Submitted:
02 August 2024
Posted:
05 August 2024
You are already at the latest version
Abstract

Keywords:
1. Introduction
1.1. Background and Motivation
1.2. Research Problem and Scope
- Vulnerability Profile Constraint: The vulnerability profile of IoT devices is within the lower bound (Vmin) and upper bound (Vmax). The constraint is given as:
- Non-Negativity Constraint: Both and are non-negative:
2. Materials and Methods
2.1. Materials
- The basis for the study was various hardware and software that exploring how artificial intelligence and the Internet of Things could be integrated into automation and security applications. Materials used included:
- Hardware: Arduino Uno, Raspberry Pi 4, ESP8266 WiFi modules, ESP32, various sensors—like PIR motion sensors and temperature and humidity sensors—actuators like relays and servo motors.
- Software: Tensor Flow 2.4, Python 3.8, OpenCV 4.5, Arduino IDE 1.8.13, and protocol MQTT for the communication between devices.
- Data: Extract datasets from open repositories like the UCI Machine Learning depository and Kaggle to train the AI model.
2.2. Methods
3. AI Algorithms and Software
3.1. Data Collection and Processing
3.2. Experimental Procedure
- Education and Assessment the operation consists of education cet models for anomaly detection and predictive maintenance exploiting the labeled data sets.
- When performing performance evaluation, it is even important to do model assessment based on some metrics such as accuracy, precision, recall and F1 score by cross validation.
- Encryption Testing: This type of testing checks the performance of various encryption protocols when the data types and sizes are changed by doing benchmarking experiments.
3.3. Materials and Equipment
3.4. Data and Code Availability
3.5. New Methods and Protocols
- Custom Anomaly Detection Algorithms: Tailored algorithms combining feature engineering and ensemble learning techniques.
- Improved Encryption Methods: More advanced versions of AES for the secure transmission and storage of data across IoT devices.
4. Theory/calculation
4.1. Theoretical Foundation
4.2. Practical Calculations
4.3. Anomaly Detection in Sensor Data
4.4. Predictive Maintenance
4.5. Secure Communication Protocols
5. Results and Discussion
5.1. Results
5.2. Discussion
5.3. Research Gap
5.4. Limitation
6. Tables and Figures
| Author | Technique | Description | Metrics Used | Advantages | Disadvantages |
| Tiwari P et al [18] | SVM (Support Vector Machine) | A supervised learning model used for classification and regression analysis. | Precision, Recall, F1-score | High accuracy, effective in high-dimensional spaces | Not suitable for large datasets, requires careful tuning of parameters |
| Copper D M L et al [10] | Neural Networks | A set of algorithms modeled after the human brain that recognizes patterns. | Precision, Recall, F1-score | Can capture complex patterns, highly adaptable | Requires large amounts of data, computationally intensive |
| Luan L et al [3] | Decision Trees | A decision support tool that uses a tree-like model of decisions and their possible consequences. | Precision, Recall, F1-score | Easy to understand and interpret, requires little data preprocessing | Prone to over fitting, especially with deep trees |
| Tiwari P et al et [18] | Auto encoder Neural Networks | A type of artificial neural network used to learn efficient coding of unlabeled data. | Reconstruction error, Anomaly score | Effective for anomaly detection, reduces dimensionality | Requires large datasets, sensitive to noise in data |
| Zhang P et al [19] | AES (Advanced Encryption Standard) | A symmetric encryption algorithm widely used across the globe. | Encryption performance, Security level | Strong security, widely recognized and used | Computationally intensive, key management is critical |


7. Conclusion and future scope
| Metrics | Proposed System | Traditional Methods |
| Anomaly Detection Accuracy (%) | 95.8 | 87.5 |
| Predictive Maintenance Accuracy (%) | 93.4 | 89.5 |
| Response Time (seconds) | 2.5 | 5.5 |
| Data Security Level | High | Moderate |
| Condition | True Positive | False Positive | True Negative | False Negative |
|---|---|---|---|---|
| Normal | 1200 | 50 | 1100 | 70 |
| Faulty | 1150 | 60 | 1050 | 90 |
| Task | Average Response Time (seconds) |
|---|---|
| Anomaly Detection | 2.5 |
| Predictive Maintenance Alerts | 3.2 |
| Payload Size (bytes) | Encryption Time (ms) | Decryption Time (ms) |
| Up to 256 | 0.8 | 0.8 |
| Up to 1024 | 1.5 | 1.5 |
| Feature | Average Rating (1-5) |
| Ease of Use | 4.6 |
| Real-time Data Visualization | 4.7 |
| Interface Responsiveness | 4.5 |
| Customization Options | 4.6 |

Funding
Institutional Review Board Statement
Informed Consent Statement
Ethical approval
Acknowledgments
Conflicts of Interest
Abbreviations
- AI: Artificial Intelligence
- IoT: Internet of Things
- SVM: Support Vector Machine
- AES: Advanced Encryption Standard
- ML: Machine Learning
- GUI: Graphical User Interface
- API: Application Programming Interface
- CSV: Comma-Separated Values
- HTTP: Hypertext Transfer Protocol
Appendix A: Hardware and Software Components
A.1 Hardware:
- Raspberry Pi 4 Model B: Utilized as the central processing unit and gateway device.
- Arduino Uno: Used for interfacing with various sensors and actuators.
- ESP8266 and ESP32 WiFi modules: Enabled wireless connectivity and communication between IoT devices.
- Sensors: PIR motion sensors, temperature sensors, humidity sensors.
- Actuators: Relays, servo motors.
A.2 Software:
- TensorFlow 2.4: Deep learning framework for developing and deploying AI models.
- Python 3.8: Programming language used for developing the systems software components.
- OpenCV 4.5: Computer vision library used for image and video processing.
- Arduino IDE 1.8.13: Integrated development environment for programming Arduino boards.
- MQTT (Message Queuing Telemetry Transport): Lightweight publish-subscribe messaging protocol used for communication between IoT devices.
Appendix B: Data Sources
- UCI Machine Learning Repository: Open dataset repository used to obtain sample datasets for anomaly detection and predictive maintenance tasks.
- Kaggle: Online platform for data science and machine learning competitions, providing access to a wide range of publicly available datasets.
Appendix C: System Architecture and Integration
- Raspberry Pi 4: Acted as the central processing unit and gateway device, managing the overall system operations.
- Arduino Uno boards with ESP8266/ESP32 modules: Responsible for sensor data acquisition, local processing, and communication with the Raspberry Pi.
- MQTT broker: Installed on the Raspberry Pi to facilitate publish-subscribe messaging between IoT devices and the central system.
- AI model deployment: Pre-trained machine learning and deep learning models were deployed on the Raspberry Pi for real-time data analysis and decision-making.
- Data processing and analysis: Sensor data was preprocessed, normalized, and fed into the AI models for anomaly detection, predictive maintenance, and security threat identification.
- Web-based user interface: A JavaScript-based web dashboard was developed using Flask to provide a centralized interface for monitoring, configuration, and remote control.
Appendix D: System Evaluation Metrics
- Precision: Measured the accuracy of the AI models in correctly identifying anomalies, predictive maintenance issues, and security threats.
- Response time: Assessed the system’s ability to detect and respond to events in a timely manner.
- Reliability: Evaluated the systems stability and consistency in performing its intended functions.
List of symbols:
| Pproblem | IoT devices’ vulnerability to port scans |
| VIoT | Vulnerability profile of IoT devices |
| Rscan | Resource allocation for conducting port scans |
| x1x2 | Weighting factors representing the relative |
| importance or cost associated with the | |
| vulnerability profile and resource allocation | |
| Vmin | Vulnerability profile of IoT devices within |
| the lower bound | |
| Vmax | Vulnerability profile of IoT devices within |
| the upper bound | |
| Ssecurity | IoT device security |
| SIEEE802.11ah | IEEE 802.11ah WLAN standard |
| Sportscans | Optimization of IWPS |
| Ri | Scan rate allocated to IoT device i |
| fi | Objective function associated with |
| optimizing security while minimizing | |
| performance degradation for the device i | |
| Rmin | Minimum scan rate |
| Rmax | Maximum scan rate |
| mAS | Action space |
| as | Current state |
| mSA | Action in the current state |
| sn | Next state |
| an | Action in the next state |
| j | Iteration |
| mR | Reward |
| l | Learning rate |
| k | Discounting factor |
| e | Exploration rate |
| qt | Device type |
| qf | Firmware |
| qp | Communication protocol |
| qi | Security incident |
| mSV | State vector |
| mPC | Performance change |
| mSE | Security enhancement |
| mR | Reward |
| |D| | Total number of IoT devices |
| Vi | Vulnerability score of the device i |
| Pi | Device’s performance score considering its |
| network performance impact | |
| a | Weight parameter that balances the |
| relative importance of security and performance | |
| Foptim | Optimization objective function |
| Vinitial | Initial vulnerability of devices |
| Vfinal | Vulnerability after the algorithm’s adaptations |
| PD | Number of successfully delivered packets |
| PTA | Time taken to adapt scan rates |
| PS | Number of security incidents |
| PTS | Total data sent |
| PST | Simulation time |
| PTT | Total packet transmission time |
| PP | Number of packets |
| PT | Time taken to converge |
| WLAN | Wireless local area network |
| IoT | Internet of things |
| IWPS | Internet-wide port scans |
| EAP | Extensible authentication protocol |
| WAC-MAC | WLAN aware cognitive medium access control |
| WSN | Wireless sensor network |
| EASISS | Evolutionary adaptive swarm intelligent sparrow search |
| NEWO | Network efficient whale optimization |
| DPFCWS | Deep particle filtering based cooperative multi-watchdog system |
| BHA | Blackhole attack |
| AODV | Ad hoc on-demand distance-vector |
| MLRP-IBFM | Multipath link routing protocol with an improved Blowfish model |
| RAW | Restricted access window |
| PRSCA | Pseudorandom sequence contention algorithm |
| SDN | Software-defined networking |
| DSM | Dife super singular multiplication |
| LBSS | Lightweight block chain-based security scheme |
| ML | Machine learning |
| PDR | Packet delivery ratio |
| AI | Adaptability index |
| VR | Vulnerability reduction |
| CS | Convergence speed |
| GSM | Global system for mobile communication |
| I2C | Inter-integrated controller |
| LoRaWAN | Long range wide area network |
| ASARL | Adaptive security-aware reinforcement learning |
| SSR | Static SCAN rate |
| RSR | Randomized scan rate |
| TA | Threshold-based approach |
| RA | Reactive algorithm |
| RLA | Reinforcement learning algorithm |
| CNN | Convolutional neural network |
| LSTM | Long short-term memory |
References
- Guizani M, Mohammadi M, Aledhari M, Ayyash M and Al-Fuqaha M 2015 “Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications.,” IEEE, vol. 17, no. 4, pp. 2347-2376, 2015. [CrossRef]
- Mell P and Grance T, “The NIST Definition of Cloud,” National Institute of Standards and Technology, vol. Gaithersburg, MD, USA, NIST Special Publication, no. 800-145, pp. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf.
- Luan L, Huang B, Luo Z and Zhou H 2020 “Applications of Artificial Intelligence in Smart Grid: A Critical Review and Future Trends.,” Energies, vol. 13, no. 5, pp. 1183-120.
- Ordonez C, Villena A J L, Andrade A O and Sherratt R S 2018 “Smart homes for tele-Healthcare and technology assessment: A case study,” Sensors, vol. 18, no. 7, pp. 1-16.
- Sicari S, De Pellegrini F, Chlamtac I and Miorandi D 2012 “Internet of Things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516. [CrossRef]
- Cheng Y, Xu L D, Zhang L, Li B H and Tao F 2014 “CCIoTCMfg: Cloud Computing and Internet of Things-Based Cloud Manufacturing Service System,” EEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1435-1442, 2014.
- Iera A, Morabito G and Atzori L 2010 “The Internet of Things: A Survey,” Computer Networks, vol. 54, no. 15, pp. 2787-2805. [CrossRef]
- Song B, Huh E N and Hassan M M 2010 “A framework of sensor-cloud integration opportunities and challenges.,” Future Generation Computer Systems, vol. 26, no. 2, pp. 155-162. [CrossRef]
- Yeo C S, Venugopal S, Broberg J, Brandic I and Buyya R 2009 “Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility.,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616.
- Cooper D M L, Friesen J and Jurcut A D 2021 “Security considerations for internet of things: a survey,” IEEE Internet of Things Journal, vol. 9, no. 1, pp. 59-81. [CrossRef]
- Abomhara M andKorien G M 2015 “Cyber security and the internet of things: vulnerabilities threats intruders and attacks,” Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65-88.
- Wan J, Zou C, Liu J and Suo H 2012 “Security in the internet of things: a review. Proceedings of 2012 International Conference on Computer Science and Electronics Engineering,” Hangzhou, China, pp. 648-651, March.
- Rizzardi A, Grieco L A, Coen Porisini A and Sicari S 2015 “Security privacy and trust in internet of things: the road ahead,” Computer Networks, vol. 76, pp. 146-164. [CrossRef]
- Wu L, Yin G, Li L, Zhao H and Yang Y 2017 “A survey on security and privacy issues in internet-of-things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250-1258. [CrossRef]
- Alhothaily A, Hu C,Cheng X and Alrawais A 2017 “Fog computing for the internet of things: security and privacy issues,” IEEE Internet Computing, vol. 21, no. 2, pp. 34-42. [CrossRef]
- Zhang X, Wang Y, Peng L and Wei J 2018 “Edge computing: A survey on the hardware aspects,” IEEE Access, vol. 6, pp. 6900-6919.
- Liang F, He X, Hatcher W G, Lu C, Lin J, Yang X and Yu W 2018 “A survey on the edge computing for the Internet of Things,” IEEE Access, vol. 6, pp. 6900-6919. [CrossRef]
- Tiwari P, Zymbler M and Kumar S 2019 “Internet of Things is a revolutionary approach for future technology enhancement: A review.,” Journal of Big Data, vol. 6, no. 1, pp. 1-21. [CrossRef]
- Zhang P, Vasilakos A V and Yan Z 2014, “A survey on trust management for Internet of Things.,” Journal of Network and Computer Applications, vol. 42, p. 120. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).