Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cybersecurity In IIOT And IOMT Networks Using Machine Learning Algorithms - A Survey


Affiliations
1 Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, India
2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, India
3 Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, Brazil
     

   Subscribe/Renew Journal


Rapid advancements in micro-computing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have allowed for innovative Internet of Things (IoT) solutions to redefine numerous networking applications. With the emergence of IoT branches such as the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT), healthcare and industrial systems have been changed by IoT. This paper presents an overview of the technologies that are being used to secure IoMT as well as IIoT frameworks seen within the research articles.

Keywords

Machine Learning, Healthcare, Cybersecurity, Internet of Things (IoT)
Subscription Login to verify subscription
User
Notifications
Font Size

  • Modbus, “The Modbus Organization”, Available at https://modbus.org/, Accessed at 2021.
  • Bacnet, “BACnet Website”, Available at http://www.bacnet.org/, Accessed at 2021.
  • DNP, “Overview of DNP3 Protocol”, Available at https://www.dnp.org/About/Overview-of-DNP3-Protocol, Accessed at 2021.
  • MQTT, “MQTT - The Standard for IoT Messaging”, Available at https://mqtt.org/, Accessed at 2021.
  • IEEE Standards, “IEEE SA - The IEEE Standards Association - Home”, Available at https://standards.ieee.org/, Accessed at 2021.
  • A. Antonini, A. Barenghi, G. Pelosi and S. Zonouz, “Security Challenges in Building Automation and SCADA”, Proceedings of International Carnahan Conference on Security Technology, pp. 1-6, 2014.
  • Cypress Perform, Available at “Bluetooth Low Energy (BLE)”, Available at https://www.infineon.com/dgdl/InfineonComponent_BLE_V2.0Software%20Module%20Datasheets-v03_66EN.pdf?fileId=8ac78c8c7d0d8da4017d0eae085e299e, Accessed at 2015.
  • Texas Instruments, “Bluetooth low energy Protocol Stack Introduction”, Available at http://softwaredl.ti.com/lprf/simplelink_cc2640r2_sdk/1.00.00.22/exports/ docs/blestack/html/blestack/index.html#:~:text=The%20Bluetooth%20low%20en ergy%20protocol%20stack%20(or%20protocol%20stack) %20consists,two%20sections%20are%20implemented%20 separately, Accessed at 2021.
  • C.T. Lin, S.L. Wu and M.L. Lee, “Cyber Attack and Defense on Industry Control Systems”, Proceedings of IEEE International Conference on Dependable and Secure Computing, pp. 1-3, 2017.
  • M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, “Evaluation of Machine Learning Algorithms for Intrusion Detection System”, Proceedings of IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277282, 2017.
  • L. Rosa, T. Cruz, P. Simoes, E. Monteiro and L. Lev, “Attacking SCADA Systems: A Practical Perspective”, Proceedings of IEEE International Conference on Integrated Network and Service Management, pp. 741-746, 2017.
  • A. Keliris, H. Salehghaffari, B. Cairl, P. Krishnamurthy, M. Maniatakos and F. Khorrami, “Machine Learning-Based Defense against Process-Aware Attacks on Industrial Control Systems”, Proceedings of IEEE International Conference on Integrated Networks, pp. 1-10, 2016.
  • F. Jiang, “Deep Learning based Multi-Channel Intelligent Attack Detection for Data Security”, IEEE Transactions on Sustainable Computing, pp. 1-10, 2018.
  • M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan and R. Jain, “Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things”, IEEE Internet of Things, Vol. 6, No. 4, pp. 6822-6834, 2019.
  • M. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin and M. Samaka, “SCADA System Testbed for Cybersecurity Research using Machine Learning Approach”, Future Internet, Vol. 10, No. 8, pp. 76-88, 2018.
  • G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou and C. Tsatsoulis, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 457-464, 2019.
  • A. Jain, T. Singh and S. Kumar Sharma, “Security as a Solution: An Intrusion Detection System using a Neural Network for IoT Enabled Healthcare Ecosystem”, Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 16, pp. 331-369, 2021.
  • P. Kumar, G.P. Gupta and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks”, Computer Communications, Vol. 166, pp. 110-124, 2021.
  • E.M. Campos, “Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 1-13, 2021.

Abstract Views: 222

PDF Views: 0




  • Cybersecurity In IIOT And IOMT Networks Using Machine Learning Algorithms - A Survey

Abstract Views: 222  |  PDF Views: 0

Authors

Pallavi Arora
Department of Computer Science and Engineering, I.K. Gujral Punjab Technical University, India
Baljeet Kaur
Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, India
Marcio Andrey Teixeira
Department of Informatics, Federal Institute of Education, Science, and Technology of São Paulo, Brazil

Abstract


Rapid advancements in micro-computing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have allowed for innovative Internet of Things (IoT) solutions to redefine numerous networking applications. With the emergence of IoT branches such as the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT), healthcare and industrial systems have been changed by IoT. This paper presents an overview of the technologies that are being used to secure IoMT as well as IIoT frameworks seen within the research articles.

Keywords


Machine Learning, Healthcare, Cybersecurity, Internet of Things (IoT)

References