Chat with us, powered by LiveChat Write a survey paper on the topic: 'MALWARE IDENTIFICATION WITH BLOCKCHAIN TECHNOLOGIES' REQUIREMENTS; 1.Page size range is fro - Writeedu

Write a survey paper on the topic: ‘MALWARE IDENTIFICATION WITH BLOCKCHAIN TECHNOLOGIES’ REQUIREMENTS; 1.Page size range is fro

 

Write a survey paper on the topic:

"MALWARE IDENTIFICATION WITH BLOCKCHAIN TECHNOLOGIES"

REQUIREMENTS; 1.Page size range is from 9 to 12 with double columns “Times new roman” font (font size 10-12, single line spacing) – A template will be given in the D2L 

2. Need at least 30 to 40 references (From IEEE, ACM, Elsevier, Springer papers) 

3. Do not copy and paste, write in your own words (Paraphrase) and cite with references

 4. Try to follow given paper writing style (You will be given a sample paper template to follow)- It's just a sample paper to follow the template (note that it doesn't refer to the same topic)

 5. Paper Structure: Title, Abstract, Introduction, Body, Conclusion and References 

6. Paper will be checked for plagiarism or similarity through Turnitin plagiarism checker. Similarity should not be more than 15%. 

Internet of Things 11 (2020) 100227

Contents lists available at ScienceDirect

Internet of Things

journal homepage: www.elsevier.com/locate/iot

Review article

Survey on IoT security: Challenges and solution using

machine learning, artificial intelligence and blockchain

technology

Bhabendu Kumar Mohanta a , ∗, Debasish Jena a , Utkalika Satapathy a , Srikanta Patnaik b

a Department of Computer Science & Engineering, IIIT Bhubaneswar, Odisha 751003, India b Department of Computer Science and Engineering, SOA University, Bhubaneswar 751030, India

a r t i c l e i n f o

Article history:

Received 24 January 2020

Revised 8 May 2020

Accepted 12 May 2020

Available online 20 May 2020

Keywords:

IoT

Security

Machine learning

Artificial intelligence

Blockchain technology

a b s t r a c t

Internet of Things (IoT) is one of the most rapidly used technologies in the last decade

in various applications. The smart things are connected in wireless or wired for commu-

nication, processing, computing, and monitoring different real-time scenarios. The things

are heterogeneous and have low memory, less processing power. The implementation of

the IoT system comes with security and privacy challenges because traditional based ex-

isting security protocols do not suitable for IoT devices. In this survey, the authors initially

described an overview of the IoT technology and the area of its application. The primary

security issue CIA (confidentially, Integrity, Availability) and layer-wise issues are identi-

fied. Then the authors systematically study the three primary technology Machine learn-

ing(ML), Artificial intelligence (AI), and Blockchain for addressing the security issue in IoT.

In the end, an analysis of this survey, security issues solved by the ML, AI, and Blockchain

with research challenges are mention.

© 2020 Elsevier B.V. All rights reserved.

1. Introduction

Internet of Things (IoT) is a network of smart things that share information over the internet. The smart things are used

to deploy in a different environment to capture the information, and some events are triggered. The applications of IoT is a

smart city, smart home, Intelligent transportation system, agriculture, hospital, supply chain system, earthquake detection, a

smart grid system. As per CISCO estimated, the IoT devices connected will be 50 billion at the end of 2020. The grown of IoT

devices is rapidly changing as it crosses the total world population. The data generated by the IoT devices are enormous. In

traditional IoT, architecture is three types physical, network, and application layer. In the physical layer, devices are embed-

ded with some technology which way they sense the environment and also able to connect in wired or wireless to the other

device. Like in the smart home system fridge can place an order automatically to the registered retailer whenever the fruits

chamber empty it, and notification will be sent to the home users. The similarity in smart hospital patients can monitor in

an emergency through sensors and corresponding computing devices. As the sensors are low-end devices, less computation

power, and have heterogeneous properties. Implementation of IoT comes with lots of challenges. The standardization, inter-

operability, data storage, processing, trust management, identity, confidentiality, integrity, availability, security, and privacy

∗ Corresponding author. E-mail addresses: [email protected] (B.K. Mohanta), [email protected] (D. Jena), [email protected] (U. Satapathy).

https://doi.org/10.1016/j.iot.2020.100227

2542-6605/© 2020 Elsevier B.V. All rights reserved.

2 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

Table 1

Related surveys work on IoT security.

Reference paper Year Contribution

Jing et al. [3] 2014 The security issue of three layers of IoT and its corresponding solution are surveyed in this paper.

Ngu et al. [4] 2016 The IoT middleware based architecture is proposed and explained each layer details. The authors also described

the adaptability and security issues in the IoT middleware system.

Mosenia et al. [5] 2016 The authors in this survey explained the reference model and security threads present on the edge side of the

model. The paper also reviewed the countermeasure to address the possible solutions.

Lin et al. [6] 2017 The paper initially described the IoT and Cyber-Physical Systems (CPS) integration. The security and privacy

issues survey in detail. The edge/fog computing integration with IoT is also explained in this survey paper.

Yang et al. [7] 2017 The paper has done a survey on security and privacy issue on IoT applications and systems. The authors

reviewed the authentication protocol in the IoT system. The challenging security issue in four-layer architecture

based IoT application are explained in details.

Alaba et al. [8] 2017 The authors in this survey investigated the state of art security issues in IoT applications. The threats and

vulnerability of the system in terms of communications, architecture, and applications are extensively reviewed.

the paper concludes with the solution approach for different security issues.

Grammatikis et al. [9] 2018 The paper provides a detailed study of IoT security layer-wise. The suitable countermeasure and potential

threats model are discussed in detail.

Das et al. [10] 2018 The authors in this paper investigate the security and threat model in IoT applications. The paper mentioned

some of the issues in IoT systems like authentication, trust management, and access control. Some solution

approach was also addressed.

Di Martino et al. [11] 2018 This paper reviewed the different standardized architecture of IoT systems and the current solution approach in

terms of Security and Interoperability are explained.

Hassija et al. [12] 2019 The authors of this paper reviewed the security and threat in IoT applications. The different solution approach

using machine learning, fog computing, edge computing, and Blockchain was proposed.

Proposed paper 2020 The authors in this paper initially identified the necessary Infrastructure, Protocol, Application of the IoT

system. Then security issue is identified in the IoT model. Some emerging technique which can be used to solve

the security issues in IoT is identified. After a rigorous survey, the authors found that machine learning,

Blockchain, and Artificial intelligence are the current solution approach to solve the Security issue in IoT.

are some of the open challenges in various IoT applications [1] . The IoT is one of the most emerging technologies in the last

decade and its uses in numerous applications area. Security and privacy are still challenges in many applications area. Some

research work addressing security and privacy issue in IoT is already done. But as the new technology comes, which can ad-

dress so of the security issue in IoT. So in this work, authors have identified three leading technologies like ML, Blockchain,

and AI, which address different security issues.

1.1. Objective and contribution

The main objective of this survey is to find out the security and privacy challenges that exist in IoT applications. The

authors also identified some emerging technology that can address security issues present in the system. Here the main

goal is to find the research challenges and corresponding solution approach in IoT security.

The following are the contribution of the paper:

• The paper explained the IoT architecture and its enabling technology with challenges. • The security issues in the IoT system are identified as in-depth layer-wise. • An extensive survey on similar technologies like machine learning, artificial intelligence, and Blockchain technology inte-

gration with IoT security are performed.

• The research challenges and corresponding solution approach with emerging technology (ML, AI, Blockchain) are also explained.

1.2. Paper organization

The rest of the paper organized as in Section 2 related work of security and privacy issues of IoT are identified, and

comparison was also made. The IoT architecture details and associated technology are described in Section 3 . The security

issues are explained in Section 4 . The different security issues address in IoT applications using Machine Learning, Artificial

intelligence, and Blockchain technology are explained in detail in Sections 5 –7 sequentially. An analysis of the entire survey

and future challenges are summarized in Section 8 . The paper concludes with a summary of the work done in Section 9 .

2. Related work

The authors explain the underlying system architecture and security issues in paper [2] . Previously some works related

to a security issue in IoT applications, infrastructure are already done. In Table 1 , a summary of some of the survey works

is mentioned. Although several works already exist in this regard from different perspectives, for implementation purposes,

there is no such study done. So in this survey, authors have identified the recent emerging technology (ML, AI, Blockchain),

which can be addressed security issues in IoT. Some of the work integration with recent technology and IoT has already

B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 3

Fig. 1. Internet of things infrastructure.

been done. In this survey, the authors tried to give the details about the insight of that technology how it will solve security

challenges in IoT. This will helps the reader to understand the IoT infrastructure creation and implementing it securely.

3. Internet of things (IoT) infrastructure,protocol, application

Internet of Things (IoT) has lots of potentials to apply in different real-time applications. It integrates sensors, smart de-

vices, radiofrequency identification (RFID), and the Internet to build an intelligent system. As per Goldman Sachs estimated

28 billion smart things would be connected to a different network by 2020. The growth of IoT in the last decade in such

a way that it incorporates everything from sensors to cloud computing intermediate with fog/edge computing. The IoT has

different types of a network like a distributed, ubiquitous, grid, and vehicular. The applications of IoT made a huge impact

in day to day life like sensors deploy in the patient body to monitoring in critical condition, monitoring gas leakage in smart

kitchen, agriculture field, smart car parking, smart transportation, tracking goods details in supply chain system using sen-

sors in the vehicle. The sensors are resource constraint devices connected through wired or wirelessly across heterogeneous

networks. The IoT networks are possessed different security, privacy, and vulnerable to the attacker.

3.1. IoT infrastructure

IoT application consists of different smart things that collect, process, compute and communicate with other smart things.

IoT has three layers physical, network, and application layer. Recently industries are developed many things which are em-

bedded with intelligent things. As shown in Fig. 1 IoT infrastructure consists of not only sensors, but it also integrates with

some emerging technology. The IoT application is based on either IoT-Cloud or IoT-Fog-Cloud. The security issue like data

privacy [13] , machine to machine communication [14] , real-time monitoring [15] and IoT testbed [16] are need to be ad-

dressed for efficient IoT applications. The architecture of IoT may be centralized, distributed, decentralized structure. In IoT

application processing and computing in real-time is one of the most challenging issues. Cloud computing provides more

storage and assures security to the data. But recently, most of the real-time monitoring IoT application demand processing

and computing in the edge of the network. So that quick action can be taken like monitoring the health condition of the

serious patient, fire detection. When processing and computing are done on the edge of the network using fog devices, it

becomes more vulnerable to the attacker as their devices are lightweight device traditional security is not applicable. During

analytic data, a technique like a machine learning is recently used to make the IoT system more intelligent and independent

to make a decision. The different smart devices are connected to make an application using some standard protocols. The

security issue exists in IoT infrastructure, which needs to be addressed to build trust among end-users and make the system

temper-proof. The data interoperability [17] in the IoT system works using an intelligent algorithm.

3.2. Standard protocol

The basic IoT architecture is a four layer network. Each of these layer consists of some standard protocol as shown in

Table 2 .

3.2.1. MQTT

MQTT stands for transportation of MQ Telemetry. It is a straightforward and lightweight messaging protocol for pub-

lishing / subscribe, designed for restricted devices and low bandwidth, high latency, or unreliable networks. The design

principles are to minimize the requirements for network bandwidth and device resources while also trying to ensure reli-

ability and some degree of delivery assurance. These principles also result in making the protocol ideal for the emerging

world of low end connected devices “machine-to-machine” (M2 M) or “Internet of Things.”

4 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

Table 2

Protocols & attacks on IoT layers.

Protocols & possible attacks in IoT layers

Layer Protocol name Possible security attack

Application MQTT, CoAP, REST, AMQP Repudiation Attack, DDoS Attack, HTTP Flood Attack, SQL Injection

Attack, Cross-Site Scripting, Parameter Tampering, Slowloris Attack

Transport TCP, UDP, DCCP, SCTP, RSVP, QUIC SYN Flood, Smruf Attack,Injection Attack, Mitnick Attack, Opt-ack Attack

Network CLNS, DDP, EIGRP, ICMP, IGMP,

IPsec, IPv4, IPv6, OSPF, RIM

IP Address Spoofing, DoS Attack, Black Hole Attack, Worm Hole Attack,

Byzantine Attack, Resource Consumption Attack.

Pysical DSL, ISDN, IDA, USB, Bluetooth,

CAN, Ethernet

Access Control Attack, Physical damage 0r Destruction, Disconnection of

Physical Links

3.2.2. CoAP

Constrained Application Protocol (CoAP), as defined in RFC 7252, is a specialized Internet Application Protocol for re-

stricted devices. It allows those restricted devices called “nodes” to use similar protocols to communicate with the broader

Internet. CoAP is designed to be used by devices on the same network.

3.2.3. REST

REST stands for State Transfer Member. REST is an architecture based on web standards and uses the HTTP protocol.

It revolves around resources where each element is a resource, and a resource is accessed using standard HTTP methods

through a specific interface. Roy Fielding introduced REST in 20 0 0. A REST server offers access to resources in REST archi-

tecture, and REST user accesses and modifies resources. Here, URIs / global IDs classify each asset. REST uses a variety of

representations to describe a resource such as text, JSON, XML.

3.2.4. AMQP

An open standard for transferring business messages between applications or organizations is the Advanced Message

Queuing Protocol (AMQP). It connects systems, feeds business processes with the information they need, and transmits the

instructions that achieve their goals reliably forward.

3.2.5. TCP

Transmission Control Protocol (TCP) is a connection-oriented communications protocol that provides the facility to ex-

change messages in a network between computer devices.

3.2.6. UDP

A Transport Layer protocol is the User Datagram Protocol (UDP). UDP is part of the Internet Protocol suite, known as UDP

/ IP. Like TCP, this protocol is unstable and unconnected. There is thus no need to create a link before transferring data.

3.2.7. DCCP

DCCP provides a way for congestion-control mechanisms to be accessed without having to implement them at the ap-

plication layer. It allows flow-based semiconducting, as in the Transmission Control Protocol (TCP), but does not provide

reliable delivery on-order. Sequenced transmission across multiple streams is not possible in DCCP, as in the Stream Control

Transmission Protocol (SCTP). A DCCP link requires both the network acknowledgment and data traffic. Acknowledgments

notify a sender that their packets have arrived and whether they have been labeled with an Explicit Notification of Conges-

tion (ECN).

3.2.8. SCTP

The Stream Control Transmission Protocol (SCTP) is a computer networking communication protocol that operates at the

transportation layer and serves a similar role to the popular TCP and UDP protocols. It is defined in RFC 4960 by IETF.SCTP

incorporates some of the features of both UDP and TCP: it is message-oriented like UDP and ensures secure, in-sequence

congestion-controlled transmission of messages like TCP. It differs from those protocols by providing multi-homing and

redundant paths to increase resilience and reliability.

3.2.9. RSVP

The Resource Reservation Protocol (RSVP) is a transport layer [1] protocol designed to use the distributed infrastructure

model to reserve resources across a network. RSVP works over an IPv4 or IPv6 and sets up resource reservations for multi-

cast or unicast data flows, initiated by the recipient. It does not transmit data from applications but is similar to a control

protocol, such as the Internet Control Message Protocol (ICMP) or the Internet Group Management Protocol (IGMP). RSVP is

set out in RFC 2205.

B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 5

3.2.10. QUIC

QUIC (pronounced’ quick’) is a general-purpose network layer protocol initially designed by Google’s Jim Roskind, intro-

duced and deployed in 2012, publicly announced in 2013 as an extended experiment and defined by the IETF. While still an

Internet-Draft, more than half of all Chrome web browser connections to Google’s servers use QUIC.[citation needed] Most

other web browsers don’t follow the protocol.

3.2.11. CLNS

Connectionless mode Network Service (CLNS) or simply Connectionless Network Service is an OSI Network Layer data-

gram service that does not require a circuit to be set up before data is transmitted, and routes messages to their destinations

independently of any other messages. CLNS is not an Internet service but offers f eatures similar to those offered by the In-

ternet Protocol (IP) and User Datagram Protocol (UDP) in an OSI Network environment.

3.2.12. DDP

Distributed Data Protocol (or DDP) is a client-server protocol designed to query and update a server-side database and

to synchronize such updates between clients. It uses a messaging pattern for publish-subscribe. The Meteor JavaScript ap-

plication was developed for use.

3.2.13. ICMP

Connectionless-mode Network Service (CLNS) or simply Connectionless Network Service is an OSI Network Layer data-

gram service that does not allow a circuit to be set up before data is transmitted and routes messages to their destinations

independently of any other messages. As such, it is a best-effort rather than a “reliable” delivery service. CLNS is not an

Internet service but offers f eatures similar to those offered by the Internet Protocol (IP) and User Datagram Protocol (UDP)

in an OSI Network environment.

3.2.14. DSI

Digital Serial Interface (DSI) is a protocol for regulating lighting (initially electrical ballast) in buildings. It is based on

Manchester-coded 8-bit protocol, 1200 baud data rate, 1 start bit, 8 data bits (dim value), 4 stop bits, and is the basis

for the more advanced Digital Addressable Lighting Interface (DALI) protocol. The technology uses a single byte (0–255 or

0x00-0xFF) to communicate the lighting level. DSI was the first use of digital communication to control lighting and was

the precursor to DALI.

3.2.15. ISDN

Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of

voice, video, data, and other network services over the traditional circuits of the public switched telephone network. The

key feature of ISDN is that it integrates speech and data on the same lines, adding features that were not available in the

classic telephone system. In the emergency mode of IoT devices, the ISDN facility can be useful.

3.3. Application

IoT applications are nowadays developed in many fields. The development of many open-source platforms like Azure

IoT Suite, IBM Watson, Amazon Web Services (AWS), Oracle IoT, Kaa, Bevywise IoT platform used for industrial IoT, IoTIFY

cloud-based platform used to build scalable IoT applications. Most of the opensource platform is enabled with AI and ML

technology for intelligent processing and computing the information. The manufacture of smart devices that can read, pro-

cess, and computing the things makes the IoT as one of the emerging fields. There are many application areas where IoT

is used, as shown in Fig. 2 . In these eight different application fields, IoT has already made an impact on enhancing and

increasing the efficiency of the system.

3.3.1. Smart home

The IoT makes the traditional home system into an intelligent one. The refrigerator, smart television, security camera, gas

sensors, temperature sensor, light system all can sense the home environment, communicate and connect to the internet

through wired or wireless. Even the refrigerator can place an order to the registered retail shop and give notification to

the user. Due to the development of smart things, the living standard becomes more comfortable. In paper [18] , authors

design a smart home system based on IoT technology. Using technology like IoT and Fog computing home converted into an

intelligent home system where monitoring of the home can be done remotely as well as processing can be done instantly.

The authentication of devices is essential to prevent unwanted access to the IoT network. The authors in Satapathy et al.

[19] and Panda et al. [20] proposed different authentication schemes for a smart home network. Still, some security issues

[21] , are exist in IoT based smart home systems.

6 B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227

Fig. 2. Internet of things applications.

3.3.2. Smart hospital

Since the development of IoT patient monitoring in real-time is possible with the use of sensors and fog/edge computing,

the paper [22] , authors have proposed an IoT-cloud based framework for data collection in the healthcare system. Similarly,

in Moosavi et al. [23] , authors performed the authentication and authorization of the smart devices in the healthcare system.

In the healthcare system, privacy is one of the main issues, so proper security and privacy protocol need to be developed to

secure the system.

3.3.3. Smart city

The ever-growing city has lots of problems like traffic management, waste management, waste management, and en-

vironmental management. The city needs a solution to monitor and control the problem exist. In papers [24,25] , authors

explained the challenges that exist in implementing smart cities and done a survey in detail about how IoT can solve an

existing problem. Using IoT and associated technology, a smart city can be developed to enhance the living standard of the

city, maintaining the security and privacy issue of the citizen.

3.3.4. Smart transportation

In recent times traffic is one of the major problems in a city. The intelligent transportation system is the need of the

hour. The IoT enables vehicles can collect information from the roadside unit and process to get the details about journey

path, time, and traffic details. Some of the research work [26,27] addressed the smart transportation issue using IoT. In

paper [28] , the authors proposed the IoT-ITS system for the transportation system. The authors in Dey et al. [29] proposed

a “Magtrack” to detect condition of the road surface using in-build mobile sensors and machine learning concepts.

3.3.5. Smart grid

The smart grid is one of the application areas of IoT, where a grid system can be made automation using IoT. The elec-

tric power generation and distribution among consumers can be monitor in real-time. The cybersecurity solution approach

[30] is explained in detail. The architecture of the IoT-Cloud based system proposed by the authors in paper [31] . The effi-

cient, economical and distribution can be improved using the IoT technology in the smart grid system.

B.K. Mohanta, D. Jena and U. Satapathy et al. / Internet of Things 11 (2020) 100227 7

Table 3

The different security attacks in IoT.

Different attacks cases and relevant research papers

Attacks type Paper

IoT

Attacks

Jamming attacks [43]

DoS attacks [44]

Intrusion detection System [45]

Malicious node [46]

Power analysis attack [47,48]

Internal attacks [49]

Access control [50]

Wormhole attack [51]

Side channel security [52]

Distributed Dos [53]

Man in the Middle attack [54]

Active attacks [55]

Routing attacks [56]

Sybil attacks [57,58]

Deceptive attack [59]

Spoofing [60]

Buffer overflow attack [61]

Impersonation attack [62]

3.3.6. Supply chain system

The IoT smart devices, once used in a supply chain management system, can fundamentally change the traditional way

to monitor the transport system. By using the IoT technique, the material is easily located, their current condition, packing

details, and it is easy to track how goods are a move through the supply chain. It increases to maintain the demand-supply

of good, easy to monitor the material movement, real-time tracking, efficient storage, energy efficient [32] , and distribution.

The authors in Li et al. [33] , explained how tracking and tracing could be done in real-time using the IoT system. Similarly,

in paper [34,35] authors, discussed the IoT based architecture and risk management in the supply chain system. In paper

[34] , authors have proposed artificial intelligent integration with IoT for the retail shop supply chain system.

3.3.7. Smart retails

The retail sector also using IoT services along with artificial intelligent [36] to enhance productivity, improve store opera-

tion, and to take the decision in real-time to manage the inventory system.

3.3.8. Agriculture

Agriculture is one of the promising application areas in IoT. In a smart agriculture system by deploying the sensors to

monitor the soil

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now