Security and privacy in IoT using machine learning and blockchain: threats and countermeasures

Nazar Waheed, Xiangjian He*, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

97 Citations (Scopus)

Abstract

Security and privacy of users have become significant concerns due to the involvement of the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate outputs from large complex databases, where the generated outputs can be used to predict and detect vulnerabilities in IoT-based systems. Furthermore, Blockchain (BC) techniques are becoming popular in modern IoT applications to solve security and privacy issues. Several studies have been conducted on either ML algorithms or BC techniques. However, these studies target either security or privacy issues using ML algorithms or BC techniques, thus posing a need for a combined survey on efforts made in recent years addressing both security and privacy issues using ML algorithms and BC techniques. In this article, we provide a summary of research efforts made in the past few years, from 2008 to 2019, addressing security and privacy issues using ML algorithms and BC techniques in the IoT domain. First, we discuss and categorize various security and privacy threats reported in the past 12 years in the IoT domain. We then classify the literature on security and privacy efforts based on ML algorithms and BC techniques in the IoT domain. Finally, we identify and illuminate several challenges and future research directions using ML algorithms and BC techniques to address security and privacy issues in the IoT domain.

Original languageEnglish
Article number122
Pages (from-to)1-37
Number of pages37
JournalACM Computing Surveys
Volume53
Issue number6
Early online dateDec 2020
DOIs
Publication statusPublished - Feb 2021

Keywords

  • Blockchain
  • cybersecurity
  • Internet of Things
  • machine learning

Fingerprint

Dive into the research topics of 'Security and privacy in IoT using machine learning and blockchain: threats and countermeasures'. Together they form a unique fingerprint.

Cite this