Open Access
Subscription Access
Open Access
Subscription Access
Cybersecurity In IIOT And IOMT Networks Using Machine Learning Algorithms - A Survey
Subscribe/Renew Journal
Rapid advancements in micro-computing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have allowed for innovative Internet of Things (IoT) solutions to redefine numerous networking applications. With the emergence of IoT branches such as the Internet of Medical Things (IoMT) and the Industrial Internet of Things (IIoT), healthcare and industrial systems have been changed by IoT. This paper presents an overview of the technologies that are being used to secure IoMT as well as IIoT frameworks seen within the research articles.
Keywords
Machine Learning, Healthcare, Cybersecurity, Internet of Things (IoT)
Subscription
Login to verify subscription
User
Font Size
Information
- Modbus, “The Modbus Organization”, Available at https://modbus.org/, Accessed at 2021.
- Bacnet, “BACnet Website”, Available at http://www.bacnet.org/, Accessed at 2021.
- DNP, “Overview of DNP3 Protocol”, Available at https://www.dnp.org/About/Overview-of-DNP3-Protocol, Accessed at 2021.
- MQTT, “MQTT - The Standard for IoT Messaging”, Available at https://mqtt.org/, Accessed at 2021.
- IEEE Standards, “IEEE SA - The IEEE Standards Association - Home”, Available at https://standards.ieee.org/, Accessed at 2021.
- A. Antonini, A. Barenghi, G. Pelosi and S. Zonouz, “Security Challenges in Building Automation and SCADA”, Proceedings of International Carnahan Conference on Security Technology, pp. 1-6, 2014.
- Cypress Perform, Available at “Bluetooth Low Energy (BLE)”, Available at https://www.infineon.com/dgdl/InfineonComponent_BLE_V2.0Software%20Module%20Datasheets-v03_66EN.pdf?fileId=8ac78c8c7d0d8da4017d0eae085e299e, Accessed at 2015.
- Texas Instruments, “Bluetooth low energy Protocol Stack Introduction”, Available at http://softwaredl.ti.com/lprf/simplelink_cc2640r2_sdk/1.00.00.22/exports/ docs/blestack/html/blestack/index.html#:~:text=The%20Bluetooth%20low%20en ergy%20protocol%20stack%20(or%20protocol%20stack) %20consists,two%20sections%20are%20implemented%20 separately, Accessed at 2021.
- C.T. Lin, S.L. Wu and M.L. Lee, “Cyber Attack and Defense on Industry Control Systems”, Proceedings of IEEE International Conference on Dependable and Secure Computing, pp. 1-3, 2017.
- M. Almseidin, M. Alzubi, S. Kovacs and M. Alkasassbeh, “Evaluation of Machine Learning Algorithms for Intrusion Detection System”, Proceedings of IEEE 15th International Symposium on Intelligent Systems and Informatics, pp. 277282, 2017.
- L. Rosa, T. Cruz, P. Simoes, E. Monteiro and L. Lev, “Attacking SCADA Systems: A Practical Perspective”, Proceedings of IEEE International Conference on Integrated Network and Service Management, pp. 741-746, 2017.
- A. Keliris, H. Salehghaffari, B. Cairl, P. Krishnamurthy, M. Maniatakos and F. Khorrami, “Machine Learning-Based Defense against Process-Aware Attacks on Industrial Control Systems”, Proceedings of IEEE International Conference on Integrated Networks, pp. 1-10, 2016.
- F. Jiang, “Deep Learning based Multi-Channel Intelligent Attack Detection for Data Security”, IEEE Transactions on Sustainable Computing, pp. 1-10, 2018.
- M. Zolanvari, M.A. Teixeira, L. Gupta, K.M. Khan and R. Jain, “Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things”, IEEE Internet of Things, Vol. 6, No. 4, pp. 6822-6834, 2019.
- M. Teixeira, T. Salman, M. Zolanvari, R. Jain, N. Meskin and M. Samaka, “SCADA System Testbed for Cybersecurity Research using Machine Learning Approach”, Future Internet, Vol. 10, No. 8, pp. 76-88, 2018.
- G. Hatzivasilis, O. Soultatos, S. Ioannidis, C. Verikoukis, G. Demetriou and C. Tsatsoulis, “Review of Security and Privacy for the Internet of Medical Things (IoMT)”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 457-464, 2019.
- A. Jain, T. Singh and S. Kumar Sharma, “Security as a Solution: An Intrusion Detection System using a Neural Network for IoT Enabled Healthcare Ecosystem”, Interdisciplinary Journal of Information, Knowledge, and Management, Vol. 16, pp. 331-369, 2021.
- P. Kumar, G.P. Gupta and R. Tripathi, “An Ensemble Learning and Fog-Cloud Architecture-Driven Cyber-Attack Detection Framework for IoMT Networks”, Computer Communications, Vol. 166, pp. 110-124, 2021.
- E.M. Campos, “Evaluating Federated Learning for Intrusion Detection in Internet of Things: Review and Challenges”, Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems, pp. 1-13, 2021.
Abstract Views: 208
PDF Views: 0