Definitions
As the expansion of nano-devices, smartphones, 5G, tiny sensors, and distributed networks evolve, the IoT is combining the “factual and virtual” anywhere and anytime. Subsequently, it is attracting the attention of both “maker and hacker.” However, interconnecting many “things” also means the possibility of interconnecting many diversified threats and attacks. For example, a malware virus can easily propagate through the IoT at an unprecedented rate. In the four design aspects of the smart IOT, there may be various threats and attacks; they are:
- (a)
Data perception and collection: In this aspect, typical attacks include data leakage, sovereignty, breach, and authentication.
- (b)
Data storage: The following attacks may occur – denial-of-service attacks (attacks on availability), access control attacks, integrity attacks, impersonation, modification of sensitive data, and so on.
- (c)
Data processing: In this aspect, there may exist computational attacks that aim to generate...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aiello F, Fortino G, Gravina R, Guerrieri A (2011) A java-based agent platform for programming wireless sensor networks. Comput J 54(3):439–454
Ayala I, Pinilla MA, Fuentes L (2012) Exploiting dynamic weaving for self-managed agents in the IOT. In: German conference on multiagent system technologies. Springer, pp 5–14
Ayala I, Amor M, Fuentes L (2013) Self-configuring agents for ambient assisted living applications. Pers ubiquit comput 17(6):1159–1169
Bao F, Chen IR (2012) Dynamic trust management for internet of things applications. In: Proceedings of the 2012 international workshop on Self-aware internet of things. ACM, pp 1–6
Beal J, Pianini D, Viroli M (2015) Aggregate programming for the internet of things. Computer 48(9):22–30
Bellifemine F, Poggi A, Rimassa G (2001) Developing multi-agent systems with a fipa-compliant agent framework. Softw-Pract Exp 31(2):103–128
Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp 21–26
Lever KE, Kifayat K, Merabti M (2015) Identifying interdependencies using attack graph generation methods. In: 2015 11th international conference on innovations in information technology (IIT). IEEE, pp 80–85
Li Y, Ma R, Jiao R (2015) A hybrid malicious code detection method based on deep learning. Methods 9(5):205–216
Lin KC, Chen SY, Hung JC (2014) Botnet detection using support vector machines with artificial fish swarm algorithm. J Appl Math 2014:1–9
Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148–156
Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trust based access control in internet of things. In: 2013 3rd international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE). IEEE, pp 1–5
Muldoon C, O’Hare GM, Collier R, O’Grady MJ (2006) Agent factory micro edition: a framework for ambient applications. In: International conference on computational science. Springer, pp 727–734
Ould-Yahia Y, Banerjee S, Bouzefrane S, Boucheneb H (2017) Exploring formal strategy framework for the security in iot towards e-health context using computational intelligence. In: Internet of things and big data technologies for next generation healthcare. Springer, pp 63–90
Urien P (2016) Three innovative directions based on secure elements for trusted and secured iot platforms. In: 2016 8th IFIP international conference on new technologies, mobility and security (NTMS). IEEE, pp 1–2
Viroli M, Audrito G, Damiani F, Pianini D, Beal J (2016) A higher-order calculus of computational fields. arXiv preprint. arXiv:161008116
Wang L, Jajodia S, Singhal A, Cheng P, Noel S (2014) k-zero day safety: a network security metric for measuring the risk of unknown vulnerabilities. IEEE Trans Dependable Secure Comput 11(1):30–44
WhitePaper (2017) Iot 2020: smart and secure. International Electrotechnical Commission, Geneva
Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120–134
Zhao YL (2013) Research on data security technology in internet of things. Appl Mech Mater Trans Tech Publ 433:1752–1755
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this entry
Cite this entry
Banerjee, S., Bouzefrane, S., Maupas, H. (2019). Exploring Scope of Computational Intelligence in IoT Security Paradigm. In: Sakr, S., Zomaya, A.Y. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-77525-8_239
Download citation
DOI: https://doi.org/10.1007/978-3-319-77525-8_239
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77524-1
Online ISBN: 978-3-319-77525-8
eBook Packages: Computer ScienceReference Module Computer Science and Engineering