Encyclopedia of Big Data Technologies

2019 Edition
| Editors: Sherif Sakr, Albert Y. Zomaya

Exploring Scope of Computational Intelligence in IoT Security Paradigm

  • Soumya BanerjeeEmail author
  • Samia Bouzefrane
  • Hanene Maupas
Reference work entry
DOI: https://doi.org/10.1007/978-3-319-77525-8_239

Definitions

As the expansion of nano-devices, smartphones, 5G, tiny sensors, and distributed networks evolve, the IoT is combining the “factual and virtual” anywhere and anytime. Subsequently, it is attracting the attention of both “maker and hacker.” However, interconnecting many “things” also means the possibility of interconnecting many diversified threats and attacks. For example, a malware virus can easily propagate through the IoT at an unprecedented rate. In the four design aspects of the smart IOT, there may be various threats and attacks; they are:

  1. (a)

    Data perception and collection: In this aspect, typical attacks include data leakage, sovereignty, breach, and authentication.

     
  2. (b)

    Data storage: The following attacks may occur – denial-of-service attacks (attacks on availability), access control attacks, integrity attacks, impersonation, modification of sensitive data, and so on.

     
  3. (c)

    Data processing: In this aspect, there may exist computational attacks that aim to generate...

This is a preview of subscription content, log in to check access.

References

  1. Aiello F, Fortino G, Gravina R, Guerrieri A (2011) A java-based agent platform for programming wireless sensor networks. Comput J 54(3):439–454CrossRefGoogle Scholar
  2. Ayala I, Pinilla MA, Fuentes L (2012) Exploiting dynamic weaving for self-managed agents in the IOT. In: German conference on multiagent system technologies. Springer, pp 5–14Google Scholar
  3. Ayala I, Amor M, Fuentes L (2013) Self-configuring agents for ambient assisted living applications. Pers ubiquit comput 17(6):1159–1169CrossRefGoogle Scholar
  4. Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things. ACM, pp 1–6Google Scholar
  5. Beal J, Pianini D, Viroli M (2015) Aggregate programming for the internet of things. Computer 48(9):22–30CrossRefGoogle Scholar
  6. Bellifemine F, Poggi A, Rimassa G (2001) Developing multi-agent systems with a fipa-compliant agent framework. Softw-Pract Exp 31(2):103–128zbMATHCrossRefGoogle Scholar
  7. Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 21–26Google Scholar
  8. Lever KE, Kifayat K, Merabti M (2015) Identifying interdependencies using attack graph generation methods. In: 2015 11th international conference on innovations in information technology (IIT). IEEE, pp 80–85Google Scholar
  9. Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Methods 9(5):205–216Google Scholar
  10. Lin KC, Chen SY, Hung JC (2014) Botnet detection using support vector machines with artificial fish swarm algorithm. J Appl Math 2014:1–9Google Scholar
  11. Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156CrossRefGoogle Scholar
  12. Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: 2013 3rd international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5Google Scholar
  13. Muldoon C, O’Hare GM, Collier R, O’Grady MJ (2006) Agent factory micro edition: a framework for ambient applications. In: International conference on computational science. Springer, pp 727–734Google Scholar
  14. Ould-Yahia Y, Banerjee S, Bouzefrane S, Boucheneb H (2017) Exploring formal strategy framework for the security in iot towards e-health context using computational intelligence. In: Internet of things and big data technologies for next generation healthcare. Springer, pp 63–90Google Scholar
  15. Urien P (2016) Three innovative directions based on secure elements for trusted and secured iot platforms. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–2Google Scholar
  16. Viroli M, Audrito G, Damiani F, Pianini D, Beal J (2016) A higher-order calculus of computational fields. arXiv preprint. arXiv:161008116Google Scholar
  17. Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secure Comput 11(1):30–44CrossRefGoogle Scholar
  18. WhitePaper (2017) Iot 2020: smart and secure. International Electrotechnical Commission, GenevaGoogle Scholar
  19. Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134CrossRefGoogle Scholar
  20. Zhao YL (2013) Research on data security technology in internet of things. Appl Mech Mater Trans Tech Publ 433:1752–1755Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Soumya Banerjee
    • 1
    Email author
  • Samia Bouzefrane
    • 2
  • Hanene Maupas
    • 3
  1. 1.Department of Computer Science and EngineeringBirla Institute of TechnologyMesraIndia
  2. 2.Conservatoire National des Arts et MetiersParisFrance
  3. 3.IDEMIA ColombesColombesFrance