Securing constrained IoT systems: A lightweight machine learning approach for anomaly detection and prevention

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorAlwaisi, Zainab
dc.contributor.authorKumar, Tanesh
dc.contributor.authorHarjula, Erkki
dc.contributor.authorSoderi, Simone
dc.contributor.departmentDepartment of Information and Communications Engineeringen
dc.contributor.organizationIMT School for Advanced Studies Lucca
dc.contributor.organizationUniversity of Oulu
dc.date.accessioned2024-11-06T06:20:00Z
dc.date.available2024-11-06T06:20:00Z
dc.date.issued2024-12
dc.descriptionPublisher Copyright: © 2024 The Authors
dc.description.abstractWith the advent of advanced technological developments such as IoT, edge, and fog computing, cyber attacks have become increasingly sophisticated. IoT networks facilitate collaborative and intelligent tasks across various domains, including Industry 4.0, digital healthcare, and home automation. However, the proliferation of IoT devices has raised concerns about severe attacks, particularly those targeting resource constraints such as energy and memory. In response to these challenges, Tiny Machine Learning (TinyML) has emerged as a new research area, focusing on machine learning techniques tailored for embedded and IoT systems. This study proposes an ML detection mechanism designed to categorize and detect resource-constrained attacks in IoT devices. We consider IoT devices to be integral components within the continuum of edge and cloud computing, leveraging EdgeML and CloudML for detection purposes. Our paper conducts a comparative analysis of ML models, with a specific focus on energy consumption and memory usage in IoT applications. We compare various ML methodologies, including cloud-based, edge-based, and device-based strategies for both training and detection. The evaluation encompasses the application of these ML techniques to petite IoT devices, utilizing TinyML, as well as cloud and edge devices. Our findings reveal that the Decision Tree algorithm deployed on smart devices surpasses other approaches in terms of training efficiency, resource utilization, and the ability to detect resource-constrained attacks on IoT devices. We demonstrate a high level of accuracy, exceeding 96.9%, across all presented ML models in detecting resource constraint attacks within IoT systems. In summary, this research serves as a guide for implementing effective security measures in the dynamic landscape of IoT and associated technologies.en
dc.description.versionPeer revieweden
dc.format.extent20
dc.format.mimetypeapplication/pdf
dc.identifier.citationAlwaisi, Z, Kumar, T, Harjula, E & Soderi, S 2024, ' Securing constrained IoT systems: A lightweight machine learning approach for anomaly detection and prevention ', Internet of Things (The Netherlands), vol. 28, 101398 . https://doi.org/10.1016/j.iot.2024.101398en
dc.identifier.doi10.1016/j.iot.2024.101398
dc.identifier.issn2543-1536
dc.identifier.issn2542-6605
dc.identifier.otherPURE UUID: 648ba051-954b-42b7-bb3f-ad2bdc1d99e6
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/648ba051-954b-42b7-bb3f-ad2bdc1d99e6
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85207122772&partnerID=8YFLogxK
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/163440164/1-s2.0-S2542660524003391-main.pdf
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/131519
dc.identifier.urnURN:NBN:fi:aalto-202411067035
dc.language.isoenen
dc.publisherElsevier
dc.relation.ispartofseriesInternet of Things (The Netherlands)
dc.relation.ispartofseriesVolume 28
dc.rightsopenAccessen
dc.subject.keywordDetection
dc.subject.keywordEdge AI
dc.subject.keywordEnergy
dc.subject.keywordInternet of Things (IoT)
dc.subject.keywordMemory
dc.subject.keywordML
dc.subject.keywordResource constraints
dc.subject.keywordSmart devices
dc.subject.keywordTinyML
dc.titleSecuring constrained IoT systems: A lightweight machine learning approach for anomaly detection and preventionen
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionpublishedVersion

Files