Machine learning and deep learning approaches in IoT

View article
PeerJ Computer Science

Main article text

 

Introduction

Literature Review

Research Methodology

Review plan

  • Research objectives

  • Research questions

  • Organizing search repositories

  • Selection studies

  • Screening results

  • Data extraction

  • Results

  • Review report finalization

  • The RQ1 identifies and explores different high-level databases that have been published in the literature on IoT-related smart devices security by using machine learning and deep learning. These answers might help choose the best venues from the highest priority platforms.

  • RQ2 helps assist the primary study conducted within the last five years, which discusses the implementation of secure systems in IoT.

  • RQ3 deals with the basic methods to implement authorization, authentication, and privacy in IoMT, IoV, and IPS environments.

  • The objective of RQ4 is to implement machine learning and deep learning techniques to cover all the security issues faced by the IoMT.

Review conduct

Automated search in digital repositories

  • Primary keywords are selected based on the research questions

  • Identify the secondary keywords that were used as additional keywords

  • The search string is developed by adding the “AND” and “OR” Boolean operators

Selection based on Inclusion/Exclusion Criteria

Inclusion criteria

  • The included paper must have the IoT as a central topic.

  • The paper must target the research questions.

  • Selected papers must be published in the SJR index journal.

  • Conference papers must be published in the top conferences.

  • Paper explores challenges, issues, and shortcomings of IoT devices.

  • The paper must discuss the IoMT, IoV, and IPS.

  • Papers must discuss the machine learning and deep learning methods to solve the IoT problems.

Exclusion criteria

  • Papers are excluded that are not written in the English language.

  • Exclude papers that do not discuss any RQ.

  • Exclude papers that are published before 2016.

  • Exclude duplicate papers.

  • Add the most recent version of the paper.

Selection based on quality assessment

  1. The paper published in Impact Factor journal awarded 2, otherwise 1.

  2. Paper covers more than 3 IoT security issues award 2, if it discusses anyone IoT security issue award 1, otherwise 0.

  3. Paper has citation award 1, else than 0.

  4. If a paper has research gap award 1, define the problem award 2; otherwise, 0.

  5. Paper discusses the evaluation of the research paper award 2 if results are given award 1, otherwise 0.

  6. The conclusion is given of the paper award 1, otherwise 0.

Selection based on Snowballing

Review report

Assessment and Discussion of Research Questions

Which are relevant publication channels for IoT research?

What are the current challenges in different IoT types regarding implementing security measures?

What are some of the authorization and authentication methods used for general IoT security purposes?

How can we implement or utilize lightweight ML-based security methods on resource-constrained IoMT devices?

Discussion and Future Direction

Taxonomic hierarchy

General observations and future directions

Questions for primary study

  • What are the other major security issues in IoT subdomains, and which intrusion detection and prevention system exists that covers all the security issues in IoT subdomains?

  • Which model can be implemented for the security of IoT devices in all the domains, including IoMT, IoV, IoH, and IoT. Future research requires authentication, vulnerability, condentiality, authorization, and privacy methods.

  • Most techniques used for IPS are not provided complete security on complex attacks. Future researchers can develop the intrusion prevention systems for IoT that can be implemented for multiple IoT subdomains to secure devices from all attacks.

  • Different security methods are implemented according to the nature of the IoT domain, including a signature group scheme with various limitations. Therefore, Researchers are suggested to implement the security in IoT domains that protect the devices from different attacks to access better results.

  • In the current era, heavy models are implemented in IoT devices to deal with complex and dynamic attacks. All the IoT devices have less computing power and cannot tackle this heavy software to overcome the security issues. Therefore, a lightweight method has been required that covers the security issues in the domain of IoT and provides the authentic model to secure these devices from vulnerable attacks.

Conclusion

Supplemental Information

Summary of the Studies

DOI: 10.7717/peerj-cs.1204/supp-1

Additional Information and Declarations

Competing Interests

The authors declare there are no competing interests.

Author Contributions

Abqa Javed conceived and designed the experiments, analyzed the data, prepared figures and/or tables, and approved the final draft.

Muhammad Awais conceived and designed the experiments, performed the computation work, prepared figures and/or tables, and approved the final draft.

Muhammad Shoaib performed the experiments, prepared figures and/or tables, and approved the final draft.

Khaldoon S. Khurshid performed the experiments, performed the computation work, authored or reviewed drafts of the article, and approved the final draft.

Mahmoud Othman analyzed the data, authored or reviewed drafts of the article, and approved the final draft.

Data Availability

The following information was supplied regarding data availability:

There was no raw data in our literature review.

Funding

The authors received no funding for this work.

15 Citations 1,901 Views 530 Downloads