Rangelov, D.; Lämmel, P.; Brunzel, L.; Borgert, S.; Darius, P.; Tcholtchev, N.; Boerger, M. Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. Future Internet2023, 15, 98.
Rangelov, D.; Lämmel, P.; Brunzel, L.; Borgert, S.; Darius, P.; Tcholtchev, N.; Boerger, M. Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. Future Internet 2023, 15, 98.
Cite as:
Rangelov, D.; Lämmel, P.; Brunzel, L.; Borgert, S.; Darius, P.; Tcholtchev, N.; Boerger, M. Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. Future Internet2023, 15, 98.
Rangelov, D.; Lämmel, P.; Brunzel, L.; Borgert, S.; Darius, P.; Tcholtchev, N.; Boerger, M. Towards an Integrated Methodology and Toolchain for Machine Learning-Based Intrusion Detection in Urban IoT Networks and Platforms. Future Internet 2023, 15, 98.
Abstract
The constant increase in volume and wide variety of available Internet of Things (IoT) devices leads to highly diverse software and hardware stacks, which opens new avenues for exploiting previously unknown vulnerabilities. The ensuing risks are amplified by the inherent IoT resource constraints both in terms of performance and energy expenditure. At the same time, IoT devices often times generate or collect sensitive, real-time data used in critical application scenarios (e.g. health monitoring, transportation, smart energy, etc.). All these factors combined make IoT networks a primary target and potential victims for malicious actors. In this paper, we present a brief overview of existing attacks and defense strategies against urban IoT networks. The goal of this work is twofold: First, it presents a summary of some of the common attack vectors and the corresponding solutions available in the research literature. Then, the paper lays out a theoretical plan and a corresponding pipeline of steps (i.e. development and implementation process) for the design and application of the solutions encountered throughout the course of the research efforts. The end goal of following this plan is the deployment of the proposed IoT security measures in a real-world urban IoT infrastructure.
Computer Science and Mathematics, Information Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.