4.5 Article

A survey of machine learning-based solutions to protect privacy in the Internet of Things

Journal

COMPUTERS & SECURITY
Volume 96, Issue -, Pages -

Publisher

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2020.101921

Keywords

Internet of Things (IoT); Survey; Privacy; Security; ML; Fog/edge computing

Ask authors/readers for more resources

The Internet of things (IoT) aims to connect everything and everyone around the world to provide diverse applications that improve quality of life. In this technology, the preservation of data privacy plays a crucial role. Recently, many studies have leveraged machine learning (ML) as a strategy to address the privacy issues of IoT including scalability, interoperability, and resource limitation such as computation and energy. In this paper, we aim to review these studies and examine opportunities and concerns related to utilizing data in ML-based solutions for privacy in IoT. We, first, explore and introduce different data sources in IoT and categorize them. Then, we review existing ML-based solutions that are designed and developed to protect privacy in IoT. Finally, we examine the extent to which some data categories have been used with ML-based solutions to preserve privacy and propose other novel opportunities for ML-based solutions to leverage these data sources in the IoT ecosystem. (C) 2020 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Agriculture, Multidisciplinary

Do food donation tax credits for farmers address food loss/waste and food insecurity? A case study from Ontario

Lesia Kinach, Kate Parizeau, Evan D. G. Fraser

AGRICULTURE AND HUMAN VALUES (2020)

Article Multidisciplinary Sciences

The environmental consequences of climate-driven agricultural frontiers

Lee Hannah, Patrick R. Roehrdanz, Krishna K. C. Bahadur, Evan D. G. Fraser, Camila Donatti, Leonardo Saenz, Timothy Max Wright, Robert J. Hijmans, Mark Mulligan, Aaron Berg, Arnout van Soesbergen

PLOS ONE (2020)

Article Psychology, Biological

The challenge of feeding a diverse and growing population

Evan D. G. Fraser

PHYSIOLOGY & BEHAVIOR (2020)

Letter Multidisciplinary Sciences

Reply to: 'Flooding is a key driver of the Tonle Sap dai fishery in Cambodia'

Gael Grenouillet, Kevin S. McCann, Bailey C. McMeans, Evan Fraser, Nam So, Zeb S. Hogan, Sovan Lek, Peng Bun Ngor

SCIENTIFIC REPORTS (2021)

Article Green & Sustainable Science & Technology

Evolution of drinking straws and their environmental, economic and societal implications

Poritosh Roy, Lisa Ashton, Maria G. Corradini, Evan D. G. Fraser, Mahendra Thimmanagari, Mike Tiessan, Atul Bali, Khurshid M. Saharan, Amar K. Mohanty, Manjusri Misra

Summary: Plastic waste issue has gained global attention, efforts are being made to replace single-use plastic straws, yet the potential impacts on environment, economy, and society need further analysis.

JOURNAL OF CLEANER PRODUCTION (2021)

Review Chemistry, Multidisciplinary

A Review on Security of Smart Farming and Precision Agriculture: Security Aspects, Attacks, Threats and Countermeasures

Abbas Yazdinejad, Behrouz Zolfaghari, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Evan Fraser, Arthur G. Green, Conor Russell, Emily Duncan

Summary: Smart Farming and Precision Agriculture have attracted attention in recent years for their potential to improve efficiency in agriculture. However, they also introduce new security threats that require awareness and proper countermeasures. This paper categorizes security threats within the SF/PA areas and provides a taxonomy for detecting cyber threats in SF and PA environments.

APPLIED SCIENCES-BASEL (2021)

Article Green & Sustainable Science & Technology

Digital agricultural technologies for food loss and waste prevention and reduction: Global trends, adoption opportunities and barriers

Addisalem (Addis) Benyam, Tammara Soma, Evan Fraser

Summary: Agricultural digitization has the potential to reduce food loss and waste, but current primary drivers are economic gains and cost reduction, rather than food loss prevention. The prohibitive investment costs and digital divide between technology adaptors limit the broad uptake of digital agricultural technologies in addressing food loss and waste.

JOURNAL OF CLEANER PRODUCTION (2021)

Review Food Science & Technology

Horizon scanning and review of the impact of five food and food production models for the global food system in 2050

Alesandros Glaros, Sarah Marquis, Chelsea Major, Philip Quarshie, Lisa Ashton, Arthur G. Green, Krishna B. Kc, Lenore Newman, Robert Newell, Rickey Y. Yada, Evan D. G. Fraser

Summary: This paper critically reviews five food frontiers and assesses their potential in reducing environmental footprints and enhancing food system sustainability. The findings suggest that cellular agriculture, controlled environment agriculture, entomophagy, and seaweed aquaculture have similar positive impacts, with controlled environment agriculture appearing to be the most feasible technology for large-scale implementation. The potential impacts of climate-driven northern agricultural expansion are mixed and may pose multiple risks to the global food system.

TRENDS IN FOOD SCIENCE & TECHNOLOGY (2022)

Article Biodiversity Conservation

Facing the challenges of using place-based social-ecological research to support ecosystem service governance at multiple scales

E. M. Bennett, P. Morrison, J. M. Holzer, K. J. Winkler, E. D. G. Fraser, S. J. Green, B. E. Robinson, K. Sherren, J. Botzas-Coluni, W. Palen

Summary: Place-based social-ecological research aims to improve local environmental governance while also providing insights for decision-making on larger scales or in other locations. However, transferring local perspectives and aggregating understanding to larger scales poses challenges.

ECOSYSTEMS AND PEOPLE (2021)

Article Food Science & Technology

Africa's Seed Revolution and Value Chain Constraints to Early Generation Seeds Commercialization and Adoption in Ghana

Philip Tetteh Quarshie, Abdul-Rahim Abdulai, Evan D. G. Fraser

Summary: The study highlights how constraints in the Early Generation Seeds value chain in Ghana hinder the commercialization and adoption of High Yielding Varieties (HYV) among smallholders, affecting trust and limiting the availability of improved seeds. To address these issues, targeted public and private sector relationships that recognize the critical roles of diverse actors in the value chain must be pursued.

FRONTIERS IN SUSTAINABLE FOOD SYSTEMS (2021)

Correction Food Science & Technology

Enhancing science-policy interfaces for food systems transformation (Nov, 10.1038/s43016-021-00406-6, 2021)

Brajesh K. Singh, Tom Arnold, Patricia Biermayr-Jenzano, Jacqueline Broerse, Gianluca Brunori, Patrick Caron, Olivier De Schutter, Shenggen Fan, Jessica Fanzo, Evan Fraser, Mirjana Gurinovic, Marta Hugas, Jacqueline McGlade, Christine Nellemann, Jemimah Njuki, Roberta Sonnino, Hanna L. Tuomisto, Seta Tutundjian, Patrick Webb, Justus Wesseler

NATURE FOOD (2021)

Article Multidisciplinary Sciences

How climatic and sociotechnical factors influence crop production: a case study of canola production

Krishna K. C. Bahadur, Danielle Montocchio, Aaron Berg, Evan D. G. Fraser, Bahram Daneshfar, Catherine Champagne

SN APPLIED SCIENCES (2020)

Article Public, Environmental & Occupational Health

The Limitations of Using Wasted Food to Feed Hungry People

Shannon Millar, Kate Parizeau, Evan D. G. Fraser

JOURNAL OF HUNGER & ENVIRONMENTAL NUTRITION (2020)

Article Area Studies

Perceptions of gender dynamics in small-scale fisheries and conservation areas in the Pursat province of Tonle Sap Lake, Cambodia

Y. K. Eugenia Kwok, Krishna Bahadur Kc, Jennifer J. Silver, Evan Fraser

ASIA PACIFIC VIEWPOINT (2020)

Article Computer Science, Information Systems

CyberEntRel: Joint extraction of cyber entities and relations using deep learning

Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina

Summary: This paper mainly introduces the construction of the cyber threat intelligence knowledge graph and the information extraction technique. By using joint extraction technique, it solves the problem of traditional techniques becoming ineffective due to the increasing size of CTI data. Experimental results show that this technique outperforms state-of-the-art models in knowledge triple extraction on CTI data and improves the F1 score.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Enhance membership inference attacks in federated learning

Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan

Summary: This paper proposes a new membership inference attack method in federated learning, which utilizes data poisoning and sequence prediction confidence. The attack is effective and results in minimal overall model performance degradation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu

Summary: In this paper, the authors propose a deep learning based dynamic malware detection method called CTIMD, which integrates threat knowledge from CTIs into the learning process of API call sequences with runtime parameters. Experimental results show that CTIMD outperforms existing methods in terms of performance.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

SuM: Efficient shadow stack protection on ARM Cortex-M

Wonwoo Choi, Minjae Seo, Seongman Lee, Brent Byunghoon Kang

Summary: This paper proposes SUM, a backward-edge control flow protection scheme for ARM Cortex-M processors. It combines MPU and the overlooked hardware feature FaultMask to achieve efficient and robust protection. The empirical evaluation shows minimal runtime overhead for the proposed solution.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Which factors predict susceptibility to phishing? An empirical study

Liliana Ribeiro, Ines Sousa Guedes, Carla Sofia Cardoso

Summary: Phishing susceptibility is influenced by individual and contextual factors. The study found that individuals who perceive themselves as capable of detecting phishing and those who use online services more frequently are more susceptible to phishing. However, technology competencies and other individual variables do not predict phishing susceptibility.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Optimization-based adversarial perturbations against twin support vector machines

Wenjie Wang, Yuanhai Shao, Yiju Wang

Summary: In this paper, we investigate the adversarial perturbations of twin support vector machines (TWSVMs) and propose an optimization framework, which provides explicit solutions to increase the interpretability of the conclusion and convenience for calculation.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability

Snofy D. Dunston, V. Mary Anita Rajam

Summary: This paper proposes a novel adversarial attack technique that can synthesize adversarial images to mislead deep learning models, and also studies interpretability plots. The research findings show that the proposed attack technique influences the interpretability plots, regardless of the success of the attack.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Protocol clustering of unknown traffic based on embedding of protocol specification

Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao

Summary: Protocol Reverse Engineering (PRE) is a direct approach for analyzing unknown traffic. This paper proposes a method for clustering unknown traffic based on private protocol labels, and the experimental results demonstrate its advantages on real-world network traffic.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

When explainability turns into a threat- using xAI to fool a fake news detection method

Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras

Summary: The inclusion of Explainability of Artificial Intelligence (xAI) has become a mandatory requirement for designing and implementing reliable, interpretable, and ethical AI solutions. However, it has been shown that xAI can enable successful adversarial attacks in the domain of fake news detection, leading to a decrease in AI security. This paper presents an attack scheme that uses an explainable solution to reshape the structure of the original message, allowing the adversary to manipulate the model's prediction while keeping the message's meaning intact.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Ensuring secure interoperation of access control in a multidomain environment

Benyuan Yang, Lili Luo, Zhimeng Wang

Summary: Interoperation is widely used in practical industrial applications, but merging local access control policies may lead to security violations. Dealing with these issues in a multidomain environment is critical, but finding the maximum secure interoperation among individual systems poses a challenge due to the large number of entities and access involved.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification

Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun

Summary: The ongoing struggle between security researchers and malware has led to the exploration of using convolutional neural networks and capsule networks for classification and identification of malware. However, training these networks requires a significant amount of data and parameters, and the research on capsule networks is still in its early stages, posing challenges.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model

Hongsong Chen, Xingyu Li, Wenmao Liu

Summary: Multivariate time-series anomaly detection is crucial for maintaining normal operation of physical equipment. Recent advances have been made in this field, but two challenges have limited the model's ability to generalize. To address these challenges, a multivariate time-series anomaly detection model consisting of a characterization network and a forecasting network is proposed. Experimental results demonstrate that this method outperforms baseline methods in terms of detection performance and robustness.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

FLAD: Adaptive Federated Learning for DDoS attack detection

Roberto Doriguzzi-Corin, Domenico Siracusa

Summary: This paper discusses the application of federated learning in the field of cybersecurity and proposes an adaptive mechanism-based federated learning solution for DDoS attack detection in dynamic cybersecurity scenarios. Through experiments, it is demonstrated that the proposed solution outperforms state-of-the-art federated learning algorithms in terms of convergence time and accuracy.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites

Antonio Giovanni Schiavone

Summary: The usage of HTTPS protocol is crucial for secure communication with websites, ensuring the confidentiality, integrity, and authenticity of online data transmissions. The Municipality2HTTPS research project analyzed the implementation of HTTPS in Italian municipalities' websites and identified areas for improvement.

COMPUTERS & SECURITY (2024)

Article Computer Science, Information Systems

Hello me, meet the real me: Voice synthesis attacks on voice assistants

Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis

Summary: Voice Assistants (VAs) are widely used in smart devices, but are vulnerable to attacks, as shown by experiments with popular VAs revealing successful attack rates exceeding 30% and statistical variations among vendors, calling for additional countermeasures to protect user information.

COMPUTERS & SECURITY (2024)