Mitigating Security Threats in IoT Networks Using Big Data Analytics and On-Device Modeling

Authors

  • Vinny Sukhija Research Scholar, Department of Computer Science & Applications, Baba Mastnath University, Asthal Bohar, Rohtak, Haryana, India
  • Dr. Brij Mohan Goel Assistant Professor, Department of Computer Science & Applications, Baba Mastnath University, Asthal Bohar, Rohtak, Haryana, India

DOI:

https://doi.org/10.5281/zenodo.15037481

Keywords:

Secure IOT Infra, Big-Data Analytics, Anomaly Behavior Profiling, Collaborative IOT Security Model, Device Analytics, Secure Model for IOT

Abstract

The rapid increase of IoT devices created the modern digital infrastructures but it has also added crucial security challenges due to the scale and heterogeneity of IOT devices. This paper presents a collaborative security framework model that uses big-data analytics & Hybrid on-device modelling that allows us to address the security threats appearing in an IoT ecosystem. The framework uses big data analytics to process huge amounts of IoT traffic data in real time, recognizing patterns, detect possible threats and creates a miniature model that can be deployed on IOT device.  On-device modeling helps to ensure that threats can be handled right there on-device, limiting cloud-based infra and latency dependencies. The framework also focus on using an AHD Model (Anomaly Hash-out Delta) using device behavior profile for permissible actions, which helps anomaly handling in a very lightweight machine learning model.

Downloads

Download data is not yet available.

References

A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, & M. Ayyash. (2015). Internet of Things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surveys & Tutorials, 17(4), 2347–2376. DOI: 10.1109/COMST.2015.2444095.

L. Atzori, A. Iera, & G. Morabito. (2010). The internet of things: A survey. Comput. Netw., 54(15), 2787–2805. DOI: 10.1016/j.comnet.2010.05.010.

M. Antonakakis et al. (2017). Understanding the mirai botnet. In Proc. 26th USENIX Security Symp., pp. 1093–1110. Available at: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis.

S. Sicari, A. Rizzardi, L. A. Grieco, & A. Coen-Porisini. (2015). Security, privacy and trust in internet of things: The road ahead. Comput. Netw., 76, 146–164. DOI: 10.1016/j.comnet.2015.02.016.

A. Alrawais, A. Alhothaily, C. Hu, & X. Cheng. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Comput., 21(2), 34–42. DOI: 10.1109/MIC.2017.37.

Y. Meidan et al. (2018). N-BaIoT: Network-based detection of IoT botnet attacks using deep autoencoders. IEEE Pervasive Comput., 17(3), 12–22. DOI: 10.1109/MPRV.2018.03367731.

M. A. Ferrag, L. Maglaras, A. Argyriou, D. Kosmanos, & H. Janicke. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. J. Netw. Comput. Appl., 101, 55–82. DOI: 10.1016/j.jnca.2017.10.017.

F. A. Alaba, M. Othman, I. A. T. Hashem, & F. Alotaibi. (2017). Internet of things security: A survey. J. Netw. Comput. Appl., 88, 10–28. DOI: 10.1016/j.jnca.2017.03.016.

Z. B. Celik, G. Tan, & P. D. McDaniel. (2019). IoT guard: Dynamic enforcement of security and safety policy in commodity IoT. In: Proc. Netw. Distrib. Syst. Security Symp. (NDSS). Available at: https://www.ndss-symposium.org/ndss-paper/iotguard-dynamic-enforcement-of-security-and-safety-policy-in-commodity-iot/.

S. R. Hussain, M. Echeverria, O. Chowdhury, N. Li, & E. Bertino. (2019). Privacy attacks to the 4G and 5G cellular paging protocols using side channel information. In: Proc. Netw. Distrib. Syst. Security Symp. (NDSS). Available at: https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/.

M. A. Razzaq, S. H. Ahmed, S. A. Hussain, & M. K. Khan. (2017). Security issues in the internet of things (IoT): A comprehensive study. Int. J. Adv. Comput. Sci. Appl. (IJACSA), 8(6), 383–388. Available at: https://thesai.org/Publications/ViewPaper?Volume=8&Issue=6&Code=IJACSA&SerialNo=54.

L. Atzori, A. Iera, & G. Morabito. (2010). The internet of things: A survey. Comput. Netw., 54(15), 2787–2805. DOI: 10.1016/j.comnet.2010.05.010.

M. Elrawy, A. Awad, & H. Hamed. (2018). Intrusion detection systems for IoT-based smart environments: A survey. J. Netw. Comput. Appl., 121, 18–40. DOI: 10.1016/j.jnca.2018.07.016.

L. D. Xu, W. He, & S. Li. (2014). Internet of things in industries: A survey. IEEE Trans. Ind. Informat., 10(4), 2233–2243. DOI: 10.1109/TII.2014.2300753.

J. Lin, W. Yu, N. Zhang, X. Yang, & H. Ge. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J., 4(5), 1125–1142. DOI: 10.1109/JIOT.2017.2683200.

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, & A. Razaque. (2020). Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory, 101, 102031. DOI: 10.1016/j.simpat.2019.102031.

S. J. Moore, T. J. Moore, & J. H. Reed. (2020). Reliability of IoT devices: A review. IEEE Internet Things J., 7(4), 2986–2998. DOI: 10.1109/JIOT.2020.2970123.

Published

2025-02-09
CITATION
DOI: 10.5281/zenodo.15037481
Published: 2025-02-09

How to Cite

Sukhija, V., & Goel, B. M. (2025). Mitigating Security Threats in IoT Networks Using Big Data Analytics and On-Device Modeling. International Journal of Engineering and Management Research, 15(1), 103–112. https://doi.org/10.5281/zenodo.15037481

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.