"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices

被引:8
|
作者
Gopalakrishna, Nikhil Krishna [1 ]
Anandayuvaraj, Dharun [1 ]
Detti, Annan [1 ]
Bland, Forrest Lee [1 ]
Rahaman, Sazzadur [2 ]
Davis, James C. [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Arizona, Tucson, AZ USA
关键词
Internet of Things; Machine Learning; Security and Privacy; Cyber-Physical Systems; Embedded Systems; Software Engineering; INTERNET;
D O I
10.1145/3528227.3528565
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The latest generation of IoT systems incorporate machine learning (ML) technologies on edge devices. This introduces new engineering challenges to bring ML onto resource-constrained hardware, and complications for ensuring system security and privacy. Existing research prescribes iterative processes for machine learning enabled IoT products to ease development and increase product success. However, these processes mostly focus on existing practices used in other generic software development areas and are not specialized for the purpose of machine learning or IoT devices. This research seeks to characterize engineering processes and security practices for ML-enabled IoT systems through the lens of the engineering lifecycle. We collected data from practitioners through a survey (N=25) and interviews (N=4). We found that security processes and engineering methods vary by company. Respondents emphasized the engineering cost of security analysis and threat modeling, and trade-offs with business needs. Engineers reduce their security investment if it is not an explicit requirement. The threats of IP theft and reverse engineering were a consistent concern among practitioners when deploying ML for IoT devices. Based on our findings, we recommend further research into understanding engineering cost, compliance, and security trade-offs.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Machine Learning for IoT Devices Security Reinforcement
    Ea, Philippe
    Xiang, Jiahui
    Salem, Osman
    Mehaoua, Ahmed
    MACHINE LEARNING FOR NETWORKING, MLN 2023, 2024, 14525 : 1 - 13
  • [2] IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?
    Xiao, Liang
    Wan, Xiaoyue
    Lu, Xiaozhen
    Zhang, Yanyong
    Wu, Di
    IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (05) : 41 - 49
  • [3] Software-Defined IoT with Machine Learning-Based Enhanced Security
    Husnain, Ali
    Nguyen, Chau
    Le, Ngoc Thuy
    2023 28TH ASIA PACIFIC CONFERENCE ON COMMUNICATIONS, APCC 2023, 2023, : 430 - 435
  • [4] IoT Security and Machine Learning
    Almalki, Sarah
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (05): : 103 - 114
  • [5] Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and Challenges
    Chen, Huaming
    Babar, M. Ali
    ACM COMPUTING SURVEYS, 2024, 56 (06)
  • [6] Machine Learning-based Vulnerability Study of Interpose PUFs as Security Primitives for IoT Networks
    Thapaliya, Bipana
    Mursi, Khalid T.
    Zhuang, Yu
    2021 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE AND STORAGE (NAS), 2021, : 164 - 170
  • [7] Machine Learning-Based Cybersecurity Framework for IoT Devices
    Arabelli, Rajeshwarrao
    Buradkar, Mrunalini
    Lakshmaji, Kotla
    Dube, Anand Prakash
    Shiba, Mary C.
    Geetha, B. T.
    2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
  • [8] Cyber Security on the Edge: Efficient Enabling of Machine Learning on IoT Devices
    Kumari, Swati
    Tulshyan, Vatsal
    Tewari, Hitesh
    INFORMATION, 2024, 15 (03)
  • [9] Machine Learning Security Allocation in IoT
    Karthika, P.
    Babu, R. Ganesh
    Nedumaran, A.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 474 - 478
  • [10] Security Engineering for Machine Learning
    McGraw, Gary
    Bonett, Richie
    Figueroa, Harold
    Shepardson, Victor
    COMPUTER, 2019, 52 (08) : 54 - 57