Modern Approaches in Iot and Machine Learning For Cyber Security
Modern Approaches in Iot and Machine Learning For Cyber Security
Modern Approaches
in IoT and Machine
Learning for Cyber
Security
Latest Trends in AI
Internet of Things
Series Editors
Giancarlo Fortino, Rende (CS), Italy
Antonio Liotta, Edinburgh Napier University, School of Computing
Edinburgh, UK
The series Internet of Things - Technologies, Communications and Computing
publishes new developments and advances in the various areas of the different facets
of the Internet of Things. The intent is to cover technology (smart devices, wireless
sensors, systems), communications (networks and protocols) and computing
(theory, middleware and applications) of the Internet of Things, as embedded in the
fields of engineering, computer science, life sciences, as well as the methodologies
behind them. The series contains monographs, lecture notes and edited volumes in
the Internet of Things research and development area, spanning the areas of wireless
sensor networks, autonomic networking, network protocol, agent-based computing,
artificial intelligence, self organizing systems, multi-sensor data fusion, smart
objects, and hybrid intelligent systems.
Indexing: Internet of Things is covered by Scopus and Ei-Compendex **
Vinit Kumar Gunjan • Mohd Dilshad Ansari
Mohammed Usman • ThiDieuLinh Nguyen
Editors
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature
Switzerland AG 2024
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
IoT Design Methodology: Architectures and Protocols�������������������������������� 1
Abhishek Pathak, Jitendra V. Tembhurne, C. Kalaiarasan, and Tapan Jain
Communication in IoT Devices���������������������������������������������������������������������� 21
Dipak Wajgi, Jitendra V. Tembhurne, Rakhi Wajgi, and Tapan Jain
IoT Security and Privacy�������������������������������������������������������������������������������� 45
Jitendra V. Tembhurne, Tausif Diwan, and Tapan Kumar Jain
Learning Approaches for Security and Privacy in Internet of Things�������� 63
T. Daniya, M. Geetha, Velliangiri Sarveshwaran, and Ch. Madhu Babu
Blockchain Security for the Internet of Things�������������������������������������������� 75
N. Nasurudeen Ahamed, P. Karthikeyan, S. Velliangiri, and Vinit
Kumar Gunjan
IoT and Blockchain-Enabled Charging Station for Electric Vehicles�������� 93
J. Shanmugapriyan, N. Karuppiah, Velliangiri Sarveshwaran, and
S. Muthubalaji
Human Activity Recognition: Approaches, Datasets, Applications,
and Challenges ������������������������������������������������������������������������������������������������ 103
Alisha Banga, Ravinder Ahuja, and S. C. Sharma
Deep Learning for IoT������������������������������������������������������������������������������������ 113
Tausif Diwan, Jitendra V. Tembhurne, Tapan Kumar Jain, and Pooja Jain
Internet of Everything: Applications�������������������������������������������������������������� 131
Rakhi Wajgi, Jitendra V. Tembhurne, Dipak Wajgi, and Tapan Jain
Artificial Intelligence and Machine Learning with IoT ������������������������������ 159
Shailendra W. Shende, Jitendra V. Tembhurne, and Tapan Kumar Jain
Performance Analysis of Cellular Internet of Things Using Cognitive
Radio ���������������������������������������������������������������������������������������������������������������� 185
Priyanka Mishra, Prabhat Thakur, and G. Singh
v
vi Contents
IoT-Based Smart Irrigation System �������������������������������������������������������������� 365
P. S. G. Aruna Sri, K. Kiran Kumar, B. B. V. S. V. Prasad,
and G. Vijay Kumar
Agricultural Monitoring and Control of a System Using Smart IoT
Devices�������������������������������������������������������������������������������������������������������������� 375
Y. Padma, M. Sailaja, Shaik Razia, and Mohammed Ali Hussain
An IoT Framework to Support Rural Population with Diabetic
Related Issues via Optimization Algorithms ������������������������������������������������ 387
Vinit Kumar Gunjan, Fahimuddin Shaik, and Rashmi Pathak
IoT-Based Heart Disease Prediction System�������������������������������������������������� 395
Vemula Manvitha, Syed Musthak Ahmed, P. Ramchandar Rao,
and Vinit Kumar Gunjan
Smart Agriculture Monitoring System Using IoT���������������������������������������� 403
Erra Thirupathi, Chakradhar Adupa, P. Ramchandar Rao,
Vinith Kumar Gunjan, and Syed Musthak Ahmed
Index������������������������������������������������������������������������������������������������������������������ 415
About the Editors
ix
x About the Editors
1 Introduction
A. Pathak
Department of Computer Engineering, St. Vincent Pallotti College of Engineering &
Technology, Nagpur, Nagpur, India
J. V. Tembhurne
Department of Computer Science & Engineering, Indian Institute of Information Technology,
Nagpur, Nagpur, India
e-mail: [email protected]
C. Kalaiarasan
School of Engineering, Presidency University, Bengaluru, India
e-mail: [email protected]
T. Jain (*)
Department of Electronics & Communication Engineering, Indian Institute of Information
Technology, Nagpur, Nagpur, India
heterogeneous devices, and these devices send the data for communication. The
data is generated from various types of devices in various forms; hence, data interop-
erability is a challenge in data extraction. To overcome this, adding semantics to it
is the most promising method as discussed in [4]. A method of semantic analysis
and extraction process is described [1, 10]. In a level-wise categorisation of IOT
network, the secure authentication is provided for different non-intelligent and
intelligent devices or nodes. Several research projects are developed and are in pro-
cess to provide solutions to key challenges at various organisations and industries
working in IOT. Many researchers are contributing to provide solutions to key chal-
lenges in terms of scalability and interoperability. In this chapter, we discussed the
design methodologies and explained the description of each methodology in brief.
Architecture with its key goals is explained. In Sect. 3, the building blocks and
explanation about each level are provided. Section 4 explains about the elements
considered for building the architecture. In Sect. 5, various protocols based on pub-
lish/subscribe and request/response category are highlighted with detailed explana-
tion of message format.
IoT has touched almost all the application areas in the world. The major enhanced
sectors where big amount of contribution is going are healthcare, transport, agricul-
ture, smart homes and industrial applications.
These IoT design and methods are required to implement the applications, and
implementation varies as per the applications. In a broader scope, the key method-
ologies that should describe the specifications shown in Fig. 1 and as per the descrip-
tion presented in [22] are the following.
• Descriptions based on objectives and purpose
• Descriptions based on actions required
• Descriptions based on modelling
• Descriptions based on information
• Descriptions based on functions
• Descriptions based on networking and services
Description based on objectives This is the primary step to know the execution
behaviour of the system, that is, factors to be considered while gathering the data,
information retrieval, and system are collected.
Description based on actions This step specifies the manner of flow of actions,
which are derived from the nature of the system. The behavioural aspects of the
system, which is specific to the application, are identified.
IoT Design Methodology: Architectures and Protocols 3
Description based on modelling In this step, the attributes related to the system
devices and the relational effect of devices on each other are identified. The c oncepts
involved between the devices are considered, and this helps in predicting the behav-
ioural aspects involved in the system.
Description based on function This level defines the specifications required for
the functional overview of IoT structure. The functions depend on device, services,
management and security.
Description based on networking This step specifies the networking and inter-
connection parameters on device and component level. Based on an application, the
different devices and components utilised will communicate with their specific
tools and platforms.
4 A. Pathak et al.
3 Architecture
IoT is an emerging area that offers support and services to all areas of engineering
and science. All the components of the systems in machine to machine (M2M),
industries as well as in other organisation develop their functional architectures
based on the basic requirements used. To facilitate the management and support to
these systems, an architecture needs to be developed in order to understand the
interconnection of devices and components. The system should be capable of inter-
connecting the range of node and devices. In the future, IoT will become by default
the basic requisite to the growth and development of business, agriculture and
industry, which will facilitate the services to all the things used in day to day life. To
fulfil the upcoming requirements of the infrastructure to support flexible system
design, scalability and interoperability, we need robust and flexible infrastructure.
In this section, we discuss the key goals for designing the architecture of IoT.
3.1.1 Ready to Use
To achieve the objective and goals of IoT, we need to identify the usage, applica-
tions and technologies involved in it. The future application and usage will demand
for updates, and changes at all levels of IoT are increasing rapidly with more num-
ber of devices. This gives rise to such an infrastructure, which is readily available
for use, and software and hardware should be capable to update according to the
changes in the application demands.
3.1.4 Localisation
Infrastructure should also support the mobility, reliability and availability features
in network. The node may be mobile in nature, so communication between mobile-
to-mobile types of devices or mobile to non-mobile types of device may happen.
With this, the configuration continuously changes according to the location, thus
availability of devices/nodes is the major factor in communication. Infrastructure
should be capable of providing the functionalities according to the changes
in location.
Various architectures are proposed according to the technologies. As per the ser-
vices and management, the IoT architecture must consist the three basic layers:
Physical layer, Networking layer and Management layer, as shown in Fig. 2.
3.2.1 Physical Layer
As per the international standards for networking, the physical layer specifies the
standards and procedures at basic level of any interconnection wherein physical
means ‘devices’. In IoT, sensors and smart devices or hardware are involved in this
category where a signal is sensed from physical devices, that is, signal form, and
then transformed into the digital signals. Moreover, the developers embed their plat-
forms into the devices according to the applications.
Example In applications related to healthcare, the sensing devices such as pulse
sensors and heartbeat sensor sensed the pulse and heartbeats, respectively, and then
the signals are converted into digital values and values are accumulated according
to the application.
3.2.2 Networking
3.2.3 Management
Management of data is the most vital process in IoT ecosystem. In IoT, the various
types of data are generated from a variety of devices and managing such data is the
important task. Processing this enormous amount of data, which continuously gets
pulled or pushed, needs management of the data. The key challenges to the data
management are monitoring of data, deployment services, processing and connec-
tivity. There are many technological concepts involved in data management such as:
(i) Event processing
(ii) Data collection and analytics
(iii) Semantics related to networking
Event processing Event processing in nodes and especially in virtual sensors is
becoming one of the emerging research areas in the complex nature of event pro-
cessing. It is based on the knowledge gained by the situations and actions to predict
the behaviour in the future. It can be computational-based and detection-based.
IoT Design Methodology: Architectures and Protocols 7
Data collection and analysis Data collection and gathering is one of the revolu-
tionising areas of IoT wherein data is collected and analysed to acquire specific
information. It supports information exchange between various systems connected
in a network.
Example Electronic product codec (EPC) and Ubiquitous are methods available
for this purpose. Sensing and identification is the basic step in the world of IoT,
which is important for further steps of communication and computation.
Infrastructural Level The physical links are established by keeping range and
power into consideration, as power consumption and depletion of devices is the key
element that decides the operating life of devices in a network. Examples of such
protocols, which are used in communication, are IEEE 802.15.4, Z-Wave and LTE-
Advanced. Some technologies pioneered the requirement for M2M communication
such as RFID, NFC and UWB. RFID facilitates the communication through radio
links, and these radio links identify the object within the range of 10 cm to 200 m
and communicate at 13.56 MHZ of frequency band. In addition, NFC protocols also
communicate at the same high frequency of 13.56 MHZ and support range up to
10 cm. The most promising technology is the WiFi, which arises as a basic support
for IoT infrastructure for communication and services within 100 m range [6].
Standardisation is the common set of rules defined to test the protocols on certain
platforms; it is a common forum of industry, researcher centres, public authorities
and consumers. The objective of defining the standard is to achieve common goals
in terms of QoS in the performance of the devices and platforms. As IoT is a collec-
tion of heterogeneous devices, the devices need a common platform for understand-
ing the communication [5, 7, 9].
Standardisation is essential to set the following:
• Interoperability across applications and services
• Maintain operation across system, syntax, semantics and domain knowledge
• Maintain regulations in economy between regulators and developers
• Provide security and privacy of contents
Nowadays, the key challenge to standardisation is maintaining the performance
interoperability, availability and reliability. Many groups are in progress and are
working in this direction. The major leading organisations are the European
Telecommunications Standards Institute (ETSI), Institute of Electrical and
Electronics Engineers (IEEE), Wide Web Consortium (W3C), Internet Engineering
Task Force (IETF) and EPCglobal [23].
Protocols are the basic building blocks of the communication process in
IoT. Various protocols are to facilitate the services offered in IoT. On each layer of
interconnection, the specific protocols function for the task as explained in Table 2.
10 A. Pathak et al.
The protocols in IoT can be categorised based on the functionality assigned and
level of management. Protocols in IoT can be categorised according to application
level, infrastructural level and influential level. As shown in Fig. 4, the protocols at
influential level are the protocols used with wide scope of usability at system level.
5.1 IEEE 1905.1
Protocol defines the standard for both wired and wireless media, especially the WiFi
media used in the market. It supports connectivity to the heterogeneous types of
devices with mobility benefits and is used as an intermediate between network and
data link layer. IEEE 1905.1 message frame consists of 8 octets and variable length
list. The frame slots are as follows and the frame format is shown in Fig. 5:
• Message version – 1 octet
• Reserved – 1 octet
• Message type – 2 octet
IoT Design Methodology: Architectures and Protocols 11
• Message-Id – 2 octet
• Fragment-Id – 1 octet
• Last fragment indicator – 1 octet
• Relay indicator – 1 octet
• Reserved – 6 bits
• List of type length value (TLV)
5.2 IEEE 1888.3
Figure 6 explains the implementation view of COAP. The request from client is
accessed by COAP server and is forwarded over the HTTP-REST to process the
query on Internet storage. In addition, Representational State Transfer Protocol
(REST) is cacheable connection. The CRUD operations are indicated, and type of
value each operation hold is presented below [11–14]:
• Request
–– 0: Confirmable: Acknowledgement message
–– 1: Non-confirmable: Does not expect a confirmation message
• Response
–– 2: Acknowledgement: Acknowledge a confirmable message
–– 3: Reset: Received a message and not processed
COAP is a specialised application protocol designed by RFC7252. It is designed
in such a way that it easily gets integrated with HTTP and UDP for seamless inte-
gration and useful in environment where M2M is implemented. The frame format
of COAP is presented in Fig. 7; COAP is low overhead protocol thus providing easy
integration and less outflows. The message format consists of version, message
type, token length, request/response code and message id [17].
Queuing Mechanism The queuing mechanism protocols are more popular in use
and attracted the researchers to investigate and resolve the issues related to interop-
erability and reliability. We enlist the protocol here, and the detailed working is
highlighted in Sects. 5.4 and 5.5, respectively:
• Message Queuing Telemetry Transport (MQTT)
• Advanced Message Queuing Protocol (AMQP)
The protocol level defines the QoS level of delivery assurance. Herein, control
header is fixed and is of 1 byte and packet length is of maximum 4 bytes. There are
two versions of MQTT protocol: MQTT designed for TCP/IP protocol and
MQTT-SN designed to work over UDP and ZigBee protocols. The architecture of
MQTT [26] is presented in Fig. 8.
MQTT operations is categorised in two sub-operations, that is, from Publisher to
broker and then from broker to consumer/client. As shown in Fig. 9, MQTT server
as broker receives the messages from publishers and makes them available to get
subscribed by appropriate client. The publisher publishes the message and gets the
response/acknowledgement to publish. The broker consists of queue, and the
maximum queue length in MQTT is of 260 MB. The specific client accesses the
specific message required. The client requests to connect with the broker, and the
broker provides the acknowledgment to connect [19].
Figure 10 demonstrates the MQTT message format, which is a binary-based
protocol. It consists of Message type of four bytes, UDP field of one byte, QoS level
of two bytes and lastly one byte of retain field. The message format of MQTT con-
sists of control header, packet length, variable length header and payload. The con-
trol elements are in the form of binary bytes not the text strings. It operates on
request and response mechanism, that is, to each request, the acknowledgment is
accepted [16].
Topic Exchange This exchange type supports multicast. The routine is done to
more queues simultaneously. The message gets delivered to queues based on match-
ing key and pattern, for example, in Geographical cases, sending specific data to
specific location user.
Header Exchange In this type of exchange, the messages are published as per the
type of headers assigned as key. The key can be multiple in number. Based on
matching key with only one type or all types, messages are published.
This exchange model accepts messages from the publisher and route them to
queues according to the predefined criteria as shown in Fig. 11. It uses a routine and
instances to examine the message and route it to proper queue by using key, which
is actually a virtual address. In communication, the parameters used for message are
as follows:
• Queue current status
• Time to live (TTL) for message expires
• Queue length
• Message type
• Message identifier
• Message order
Queue Status The queues used in messaging hold the data according to the capac-
ity of queue. The messages/data are pulled from messages as per the parameter, that
is, links defined for the consumer.
Time to Live (TTL) It is a live for which the message will remain in the queue.
The time to live decides the life of message in the queue.
Queue Length The queue will decide the capacity of message to hold in commu-
nication by the queue.
IoT Design Methodology: Architectures and Protocols 17
As predicted by various standard bodies and organisations, with the growth in num-
ber of devices and nodes in network, the challenges and threats related to commu-
nication and synchronisation will increase. In the coming years, the quality of
services and performance of the system will depend on the networks’ support for
scalability with efficient interoperability. The coming era will be independent of the
platform, and the modelling of the system will not depend on the specifications and
requirements of functional modelling in the system. Various IoT platforms will get
updated with the arising needs and requirements. It is clear that a single protocol
and standard will not be sufficient to cope with publisher and subscriber synchroni-
sation. The challenges will arise with quality of services (QoS) in the performance
of protocols. In such a varying environment, the standards and protocols in IoT will
play a vital role in seamless integration of devices with platforms to achieve objec-
tives of IoT.
References
1. A. Mazayev, J.A. Martins, N. Correia, Interoperability in IoT Through the Semantic Profiling
of Objects Center for Electronic, Optoelectronic and Telecommunications (University of
Algarve, Faro, 2018)
2. D. Evans, The Internet of Things: How the Next Evolution of the Internet Is Changing
Everything (Cisco Internet Business Solutions Group, San Jose, 2011)
3. A.N. Knaian, J. Paradiso, A.C. Smith, A Wireless Sensor Network for Smart Roadbeds and
Intelligent Transportation Systems (Massachusetts Institute of Technology, 2000). https://
dspace.mit.edu/handle/1721.1/9072. Accessed on 17 Jan 2018
4. F. Shi, Q. Li, T. Zhu, H. Ning, et al., A survey of data semantization in Internet of Things.
Sensors 18, 313 (2018)
5. M. Wazid, A.K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo, et al., Design of secure user authen-
ticated key management protocol for generic IoT networks. IEEE Internet Things J. 5(1),
269–282 (2018)
6. J. Lin, W. Yuy, N. Zhangz, Z. Yang, H. Zhangx, W. Zhao, et al., A survey on Internet of Things:
architecture, enabling technologies, security and privacy, and applications. IEEE Internet
Things J. 4(5), 1125–1142 (2017)
20 A. Pathak et al.
7. Y. Yang, L. Wu, G. Yin, L. Li, H. Zhao, et al., A survey on security and privacy issues in
Internet-of-Things. IEEE Internet Things J. 4(5), 1250–1258 (2017)
8. A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, M. Ayyash, et al., Internet of
Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv.
Tutor. 17(4), 2347–2376 (2015)
9. P. Sethi, S.R. Sarangi, Internet of Things: architectures, protocols, and applications. J. Electr.
Comput. Eng. 2017, 25 pages (2017)
10. S. Wagle, Semantic Data Extraction over MQTT for IoTcentric Wireless Sensor Networks, in
2016 International Conference on Internet of Things and Applications (IoTA), (Maharashtra
Institute of Technology, Pune, India, 22 January–24 January 2016)
11. A. Ludovici, P. Moreno, A. Calveras, TinyCoAP: A novel constrained application protocol
(CoAP) implementation for embedding RESTful web services in wireless sensor networks
based on TinyOS. J. Sens. Actuator Netw. 2, 288–315 (2013)
12. Z. Shelby, K. Hartke, C. Bormann, B. Frank, et al., Constrained Application Protocol (CoAP)
(Internet Engineering Task Force (IETF), Fremont, 2013)
13. C. Bormann, A.P. Castellani, Z. Shelby, CoAP: an application protocol for billions of tiny
Internet nodes. IEEE Internet Comput. 16(2), 62–67 (2012)
14. Amaran, M. H., Noh, N. A. M., Rohmad, M. S., & Hashim, H. et al., A comparison of
lightweight communication protocols in robotic applications. Procedia Comput. Sci. 76,
400–405 (2015)
15. Oasis, MQTT Version 3.1.1 Plus Errata 01 (2014). http://docs.oasisopen.org/mqtt/mqtt/v3.1.1/
mqtt-v3.1.1.pdf. R. Cohn, Comparison of AMQP and MQTT. White Paper (2012). https://
lists.oasisopen.org/archives/amqp/201202/msg00086/StormMQ_WhitePaper_Comparison_
of_AMQP_and_MQTT.Pdf
16. A.S. Clark, H. Troung, MQTT for sensor networks (MQTT-SN) protocol specification (2013).
http://mqtt.org//new/wpcontent/uploads/2009/06/MQTT-SN/_spec_v1.2.pdf
17. P. Madhumitha, B. Johnsema, D. Manivannan, Domination of constrained application proto-
col: a requirement approach for optimization of Internet of Things in wireless sensor networks.
Indian J. Sci. Technol. 7(3), 296–300 (2014)
18. J.E. Luzuriaga, M. Perez, P. Boronat, J.C. Cano, C. Calafate, P. Manzoni, et al., A comparative
evaluation of AMQP and MQTT protocols over unstable and mobile networks, in IEEE 12th
Consumer Communications and Networking Conference, (Las Vegas, NV, USA, 2015)
19. K. Grgić, I. Špeh, I. Heđi, A web-based IoT solution for monitoring data using MQTT protocol,
in International Conference on Smart Systems and Technologies (SST), (Osijek, Croatia, 2016)
20. J.E. Luzuriaga, M. Perez, P. Boronat, J.C. Cano, C. Calafate, P. Manzoni, et al., Testing AMQP
protocol on unstable and mobile networks, in Internet and Distributed Computing Systems.
IDCS 2014. Lecture Notes in Computer Science, vol. 8729, (Springer, Cham, 2014)
21. S. Andy, B. Rahardjo, B. Hanindhito, Attack scenarios and security analysis of MQTT com-
munication protocol in IoT system, in Proceeding of the EECSI 2017, (Yogyakarta, Indonesia,
2017, 19–21 Sept)
22. A. Bahga, V. Madisetti, Internet of Things, a Hands on Approach (ISBN: 978-0996025515,
2015)
23. A. Pal, H.K. Rath, S. Shailendra, A. Bhattacharyya, et al., IoT Standardization: The Road
Ahead (IntechOpen, 2018)
24. Dr Andy Stanford-Clark of IBM, and Arlen Nipper of Arcom (now Eurotech) (1999). https://
www.ibm.com/support/pages/mqtt
25. G. Marsh, A.P. Sampat, S. Potluri, D.K. Panda, et al., Scaling Advanced Message Queuing
Protocol (AMQP) Architecture with Broker Federation and InfiniBand (Ohio State
University, 2008)
26. http://www.steves-internet-guide.com/mqtt-protocol-messages-overview. Accessed on 1st
Oct 2020
27. A. Vijayakrishna, G. Gopichand, M.D. Ansari, G. Suryanarayana, IOT based smart agricul-
ture using LIFI, in 2022 5th International Conference on Multimedia, Signal Processing and
Communication Technologies (IMPACT), (IEEE, November 2022), pp. 1–7