Skip to main content

Exploring Scope of Computational Intelligence in IoT Security Paradigm

  • Reference work entry
  • First Online:
Encyclopedia of Big Data Technologies

Definitions

As the expansion of nano-devices, smartphones, 5G, tiny sensors, and distributed networks evolve, the IoT is combining the “factual and virtual” anywhere and anytime. Subsequently, it is attracting the attention of both “maker and hacker.” However, interconnecting many “things” also means the possibility of interconnecting many diversified threats and attacks. For example, a malware virus can easily propagate through the IoT at an unprecedented rate. In the four design aspects of the smart IOT, there may be various threats and attacks; they are:

  1. (a)

    Data perception and collection: In this aspect, typical attacks include data leakage, sovereignty, breach, and authentication.

  2. (b)

    Data storage: The following attacks may occur – denial-of-service attacks (attacks on availability), access control attacks, integrity attacks, impersonation, modification of sensitive data, and so on.

  3. (c)

    Data processing: In this aspect, there may exist computational attacks that aim to generate...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 849.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 999.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Aiello F, Fortino G, Gravina R, Guerrieri A (2011) A java-based agent platform for programming wireless sensor networks. Comput J 54(3):439–454

    Article  Google Scholar 

  • Ayala I, Pinilla MA, Fuentes L (2012) Exploiting dynamic weaving for self-managed agents in the IOT. In: German conference on multiagent system technologies. Springer, pp 5–14

    Google Scholar 

  • Ayala I, Amor M, Fuentes L (2013) Self-configuring agents for ambient assisted living applications. Pers ubiquit comput 17(6):1159–1169

    Article  Google Scholar 

  • Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things. ACM, pp 1–6

    Google Scholar 

  • Beal J, Pianini D, Viroli M (2015) Aggregate programming for the internet of things. Computer 48(9):22–30

    Article  Google Scholar 

  • Bellifemine F, Poggi A, Rimassa G (2001) Developing multi-agent systems with a fipa-compliant agent framework. Softw-Pract Exp 31(2):103–128

    Article  MATH  Google Scholar 

  • Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 21–26

    Google Scholar 

  • Lever KE, Kifayat K, Merabti M (2015) Identifying interdependencies using attack graph generation methods. In: 2015 11th international conference on innovations in information technology (IIT). IEEE, pp 80–85

    Google Scholar 

  • Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Methods 9(5):205–216

    Google Scholar 

  • Lin KC, Chen SY, Hung JC (2014) Botnet detection using support vector machines with artificial fish swarm algorithm. J Appl Math 2014:1–9

    Google Scholar 

  • Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156

    Article  Google Scholar 

  • Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: 2013 3rd international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5

    Google Scholar 

  • Muldoon C, O’Hare GM, Collier R, O’Grady MJ (2006) Agent factory micro edition: a framework for ambient applications. In: International conference on computational science. Springer, pp 727–734

    Google Scholar 

  • Ould-Yahia Y, Banerjee S, Bouzefrane S, Boucheneb H (2017) Exploring formal strategy framework for the security in iot towards e-health context using computational intelligence. In: Internet of things and big data technologies for next generation healthcare. Springer, pp 63–90

    Google Scholar 

  • Urien P (2016) Three innovative directions based on secure elements for trusted and secured iot platforms. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–2

    Google Scholar 

  • Viroli M, Audrito G, Damiani F, Pianini D, Beal J (2016) A higher-order calculus of computational fields. arXiv preprint. arXiv:161008116

    Google Scholar 

  • Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secure Comput 11(1):30–44

    Article  Google Scholar 

  • WhitePaper (2017) Iot 2020: smart and secure. International Electrotechnical Commission, Geneva

    Google Scholar 

  • Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134

    Article  Google Scholar 

  • Zhao YL (2013) Research on data security technology in internet of things. Appl Mech Mater Trans Tech Publ 433:1752–1755

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumya Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Banerjee, S., Bouzefrane, S., Maupas, H. (2019). Exploring Scope of Computational Intelligence in IoT Security Paradigm. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_239

Download citation

Publish with us

Policies and ethics