lot of data with a lot of variety and veracity. As a result, by using big data technologies, it is possible to achieve enhanced speed and data management. In this research, we examine the safety necessities, assault vectors, and existing safety resolutions for IoT systems and offer a ground-breaking deep learning strategy for IoT security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mohan, N., & Kangasharju, J. (2016). Edge-fog cloud: A distributed cloud for internet of things computations. In Proceedings of cloudification of the internet of things (CIoT) (pp. 1–6). https://doi.org/10.1109/CIOT.2016.7872914

  2. Habeeb, R. A. A., Nasaruddin, F., Gani, A., Hashem, I. A. T., Ahmed, E., & Imran, M. (2019). Real-time big data processing for anomaly detection: A survey. International Journal of Information Management, 45, 289–307.

    Article  Google Scholar 

  3. Davis, G., & Davis, G. (2018). Trending: IoT malware attacks of 2018. https://securingtomorrow.mcafee.com/consumer/mobile-and-iot-security/top-trending-iot-malware-attacks-of-2018. Accessed on May 10, 2019.

  4. Wong, W. G. (2015). Developers discuss IoT security and platforms trends. https://www.electronicdesign.com/embedded/developers-discuss-iot-security-and-platforms-trends. Accessed on May 1, 2019.

  5. New trends in the world of iot threats. https://securelist.com/new-trends-in-the-world-of-iot-threats/87991/. Accessed on May 10, 2019

  6. Katal, A., Wazid, M., & Goudar, R. H. (2013). Big data: Issues, challenges, tools and good practices. In: 2013 6th International Conference on Contemporary Computing (IC3), IEEE. https://doi.org/10.1109/ic3.2013.6612229

  7. Cardenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security & Privacy, 11(6), 74–76. https://doi.org/10.1109/msp.2013.138

    Article  Google Scholar 

  8. McDermott, C. D., Majdani, F., & Petrovski, A. V. (2018). Botnet detection in the internet of things using deep learning approaches. In: 2018 International Joint Conference on Neural Networks (IJCNN) (pp. 1–8). IEEE

    Google Scholar 

  9. Aly, M., Khomh, F., Haoues, M., Quintero, A., & Yacout, S. (2019). Enforcing security in internet of things frameworks: A systematic literature review. Internet of Things 100050.

    Google Scholar 

  10. Pan, J., & Yang, Z. (2018). Cybersecurity challenges and opportunities in the new edge computing+ IoT world. In: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (pp. 29–32). ACM

    Google Scholar 

  11. Reddy Madhavi, K., Vijaya Sambhavi, Y., Sudhakara, M., & Srujan Raju, K. (2021). Covid-19 isolation monitoring System, Springer series—Lecture Notes on Data Engineering and Communication Technologyhttps://doi.org/10.1007/978-981-16-0081-4_60

  12. Rizwan, P., Suresh, K., & Babu, M. R. (2016). Real-time smart traffic management system for smart cities by using Internet of Things and big data. In 2016 International Conference on Emerging Technological Trends (ICETT). IEEE.

    Google Scholar 

  13. Sekaran, R., Goddumarri, S. N., Kallam, S., Patan, R., Ramachandran, M., Al-Turjman, F. (2021). 5G integrated spectrum selection and spectrum access using ai-based framework for iot based sensor networks, Computer Networks, 186.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rabinarayan Satpathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Venkatesh, M., Srinu, M., Gudivada, V.K., Dash, B.B., Satpathy, R. (2023). An Efficient IoT Security Solution Using Deep Learning Mechanisms. In: Rao, B.N.K., Balasubramanian, R., Wang, SJ., Nayak, R. (eds) Intelligent Computing and Applications. Smart Innovation, Systems and Technologies, vol 315. Springer, Singapore. https://doi.org/10.1007/978-981-19-4162-7_11

Download citation

Publish with us

Policies and ethics