Big Data Analytics in Fog-Enabled IoT Networks - Towards A Privacy and Security Perspective
Big Data Analytics in Fog-Enabled IoT Networks - Towards A Privacy and Security Perspective
Edited By:
Govind P. Gupta, Rakesh Tripathi,
Brij B. Gupta, and Kwok Tai Chui
First edition published 2023
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487–2742
and by CRC Press
© 2023 selection and editorial matter, Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta, and
Kwok Tai Chui; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all mate-
rial reproduced in this publication and apologize to copyright holders if permission to publish
in this form has not been obtained. If any copyright material has not been acknowledged, please
write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, repro-
duced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now
known or hereafter invented, including photocopying, microfilming, and recording, or in any
information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copy-
right.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978-750-8400. For works that are not available on CCC, please contact
[email protected]
Names: Gupta, Govind P., 1979- editor. | Tripathi, Rakesh, editor. | Gupta, Brij,
1982- editor. | Chui, Kwok Tai, editor.
Title: Big data analytics in fog-enabled IoT networks : towards a privacy and security
perspective / edited by Govind P. Gupta, Rakesh Tripathi, Brij B. Gupta and Kwok Tai Chui.
Description: First edition. | Boca Raton : CRC Press, 2023. | Includes bibliographical
references.
Identifiers: LCCN 2022049027 (print) | LCCN 2022049028 (ebook) |
ISBN 9781032206448 (hardback) | ISBN 9781032206455 (paperback) |
ISBN 9781003264545 (ebook)
Subjects: LCSH: Internet of things--Security measures. | Cloud computing--Security
measures. | Big data. | Deep learning (Machine learning)
Classification: LCC TK5105.8857 .B54 2023 (print) | LCC TK5105.8857 (ebook) |
DDC 005.8--dc23/eng/20230103
LC record available at https://lccn.loc.gov/2022049027
LC ebook record available at https://lccn.loc.gov/2022049028]
DOI: 10.1201/9781003264545
P r e fa c e vii
Contributors xiii
Chapter 1 D e e p L e a r n i n g Te c h n i q u e s i n
B i g D ata - E n a b l e d I n t e r n e t- o f -
Th i n g s D e v i c e s 1
S O U R AV S I N G H , S AC H I N S H A R M A , A N D
SH UCH I BH A DU L A
Chapter 2 I o MT- B a s e d S m a r t H e a lt h M o n i t o r i n g :
Th e F u t u r e o f H e a lt h C a r e 35
I N D R A S H I S M I T R A , YA S H I S R I VA S TAVA ,
K A N A N B A L A R AY, A N D T E J A S W I N I K A R
v
vi C o n t en t s
D e c e n t r a l i z e d E d g e Fr a m e w o r ks 77
M O N I K A S A X E N A , K I R T I PA N D E Y, VA I B H AV
V YA S , A N D C . K . J H A
M a lwa r e D e t e c t i o n 10 3
S A K S H I B H AG WAT A N D G OV I N D P. G U P TA
Chapter 6 A n E n s e m b l e XG B o o s t A pp r o a c h for
t h e D e t e c t i o n o f C y b e r -A t ta c k s in the
I n d u s t r i a l I oT D o m a i n 12 5
R . K . PA R E R I YA , P R I YA N K A V E R M A , A N D
PAT H A N S U H A N A
Chapter 7 A R e v i e w o n I oT f o r t h e A ppl i c at i o n
o f E n e r gy, E n v i r o n m e n t, a n d W a s t e
Chapter 8 A n a ly s i s o f F e at u r e S e l e c t i o n M e t h o d s
f o r A n d r o i d M a lwa r e D e t e c t i o n U s i n g
M a c h i n e L e a r n i n g Te c h n i q u e s 173
S A N T O S H K . S M M A R WA R , G OV I N D P. G U P TA ,
A N D S A N J AY K U M A R
Chapter 9 A n E f f i c i e n t O p t i m i z i n g E n e r gy
C o n s u mp t i o n U s i n g M o d i f i e d
B e e C o l o n y O p t i m i z at i o n i n
F o g a n d I oT N e t w o r k s 197
P O T U N A R AYA N A , C H A N D R A S H E K A R J AT O T H ,
P R E M C H A N D PA R AVATA N E N I , A N D G . R E K H A
Index 213
Preface
vii
viii P refac e
ix
x A b o u t t he Ed it o rs
Dr. Kwok Tai Chui r eceived the Bachelor’s degree in electronic and
communication engineering with a business intelligence minor, and
Ph.D. in electronic engineering from City University of Hong Kong.
He had industry experience as a senior data scientist in an Internet of
Things (IoT) company. He is with the Department of Technology,
School of Science and Technology, at Hong Kong Metropolitan
University as an assistant professor. He has more than 90 research
publications including edited books, book chapters, journal papers,
and conference papers. He has served in various editorial posi-
tions in ESCI/SCIE-listed journals including managing editor of
International Journal on Semantic Web and Information Systems, topic
editor of Sensors, and associate editor of International Journal of Energy
Optimization and Engineering. His research interests include compu-
tational intelligence, data science, energy monitoring and manage-
ment, intelligent transportation, smart metering, healthcare, machine
learning algorithms, and optimization.
Contributors
x iii
xiv C o n t ribu t o rs
Pathan Suhana
Maulana Azad National
Institute of Technology
Bhopal, Madhya Pradesh, India
1
D eep L e arnin g Techni ques
in B i g D ata -E nabled
I nterne t- of -Thin g s D e v i ces
S O U R AV S I N G H , S AC H I N S H A R M A , A N D
SHUCHI BH A DUL A
Department of Computer Science & Engineering, Graphic Era
(Deemed to be University), Dehradun, Uttarakhand, India
Contents
1.1 Introduction 2
1.2 Literature Review 3
1.2.1 Motivation and Contributions 6
1.3 Overview of Big Data-Enabled IoT Devices 6
1.4 New Technologies for Big Data-Enabled IoT Devices 9
1.4.1 DL Models for IoT Big Data Analytics 9
1.4.2 DL Frameworks for IoT-DL Development 12
1.4.3 Supportive Techniques/Technologies for
IoT-DL Integration 13
1.4.4 Fog and Cloud Architectures for
DL-Computing on IoT Big Data 15
1.4.5 Some Commercial Products for Development and
Quick Prototyping of DL-IoT Analytics Projects 16
1.4.6 Some Datasets for Easy DL-IoT Integration 17
1.4.7 The Importance of DL Techniques for
Big Data-Enabled IoT Devices 17
1.4.8 Importance of DL Techniques in Real-Time IoT 20
1.4.8.1 Implementation Issues of DL Techniques
in Real-Time IoT 20
1.4.8.2 Challenges in Implementing DL
Techniques in Real-Time IoT Networks 21
1.4.8.3 Future Considerations for Real-Time
IoT-DL Integration 22
DOI: 10.1201/9781003264545-1 1
2 S O UR AV SIN G H E T A L .
1.1 Introduction
Figure 1.1 “Google Trend” showing the increase in the popularity of Internet of Things and deep
learning in recent years.
Our survey focused on the recent innovations in the field of IoT using
DL techniques by different researchers. This helps us in building an
understanding of various DL techniques that can integrate with IoT.
Here, we have discussed the contributions of different authors, with
DL techniques or DL tools utilized in smart systems. We also high-
light the various outcomes from different studies done by different
independent groups of researchers for DL-IoT integration. This may
4 S O UR AV SIN G H E T A L .
Our idea for this chapter is based on summarizing the key DL tech-
niques under the IoT domain, which can be utilized by researchers,
firms, and independent developers who want to work on DL-IoT
integration. Also, this may be helpful in exploring the universe of IoT
big data analytics. The key contributions of this chapter are as follows:
• We summarize and compare some recent work and develop
an understanding for state-of-the-art techniques.
• We present the overview of big data-enabled IoT devices and
discuss the “10 V” features (discussed next) of IoT big data.
• We highlight and briefly discuss some DL models for IoT big
data analytics.
• We summarize some frameworks for IoT-DL development.
• We also summarize some “supportive” techniques for IoT-DL
integration.
• We briefly discuss Fog-Cloud architecture.
• We also list some commercial products and development
boards for the development and quick prototyping of IoT-DL
projects.
• We discuss the importance of DL techniques for big data-
enabled IoT devices.
• We also briefly discuss the importance of DL in real-time
IoT.
• We point out some impacts, challenges, and applications of
DL-IoT integration.
• Lastly, we compare and analyse the key facts found in this
survey.
data analytics can be useful for creating value for a company and its
stakeholders.
The IoT generates data by sensing the environment with the help of
various sensors integrated with different devices. These sensors were
designed to generate different formats and types of data. IoT big data
naturally has some characteristics associated with it. Understanding
these characteristics would be useful in understanding IoT big data
and IoT-DL integration. There are several researchers who have pre-
viously defined and described these characteristics very beautifully
[18]–[20]. Figure 1.2 shows the “10 V” features of IoT-big data, how-
ever, here, we consider the most commonly known “10 V” features:
• Velocity: This feature points toward the rate of IoT data genera-
tion. Also, in a new data-driven world scenario, this also refers to
the need of fast processing with respect to the data production.
8 S O UR AV SIN G H E T A L .
A deep neural network (DNN) starts from the input layer, then sev-
eral “hidden layers” are present and then last is the output layer. Each
layer consists of basic computing units, popularly known as neurons,
which receive inputs and perform a basic weighted summation. This
sums then goes through an activation function, which, finally, pro-
duces the output. A bias is also associated with each unit with vector
of weight to input size.
Training is done through the process of assigning random weights
to input data, which then is further passed to the next layer. Each other
layer also does the same, providing their output to the next layer as
input. At the last layer, the final output is considered. An “error rate”
is flowed and propagated back to the initial input layer from across the
neural network. The network repeats this cyclic process until the error
rate comes under and below a value of desire or below a certain thresh-
old. Figure 1.3 provides a visualization of DL models. Each basic DL
model useful for IoT big data analytics is discussed below [21]–[23]:
1. Convolutional neural network (CNN): A variety of DNN
that can accept image data as input and assign biases with
weights to a variety of objects in that particular image [24].
A CNN can also distinctly identify various objects in that
image. The pre-processing and complexity is much lower or
10 S O UR AV SIN G H E T A L .
1.4.4 Fog and Cloud Architectures for DL-Computing on IoT Big Data
18
DATASET NATURE OF DATA SIZE WEB LINK
MNIST Handwritten digits Size: 50 MB http://yann.lecun.com/exdb/mnist/
Microsoft COCO 250,000 people with key points 328K https://cocodataset.org/#home
Size: 25 GB
ImageNet Images according to worldNet hierarchy Size: 150 GB https://www.image-net.org/
Open Images Dataset 9,011,219 images with more than 5k labels Size: 500 GB https://opensource.google/projects/open-images-dataset
VisualQA Containing open-ended questions about images Size: 25 GB https://visualqa.org/
S O UR AV SIN G H E T A L .
Street View House Numbers 630,420 images in 10 classes Size: 2.5 GB http://ufldl.stanford.edu/housenumbers/
CIFAR-10 60,000 images in 10 classes Size: 170 MB https://www.cs.toronto.edu/~kriz/cifar.html
Fashion-MNIST Fashion products Size: 30 MB https://github.com/zalandoresearch/fashion-mnist
IMDB reviews 25,000 highly polar movie reviews for training Size: 80 MB https://www.kaggle.com/lakshmi25npathi/
and 25,000 for testing imdb-dataset-of-50k-movie-reviews
20 Newsgroups 20,000 messages taken from 20 newsgroups Size: 2 MB https://scikit-learn.org/0.19/datasets/twenty_newsgroups.html
Sentiment140 160,000 tweets Size: 80 MB http://help.sentiment140.com/for-students/
WordNet 117,000 synsets are linked to other synsets by a Size: 10 MB https://wordnet.princeton.edu/
small number of conceptual relations
Yelp Reviews 5,200,000 reviews, 174,000 business attributes, 2.66 GB JSON, 2.9 GB https://www.yelp.com/
200,000 pictures, and 11 metropolitan areas SQL, and 7.5 GB
photos
The Wikipedia Corpus 4,400,000 articles containing 1.9 billion words Size: 20 MB https://www.english-corpora.org/wiki/
The Blog Authorship 681,288 posts with over 140 million words Size: 300 MB https://cs.biu.ac.il/
Corpus
(Continued)
Table 1.4 Some DataSets for DL-IoT Integration (Continued)
DATASET NATURE OF DATA SIZE WEB LINK
Machine Translations of 30,000,000 sentences and their translations Size: 15 GB http://statmt.org/wmt18/index.html
Various Languages
Free open-digit dataset 1,500 audio samples Size: 10 MB https://github.com/Jakobovski/free-spoken-digit-dataset
Free Music Archive 100,000 tracks 1000 GB https://github.com/mdeff/fma
Ballroom 700 audio samples Size: 14 GB http://mtg.upf.edu/ismir2004/contest/tempoContest/node5.
D EE P L E A RNIN G T EC HNI Q UE S
html
Million Song Dataset Songs 280 GB https://labrosa.ee.columbia.edu/millionsong/
19
20 S O UR AV SIN G H E T A L .
IoT big data analysis [54]. Next, we point out some advantages of DL
techniques for big data-enabled IoT devices:
• DL analytics techniques are capable of extracting useful
information, new facts, and new patterns from huge IoT big
data.
• IoT data have their own characteristics, such as every IoT
device and sensor being capable of generating highly hetero-
geneous data in huge amounts. DL techniques are useful in
handling such analytics issues.
• It improves quality of IoT service in general, as DL analytics
help IoT to perform such tasks that were not possible before
due to the lack of analytics techniques for IoT big data.
• It also helps businesses grow more significantly, as it provides
new insights into their interest through IoT big data.
• DL techniques combined with IoT can solve issues regard-
ing highly noisy data produced by different sensors in a harsh
environment.
• DL techniques can give new abilities to IoT devices, making
real-time decisions efficiently.
• IoT can generate streams of data continuously and for over a
highly extended period of time. It is not possible for a human
to analyze such big data by traditional techniques, therefore,
DL techniques can be very effective in solving this issue.
1.4.8.2
Challenges in Implementing DL Techniques in Real-Time
IoT Networks
1.4.9.1 Impact
1.4.9.2 Challenges
1.4.9.3 Applications
In this research, we reviewed the techniques like IoT, DL, and IoT
big data analytics. We observed a huge trend in DL analytics and
IoT big data. Figure 1.6 shows recent trends in IoT big data analytics
and DL, among researchers. Tables 1.5 and 1.6 give a summary and
comparison of the extracted features from our survey about various
techniques of DL-IoT integration.
In the work Khan et al. [69], the authors use CNN to solve the
challenges of segmentation of a brain tumour, which usually shows
Figure 1.6 Number of results displayed on Google Scholar from 2010 to 2021 for “IoT big data
analytics and DL” keywords.
D EE P L E A RNIN G T EC HNI Q UE S 25
1.6 Conclusion
IoT and big data are in high demand, as are DL analytics methodolo-
gies. This IoT-DL connection has a long way to go from here. With
the help of new research in accordance with the integration of the
IoT domain with DL techniques, we may achieve tremendous devel-
opment in the respective domains, which will certainly improve the
quality of life of future and present generations. To develop a knowl-
edge of state-of-the-art techniques, we conducted an exhaustive
assessment of previous publications on DL approaches in the IoT sec-
tor in this chapter. We then discussed the “10 Vs” of IoT big data and
several new DL approaches for IoT-DL integration, such as CNN,
RNN, LSTM, and GAN. We have included a list of various key DL
frameworks that can be used in the IoT arena. Following that, we
reviewed some supporting technologies such as tinymotes, edge tech-
nology, 5G, etc. Then, we briefly mentioned fog architecture. For rapid
IoT-DL prototyping, we also mentioned several development boards,
commercial devices, and online datasets. Under real-time IoT, we also
explored DL implementation concerns, obstacles, and future consid-
erations. Finally, we conducted a comparison analysis of the various
data and facts we discovered during our literature review. According to
the findings, IoT-DL integration is becoming a much-needed trend in
smart settings, leading to a technology-driven future. The security and
privacy concerns with DL-IoT devices must be addressed in the future.
Blockchain, for example, must be evaluated and implemented. To com-
bat software vulnerabilities, some hardware-based security solutions
should also be created. For IoT networks, an intrusion-detection system
with firewalls and authentication must be developed. These types of
measures are required for future IoT-DL deployments in the real world.
References
1. Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A.
(2021). Big data and IoT-based applications in smart environments: A
systematic review. Computer Science Review, 39, 100318.
28 S O UR AV SIN G H E T A L .
2. Xu, T., Fu, Z., Yu, M., Wang, J., Liu, H., & Qiu, T. (2021, May).
Blockchain Based Data Protection Framework for IoT in Untrusted
Storage. In 2021 IEEE 24th International Conference on Computer
Supported Cooperative Work in Design (CSCWD) (pp. 813–818). IEEE.
3. Serrano, W. (2021). The blockchain random neural network for cyber-
secure IoT and 5G infrastructure in smart cities. Journal of Network and
Computer Applications, 175, 102909.
4. Anbarasan, M., Muthu, B., Sivaparthipan, C. B., Sundarasekar, R.,
Kadry, S., Krishnamoorthy, S., & Dasel, A. A. (2020). Detection of
flood disaster system based on IoT, big data and convolutional deep neu-
ral network. Computer Communications, 150, 150–157.
5. Shah, S. K., Tariq, Z., & Lee, Y. (2019, December). IoT Based Urban
Noise Monitoring in Deep Learning Using Historical Reports. In 2019
IEEE International Conference on Big Data (Big Data) (pp. 4179–4184).
IEEE.
6. Tariq, Z., Shah, S. K., & Lee, Y. (2019, December). Speech Emotion
Detection Using IoT Based Deep Learning for Health Care. In 2019
IEEE International Conference on Big Data (Big Data) (pp. 4191–4196).
IEEE.
7. Fang, W., Guo, Y., Liao, W., Ramani, K., & Huang, S. (2020). Big data
driven jobs remaining time prediction in discrete manufacturing sys-
tem: A deep learning-based approach. International Journal of Production
Research, 58(9), 2751–2766.
8. Muthu, B., Sivaparthipan, C. B., Manogaran, G., Sundarasekar, R.,
Kadry, S., Shanthini, A., & Dasel, A. (2020). IOT based wearable sen-
sor for diseases prediction and symptom analysis in healthcare sector.
Peer-to-Peer Networking and Applications, 13(6), 2123–2134.
9. Rajan Jeyaraj, P., & Nadar, E. R. S. (2019). Smart-monitor: Patient
monitoring system for IoT-based healthcare system using deep learning.
IETE Journal of Research, 68(2), 1435–1442.
10. Hossain, M. S., & Muhammad, G. (2019). Emotion recognition
using deep learning approach from audio–visual emotional big data.
Information Fusion, 49, 69–78.
11. Yao, C., Wu, S., Liu, Z., & Li, P. (2019). A deep learning model for
predicting chemical composition of gallstones with big data in medical
Internet of Things. Future Generation Computer Systems, 94, 140–147.
12. Chowdury, M. S. U., Emran, T. B., Ghosh, S., Pathak, A., Alam, M.
M., Absar, N., … Hossain, M. S. (2019). IoT based real-time river water
quality monitoring system. Procedia Computer Science, 155, 161–168.
13. Ali, M., Anjum, A., Yaseen, M. U., Zamani, A. R., Balouek-Thomert,
D., Rana, O., & Parashar, M. (2018, May). Edge Enhanced Deep
Learning System for Large-Scale Video Stream Analytics. In 2018
IEEE 2nd International Conference on Fog and Edge Computing (ICFEC)
(pp. 1–10). IEEE.
14. Chauhan, D., Kumar, A., Bedi, P., Athavale, V. A., Veeraiah, D., &
Pratap, B. R. (2021). An effective face recognition system based on Cloud
based IoT with a deep learning model. Microprocessors and Microsystems,
81, 103726.
D EE P L E A RNIN G T EC HNI Q UE S 29
15. Zhou, X., Liang, W., Kevin, I., Wang, K., Wang, H., Yang, L. T., &
Jin, Q. (2020). Deep-learning-enhanced human activity recognition
for Internet of healthcare things. IEEE Internet of Things Journal, 7(7),
6429–6438.
16. Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A. Y., & Ranjan,
R. (2019). A hybrid deep learning-based model for anomaly detection in
cloud datacenter networks. IEEE Transactions on Network and Service
Management, 16(3), 924–935.
17. Ciampi, F., Demi, S., Magrini, A., Marzi, G., & Papa, A. (2021).
Exploring the impact of big data analytics capabilities on business model
innovation: The mediating role of entrepreneurial orientation. Journal of
Business Research, 123, 1–13.
18. Rathore, M. M., Shah, S. A., Shukla, D., Bentafat, E., & Bakiras, S.
(2021). The role of AI, machine learning, and big data in digital twin-
ning: A systematic literature review, challenges, and opportunities.
IEEE Access, 9, 32030–32052.
19. Rehman, A., Naz, S., & Razzak, I. (2021). Leveraging big data analyt-
ics in healthcare enhancement: Trends, challenges and opportunities.
Multimedia Systems, 28(4), 1339–1371.
20. Biermann, O., Koya, S. F., Corkish, C., Abdalla, S. M., & Galea, S.
(2021). Food, big data, and decision-making: A scoping review—The
3-D commission. Journal of Urban Health, 98(1), 69–78.
21. Minaee, S., Boykov, Y. Y., Porikli, F., Plaza, A. J., Kehtarnavaz, N., &
Terzopoulos, D. (2021). Image segmentation using deep learning: A sur-
vey. IEEE Transactions on Pattern Analysis and Machine Intelligence,
44(7), 3523–3542.
22. Ye, M., Shen, J., Lin, G., Xiang, T., Shao, L., & Hoi, S. C. (2021).
Deep learning for person re-identification: A survey and outlook.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(6),
2872–2893.
23. Wang, W., Lai, Q., Fu, H., Shen, J., Ling, H., & Yang, R. (2021).
Salient object detection in the deep learning era: An in-depth survey.
IEEE Transactions on Pattern Analysis and Machine Intelligence, 44(6),
3239–3259.
24. Albawi, S., Mohammed, T. A., & Al-Zawi, S. (2017, August).
Understanding of a Convolutional Neural Network. In 2017 International
Conference on Engineering and Technology (ICET) (pp. 1–6). IEEE.
25. Yin, C., Zhu, Y., Fei, J., & He, X. (2017). A deep learning approach
for intrusion detection using recurrent neural networks. IEEE Access, 5,
21954–21961.
26. Le, X. H., Ho, H. V., Lee, G., & Jung, S. (2019). Application of long
short-term memory (LSTM) neural network for flood forecasting.
Water, 11(7), 1387.
27. Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta,
B., & Bharath, A. A. (2018). Generative adversarial networks: An over-
view. IEEE Signal Processing Magazine, 35(1), 53–65.
28. Wang, G., Qiao, J., Bi, J., Jia, Q. S., & Zhou, M. (2019). An adap-
tive deep belief network with sparse restricted Boltzmann machines.
30 S O UR AV SIN G H E T A L .
41. Tung, F., & Mori, G. (2018). Deep neural network compression by in-
parallel pruning-quantization. IEEE Transactions on Pattern Analysis
and Machine Intelligence, 42(3), 568–579.
42. Song, L., Chen, F., Zhuo, Y., Qian, X., Li, H., & Chen, Y. (2020,
February). Accpar: Tensor Partitioning for Heterogeneous Deep
Learning Accelerators. In 2020 IEEE International Symposium on High
Performance Computer Architecture (HPCA) (pp. 342–355). IEEE.
43. Liu, W., Lombardi, F., & Schulte, M. (2020). Approximate comput-
ing: From circuits to applications. Proceedings of the IEEE, 108(12),
2103–2107.
44. Bang, S., Wang, J., Li, Z., Gao, C., Kim, Y., Dong, Q., … Sylvester,
D. (2017, February). 14.7 a 288µw Programmable Deep-Learning
Processor with 270kb On-Chip Weight Storage Using Non-Uniform
Memory Hierarchy for Mobile Intelligence. In 2017 IEEE International
Solid-State Circuits Conference (ISSCC) (pp. 250–251). IEEE.
45. Li, H., Ota, K., & Dong, M. (2018). Learning IoT in edge: Deep learn-
ing for the Internet of Things with edge computing. IEEE network,
32(1), 96–101.
46. Wang, D., Chen, D., Song, B., Guizani, N., Yu, X., & Du, X. (2018). From
IoT to 5G I-IoT: The next generation IoT-based intelligent algorithms and
5G technologies. IEEE Communications Magazine, 56(10), 114–120.
47. Hwang, J., Uddin, A. S., & Bae, S. H. (2021). A layer-wise extreme
network compression for super resolution. IEEE Access, 9, 93998–94009.
48. Kong, H., Huai, S., Liu, D., Zhang, L., Chen, H., Zhu, S., … Lewis,
M. A. (2021). EDLAB: A benchmark for edge deep learning accelera-
tors. IEEE Design & Test, 39(3), 8–17.
49. Masadeh, M., Hasan, O., & Tahar, S. (2021). Machine-learning-based
self-tunable design of approximate computing. IEEE Transactions on
Very Large Scale Integration (VLSI) Systems, 29(4), 800–813.
50. Kimovski, D., Ijaz, H., Saurabh, N., & Prodan, R. (2018, May). Adaptive
Nature-Inspired Fog Architecture. In 2018 IEEE 2nd International
Conference on Fog and Edge Computing (ICFEC) (pp. 1–8). IEEE.
51. Plaza, P., Sancristobal, E., Carro, G., Castro, M., & Ruiz, E. (2018).
Wireless Development Boards to Connect the World. In Online
Engineering & Internet of Things (pp. 19–27). Springer, Cham.
52. Hoy, M. B. (2018). Alexa, Siri, Cortana, and more: An introduction to
voice assistants. Medical Reference Services Quarterly, 37(1), 81–88.
53. Tajbakhsh, N., Jeyaseelan, L., Li, Q., Chiang, J. N., Wu, Z., & Ding,
X. (2020). Embracing imperfect datasets: A review of deep learning
solutions for medical image segmentation. Medical Image Analysis, 63,
101693.
54. Coccia, M. (2020). Deep learning technology for improving cancer care
in society: New directions in cancer imaging driven by artificial intel-
ligence. Technology in Society, 60, 101198.
55. Aggarwal, S., & Sharma, S. (2021). Voice Based Deep Learning
Enabled User Interface Design for Smart Home Application System.
2nd International Conference on Communication, Computing & Industry
4.0(C214), 1–6, https://doi.org/10.1109/C2I454156.2021.9689435.
32 S O UR AV SIN G H E T A L .
56. Juyal, A., Sharma, S., & Matta, P. (2021). Deep Learning Methods for
Object Detection in Autonomous Vehicles. In 2021 5th International
Conference on Trends in Electronics and Informatics (ICOEI) (pp. 751–755).
IEEE.
57. Agarwal, V., & Sharma, S. (2021). A Survey of Deep Learning
Techniques to Improve Radio Resource Management in Vehicular
Communication Network. In International Conference on Sustainable
Advanced Computing (ICSAC).
58. Ghildiyal, A, Sharma, S., & Kumar, A. (2021). Street Cleanliness
Monitoring System Using Deep Learning. In 2021 Third International
Conference on Intelligent Communication Technologies and Virtual Mobile
Networks (ICICV) (pp. 868–873). IEEE.
59. Juyal, P., & Sharma, S. (2020). Detecting the Infectious Area Along
with Disease Using Deep Learning in Tomato Plant Leaves. In 2020
3rd International Conference on Intelligent Sustainable Systems (ICISS) (pp.
328–332). IEEE.
60. Juyal, P., & Sharma, S. (2020). Estimation of Tree Volume Using Mask
R-CNN Based Deep Learning. In 2020 11th International Conference
on Computing, Communication and Networking Technologies (ICCCNT)
(pp. 1–6). IEEE.
61. Sharma, S., Ghanshala, K. K., & Mohan, S. (2018). A Security System
Using Deep Learning Approach for Internet of Vehicles (IoV). In
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile
Communication Conference (UEMCON) (pp. 1–5). IEEE.
62. Haghighat, E., & Juanes, R. (2021). Sciann: A keras/tensorflow wrapper
for scientific computations and physics-informed deep learning using
artificial neural networks. Computer Methods in Applied Mechanics and
Engineering, 373, 113552.
63. Ashraf, M., Ahmad, S. M., Ganai, N. A., Shah, R. A., Zaman, M.,
Khan, S. A., & Shah, A. A. (2021). Prediction of Cardiovascular Disease
Through Cutting-Edge Deep Learning Technologies: An Empirical
Study Based on TensorFlow, Pytorch and Keras. In International
Conference on Innovative Computing and Communications (pp. 239–255).
Springer, Singapore.
64. Hagargi, P. A. (2021). The Effective Use of Deep Learning Network
with Software Framework for Medical Healthcare. In Techno-Societal
2020 (pp. 225–240). Springer, Cham.
65. Shah, B., & Bhavsar, H. (2021). Overview of Deep Learning in Food Image
Classification for Dietary Assessment System. In Intelligent Systems,
Technologies and Applications (pp. 265–285). Springer, Singapore.
66. Indulkar, Y. (2021, March). PUBG Winner Ranking Prediction
Using R Interface ‘h2o’ Scalable Machine Learning Platform. In 2021
International Conference on Emerging Smart Computing and Informatics
(ESCI) (pp. 300–305). IEEE.
67. Bhargavi, K. (2021). Deep learning architectures and tools: A com-
prehensive survey. Deep Learning Applications and Intelligent Decision
Making in Engineering, 55–75. https://doi.org/10.4018/978-1-7998-
2108-3.ch002.
D EE P L E A RNIN G T EC HNI Q UE S 33
68. Yang, C. T., Liu, J. C., Chan, Y. W., Kristiani, E., & Kuo, C. F. (2021).
Performance benchmarking of deep learning framework on Intel Xeon
Phi. The Journal of Supercomputing, 77(3), 2486–2510.
69. Khan, H., Shah, P. M., Shah, M. A., ul Islam, S., & Rodrigues, J.
J. (2020). Cascading handcrafted features and convolutional neu-
ral network for IoT-enabled brain tumor segmentation. Computer
Communications, 153, 196–207.
70. Gao, C., Braun, S., Kiselev, I., Anumula, J., Delbruck, T., & Liu,
S. C. (2019, May). Real-Time Speech Recognition for IoT Purpose
Using a Delta Recurrent Neural Network Accelerator. In 2019 IEEE
International Symposium on Circuits and Systems (ISCAS) (pp. 1–5).
IEEE.
71. Wang, B., Kong, W., Guan, H., & Xiong, N. N. (2019). Air quality
forecasting based on gated recurrent long short term memory model in
Internet of Things. IEEE Access, 7, 69524–69534.
72. Ferdowsi, A., & Saad, W. (2019, December). Generative Adversarial
Networks for Distributed Intrusion Detection in the Internet of Things.
In 2019 IEEE Global Communications Conference (GLOBECOM)
(pp. 1–6). IEEE.
73. Sun, X., Ma, S., Li, Y., Wang, D., Li, Z., Wang, N., & Gui, G. (2019).
Enhanced echo-state restricted Boltzmann machines for network traffic
prediction. IEEE Internet of Things Journal, 7(2), 1287–1297.
74. Huda, S., Yearwood, J., Hassan, M. M., & Almogren, A. (2018).
Securing the operations in SCADA-IoT platform based industrial
control system using ensemble of deep belief networks. Applied Soft
Computing, 71, 66–77.
75. Kim, D., Yang, H., Chung, M., Cho, S., Kim, H., Kim, M., … Kim,
E. (2018, March). Squeezed Convolutional Variational Autoencoder for
Unsupervised Anomaly Detection in Edge Device Industrial Internet
of Things. In 2018 International Conference on Information and Computer
Technologies (ICICT) (pp. 67–71). IEEE.
2
I o MT-B ased S mart
H e alth M onitorin g
The Future of Health Care
I N D R A S H I S M I T R A , YA S H I S R I VA S TAVA ,
K A N A N B A L A R AY, A N D T E J A S W I N I K A R
School of Electronics Engineering, K IIT Deemed to
be University, Bhubaneswar, Odisha, India
Contents
and lower thresholds for the trunk and thigh, respectively. A decline
would happen if any of the four thresholds were exceeded. The dif-
ficulty with this strategy is that other activities of daily living (ADLs),
such as sitting down quickly and leaping also involve significant ver-
tical acceleration. As a result, relying just on acceleration to identify
falls leads to a high number of false positives [14–16].
It is observed from the literature review that most of the works
include a set of sensors for monitoring health parameters and display-
ing them on a Web page. But that has its own set of challenges, such
as the Web page may not be calibrated for display on any screen size,
like that of laptops and mobile phones. Or the sensors measuring the
parameters might take up a lot of space and lead to a cumbersome,
uncomfortable device that must be worn by the patient. Various fall-
detection technologies have been offered in the past to establish a
dependable monitoring system for senior persons with high accuracy,
sensitivity, and specificity criteria [17]. Table 2.1 shows the description
of the sensors.
Figure 2.2 Overview of the complete algorithm. Flow diagram of metrics monitoring (a); fall
detection flow chart (b).
42 IN D R A SHIS MIT R A E T A L .
2.3.5 IoT–Dashboard
Dashboards are a means to visualize data, giving all users the abil-
ity to understand the analytics essential for their business or project.
Generic users can use this to participate in and understand the ana-
lytics through data compilation and see trends. The plan is to make a
Figure 2.3 Notifications from MPU6050 via IFTTT integration displayed on a cellphone.
I o M T- BA SED SM A R T HE A LT H M O NIT O RIN G 43
Clock: Can display the present time in the local time zone or in
UTC. It is convenient when processes are being monitored in
real time.
Dashboard Tab: An extra page that helps to simplify navigation
between interlinked consoles and helps to arrange the data
visualization. Each tab might have varying widgets and data
sources, but all the tabs have the same configuration settings
(widget border-radius, column index, etc.). There is also the
benefit of keeping all unused tabs open so that no real-time
data are lost when switching tabs.
2.3.6 IoT–Blynk
The parameters that are being monitored by the different sensors are
visualized remotely on smartphones via the Blynk app, which has a
back-end server that provides data on request and is supported by a
wide array of libraries integrating various features, such as different
connections, no laptop needed, etc. The entire organization of the
Blynk app is demonstrated in Figure 2.6. Thus, a quality GUI experi-
ence can be provided to the customers, i.e., the relatives and family
members of the patient. By using the Blynk app, anyone who has been
given the QR code can download the app, which will contain the
required project for metrics monitoring. This approach will reduce the
amount of panic within family members and will provide a suitable
environment and time duration for the best possible outcome.
Blynk helps to plot the graphical representation of data that will
be given by the sensors that are being used. It uses a virtual pin con-
cept through which data can be pushed from the Node MCU to the
Blynk mobile app widgets. The data can also travel from the widgets
to the Node MCU via the ESP8266 Wi-Fi module present. Blynk
Inc.’s Virtual Pin is a feature that facilitates data exchange between
hardware and the Blynk mobile app. Sample layout illustrations of the
Blynk app are shown in Figures 2.7a and b.
Figures 2.7 Sample Blynk app layout illustrations (a) and (b).
I o M T- BA SED SM A R T HE A LT H M O NIT O RIN G 47
2.4 Conclusions
people healthy and safe, while bearing costs in mind. The IoMT is
an amalgamation of applications and medical devices that connect
Medicare IT systems via different network technologies. The technol-
ogy can reduce needless hospital visits along with decreasing the load
on the healthcare sector by connecting patients and physicians. The
suggested project is reasonable and is market-based. With easily avail-
able, secure data at their fingertips, it is possible for the healthcare
sector to take huge strides toward progress and development for the
betterment of humanity. Thus, it can be deduced that this will have a
huge impact on the available healthcare scene.
References
[1]. J. Höller, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand and D. Boyle,
From Machine-to-Machine to the Internet of Things: Introduction to a
New Age of Intelligence, Amsterdam, The Netherlands: Elsevier, 2014.
[2]. G. Kortuem, F. Kawsar, D. Fitton and V. Sundramoorthy, “Smart
objects as building blocks for the Internet of Things”, IEEE Internet
Computing., vol. 14, pp. 44–51, Jan./Feb. 2010.
[3]. K. Romer, B. Ostermaier, F. Mattern, M. Fahrmair and W. Kellerer,
“Real-time search for real-world entities: A survey”, Proceedings of the
IEEE, vol. 98, no. 11, pp. 1887–1902, Nov. 2010.
[4]. D. Guinard, V. Trifa and E. Wilde, “A resource oriented architecture
for the Web of Things”, Proceedings of the Internet Things (IOT), pp. 1–8,
2010, https://doi.org/10.1109/IOT.2010.5678452.ookref>
[5]. Md. M. Islam, A. Rahaman and Md. R. Islam, Development of Smart
Healthcare Monitoring System in IoT Environment, Springer Nature
Singapore Pte Ltd. https://doi.org/10.1007/s42979-020-00195-y.
[6]. N. Deepak, C. H. Rajendra Prasad and S. Sanjay Kumar, “Patient health
monitoring using IOT”, International Journal of Innovative Technology
and Exploring Engineering, vol. 8, 454–457, 2018.
[7]. V. Tamilselvi, S. Sribalaji, P. Vigneshwaran, P. Vinu and J. Geetharamani,
IoT based health monitoring system. In: 2020 6th International confer-
ence on advanced computing and communication systems (ICACCS), IEEE,
pp. 386–9, 2020.
[8]. S. Trivedi and A. N. Cheeran, Android based health parameter moni-
toring. In: 2017 International conference on intelligent computing and con-
trol systems (ICICCS), IEEE, pp. 1145–9, 2017.
[9]. A. D. Acharya and S. N. Patil, IoT based health care monitoring kit. In:
2020 Fourth international conference on computing methodologies and com-
munication (ICCMC), IEEE, pp. 363–8, 2020.
[10]. A. K. Bourke, J. V. O’Brien and G. M. Lyons, “Evaluation of a thresh-
old-based tri-axial accelerometer fall detection algorithm”, Gait and
Posture, vol. 26, pp. 194–199, 2007.
I o M T- BA SED SM A R T HE A LT H M O NIT O RIN G 49
P R A B H AT K U M A R , G OV I N D P. G U P TA ,
A N D R A K E S H T R I PAT H I
Department of Information Technology, National
Institute of Technology Raipur, Chhattisgarh, India
Contents
3.1 Introduction 51
3.2 Categorization of IoT Threats 54
3.2.1 Physical Attacks 54
3.2.2 Cyber Attacks 56
3.3 Security Mechanisms in IoT-enabled Networks 57
3.3.1 Intrusion Detection System 57
3.3.2 Cyber Threat Intelligence 59
3.4 Literature Review 61
3.4.1 Intrusion Detection System for Safeguarding IoT 61
3.4.2 Cyber Threat Intelligence for Securing IoT 64
3.5 Challenges and Research Directions 67
3.6 Conclusion 70
References 70
3.1 Introduction
The rapid growth of the Internet and proliferation of low-cost and low
energy-consuming sensors are responsible for the emergence of the
Internet of Things (IoT) [1]. The IoT is a concept invented by British
DOI: 10.1201/9781003264545-3 51
52 P R A BH AT KUM A R E T A L .
The IoT market has grown rapidly over the last decade, with the
total economic potential exceeding $120 billion in 2016 and poten-
tially reaching $6.2 trillion by 2027. As anticipated by Cisco and
Ericsson in 2020, the IoT forms a vision of the future Internet that
leverages the sensing and processing capabilities of multiple objects
to improve human-environment interaction [3]. The IoT paradigm
is recognized as a key enabling technology in realizing smart envi-
ronments. The goal of such pervasive computing is to make human
existence more valued and productive by addressing issues related
to living conditions [4]. The Padova Smart City in Italy is a fantastic
example of an IoT system [5, 6]. A few examples of IoT applications
such as smart home, smart city, smart grids, smart farming, and smart
healthcare, etc., are shown in Figure 3.1.
As illustrated in Figure 3.2, a typical IoT system consists of three
fundamental elements, a set of front-end devices that can detect, com-
pute, and transmit; a back-end storage and processing unit that can
give insights and intelligence; and a communication infrastructure
that links front-end sensors to back-end servers [7]. In IoT applica-
tions, front-end equipment performs a range of tasks and is adapted to
a specific purpose. These devices are resource-constrained and include
sensors, actuators, microprocessors with limited storage, computing,
communication, and even energy capacity for those powered by bat-
teries [8, 9]. The back-end servers, on the other hand, are significantly
more powerful. Many services have been deployed in the cloud as a
result of the rapid growth of cloud computing to take advantage of
the inexpensive and easily accessible storage and computing capabili-
ties [10]. The major cloud vendors, such as Amazon Web Services and
A RE V IE W O N IN T RUSI O N D E T EC TI O N SYS T EM S 53
Microsoft Azure, offer an IoT suite to help clients gather and transfer
data to the cloud, make it simple to load and analyze that data, and
expedite IoT development. Finally, the communication infrastruc-
ture connects front-end devices to back-end servers and each other
via wired and wireless networks such as Wi-Fi, LTE, Bluetooth,
medical data. This model used fuzzy C-means clustering (FCM) and
support vector machines (SVM) at the first level and a CloudSec com-
ponent at the second level to ensure data integrity. The model based
on SVM achieved effective results. However, the proposed approach
lacked implementation details.
Kaur et al. [45], used ML techniques to design a four-layer hybrid
architecture for a secure healthcare system. This method allowed the
integration and analysis of unstructured information, which can aid
patients in receiving better treatment and healthcare professionals in
making informed decisions. The proposed strategy, however, lacked
implementation details.
For remote healthcare systems, Begli et al. [46], developed an IDS.
SVM was used in this approach to prevent User to Root (U2R) and
DoS attacks. The proposed framework was tested on the NSL-KDD
dataset and reported a 95.01% DR. However, the proposed IDS was
tested using an out-of-date dataset that did not include any IoT net-
work traffic or telemetry data.
Newaz et al. [47], designed a security framework named
HealthGuard for healthcare data. To differentiate between nor-
mal and abnormal instances, this model calculates the change in a
patient’s physiological function. In addition, ML techniques such
as artificial neural network (ANN), decision tree (DT), k-Nearest
Neighbour (k-NN) and Random Forest (RF) were employed. The
model outperforms using DT by 93% accuracy. However, one of the
important evaluation metrics, i.e., FAR, was not considered in this
experiment.
He et al. [48], presented an IDS for healthcare networks. For fea-
ture selection, the proposed model employed the stacked autoencoder.
The methods k-NN, naive Bayes (NB), XGBoost and SVM were used
to identify intrusive actions. The detection system with XGBoost
surpassed the competition and obtained 97.83% accuracy. However,
instead focusing on security, this strategy mainly concentrated on
performance issues. Almiani et al. [49], presented an intelligent IDS
for fog computing security based on multi-layered recurrent neural
networks. The traffic processing engine and the recurrent ANN clas-
sification engine were the two phases of this model. To effectively
classify normal and abnormal occurrences, an adaptive variant of the
back-propagation method was utilized for training. The suggested
A RE V IE W O N IN T RUSI O N D E T EC TI O N SYS T EM S 63
Various research for threat hunting and intelligence has been under-
taken in recent years. The most fundamental criteria for any cyber
threat protection and warning system should certainly include CTI
modelling and threat type identification for a network. Artificial
intelligence (AI)-based CTI models has received substantial atten-
tion from industry and academics due to its efficient power to under-
stand large-scale data and combat undetected threat occurrences. This
review makes use of multiple current research topics based on ML
and DL-based CTI solutions.
For instance, Koloveas et al. [55] proposed a ML-based framework
named “intime” that enabled a security team to find, gather, analyze,
and share CTI from various popular social networks such as trusted
structured sources (e.g., known security databases), clear/deep/dark
forums, Web sites and popular social networks, marketplaces, or
other data store types (e.g., pastebins). However, this model used
a traditional ML approach and achieved low overall accuracy, i.e.,
87.51%. In Ref. [56], the authors used doc2vec, a neural network-based
threat extraction tool and MLP model to detect threats from the dark
Web social network. In the proposed model, datasets were collected
using a Web crawler and then manually categorized into critical posts
and non-critical posts. The MLP-based CTI obtained very low 79.4%
overall accuracy on unseen data.
Atluri et al. [57], designed a ML-based CTI framework for an
industrial control system (ICS) using a bagging decision trees (BDT)
model and achieved 94.24% accuracy and outperformed other tra-
ditional ML approaches. However, this model did not discuss the
technique used for feature extraction or the steps used in data pre-
processing. Sentuna et al. [58], designed an enhanced posterior
probability-based naive Bayes (ENBPP) technique. This approach
combined the posterior probability function of naive Bayes with a
modified risk assessment function to optimize the threat prediction
A RE V IE W O N IN T RUSI O N D E T EC TI O N SYS T EM S 65
P R A BH AT KUM A R E T A L .
Kaur et al. [45] Healthcare ML NA × × × ✓
Begli et al. [46] Healthcare SVM NSL-KDD × × × ×
Newaz et al. [47] Healthcare DT NA × × × ×
He et al. [48] Healthcare XGBoost NA ✓ × × ×
Almiani et al. [49] IoT ANN NSL-KDD ✓ × × ✓
Kumar et al. [50] IoT UIDS NA ✓ × × ✓
Pajouh et al. [51] IoT TDTC NSL-KDD ✓ ✓ × ×
Khan et al. [52] NIDS TSDL KDD99 ✓ ✓ × ×
Alrashdi et al. [53] IoT EOS-ELM NSL-KDD ✓ × × ✓
Swarna et al. [54] IoMT DNN NSL-KDD ✓ × × ×
Note: Terms and abbreviations: NA denotes that there is no information available; MLP: Multi-layer perceptron; SVM: Support vector machines; FCM: Fuzzy C-means clustering;
DT: Decision tree; ANN: Artificial neural network; UIDS: Unified IDS; TSDL: Two-stage deep learning; EOS-ELM: Ensemble of online sequential extreme learning machine;
DNN: Deep neural network.
Table 3.2 Summary of Investigated Methods to Design CTI
THREAT ATTACK-TYPE DEPLOYMENT
AUTHORS AREA APPROACH DATASET AUTOMATIC ANALYSIS DETECTION IDENTIFICATION SOLUTION
A RE V IE W O N IN T RUSI O N D E T EC TI O N SYS T EM S
Koloveas et al. [55] IoT RF SEDD × ✓ × ×
Kadoguchi et al. [56] Online forum MLP DARK WEB × ✓ × ×
Atluri et al. [57] IIoT BDT ICS × ✓ × ×
Sentuna et al. [58] CTI ENBPP NSL-KDD, CICIDS-2017 × ✓ × ✓
Usman et al. [59] IoT DT NA × ✓ × ✓
Deliu et al. [35] Online forum SVM NA ✓ ✓ × ×
Zhou et al. [37] Online forum EBN XSS Payloads × ✓ × ×
Noor et al. [40] CTI TTD ATT&CK × ✓ ✓ ×
Alsaedi et al. [60] IIoT CART ToN-IoT × ✓ × ×
HaddadPajouh et al. [61] IoT AI4SAFE-IoT NA × × × ✓
Noor et al. [62] CTI ARM ATT&CK × ✓ × ×
Naik et al. [63] CTI FCM NA ✓ ✓ × ×
Moustafa et al. [64] IIoT HMM UNSW-NB15 × ✓ ✓ ✓
Ebrahimi et al. [65] Online forum LSTM DNM ✓ ✓ × ×
Husari et al. [66] CTI ActionMiner NA × ✓ × ×
Al-Hawawreh et al. [36] IoT GRNN ToN-IoT ✓ ✓ ✓ ×
Note: Terms and abbreviations: NA denotes that there is no information available; RF: Random forest; SEDD: Stack exchange data dump; MLP: Multi-layer perceptron; IIoT:
Industrial Internet of Things; BDT: Bagging decision trees; ICS: Industrial control system; CTI: Cyber threat intelligence; ENBPP: Enhanced posterior probability-based
naive Bayes; DT: Decision tree; SVM: Support vector machines; EBN: Ensemble Bayesian networks; TTD: ThreatTTP-Detection; CART: Classification and regression trees;
ARM: Association rule mining; FCM: Fuzzy C-means; HMM: Hidden Markov models; LSTM: Long short-term memory; GRNN: Gated recurrent neural network.
69
70 P R A BH AT KUM A R E T A L .
3.6 Conclusion
References
[1] P. Kumar, G. P. Gupta, and R. Tripathi, “An ensemble learning and fog-
cloud architecture-driven cyber-attack detection framework for IoMT
networks,” Computer Communications, vol. 166, pp. 110–124, 2021.
[2] R. Ahmad and I. Alsmadi, “Machine learning approaches to IoT secu-
rity: A systematic literature review,” Internet of Things, vol. 14, p. 100365,
2021.
[3] P. Kumar, G. P. Gupta, and R. Tripathi, “A distributed ensemble
design based intrusion detection system using fog computing to pro-
tect the Internet of Things networks,” Journal of Ambient Intelligence and
Humanized Computing, vol. 12, no. 10, pp. 9555–9572, 2021.
[4] X. Yao, F. Farha, R. Li, I. Psychoula, L. Chen, and H. Ning, “Security
and privacy issues of physical objects in the IoT: Challenges and opportu-
nities,” Digital Communications and Networks, vol. 7, no. 3, pp. 373–384,
2021.
[5] P. Kumar, G. P. Gupta, and R. Tripathi, “PEFL: Deep privacy-encod-
ing based federated learning framework for smart agriculture,” IEEE
Micro, vol. 42, no. 1, pp. 33–40, 2021.
[6] P. Kumar, G. P. Gupta, R. Tripathi, S. Garg, and M. M. Hassan,
“DLTIF: Deep learning-driven cyber threat intelligence modeling and
identification framework in IoT-enabled maritime transportation sys-
tems,” IEEE Transactions on Intelligent Transportation Systems, 2021,
https://doi.org/10.1109/TITS.2021.3122368.
[7] P. Kumar, G. P. Gupta, and R. Tripathi, “Design of anomaly-based intru-
sion detection system using fog computing for IoT network,” Automatic
Control and Computer Sciences, vol. 55, no. 2, pp. 137–147, 2021.
[8] R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M.
Hassan, “BDTwin: An integrated framework for enhancing security and
privacy in cybertwin-driven automotive industrial Internet of Things,”
IEEE Internet of Things Journal, vol. 9, no. 18, pp. 17110–17119, 2022,
https://doi.org/10.1109/JIOT.2021.3122021.
A RE V IE W O N IN T RUSI O N D E T EC TI O N SYS T EM S 71
Contents
4.1 Introduction 78
4.1.1 Self-Adaptive Systems 78
4.1.2 Evaluation of Self-Adaptive Applications 79
4.1.3 Selection of Approaches for Available Assessment 80
4.2 The Framework 80
4.2.1 Edge Computing Framework 81
4.2.2 Why Edge Computing? 82
4.2.3 Characteristics 84
4.3 Literature Review 85
4.3.1 Analysis of Monitoring Levels 86
4.3.1.1 Virtual Machine Level Monitoring 86
4.3.1.2 Container-Level Monitoring 88
4.3.1.3 Link-Quality Monitoring 89
4.3.1.4 Application-Level Monitoring 92
4.4 Technical and Open Challenges for Monitoring 94
4.5 Requirement Classification 95
4.6 Conclusion 97
Acknowledgement 98
References 98
DOI: 10.1201/9781003264545-4 77
78 M O NIK A S A X EN A E T A L .
4.1 Introduction
Currently the whole world is being digitized and data are gener-
ated in several fields. In most cases, this information needs to be
processed quickly to facilitate current technology (real-time applica-
tions). A few years ago, cloud technologies were introduced, which
gradually reduced the need for computers to be owned by small- to
medium-sized companies and research institutes. Edge computing
is an alternative way to calculate the data location and is especially
suited for real-time use. Part of the IoT, in particular, may require
short response times, private data, and large data that may be difficult
for the network [6].
This chapter focuses on the monitoring of these SAS in an
Edge-based environment, where the data processing takes time.
Consequently, it is necessary to monitor and auto-adjust this pro-
cessing to ensure that the centralized cloud and Edge facilities, bor-
der devices, and the complete infrastructure is compatible with each
other and utilized efficiently [5]. Figure 4.1 provides as an example
of a modern computing framework scheme architecture with a vari-
ety of layers: a) Central cloud computing [8], b) software-defined
network (SDN) and virtualization network functions (NFV) tech-
nology [9], c) Edge computing framework [5], and d) IoT objects,
sensors, or users [6]. Below is an example of pioneering cloud com-
puting frameworks of the multi-layer architecture presented in the
figure:
SEL F- A DA P TI V E A P P LI C ATI O N M O NIT O RIN G 83
4.2.3 Characteristics
The main aim of this chapter is to explore the fundamental issues that
are still not properly addressed in different academic literatures and
industry to develop surveillance in the context of Edge computing.
The focus is on the analysis of the elemental features of existing cloud
technologies, to understand how these challenges can currently be
addressed, and to determine precisely their strengths and weaknesses
in this field [2]. The review is based on the different application moni-
toring level of SAS.
In particular, it is possible to summarize the principal contribution
of this article as follows: a) Systematic analysis of different concepts of
86 M O NIK A S A X EN A E T A L .
Amazon’s cloud data centres, and reduce the packet loss between their
data centres using low latency. The authors evaluate different Amazon
data centre network QoS metrics in various locations.
The following are the main challenges currently facing the monitor-
ing of adaptive applications within Edge computing frames based on
our analyses:
a. Mobility management: Applications are managed over mov-
ing devices.
b. Scalability and resource availability: Applications and
resources are available and scalable.
SEL F- A DA P TI V E A P P LI C ATI O N M O NIT O RIN G 95
4.6 Conclusion
for this purpose. A Web application service, for example, can be mon-
itored to ensure that the application’s response time is within accept-
able limits. Whether a service is monitored is in keeping with the
perceived risk that an infringement occurs. If the perceived risk is
low, there may be no need for surveillance and vice versa. The degree
of risk perceived in connection with a service transaction may change
over time. However, this change cannot be dealt with by traditional
monitoring techniques. A SAS monitor adapts the perceived level of
risk to noticed changes. This framework combines a conventional ser-
vice monitor and a self-control protocol. Research and development
are beginning to take place in the applications developed for Edge
computing frameworks. Great attention has been given to the moni-
toring of adaptive applications of Edge framework, an area still to be
examined and improved.
Acknowledgement
References
1. Weyns, D. (2020). An introduction to self-adaptive systems: A contem-
porary software engineering perspective. John Wiley & Sons.
2. Raibulet, C., Fontana, F. A., Capilla, R., & Carrillo, C. (2017). An
overview on quality evaluation of self-adaptive systems. Managing
trade-offs in adaptable software architectures, 2017, pp. 325–352.
3. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge computing:
Vision and challenges. IEEE internet of things journal, 3(5), 637–646.
4. Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing:
A platform for internet of things and analytics. In Big data and internet
of things: A roadmap for smart environments (pp. 169–186). Springer,
Cham.
5. Saxena, M., & Jha, D. (2019). A new pattern mining algorithm for ana-
lytics of real time internet of things data. International journal of inno-
vative technology and exploring engineering, 9(1). doi: 10.35940/ijitee.
A4506.119119
6. Saxena, M., Vyas, V., & Jha, C. K. (2021, March). A framework for
multi-sensor data fusion in the context of IoT smart city parking data. In
SEL F- A DA P TI V E A P P LI C ATI O N M O NIT O RIN G 99
21. Beserra, D., Moreno, E. D., Endo, P. T., & Barreto, J. (2016, October).
Performance evaluation of a lightweight virtualization solution for HPC
I/O scenarios. In 2016 IEEE International Conference on Systems,
Man, and Cybernetics (SMC) (pp. 004681–004686). IEEE.
22. Dusia, A., Yang, Y., & Taufer, M. (2015, September). Network quality
of service in docker containers. In 2015 IEEE International Conference
on Cluster Computing (pp. 527–528). IEEE.
23. Soree, P., Gupta, R. K., Singh, K., Desiraju, K., Agrawal, A., Vats,
P., … & Singh, S. B. (2016). Raised HIF1α during normoxia in high
altitude pulmonary edema susceptible non-mountaineers. Scientific
reports, 6(1), 1–7.
24. Jiang, Y., Lin, C., Wu, J., & Sun, X. (2001, July). Integrated performance
evaluating criteria for network traffic control. In Proceedings. Sixth IEEE
Symposium on Computers and Communications (pp. 438–443). IEEE.
25. Mohit, P., Amin, R., & Biswas, G. P. (2017). Design of authentica-
tion protocol for wireless sensor network- based smart vehicular system.
Vehicular communications, 9, 64–71.
26. Taherizadeh, S., Jones, A. C., Taylor, I., Zhao, Z., & Stankovski, V.
(2018). Monitoring self-adaptive applications within Edge computing
frameworks: A state-of-the-art review. Journal of systems and software,
136, 19–38.
27. Cervino, J., Rodríguez, P., Trajkovska, I., Mozo, A., & Salvachúa, J.
(2011, July). Testing a cloud provider network for hybrid P2P and cloud
streaming architectures. In 2011 IEEE 4th International Conference on
Cloud Computing (pp. 356–363). IEEE.
28. Leitner, P., Satzger, B., Hummer, W., Inzinger, C., & Dustdar, S.
(2012, March). CloudScale: A novel middleware for building trans-
parently scaling cloud applications. In Proceedings of the 27th Annual
ACM Symposium on Applied Computing (pp. 434–440).
29. Rizki, R., Rakhmatsyah, A., & Nugroho, M. A. (2016, May).
Performance analysis of container-based hadoop cluster: OpenVZ
and LXC. In 2016 4th International Conference on Information and
Communication Technology (ICoICT) (pp. 1–4). IEEE.
30. Emeakaroha, V. C., Ferreto, T. C., Netto, M. A., Brandic, I., & De Rose,
C. A. (2012, July). CASViD: Application level monitoring for SLA
violation detection in clouds. In 2012 IEEE 36th Annual Computer
Software and Applications Conference (pp. 499–508). IEEE.
31. Farokhi, S., Lakew, E. B., Klein, C., Brandic, I., & Elmroth, E.
(2015, September). Coordinating CPU and memory elasticity control-
lers to meet service response time constraints. In 2015 International
Conference on Cloud and Autonomic Computing (pp. 69–80). IEEE.
32. Xiong, X., & De la Torre, F. (2013). Supervised descent method and its
applications to face alignment. In Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition (pp. 532–539).
33. Mastelic, T., Emeakaroha, V. C., Maurer, M., & Brandic, I. (2012,
April). M4Cloud-generic application level monitoring for resource-
shared cloud environments. In CLOSER (pp. 522–532).
SEL F- A DA P TI V E A P P LI C ATI O N M O NIT O RIN G 101
34. Cheng, L., Wang, S. H., Chen, Q. C., & Liao, X. M. (2011). Moderate
noise induced cognition impairment of mice and its underlying mecha-
nisms. Physiology & behavior, 104(5), 981–988.
35. Casas, P., D’Alconzo, A., Wamser, F., Seufert, M., Gardlo, B., Schwind,
A., … Schatz, R. (2017, May). Predicting QoE in cellular networks
using machine learning and in-smartphone measurements. In 2017
Ninth International Conference on Quality of Multimedia Experience
(QoMEX) (pp. 1–6). IEEE.
5
Fed er ated L e arnin g
and its A pplication in
M alware D e tection
S A K S H I B H AG WAT A N D
G OV I N D P. G U P TA
Department of Information Technology, National
Institute of Technology Raipur, Chhattisgarh, India
Contents
DOI: 10.1201/9781003264545-5 10 3
10 4 S A KSHI BH AGWAT A N D G O V IN D P. GU P TA
5.1 Introduction
Due to this privacy issue, many organizations are not inclined to par-
ticipant in centralized learning. To alleviate this drawback, another
approach is used in which the training dataset is subdivided; simulta-
neously, a model is trained on the subset and a parameter server is used
to aggregate model parameters. Author of Ref. [1] has proposed FL
that merges various participants and train models aggregately without
uploading data onto a server, which avoids collection of private data.
The model architecture is shown in Figure 5.1.
According the authors of Ref. [2], FL has two architectures: hori-
zontal FL (HFL) and vertical FL (VFL).
and sent to devices. Using this new parameter, the values local
model is updated. Then this updated model is then sent to the
edge server from devices. Aggregation models are transmit-
ted to blockchain.
• Global model aggregation and update: The updated model is
retrieved by the cloud from blockchain then all the local mod-
els are aggregated through a weighted average calculation to
form a global model. Then, the cloud returns the parameters
to the edge server.
The process of using blockchain in the proposed approach has three
layers. Among these layers, blockchain is the top layer. Blockchain
is the interconnected block structure. These blocks contain data and
include two parts: block header and block body. These blocks of
information are transferred from devices to servers to maintain the
integrity of the data signature; a verification process–the elliptic curve
digital signature algorithm (ECDSA)–is used by the author. ECDSA
is a combination of ECC and DSA digital signature algorithms.
12 0 S A KSHI BH AGWAT A N D G O V IN D P. GU P TA
The author has compared the accuracy of the model in the training
model and training loss with different samples sizes, i.e. batch and
times the dataset is trained (epochs). It is observed that when batch
size is constant and epochs increase, then training accuracy increases.
When epochs are constant and batch size is smaller, training accuracy
is higher. While in the case of training loss, batch size is directly
proportional. When epochs are constant and batch size increases,
training loss also increases. However, when batch size is constant and
epochs increase, training loss decreases.
F ED ER AT ED L E A RNIN G
3. Lin et al. 2020 HFL Edge devices Data centre A malware classification with decentralized Accuracy: 91.67%
[7] data collection using FL and compared the -
results of SVM and LSTM.
4. C. Zhou 2020 VFL IoT devices Cloud server Proposed an approach for data security in IoT Approach is inefficient and Accuracy
et al. [10] devices using Paillier homomorphic requires high computational increases with
encryption. A privacy-preserving scheme for overhead an increase in
fog computing using FL is proposed. privacy budget
5. Gálvez 2021 HFL Android mobile Cloud server Proposed an efficient way to combine FL with a Malware families and categories F1 score: 73.7%
et al. [9] semi-supervised ensemble method to detect are not classified by the given
malware approach. Performance of LiM
when the number of rounds are
increased is not presented.
6. Zhang 2021 VFL Edge Cloud server Proposed a data transmission method using Complexity of data transmission Accuracy: 98%
et al. [11] equipment edge computation and FL with features of is not present
blockchain
7. Mothukuri 2021 HFL IoT Central server Proposed an anomaly detection approach that Proposed approach is not tested Accuracy: 99.5%
et al. [8] end-devices uses GRUs to recognize intrusion in IoT on live data
121
devices using FL
12 2 S A KSHI BH AGWAT A N D G O V IN D P. GU P TA
are used. For MNIST the LetNet model is used and for CIFAR-10,
ResNet is used. In FL, the global server’s aim is to learn a model with
the highest accuracy. A method used for aggregation in FL is weighted
averaging. Injecting malicious data into the model regularization term
in the objective function is used in a neural network. At the local data-
set, the model is trained. The adversarial task is one in which adversarial
features are embedded in a neural network to improve persistence.
For a large dataset such as CIFAR-10, the model proposed for the
poisoning attack has a 90% success rate for adversarial tasks. Table 5.4
illustrates comparative analysis of the existing research papers related
to malware detection.
5.7 Conclusions
References
1. Aledhari, Mohammed, Rehma Razzak, Reza M. Parizi, and Fahad
Saeed. “Federated learning: A survey on enabling technologies, proto-
cols, and applications.” IEEE Access 8 (2020): 140699–140725.
2. Yang, Qiang, Yang Liu, Tianjian Chen, and Yongxin Tong. “Federated
machine learning: Concept and applications.” ACM Transactions on
Intelligent Systems and Technology (TIST) 10, no. 2 (2019): 1–19.
3. Liu, Yang, Yan Kang, Chaoping Xing, Tianjian Chen, and Qiang Yang.
“A secure federated transfer learning framework.” IEEE Intelligent
Systems 35, no. 4 (2020): 70–82.
4. Shukla, Sanket, Gaurav Kolhe, Houman Homayoun, Sai Manoj PD,
and Setareh Rafatirad. Malware Detection using Federated Learning
based on HPC Events and Localized Image features. 2019.
F ED ER AT ED L E A RNIN G 12 3
Contents
6.1 Introduction
used to retrieve the features from big IDS data and WDLSTM was
used for attacks classification. Li et al. [10] also present an in-depth
migration learning program. The authors executed the performance
results of the model with the use of the KDD CUP 99 dataset.
Ugochukwu et al. [11] presented a comparative analysis of several
machine learning algorithms such as J48, Bayes net, random forest,
and random trees for the classification of cyber-attacks. The authors
proved that random forest and random trees implementation was
efficient in classifying the attack in comparison to other algorithms.
Khammassi et al. [12] proposed the Genetic algorithm for feature
extraction and logistic regression for the classification of attacks.
The authors used the UNSW-NB15 dataset to execute the perfor-
mance results of the model. Verma et al. [13] proposed a bio-inspired
approach for the identification of attack requests. In the proposed
approach, a Cuckoo search-based identification of requests is per-
formed. de Souza et al. [14] presented a cyber-attack detection sys-
tem, which works on a computerized layer of the IIoT network. The
authors have introduced a binary classification technique containing
K-Nearest Neighbours (KNN) and deep neural network (DNN).
Heikkonen and colleague [15] presented a cyber-attack detection
mechanism based on a deep autoencoder. The authors used the KDD
CUP 99 dataset for analysis of their presented scheme and achieved
good attack-detection results. Vijayanand et al. [16] enhanced accu-
racy by introducing a support vector-based model. They performed the
tests using the database ADFA-LD. Parra et al. [17] have developed an
in-depth cloud-based learning framework for botnet and cyber-crime
attacks. Huang et al. [18] proposed process-error detection of the
IIoT network. The authors presented the DNN based on Gaussian-
Bernoulli restricted Boltzmann machine (GBRBM) as their proposed
system. Moustafa et al. [19] proposed a genetic algorithm accelera-
tor (GAA) for feature selection and automatic dependent surveillance
(ADS) for classification. The authors used the UNSW-NB15 dataset
to execute the performance results of the model. Ravi et al. [20] intro-
duced a scheme for distributed denial-of-service (DDoS) cyber-attack
detection by using a non-paired learning algorithm. Investigators
have succeeded in detecting a DDoS attack. Verma et al. [21] applied
teacher-learner-based optimization (TLBO) for clustering the attack
and benign requests. TLBO is used to find the optimal cluster centres.
A N ENSEM B L E XG B O O S T A P P R OAC H 12 9
The result shows that the proposed approach achieves high accuracy
and false alarm rates. Kasongo et al. [22] used a feed-forward deep
neural network (FFDNN) and wrapper-based technique for feature
extraction using the UNSW-NB15 dataset. Alrashdi et al. [23] pro-
posed anomaly detection of cyber-attacks using random forest. The
authors used extra tree classifiers to retrieve the most prominent fea-
tures and performed binary classification using random forest with
high accuracy. Moustafa et al. [19] introduced distributed map match-
ing (DMM) for feature extraction and ADS for the classification. The
authors used the UNSW-NB15 dataset to execute the performance
results of the model. They achieved good prediction results.
Many investigators have done an excellent job of introducing effec-
tive strategies for detecting IoT and IIOT platform attacks. But exist-
ing studies have some limitations such as: (i) Most authors have used
the data from the old NSLKDD and the KDD CUP 99 datasets
that have not been updated and are not suitable for modern industrial
needs; (ii) Many researchers analyzed their proposed schemes with
only some performance metrics, which did not provide a complete
analysis; and (iii) Many previous programmes are complex and time-
consuming and recommended for Dell Alienware or Raspberry Pi
laptops.
the set of features; every tree should choose the best or most impor-
tant feature to split the data based upon mathematical criteria such as
Gini or entropy (Gini is used here). Since the dataset is imbalanced,
over-sampling and then under-sampling is performed, using the syn-
thetic minority oversampling technique (SMOTE) and Tomek links
technique. Based upon the Gini score, the most significant features
of the dataset were selected. Finally, input data is ready to train on
different machine learning algorithms. The XGBoost mathematical
algorithm is given below [24]:
Algorithm 6.1:
G
Determine the leaf weights w* = −
H
∑
T
Determine the base model bˆ( x ) = wI ;
i =1
∑
N
Result: f k ( x ) = f k ( x );
k=0
The dataset used here is the UNSW-NB15 dataset. These are the
most recent IIoT datasets that are broadly utilized for the efficient
analysis of machine learning-dependent cyber-security applica-
tions. The dataset comprises an overall of 257,673 samples, of
which 164,673 are attacked and the remaining 93,000 are normal.
This dataset includes 45 features and 9 kinds of attacks. The type
of attacks are fuzzers, analysis, backdoor, reconnaissance, exploit,
generic, denial-of-service (DoS), shellcode, and worm attacks as
mentioned in Table 6.1.
Dataset collection and data observation were the primary steps of
this mechanism. Collection of the dataset and its evaluation is done
in this step. In the following step, data pre-processing takes place,
where data cleaning, data visualization, and data normalization, and
feature selection are performed. After applying all these techniques,
the selected data features are extracted. The dataset was divided into
a training and test data set in a ratio of 72% and 28%, individu-
ally. The learning of the proposed ensemble XGBoost classifier is
done using the training dataset. Subsequently, the ultimate model
was analyzed with the use of a test dataset with several evaluation
parameters.
Table 6.1 Available Attacks Description Presented in the UNSW-NB15 Dataset [26]
ATTACKS DESCRIPTION
Fuzzers In Fuzzers, the attacker gives an unexpected or random amount of data as input,
which leads to the crashing of any program, network, or operating system.
Backdoor This is a kind of malware where, along with authorized users, unauthorized
users also can gain access with normal security measures. Attackers use this
malware to access to their financial and personal information.
Analysis Analysis attacks target PC interruptions and malware events in which
cyber-criminals gain access to a system or network by using the technical
abilities of the users to misuse vulnerability.
Reconnaissance Reconnaissance is where the attacker assembles the data of the computer
vulnerabilities that can make use of the system control.
Exploit An exploit attack is a program that takes advantage of security flaws and
software vulnerabilities such as in the OS (Operating System), networks, or
applications. In this, the attacker can gain illegal access.
Generic Generic attacks work against all types of block-ciphers (with given key and
block size) without considering the formation of the block-cipher.
DoS In DoS, the attacker can shut down or suspend the machine or network
resources by making them inaccessible to users. The attacker sends a large
amount of ambiguous traffic to overload the network.
Shellcode These are a few lines of code that execute instructions or commands in
software for taking control of a machine.
Worm These attacks exploit some of the dangerous and deepest security
vulnerabilities in the host system and make copies of themselves.
Normal If the attack is perfectly accurate, then it is called Normal.
Tp
Precision =
(T p + Fp )
3. Recall
It represents the fraction of the truly positive results to the
total results of each class.
Tp
Recall =
(T p + Fn )
4. F1 Score
It is considered a balanced average between recall and preci-
sion. It gives a result in the range of 0 to 1.
2 × (recall × precision )
F1 Score =
(recall + precision )
5. Log Loss
It is the measure of performance or execution of the model
with the use of probability of expected results. If the varia-
tion between the prediction probability and the actual value
is high, then the log loss value will be high. A low score of log
loss represents better performance.
N
− ∑y
i =1
o ,i log( po ,i )
6. AUC ROC
This is the curve plotting at different thresholds of a model.
The graph uses the true positive rate (TPR) and false positive
rate (FPR).
Tp
TPR =
(T p + Fn )
Fp
FPR =
(F p + Tn )
6.4.2 Performance Evaluation of Proposed Approach
The UNSW-NB15 [28] dataset was divided into training and testing
datasets at a rate of 72% and 28%, individually. This work utilized 38
A N ENSEM B L E XG B O O S T A P P R OAC H 13 5
The latest improvements in learning methods are very useful for the
development of new machine learning and deep learning approaches
to solve the security challenges in the IIoT and IoT networks. Many
challenges should be solved to fulfil the complex needs of IIoT devices.
Recently, the industry has seen a great demand for IoT and cloud com-
puting devices. Due to this, many security and privacy problems have
arisen [27]. To overcome all these challenges, some future research
paths are presented here:
i. Formation of new cyber-security related datasets: In IIoT net-
works, the formation of the latest realistic high-quality data-
set is a major challenge as things are changing rapidly day
by day. The quality of the dataset is very important to the
performance evaluation of deep learning and machine learn-
ing schemes and with new approaches. For this path, crowd-
sourcing can help to generate high-quality datasets for IoT
and IIoT systems. Future datasets can further evaluate the
XGBoost algorithm and any new schemes that will be pro-
posed in the future.
ii. Improvements in existing machine learning approaches for
noisy data: The IIoT and IoT network system consists of a
large number of different devices. These devices have various
A N ENSEM B L E XG B O O S T A P P R OAC H 13 7
6.5 Conclusion
References
1. Boyes, H., Hallaq, B., Cunningham, J., & Watson, T. (2018). The
industrial internet of things (IIoT): An analysis framework. Computers
in industry, 101, 1–12.
2. Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund, M. (2018).
Industrial internet of things: Challenges, opportunities, and directions.
IEEE transactions on industrial informatics, 14(11), 4724–4734.
3. Possey, B., Losencrance, L., & Shea, S. (2021). Internet of Things
Agenda. Available online: https://internetofthingsagenda.techtarget.
com/definition/Industrial-Internet-of-Things-IIoT.
4. Micro, T. (2021). Industrial internet of things (IIoT). Available on-line:
https://www.trendmicro.com/vinfo/us/security/definition/industrial-
internet-of-things-iiot.
5. Panchatcharam, P., & Vivekanandan, S. (2019). Internet of things (IoT)
in healthcare–smart health and surveillance, architectures, security
analysis, and data transfer: A review. International journal of software
innovation (IJSI), 7(2), 21–40.
13 8 R .K . PA RERI YA E T A L .
6. Huma, Z. E., Latif, S., Ahmad, J., Idrees, Z., Ibrar, A., Zou, Z., …
Baothman, F. (2021). A hybrid deep random neural network for cyber-
attack detection in the industrial internet of things. IEEE access, 9,
55595–55605.
7. Da Costa, K. A., Papa, J. P., Lisboa, C. O., Munoz, R., & de Albuquerque,
V. H. C. (2019). Internet of Things: A survey on machine learning-based
intrusion detection approaches. Computer networks, 151, 147–157.
8. Li, Y., Xu, Y., Liu, Z., Hou, H., Zheng, Y., Xin, Y., … Cui, L. (2020).
Robust detection for network intrusion of industrial IoT based on multi-
CNN fusion. Measurement, 154, 107450.
9. Huda, S., Yearwood, J., Hassan, M. M., & Almogren, A. (2018).
Securing the operations in SCADA-IoT platform-based industrial
control system using an ensemble of deep belief networks. Applied soft
computing, 71, 66–77.
10. Li, D., Deng, L., Lee, M., & Wang, H. (2019). IoT data feature extrac-
tion and intrusion detection system for smart cities based on deep
migration learning. International journal of information management,
49, 533–545.
11. Ugochukwu, C. J., Bennett, E. O., & Harcourt, P. (2019). An intrusion
detection system using a machine learning algorithm. LAP LAMBERT
Academic Publishing.
12. Khammassi, C, Krichen, S. (2017 Sep 1). A GA-LR wrapper approach
for feature selection in network intrusion detection. Computers & secu-
rity, 70, 255–77.
13. Verma, P., Tapaswi, S. J., & Godfrey, W. W. (2021). A request aware
module using CS-IDR to reduce VM level collateral damages caused
by DDoS attack in cloud environment. Cluster computing, 24(3),
1917–1933.
14. de Souza, C. A., Westphall, C. B., Machado, R. B., Sobral, J. B. M., &
dos Santos Vieira, G. (2020). Hybrid approach to intrusion detection in
fog-based IoT environments. Computer networks, 180, 107417.
15. Farahnakian, F., & Heikkonen, J. (2018, February). A deep auto-
encoder-based approach for intrusion detection system. In 2018 20th
International Conference on Advanced Communication Technology
(ICACT) (pp. 178–183). IEEE.
16. Vijayanand, R., Devaraj, D., & Kannapiran, B. (2018). A novel intru-
sion detection system for wireless mesh network with hybrid feature
selection technique based on GA and MI. Journal of intelligent & fuzzy
systems, 34(3), 1243–1250.
17. Parra, G. D. L. T., Rad, P., Choo, K. K. R., & Beebe, N. (2020).
Detecting internet of things attacks using distributed deep learning.
Journal of network and computer applications, 163, 102662.
18. Huang, H., Ding, S., Zhao, L., Huang, H., Chen, L., Gao, H., &
Ahmed, S. H. (2019). Real-time fault detection for IIoT facilities
using GBRBM-based DNN. IEEE internet of things journal, 7(7),
5713–5722.
A N ENSEM B L E XG B O O S T A P P R OAC H 13 9
19. Moustafa, N., Slay, J., & Creech, G. (2017 Jun 14). Novel geometric
area analysis technique for anomaly detection using trapezoidal area
estimation on large-scale networks. IEEE transactions on big data, 5(4),
481–94.
20. Ravi, N., & Shalinie, S. M. (2020). Learning-driven detection and miti-
gation of DDoS attack in IoT via SDN-cloud architecture. IEEE inter-
net of things journal, 7(4), 3559–3570.
21. Verma, P., Tapaswi, S., & Godfrey, W. W. (2021). An impact analysis
and detection of HTTP flooding attack in cloud using bio-inspired clus-
tering approach. International journal of swarm intelligence research
(IJSIR), 12(1), 29–49.
22. Kasongo, S. M., & Sun, Y. (2020 May 1). A deep learning method with
wrapper-based feature extraction for wireless intrusion detection sys-
tem. Computers & security, 92, 101752.
23. Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., &
Ming, H. (2019, January). Ad-IoT: Anomaly detection of IoT cyberat-
tacks in smart city using machine learning. In 2019 IEEE 9th Annual
Computing and Communication Workshop and Conference (CCWC)
(pp. 0305–0310). IEEE.
24. Deok-Kee, Choi. Data-driven materials modeling with XGBoost algo-
rithm and statistical inference analysis for prediction of fatigue strength
of steels.
25. Dansbecker. How to build and optimize models with the powerful
xgboost library. Available on-line: https://www.kaggle.com/dansbecker/
xgboost.
26. UNSW-NB15 dataset available online: https://research.unsw.edu.au/
projects/unsw-nb15-dataset
27. Latif, S., Zou, Z., Idrees, Z., & Ahmad, J. (2020). A novel attack detec-
tion scheme for the industrial internet of things using a lightweight ran-
dom neural network. IEEE access, 8(1), 89337–89350.
7
A R e v ie w on I oT for
the A ppli cati on of
E nergy, E n v ironment,
and Waste M anag ement
C . R A K E S H , T. V I V E K , A N D K . B A L A J I
School of Mechanical Engineering, Vellore Institute of
Technology (V IT) University, Vellore, Tamil Nadu, India
Contents
7.1 Introduction
The devices, tools, machines, etc. connected to the Internet that can
communicate with the network are commonly termed the Internet
of Things (IoT). Zillions of devices are connected to the Internet at
present, soon to extend beyond 50 billion things. IoT unites various
technologies such as “Big Data”, “cloud computing”, and “machine
learning”. With the breakthrough of wireless technologies, the pres-
ent-day Internet is not just about connecting individuals it is about
connecting things [1]. The users become secondary in receiving and
generating various types of data, instead an enormous amount of data
is transmitted from the devices/things, which leads to complex IoT.
The definition of IoT is “the network of physical objects that con-
tain embedded technology to communicate and sense or interact with
their internal states or the external environment” (Gartner Research).
Specifically, IoT is described as “any-time, any-place, and any-one
connected”. Its inference is based on innovation that can make indi-
viduals and things closer.
The physical objects or things are personal devices such as phones,
watches, tabs, and digital cameras, etc. Daily-use technology like
vehicles, home appliances, security cameras, and office laptops con-
nected through a common gateway are also termed as “things” [2].
Each individual provides an enormous amount of data that which has
to be analyzed, captured, and stored, with the phrase “volume, variety,
and velocity” (Big Data) making the devices smarter. Adding intel-
ligence to these things is termed the Internet of Intelligent Things
(IoIT). When the device is smarter, or intelligent, it can make its
own decisions without any human intervention and can manage and
improve functionality. The flexibility of multiple devices, their ability
A RE V IE W O N I oT 14 3
Figure 7.1 Simplified relationship of IoT, Big Data, and artificial intelligence.
IoT devices are equipped with essential building blocks, such as sen-
sors, which sense the physical phenomena around them, connect to
a network via the cloud, and, based on the detected data from the
A RE V IE W O N I oT 14 9
Figure 7.5 Three-layer (A) and five-layer (B) IoT architecture representation.
The data can be read outside the line of sight and stored
in the database management system. The features involve
an integrated circuit and antenna. The tags may be clas-
sified into passive tags and active tags, where passive tags
are powered via battery power and active tags have their
power supply. The main components include a smart label,
an RFID reader, and an antenna; the application includes
smart labels, assets tracker, inventory management, per-
sonal tracking, and ID badging [29].
• UWB, otherwise called “802.15.3”, is a correspondences
innovation structured by the IEEE to work inside regions
of low inclusion and transfer speed prerequisites. Wi-Fi
utilizes radio waves for correspondence inside 100 meters
and permits devices to connect through an impromptu
configuration, i.e., without the utilization of a switch.
• Bluetooth is a correspondence innovation broadly utilized
for communication between devices at a short distance.
It utilizes essential radio waves with short frequencies to
ensure spared battery use.
• 802.15.4, created by the IEEE, gives specifications on
low-force remote systems for both the physical layer
and the medium air conditioning access control layer by
advancing solid and adaptable correspondence.
• LTE is a remote correspondence standard that enables
rapid data movement between cell phones dependent on
GSM/UMTS to arrange advances and incorporate devices
moving at high speeds, giving multicast-based admin-
istrations and communication. LTE-An is an improved
rendition LTE and incorporates broadband, spatial multi-
plexing, more noteworthy inclusion, and better execution
with lower latencies. Also called the fourth era of versatile
correspondence is a development of “WCDMA (3G) and
GSM/GPSR (2G)”.
4. Computation: This layer communicates to the computational
limit of IoT because of programming and applications. There
is an enormous scope of hardware improvement stages for
IoT application activity; a few models are: “Arduino, UDOO,
Friendly ARM, Intel Galileo, Raspberry Pi, Gadgeteer,
A RE V IE W O N I oT 15 7
IoT and urges designers and makers to receive their rules intention-
ally. Their present work incorporates a meaning of multiple con-
ventions to help IPv6 from the reduced controlled 6LoWPAN and
advancements.
7.6 Conclusion
The IoT plays a vital role in our day-to-day applications, from com-
municating on a virtual level to live connections. IoT has given a new
dimension to the Internet by effectively understanding the needs of
the people and their products, to produce a smarter insightful envi-
ronment. This has led to the vision of “anytime, anywhere, anyway,
anything” communication. IoT is termed as the centerpiece of the
conventional Internet for the next-generation digital ecosystem, which
ought to have an exceptionally drastic change in the field of a health-
care centre, educational sector, industries, etc. One such example, the
integration of AI into the Internet of things, has led to an innovative
technique of detecting chronic viruses through voice recognition.
Thus, the architecture concept for different applications is stud-
ied and discussed in detail for smart building automation, smart
waste management, and environmental monitoring. IoT architecture
involves five major layers that indicate innovation and research at
every stage, making it smarter with a unique identity and communi-
cation with humans at each level of the layers. The modern IoT, which
is mostly concentrated on machine-to-machine communications, is
trending getting reduced depending on several factors. Advanced
mathematical formulations are being researched for the optimization
of devices and techno-economic analysis. The challenges and recom-
mendations suggested in the study can be further researched in terms
of theoretical and experimental validations for numerous IoT applica-
tions. The modern IoT has initiated the people to focus and research
on vertical silos of architecture, this commercial type of architecture
available in major applications deals with publish/subscribe model but
A RE V IE W O N I oT 16 7
Acknowledgment
References
[1] Hung, M., 2017. Leading the IoT, Gartner insights on how to lead in a
connected world. Gartner Research, pp. 1–29.
[2] Wang, P., Valerdi, R., Zhou, S., and Li, L., 2015. Introduction: Advances
in IoT research and applications. Information Systems Frontiers, 17(2),
pp. 239–241.
[3] Ghosh, A., Chakraborty, D., and Law, A., 2018. Artificial intelligence
in the Internet of Things. CAAI Transactions on Intelligence Technology,
3(4), pp. 208–218.
16 8 C . R A K E SH E T A L .
[4] Rabah, K., 2018. The convergence of AI, IoT, Big Data, and blockchain:
A review. The Lake Institute Journal, 1(1), pp. 1–18.
[5] Tyagi, S., Agarwal, A., and Maheshwari, P., 2016, January. A concep-
tual framework for IoT-based healthcare system using cloud comput-
ing. In 2016 6th International Conference-Cloud System and Big Data
Engineering (Confluence) (pp. 503–507). IEEE.
[6] Chowdhary, C.L., Das, T.K., Gurani, V., and Ranjan, A., 2018. An
improved tumour identification with Gabor wavelet segmentation.
Research Journal of Pharmacy and Technology, 11(8), pp. 3451–3456.
[7] Gope, P., and Hwang, T., 2015. BSN-Care: A secure IoT-based modern
healthcare system using a body sensor network. IEEE Sensors Journal,
16(5), pp. 1368–1376.
[8] Ahmadi, H., Arji, G., Shahmoradi, L., Safdari, R., Nilashi, M., and
Ali, M., 2019. The application of the Internet of Things in healthcare:
A systematic literature review and classification. Universal Access in the
Information Society, pp. 1–33.
[9] Alsamhi, S.H., Ma, O., Ansari, M.S., and Almalki, F.A., 2019. Survey
on collaborative smart drones and the Internet of Things for improving
the smartness of smart cities. IEEE Access, 7, pp. 128125–128152.
[10] Saha, A.K., Saha, J., Ray, R., Sircar, S., Dutta, S., Chattopadhyay, S.P.,
and Saha, H.N., 2018, January. IoT-based drone for improvement of crop
quality in the agricultural field. In 2018 IEEE 8th Annual Computing and
Communication Workshop and Conference (CCWC) (pp. 612–615). IEEE.
[11] Kamilaris, A., Gao, F., Prenafeta-Boldu, F.X., and Ali, M.I., 2016,
December. Agri-IoT: A semantic framework for Internet of Things-
enabled smart farming applications. In 2016 IEEE 3rd World Forum on
the Internet of Things (WF-IoT) (pp. 442–447). IEEE.
[12] Pardini, K., Rodrigues, J.J., Kozlov, S.A., Kumar, N., and Furtado, V.,
2019. IoT-based solid waste management solutions: A survey. Journal of
Sensor and Actuator Networks, 8(1), p. 5.
[13] Pedersen, S.M., Pedersen, M.F., Ørum, J.E., Fountas, S., van Evert, F.K.,
van Egmond, F., Kernecker, M., and Mouazen, A.M., 2020. Economic,
environmental and social impacts. In Agricultural Internet of Things
and Decision Support for Precision Smart Farming (pp. 279–330).
Academic Press.
[14] Saravanan, K., and Saraniya, S., 2018. Cloud IoT-based novel livestock
monitoring and identification system using UID. Sensor Review, 38(1).
[15] Alonso, R.S., Sittón-Candanedo, I., García, Ó., Prieto, J., and
Rodríguez-González, S., 2020. An intelligent Edge-IoT platform for
monitoring livestock and crops in a dairy farming scenario. Ad Hoc
Networks, 98, p. 102047.
[16] Zhang, J., Kong, F., Zhai, Z., Han, S., Wu, J., and Zhu, M., 2016.
Design and development of IoT monitoring equipment for an open live-
stock environment. International. Journal. Simulation: Systems Science &
Technology, 17(26), pp. 2–7.
[17] Lee, I., 2019. The Internet of Things for enterprises: An ecosystem,
architecture, and IoT service business model. Internet of Things, 7,
p. 100078.
A RE V IE W O N I oT 16 9
[18] Navani, D., Jain, S., and Nehra, M.S., 2017, December. The Internet
of Things (IoT): A study of architectural elements. In 2017 13th
International Conference on Signal-Image Technology & Internet-Based
Systems (SITIS) (pp. 473–478). IEEE.
[19] Soni, A., Upadhyay, R., and Jain, A., 2017. Internet of Things
and wireless physical layer security: A survey. In Computer
Communication, Networking, and Internet Security (pp. 115–123).
Springer, Singapore.
[20] Verma, A., Prakash, S., Srivastava, V., Kumar, A., and Mukhopadhyay,
S.C., 2019. Sensing, controlling, and IoT infrastructure in the smart
building: A review. IEEE Sensors Journal, 19(20), pp. 9036–9046.
[21] Shah, A.S., Nasir, H., Fayaz, M., Lajis, A., and Shah, A., 2019. A
review of energy consumption optimization techniques in IoT-based
smart building environments. Information, 10(3), p. 108.
[22] Zaidan, A.A., and Zaidan, B.B., 2020. A review of the intelligent pro-
cess for smart home applications based on IoT: Coherent taxonomy,
motivation, open challenges, and recommendations. Artificial Intelligence
Review, 53(1), pp. 141–165.
[23] Noura, M., Atiquzzaman, M., and Gaedke, M., 2019. Interoperability
in the Internet of Things: Taxonomies and open challenges. Mobile
Networks and Applications, 24(3), pp. 796–809.
[24] Jia, M., Komeily, A., Wang, Y., and Srinivasan, R.S., 2019. Adopting
Internet of Things for the development of smart buildings: A review of
enabling technologies and applications. Automation in Construction, 101,
pp. 111–126.
[25] Wang, X., Tao, Y., and Xu, X., 2015. SHSM: A service middleware for
smart home. In 2015 IEEE International Conference on Mobile Services
(pp. 475–479). IEEE.
[26] Henricksen, K., and Robinson, R., 2006, November. A survey of mid-
dleware for sensor networks: State-of-the-art and future directions.
In Proceedings of the International Workshop on Middleware for Sensor
Networks (pp. 60–65).
[27] Chowdhury, B., and Chowdhury, M.U., 2007, December. RFID-
based real-time smart waste management system. In 2007 Australasian
Telecommunication Networks and Applications Conference (pp. 175–180).
IEEE.
[28] Folianto, F., Low, Y.S., and Yeow, W.L., 2015, April. Smart bin: Smart
waste management system. In 2015 IEEE Tenth International Conference
on Intelligent Sensors, Sensor Networks, and Information (ISSNIP)
(pp. 1–2). IEEE.
[29] Zeb, A, Ali, Q., Saleem, M.Q., Awan, K.M., Alowayr, A.S., Uddin, J.,
Iqbal, S., and Bashir, F., 2019. A proposed IoT-enabled smart waste bin
management system and efficient route selection. Journal of Computer
Networks and Communications, 2019(3), pp. 1–9.
[30] H IoT and E Sustainability, 2020. How IoT and AI can enable Using
IoT and AI for reducing e-waste Applying IoT and AI for agricultural
sustainability Leveraging IoT and AI for species protection Using IoT
and AI for cleaner air, pp. 9–12.
17 0 C . R A K E SH E T A L .
[31] Tellez, M., El-Tawab, S., and Heydari, H.M., 2016, April. Improving
the security of wireless sensor networks in an IoT environmental moni-
toring system. In 2016 IEEE Systems and Information Engineering Design
Symposium (SIEDS) (pp. 72–77). IEEE.
[32] Mois, G., Folea, S., and Sanislav, T., 2017. Analysis of three IoT-based
wireless sensors for environmental monitoring. IEEE Transactions on
Instrumentation and Measurement, 66(8), pp. 2056–2064.
[33] Ibrahim, H., Mostafa, N., Halawa, H., Elsalamouny, M., Daoud, R.,
Amer, H., Adel, Y., Shaarawi, A., Khattab, A., and ElSayed, H., 2019.
A layered IoT architecture for greenhouse monitoring and remote con-
trol. SN Applied Sciences, 1(3), pp. 1–12.
[34] Xu, K., Kong, L., Wu, F., Chen, Q., and Chen, G., 2019, December.
Mobile sampling strategy for environment information reconstruction
from view of cloud. In 2019 IEEE International Conference on Smart
Cloud (SmartCloud) (pp. 25–30). IEEE.
[35] Marche, T., Maheshwary, P., and Kumar, R., 2019. Environmental mon-
itoring system for smart city based on secure Internet of Things (IoT)
architecture. Wireless Personal. Communications, 107, pp. 2143–2172,.
[36] Madakam, S., Ramaswamy, R., and Tripathi, S., 2015. Internet of Things
(IoT): A literature review. Journal of Computer and Communications, 3(5),
pp. 164–173.
[37] Gomez, C., Chessa, S., Fleury, A., Roussos, G., and Preuveneers, D.,
2019. Internet of Things for enabling smart environments: A tech-
nology-centric perspective. Journal of Ambient Intelligence and Smart
Environments, 11, pp. 23–43.
[38] Thantharate, A., Beard, C., and Kankariya, P., 2019. CoAP and MQTT
based models to deliver software and security updates to IoT devices over
the air. In The 2019 International Conference on Internet of Things (iThings)
and IEEE Green Computing and Communications (GreenCom) and IEEE
Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData) (pp. 1065–1070). IEEE.
[39] Sayed, E., Ahmed, A., and Yousef, M.E., 2019, July. Internet of Things
in smart environment : Concept, applications, challenges, and future
directions. World Scientific News, 134(1), pp. 1–51.
[40] Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., and Ande, R.,
2018. IoT standardization: Challenges, perspectives, and solution. In
Proceedings of the 2nd International Conference on Future Networks and
Distributed Systems (pp. 1–9).
[41] Khan, R., 2012. Applications and key challenges future internet: The
Internet of Things architecture, possible applications, and key chal-
lenges. pp. 257–260.
[42] Samaila, M.G., Neto, M., Fernandes, D.A., Freire, M.M., and Inácio,
P.R., 2017. Security challenges of the Internet of Things. In Beyond the
Internet of Things (pp. 53–82). Springer, Cham.
[43] Radanliev, P., De Roure, D., Nurse, J., Montalvo, R.M., and Burnap, P.,
2019. Standardization of cyber risk impact assessment for the Internet of
Things (IoT). arXiv Preprint arXiv:1903.04428.
A RE V IE W O N I oT 171
[44] Pereira, C., Pinto, A., Aguiar, A., Rocha, P., Santiago, F., and Sousa,
J., 2016, June. IoT interoperability for actuating applications through
standardized M2M communications. In 2016 IEEE 17th International
Symposium on A World of Wireless, Mobile and Multimedia Networks
(WoWMoM) (pp. 1–6). IEEE.
[45] Cai, H., Xu, B., Jiang, L., and Vasilakos, A.V., 2016. IoT-based big data
storage systems in cloud computing: Perspectives and challenges. IEEE
Internet of Things Journal, 4(1), pp. 75–87.
[46] Liu, C., Yang, C., Zhang, X., and Chen, J., 2015. External integrity ver-
ification for outsourced big data in cloud and IoT: A big picture. Future
Generation Computer Systems, 49, pp. 58–67.
[47] Colony, B., Al-Fuqaha, A., Gupta, A., Benhaddou, D., Alwajidi, S.,
Qadir, J., and Fong, A.C., 2019. Leveraging machine learning and
big data for smart buildings: A comprehensive survey. IEEE Access, 7,
pp. 90316–90356.
[48] BP Forum, D Bpf, and O Report, 2019. IGF 2019 Best Practices Forum
on Internet of Things Big Data Artificial Intelligence Draft BPF Output
Report, no. November.
8
A nalysis of Fe ature
S electi on M e thods
fo r A nd ro id M alware
D e tecti o n U sin g M achine
L e arnin g Techniques
S A N T O S H K . S M M A R WA R ,
G OV I N D P. G U P TA , A N D S A N J AY K U M A R
Department of Information Technology, National
Institute of Technology, Raipur, Chhattisgarh, India
Contents
8.1 Introduction
select a subset of features from the original feature set, which can be used
to train learning models to achieve a better detection rate. A growing
number of Android malware detection models implemented different
feature subset selection algorithms and achieved better detection rates
[6]. This chapter deals with binary and multiclass malware classifica-
tion methods. Binary class malware comprising portmap and multiclass
has SMSMALWARE_BIIGE, SMSMALWARE_BEANBOT, and
SCAREWARE subclasses of malware.
8.3 Methodology
Figure 8.1 shows the process of the automatic classification system for
Android malware detection: (1) Sample dataset pre-processing (which
involves feature extraction), (2) feature subset selection, and (3) the
classification of application as benign or malicious [14].
The number and quality of features used to train models to identify
Android apps as benign or malware (malicious) with reasonable accu-
racy are critical. Until training the models, feature selection is used to
remove obsolete, redundant, constant, duplicated, and associated fea-
tures from the raw features. In Android malware detection systems,
several methods for selecting the best features have been commonly
used. Brief descriptions of the different feature selection algorithms
are explained in the following sections.
Constant features are those that have a single value for all of the out-
puts in the dataset. Constant features have no details that can be used
to classify the current record. As a result, all constant features should
be removed from the dataset [4].
Since Naïve Bayes integrates a simple model for simplifying the data,
learning data, and predicting groups, it is an attribute probabilistic clas-
sifier algorithm used in multiclass classification problems. Taking all fea-
tures that are independent and visible within the given features, Naïve
Bayes defines a special class without having any relations to the other
features. The goal is to accurately predict the class of malware [16].
8.4.5 AdaBoost
Table 8.2 Performance Comparison of Different Machine Learning Classification Models, with
Feature selection
FEATURE SELECTED – 60 AFTER CONSTANT QUASI-CONSTANT DUPLICATE REMOVAL
CLASSIFIER ACCURACY (%) PRECISION (%) RECALL (%) F1 SCORE (%)
Random forest 92.16 75.13 43.84 90.10
Naïve Bayes 76.26 27.66 30.53 79.61
Gradient boosting 91.15 67.11 29.39 87.30
Decision tree 90.84 35.80 28.90 86.98
k-NN 90.95 66.96 42.67 88.94
AdaBoost 90.76 37.90 40.21 86.73
scored consistently except for Naïve Bayes and the best classifier is
the random forest with 50 estimators, giving a 92.19% accuracy score.
Table 8.4 illustrates the outcome by different classifiers of machine
learning tested on the multiclass dataset with features selected by lin-
ear regression. In this experiment, 3 out of 80 features are selected.
From Table 8.4, it is observed that all algorithms have scored approxi-
mately 86%, this feature selection has the most equal scores across all
classifiers and the best classifier is the decision tree classifier with a
maximum depth of 4 and an accuracy score of 90.90%.
Table 8.5 illustrates the outcome by different classifiers of machine
learning tested on the multiclass dataset with features selected by
logistics L1 regularization (Lasso). In this experiment, 35 out of
80 features are selected. From Table 8.5, it is observed that all
algorithms scored very well, but Naïve Bayes had the worst scores.
Random forest was the best classifier with 100 estimators, giving a
92.55% accuracy score.
the Naïve Bayes classifier and the best classifier is gradient boosting
with 50 estimators, giving a 99.97% F1 score.
Table 8.19 illustrates the outcome by different classifiers of machine
learning tested on the binary dataset (AAGM) using RFE with
100 estimators for feature selection. In this experiment, 15 out of
82 features are selected by RFE. From Table 8.19, it is observed that
all algorithms have scored approximately 99% and the best classifier is
gradient boosting with 50 estimators, giving a 100% F1 score.
Table 8.20 illustrates the outcome by different classifiers of machine
learning tested on the binary dataset (AAGM) using gradient boost
with 100 estimators for selecting features. In this experiment, 12 out
of 82 features are selected by random forest. From Table 8.20, it is
observed that all algorithms have scored approximately 100% and the
best classifier is gradient boosting with 50 estimators, giving a 100%
F1 score.
Table 8.21 illustrates the outcome by different classifiers of machine
learning tested on the binary dataset (AAGM) using LDA for feature
extraction. In this experiment, 1 out of 82 features is selected using
LDA. From Table 8.21, it is observed that all algorithms have scored
approximately 100% and the best classifier is the decision tree classi-
fier with a 99.95% F1 score.
Table 8.22 illustrates the outcome by different classifiers of machine
learning tested on the binary dataset (AAGM) using PCA for fea-
ture extraction. In this experiment, 2 out of 82 features are selected
using PCA. From Table 8.22, it is observed that all algorithms have
scored approximately 100%, but in this case, Naïve Bayes surprisingly
A N A LYSIS O F F E AT URE SEL EC TI O N M E T H O D S 19 3
Tables 8.23 and 8.24 show the summary of the highest accuracy
obtained by machine learning classifiers using different feature selec-
tion methods on multiclass and binary class datasets.
References
1. Sharmeen, S., Huda, S., Abawajy, J. H., Ismail, W. N., & Hassan, M.
M. (2018). Malware threats and detection for industrial mobile-IoT net-
works. IEEE Access, 6, 15941–15957.
2. Feng, R., Chen, S., Xie, X., Meng, G., Lin, S. W., & Liu, Y. (2020). A
performance-sensitive malware detection system using deep learning on
mobile devices. IEEE Transactions on Information Forensics and Security,
16, 1563–1578.
3. Wang, X., Wang, W., He, Y., Liu, J., Han, Z., & Zhang, X. (2017).
Characterizing Android apps’ behavior for effective detection of malapps
at large scale. Future Generation Computer Systems, 75, 30–45.
4. Alazab, M. (2020). Automated malware detection in mobile app stores
based on robust feature generation. Electronics, 9(3), 435.
5. Abawajy, J. H., Chowdhury, M., & Kelarev, A. (2015). Hybrid consen-
sus pruning of ensemble classifiers for big data malware detection. IEEE
Transactions on Cloud Computing, 8(2), 398–407.
A N A LYSIS O F F E AT URE SEL EC TI O N M E T H O D S 19 5
19. Smmarwar, S. K., Gupta, G. P., & Kumar, S. (2022). Research trends
for malware and intrusion detection on network systems: A topic mod-
elling approach. In Advances in Malware and Data-Driven Network
Security (pp. 19–40). IGI Global, UK.
20. Kumar, P., Gupta, G. P., & Tripathi, R. (2021). Toward design of an
intelligent cyber attack detection system using hybrid feature reduced
approach for IoT Networks. Arabian Journal for Science and Engineering,
46(4), 3749–3778.
21. Kumar, P., Gupta, G. P., & Tripathi, R. (2021). A distributed ensemble
design based intrusion detection system using fog computing to pro-
tect the internet of things networks. Journal of Ambient Intelligence and
Humanized Computing, 12(10), 9555–9572.
9
A n E ffi cient O p timizin g
E nergy C onsump tion
U sin g M od ified B ee
C olo ny O p timiz ation in
F o g and I oT N e t wo rks
P O T U N A R AYA N A 1 , C H A N D R A S H E K A R
J AT O T H 2 , P R E M C H A N D
PA R AVATA N E N I 1 , A N D G . R E K H A 3
1 Department of Computer Science and Engineering,
Contents
9.1 Introduction
DOI: 10.1201/9781003264545-9 19 7
19 8 P O T U N A R AYA N A E T A L .
without any intervention, which is the major aim of the IoT applica-
tions. In a one-hop manner, the real-time applications of the neigh-
bouring devices are processed by increasing the potentiality of the IoT
resources. However, the fog devices have limitations in their storage
and computation capabilities to process those applications [1]. Thus,
both the cloud computing (CC) and fog computing have their respec-
tive inherent limitations in addressing the issues related to perfor-
mance and energy consumption (EC) as the paradigms pit one at the
cost of the other. Hence, it is required to combine both the paradigms
for developing an IoT infrastructure with high resource utilization for
smart IoT applications [2–4]. In the cloud-fog environment, the chal-
lenging problem is to allocate the IoT applications efficiently to the
appropriate devices, which include cloud data centres as well as fog
nodes. For instance, the delay may be minimized by running various
tasks on fog nodes, but the energy consumption of those fog nodes
will increase greatly. In the cloud, the transportation of tasks can save
the fog node’s energy, however it increases the delay time of the tasks
[5, 6]. Hence, a trade-off strategy between energy consumption and
delay must be proposed to minimize the consumption of energy and
delay in fog computing. In this research study, a cloud-fog coopera-
tion scheduling algorithm called modified honey bee search algorithm
based on Gaussian probability threshold value is designed to reduce
the EC and increase resource utilization. The honey bee algorithm is
robust when compared to other heuristic algorithms, as a stochastic
global optimization procedure is used in the proposed method. The
delay is sought to be reduced by introducing the Gaussian probability
in the optimization algorithm, where the tasks are allocated to over-
loaded or underloaded servers. The simulation is conducted by using
the iFogSim simulator to verify the effectiveness of proposed modi-
fied honey bee algorithm.
The remaining chapter is organized as follows: Section 9.2 dis-
cusses the studies of various existing techniques in fog computing.
The detailed explanation of optimization problem is illustrated in
Section 9.3. The problem is addressed by the proposed methodology
is described in Section 9.4. The validation of the proposed method
with existing techniques to reduce energy and delay is represented in
Section 9.5. Finally, the conclusion of the research study with future
work is discussed in Section 9.6.
EF FI CIEN T O P TIMIZIN G ENER GY C O NSUM P TI O N 19 9
9.3.1 Makespan
∑length (T ) i ≤ k ≤n
k
MinMakespan = (9.1)
∑CPUrate ( N )
i ≤i ≤n
i
If a task is performed, then a certain cost should be paid for the band-
width, memory usage, and processing. This cost is estimated as the
node Ni processes task Tk, and is expressed in Equation 9.2.
Cost (Ti k ) = c p (Ti k ) + cm (Ti k ) + c b (Ti k ) (9.2)
TotalCost = ∑
Tki ∈NodeTasks
Cost (Tki ) (9.3)
mobile nodes.
i =T
X mt
i
Emt mt × Pmt = × Pmt (9.4)
µ−λ
202 P O T U N A R AYA N A E T A L .
i =
λ
Dmt (9.5)
µ( µ − λ )
Huge numbers of computation functions are used to model the EC
of a fog node, where the computation function is a strictly convex
and monotonic increasing function. There are two alternatives present
in the fog nodes, namely a quadratic function and a piecewise linear
function. The proposed method chose the quadratic function for its
simplicity without generality loss. According to the workload of fog
j j
nodes as X fog , the EC of fog node as E fog is mathematically defined
in Equation 9.6:
j j2 j
E fog = aX fog + bX fog +e (9.6)
Mathematical Equation 9.7 denoted the total EC of the system as:
ETotal = ∑E + ∑E
i ∈N
i
mt
j ∈M
j
fog (9.7)
DTotal = ∑D + ∑D
i ∈N
i
mt
j ∈M
j
fog (9.8)
The sensitive tasks with latency are immediately responded in the IoT
environment scenarios. When there is no extension in the workload,
EF FI CIEN T O P TIMIZIN G ENER GY C O NSUM P TI O N 203
the allocated layers executed the tasks. If the workloads of layers are
exceeded, then tasks are not executed directly. Hence, it is important
to implement the modified bee search scheduling algorithm for high
utilization of the resources and minimization of the EC. The Bees
Algorithm is a search procedure inspired by the way honey bees for-
age for food. The algorithm, with its basic version, performs a kind of
neighborhood search combined with random search and can be used
for both combinatorial optimization and functional optimization. In
addition, the Bees Algorithm is an optimization algorithm inspired
by the natural foraging behaviour of honey bees to find the optimal
solution.
Figure 9.2 Analysis of total cost for the proposed modified honey bee algorithm.
EF FI CIEN T O P TIMIZIN G ENER GY C O NSUM P TI O N 207
Table 9.3 Validation of Proposed Method with Existing Techniques by Means of Delay Time
DELAY TIME (SEC)
AMOUNT OF DATA
TRANSMISSION (MB) PSO MPSO FBI HONEY BEE PROPOSED MBCO
100 6 5 5 6 5
150 9 8 7 8 7
200 15 13 11 11 8
250 18 16 15 16 10
300 21 15 14 18 12
350 24 18 16 21 14
400 26 18 18 23 18
208 P O T U N A R AYA N A E T A L .
Figure 9.3 Comparative analysis of the proposed method in terms of delay time.
threshold value. When the data sizes are increased, the delay time of
the proposed method is also increased, for example, the delay time of
250 MB of data is 10 seconds, whereas the delay time for 400 MB
of data is 18 seconds in the proposed modified honey bee algorithm.
When compared with other techniques, standard PSO provided poor
performance for processing the various sizes of tasks due to its simple
mechanisms. Table 9.4 shows the EC of the proposed method for the
same size of the tasks; the graphical illustration is given in Figure 9.4.
From Table 9.4 and Figure 9.4, it is clearly evident that the proposed
modified honey bee algorithm achieved less EC for various data sizes
than other heuristic traditional algorithms. When compared with
standard PSO, the proposed modified honey bee algorithm reduced
nearly 15–25% of energy for all the data sizes. However, there is only
Table 9.4 Consumption of Energy for the Proposed Method with Existing Techniques
ENERGY CONSUMPTION (KWH)
AMOUNT OF DATA
TRANSMISSION (MB) PSO MPSO FBI HBO PROPOSED MBCO
100 0.25 0.12 0.12 0.15 0.08
150 0.38 0.16 0.19 0.22 0.11
200 0.46 0.29 0.30 0.38 0.26
250 0.67 0.33 0.42 0.46 0.37
300 1.02 0.49 0.58 0.63 0.51
350 1.35 0.61 0.72 0.81 0.68
400 1.72 0.73 0.90 1.02 0.76
EF FI CIEN T O P TIMIZIN G ENER GY C O NSUM P TI O N 209
Figure 9.4 Energy consumption in the proposed method with traditional techniques.
9.6 Conclusion
proposed method achieved 0.08 kWH for the data size of 100 MB. In
the experiments of makespan, the proposed method achieved 256.52s
of makespan, whereas the MPSO and honey bee algorithms achieved
303.23s and 298.32s of makespan for the 200th task, respectively. An
efficient computation offloading strategy among multiple fog nodes
must be developed in the future to improve the overall performance
of the proposed method.
References
1. D. Rahbari, and M. Nickray, “Task offloading in mobile fog comput-
ing by classification and regression tree”. Peer-to-Peer Networking and
Applications, vol. 13, no. 1, pp. 104–122, 2020.
2. J. Luo, L. Yin, J. Hu, C. Wang, X. Liu, X. Fan, and H. Luo, “Container-
based fog computing architecture and energy-balancing scheduling
algorithm for energy IoT”. Future Generation Computer Systems, vol. 97,
pp. 50–60, 2019.
3. E. M. Borujeni, D. Rahbari, and M. Nickray, “Fog-based energy-
efficient routing protocol for wireless sensor networks”. The Journal of
Supercomputing, vol. 74, no. 12, pp. 6831–6858, 2018.
4. L. Liu, Z. Chang, X. Guo, S. Mao, and T. Ristaniemi, “Multiobjective
optimization for computation offloading in fog computing”. IEEE
Internet of Things Journal, vol. 5, no. 1, pp. 283–294, 2017.
5. J. Wu, M. Dong, K. Ota, J. Li, W. Yang, and M. Wang, “Fog-computing-
enabled cognitive network function virtualization for an information-
centric future Internet”. IEEE Communications Magazine, vol. 57, no. 7,
pp. 48–54, 2019.
6. G. Li, J. Yan, L. Chen, J. Wu, Q. Lin, and Y. Zhang, “Energy con-
sumption optimization with a delay threshold in cloud-fog cooperation
computing”. IEEE Access, vol. 7, pp. 159688–159697, 2019.
7. M. Mishra, S. K. Roy, A. Mukherjee, D. De, S. K. Ghosh, and R.
Buyya, “An energy-aware multi-sensor geo-fog paradigm for mission
critical applications”. Journal of Ambient Intelligence and Humanized
Computing, pp. 1–19, 2019.
8. G. Zhang, F. Shen, Z. Liu, Y. Yang, K. Wang, and M. T. Zhou,
“FEMTO: Fair and energy-minimized task offloading for fog-enabled
IoT networks”. IEEE Internet of Things Journal, vol. 6, no. 3, pp. 4388–
4400, 2018.
9. P. G. V. Naranjo, E. Baccarelli, and M. Scarpiniti, “Design and energy-
efficient resource management of virtualized networked Fog archi-
tectures for the real-time support of IoT applications”. The Journal of
Supercomputing, vol. 74, no. 6, pp. 2470–2507, 2018.
10. D. Wang, Z. Liu, X. Wang, and Y. Lan, “Mobility-aware task offload-
ing and migration schemes in fog computing networks”. IEEE Access,
vol. 7, pp. 43356–43368, 2019.
EF FI CIEN T O P TIMIZIN G ENER GY C O NSUM P TI O N 211
A C
Accelerators, 15 Caffe, 13
Accuracy, 181 Challenges in IoT applications, 161
AdaBoost, 180 CICMalAnal2017, 181
Adware, 110 Classification, 179
Aggregated layer, 144 Classification and Regression Trees
Agriculture Drones, 146 (CART), 65
Algorithm poisoning, 120 Cloud platform, 144
Analysis of Variance (ANOVA), 177 Crops health monitoring, 146
Anomaly or behaviour-based IDS Convolution Neural Network
(AIDS), 59 (CNN), 4, 9, 127
Artificial Neural Network Constrained Application Protocol
(ANN), 62 (CoAP), 152
Autoencoder (AE), 12 COVID-19, 109
Cross-site scripting (XSS), 65
B Cyber attacks, 51, 56
Cyber threat intelligence (CTI), 51,
Beta Mixture Models (BMM), 66 54, 59
Big data, 2, 7, 142
Big data analytics, 9, 165 D
Blockchain-edge federated
learning, 119 Dataset poisoning, 120
Blynk cloud, 45 Decision tree (DT), 62, 180
Browser hijacker, 110 Deep belief networks (DBN), 11
213
214 In d e x
Deep learning, 2 H
Deep learning models, 9
Deeplearning4J (D4J), 13 Hidden Markov models
Deep neural network (DNN), 128 (HMM), 66
Detection rate (DR), 61 H 2O, 13
Denial-of-service (DoS), 56 Horizontal federated learning, 106
Distributed denial-of-service Host-based IDS (HIDS), 57
(DDoS), 56, 128
I
E
Industrial Internet of Things (IIoT),
Edge architecture, 14 125
Edge computing, 82, 84 Industrial Internet Task Force
Edge computing framework, 77, 81 (IETF), 164
Elliptic Curve Digital Signature Internet Industrial Consortium
Algorithm (ECDSA), 119 (IIC), 164
Environmental monitoring, 158 Internet of Medical Things (IoMT),
ESP8266, 46 5, 47
Internet of Things, 2, 80, 142, 197
Internet protocol (IP), 65
F
Intrusion Detection System, 51
Farmland monitoring, 147 IoMT, 35
Federated learning, 103, 104 IoT applications, 162
Federated learning architecture, 105 IoT big data, 7
Federated SVM, 112 IoT–Blynk, 45
Fog-cloud architecture, 16 IoT Security Foundation
F-score, 181 (IoTSF), 165
Fuzzy C-means clustering
(FCM), 62 K
N
S
Network-based IDS (NIDS), 58
SDN/NFV technologies, 83
NSL-KDD, 62, 127
Secure Multi-Party Computation
(SMPC), 112
O Self-adaptive systems (SAS), 78
Semi-supervised learning (SSL), 115
Optimization problem, 201
Sensing layer, 144
Side channel attack, 55
P Signature or knowledge-based IDS
Performance metrics, 181 (SIDS), 59
Permanent denial of service Sleep denial attack, 55
(PDoS), 55 Smart building, 150
Physical attacks, 54 Smart home, 23
Poisoning attacks, 120 Smart home service middleware
Precision, 181 (SHSM), 153
Principal component analysis Smart waste management
(PCA), 63, 179 system, 153
Privacy-preserving, 117 SMOTE, 130
Processing layer, 144 Software-defined network
PySyft, 108 (SDN), 82
Pytorch, 13 Spyware, 110
Support vector machines (SVM), 62
Q
T
Quality-of-service (QoS), 89
Technical CTI, 61
R TensorFlow, 12
TensorFlow Federated (TFF), 109
Radio frequency jamming, 55 Theft attacks, 57
Random Forest (RF), 62, 177 Thinger.io, 43
216 In d e x
Tinymotes, 13 W
Trojan, 110
Worm, 110
WSN, 47
U
V
Z
Vertical Federated Learning, 107
Virus, 110 Zigbee, 54, 152