Document Type

Article

Publication Date

2023

DOI

10.31449/inf.v47i6.4635

Publication Title

Informatica

Volume

47

Issue

6

Pages

1-54

Abstract

The Internet of Things (IoT) has become more popular in the last 15 years as it has significantly improved and gained control in multiple fields. We are nowadays surrounded by billions of IoT devices that directly integrate with our lives, some of them are at the center of our homes, and others control sensitive data such as military fields, healthcare, and datacenters, among others. This popularity makes factories and companies compete to produce and develop many types of those devices without caring about how secure they are. On the other hand, IoT is considered a good insecure environment for cyber thefts. Machine Learning (ML) and Deep Learning (DL) also gained more importance in the last 15 years; they achieved success in the networking security field too. IoT has some similar security requirements such as traditional networks, but with some differences according to its characteristics, some specific security features, and environmental limitations, some differences are made such as low energy resources, limited computational capability, and small memory. These limitations inspire some researchers to search for the perfect and lightweight security ways which strike a balance between performance and security. This survey provides a comprehensive discussion about using machine learning and deep learning in IoT devices within the last five years. It also lists the challenges faced by each model and algorithm. In addition, this survey shows some of the current solutions and other future directions and suggestions. It also focuses on the research that took the IoT environment limitations into consideration.

Rights

© 2023 The Authors.

This work is licensed under a Creative Commons Attribution 3.0 Unported (CC BY 3.0) License.

Original Publication Citation

Harahsheh, K., & Chen, C.-H. (2023). A survey of using machine learning in IoT security and the challenges faced by researchers. Informatica, 47(6), 1-54. https://doi.org/10.31449/inf.v47i6.4635

Share

COinS