IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v16y2024i1p32-d1322773.html
   My bibliography  Save this article

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

Author

Listed:
  • Hassan Khazane

    (RITM Laboratory, CED Engineering Sciences, ENSEM, Hassan II University, Casablanca 20000, Morocco)

  • Mohammed Ridouani

    (RITM Laboratory, CED Engineering Sciences, ENSEM, Hassan II University, Casablanca 20000, Morocco)

  • Fatima Salahdine

    (Department of Electrical and Computer Engineering, University of North Carolina at Charlotte, Charlotte, NC 28223, USA)

  • Naima Kaabouch

    (School of Electrical and Computer Science, University of North Dakota, Grand Forks, ND 58202, USA)

Abstract

With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are deployed to identify or thwart attacks, including intrusion detection systems (IDSs), malware detection systems (MDSs), and device identification systems (DISs). Machine Learning-based (ML-based) IoT security systems can fulfill several security objectives, including detecting attacks, authenticating users before they gain access to the system, and categorizing suspicious activities. Nevertheless, ML faces numerous challenges, such as those resulting from the emergence of adversarial attacks crafted to mislead classifiers. This paper provides a comprehensive review of the body of knowledge about adversarial attacks and defense mechanisms, with a particular focus on three prominent IoT security systems: IDSs, MDSs, and DISs. The paper starts by establishing a taxonomy of adversarial attacks within the context of IoT. Then, various methodologies employed in the generation of adversarial attacks are described and classified within a two-dimensional framework. Additionally, we describe existing countermeasures for enhancing IoT security against adversarial attacks. Finally, we explore the most recent literature on the vulnerability of three ML-based IoT security systems to adversarial attacks.

Suggested Citation

  • Hassan Khazane & Mohammed Ridouani & Fatima Salahdine & Naima Kaabouch, 2024. "A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks," Future Internet, MDPI, vol. 16(1), pages 1-42, January.
  • Handle: RePEc:gam:jftint:v:16:y:2024:i:1:p:32-:d:1322773
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/16/1/32/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/16/1/32/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Tala Talaei Khoei & Naima Kaabouch, 2023. "Machine Learning: Models, Challenges, and Research Directions," Future Internet, MDPI, vol. 15(10), pages 1-29, October.
    2. Afnan Alotaibi & Murad A. Rassam, 2023. "Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense," Future Internet, MDPI, vol. 15(2), pages 1-34, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tala Talaei Khoei & Aditi Singh, 2024. "A survey of Emotional Artificial Intelligence and crimes: detection, prediction, challenges and future direction," Journal of Computational Social Science, Springer, vol. 7(3), pages 2359-2402, December.
    2. Muhammad Imran & Annalisa Appice & Donato Malerba, 2024. "Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection," Future Internet, MDPI, vol. 16(5), pages 1-30, May.
    3. Bita Ghasemkhani & Kadriye Filiz Balbal & Derya Birant, 2024. "A New Predictive Method for Classification Tasks in Machine Learning: Multi-Class Multi-Label Logistic Model Tree (MMLMT)," Mathematics, MDPI, vol. 12(18), pages 1-27, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:16:y:2024:i:1:p:32-:d:1322773. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.