An Analytical Survey of Various Learning Methods for IoT Based Privacy Preservation.
Author
Author
Keywords: cloud computing, Machine Learning, Internet of Things,, Intrusion Detection, PSO
Abstract: The Internet of Things (IoT) involves a network of Internet-connected gadgets that can detect, communicate, and respond to changes in their surroundings. Billions of these computer devices are linked to the Internet in order to share data with one another and/or with their infrastructure. The Internet of Things (IoT) aims to enable a multitude of smart services in practically every facet of our everyday interactions while also improving our general level of life. However, as IoT becomes more widely adopted, there are serious privacy worries about losing control over how our data is gathered and distributed with others. As a result, privacy is an essential prerequisite for every IoT ecosystem and a major barrier to mainstream consumer adoption. The ultimate source of consumer annoyance is the inability to regulate personal information in raw form that is directly transmitted.
References:
- Ahmadvand, H., Lal, C., Hemmati, H., Sookhak, M., & Conti, M. (2023). Privacy-preserving and security in SDN-based IoT: A survey. IEEE Access, 11, 44772-44786.
- Tanveer, M., Chelloug, S. A., Alabdulhafith, M., & Abd El-Latif, A. A. (2024). Lightweight authentication protocol for connected medical IoT through privacy-preserving access. Egyptian Informatics Journal, 26, 100474.
- Dhinakaran, D., Sankar, S. M., Selvaraj, D., & Raja, S. E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with Al Integration. arXiv preprint arXiv:2401.00794.
- Liu, L., Li, J., Lv, J., Wang, J., Zhao, S., & Lu, Q. (2024). Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework. IEEE Internet of Things Journal,Mengistu, T. M., Kim, T., & Lin, J. W. (2024). A Survey on Heterogeneity Taxonomy, Security and Privacy Preservation in the Integration of IoT, Wireless Sensor Networks and Federated Learning. Sensors, 24(3), 968.
- Aggarwal, M., Khullar, V., & Goyal, N. (2024). A comprehensive review of federated learning: Methods, applications, and challenges in privacy-preserving collaborative model training. Applied Data Science and Smart Systems, 570-575.
- Amaithi Rajan, A., & V, V. (2024). Systematic survey: secure and privacy-preserving big data analytics in cloud. Journal of Computer Information Systems, 64(1), 136156.
- Aouedi, O., Vu, T. H., Sacco, A., Nguyen, D. C., Piamrat, K., Marchetto, G., & Pham, Q. V. (2024). A survey on intelligent Internet of Things: Applications, security, privacy, and future directions. IEEE communications surveys & tutorials.
- Xie, Q., Jiang, S., Jiang, L., Huang, Y., Zhao, Z., Khan, S., ... & Wu, K. (2024). Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey. IEEE Internet of Things Journal, 11(14), 2456924580.
- Chen, J., Yan, H., Liu, Z., Zhang, M., Xiong, H., & Yu, S. (2024). When federated learning meets privacy-preserving computation. ACM Computing Surveys, 56(12), 1-36.
- McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017, April). Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics (pp. 1273-1282). PMLR.
- Nawshin, F., Gad, R., Unal, D., Al-Ali, A. K., & Suganthan, P. N. (2024). Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey. Computers and Electrical Engineering, 117, 109233.
- Nowrozy, R., Ahmed, K., Kayes, A. S. M., Wang, H., & McIntosh, T. R. (2024). Privacy preservation of electronic health records in the modern era: A systematic survey. ACM Computing Surveys, 56(8), 1-37.
- Anand, N., Singh, K.J. (2024). A Comprehensive Study of DDoS Attack on Internet of Things Network. In: Swain, B.P., Dixit, U.S. (eds) Recent Advances in Electrical and Electronic Engineering. ICSTE 2023. Lecture Notes in Electrical Engineering, vol 1071. Springer, Singapore.
- Vishwakarma, R., Jain, A.K. A survey of DDoS attacking techniques and defence mechanisms in the IoT network. Telecommun Syst 73, 3-25 (2020).
- Elrawy, M. F., Awad, A. I., & Hamed, H. F. (2018). Intrusion detection systems for IoTbased smart environments: a survey. Journal of Cloud Computing, 7(1), 1-20.
- Gendreau, A. A., & Moorman, M. (2016, August). Survey of intrusion detection systems towards an end to end secure internet of things. In 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud) (pp. 84-90). ΙΕΕΕ.
- Anand, N., Singh, K.J. (2023). An Overview on Security and Privacy Concerns in IoTBased Smart Environments. In: Rao, U.P., Alazab, M., Gohil, B.N., Chelliah, P.R. (eds) Security, Privacy and Data Analytics. ISPDA 2022. Lecture Notes in Electrical Engineering, vol 1049. Springer, Singapore._ [19]Alkaeed, M., Qayyum, A., & Qadir, J. (2024). Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey. Journal of Network and Computer Applications, 103989.
- Karie, N. M., Sahri, N. M., Yang, W., Valli, C., & Kebande, V. R. (2021). A review of security standards and frameworks for IoT-based smart environments. IEEE Access, 9, 121975-121995.
- Agarwal, S., Singh, A. P., & Anand, N. (2013, July). Evaluation performance study of Firefly algorithm, particle swarm optimization and artificial bee colony algorithm for nonlinear mathematical optimization functions. In 2013 fourth international conference on computing, communications and networking technologies (ICCCNT) (pp. 1-8). IEEE.
- Rachit, Bhatt, S., & Ragiri, P. R. (2021). Security trends in Internet of Things: A survey. SN Applied Sciences, 3,1-14.
- Alterazi, H. A., Kshirsagar, P. R., Manoharan, H., Selvarajan, S., Alhebaishi, N., Srivastava, G., & Lin, J. C. W. (2022). Prevention of cyber security with the internet of things using particle swarm optimization. Sensors, 22(16), 6117.
- Gebremichael, T., Ledwaba, L. P., Eldefrawy, M. H., Hancke, G. P., Pereira, N., Gidlund, M., & Akerberg, J. (2020). Security and privacy in the industrial internet of things: Current standards and future challenges. IEEE Access, 8, 152351-152366.
- Hazman, C., Guezzaz, A., Benkirane, S., & Azrour, M. (2024). Toward an intrusion detection model for IoT-based smart environments. Multimedia Tools and Applications, 83(22), 62159-62180.
- Fährmann, D., Martín, L., Sánchez, L., & Damer, N. (2024). Anomaly Detection in Smart Environments: A Comprehensive Survey. IEEE Access.
- Smys, S., Basar, A., & Wang, H. (2020). Hybrid intrusion detection system for internet of things (IoT). Journal of ISMAC, 2(04), 190-199.
- Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Topics Comput 5(4):586-602.
- Son, S., McKinley, K. S., & Shmatikov, V. (2013, November). Diglossia: detecting code injection attacks with precision and efficiency. In Proceedings of the 2013 ACM SIGSAC conference on computer & communications security (pp. 1181-1192).
- Liu, J., Yang, D., Lian, M., & Li, M. (2021). Research on intrusion detection based on particle swarm optimization in IoT. IEEE Access, 9, 38254-38268.
- Ahmed, E., Yaqoob, I., Gani, A., Imran, M., & Guizani, M. (2016). Internet-of-thingsbased smart environments: state of the art, taxonomy, and open research challenges. IEEE Wireless Communications, 23(5), 10-16.
- Babbar H, Rani S, Driss M (2024) Effective DDoS attack detection in software-defined vehicular networks using statistical flow analysis and machine learning. PLoS ONE 19(12): e0314695.
- Sharma, A., & Babbar, H. (2024, May). Machine Learning-based Threat Detection for DDoS Prevention in SDN-Controlled IoT Networks. In 2024 5th International Conference for Emerging Technology (INCET) (pp. 1-6). IEEE.
