"If security is required": Engineering and Security Practices for Machine Learning-based IoT Devices

被引:8
|
作者
Gopalakrishna, Nikhil Krishna [1 ]
Anandayuvaraj, Dharun [1 ]
Detti, Annan [1 ]
Bland, Forrest Lee [1 ]
Rahaman, Sazzadur [2 ]
Davis, James C. [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Univ Arizona, Tucson, AZ USA
关键词
Internet of Things; Machine Learning; Security and Privacy; Cyber-Physical Systems; Embedded Systems; Software Engineering; INTERNET;
D O I
10.1145/3528227.3528565
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The latest generation of IoT systems incorporate machine learning (ML) technologies on edge devices. This introduces new engineering challenges to bring ML onto resource-constrained hardware, and complications for ensuring system security and privacy. Existing research prescribes iterative processes for machine learning enabled IoT products to ease development and increase product success. However, these processes mostly focus on existing practices used in other generic software development areas and are not specialized for the purpose of machine learning or IoT devices. This research seeks to characterize engineering processes and security practices for ML-enabled IoT systems through the lens of the engineering lifecycle. We collected data from practitioners through a survey (N=25) and interviews (N=4). We found that security processes and engineering methods vary by company. Respondents emphasized the engineering cost of security analysis and threat modeling, and trade-offs with business needs. Engineers reduce their security investment if it is not an explicit requirement. The threats of IP theft and reverse engineering were a consistent concern among practitioners when deploying ML for IoT devices. Based on our findings, we recommend further research into understanding engineering cost, compliance, and security trade-offs.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] A Machine Learning-Based Temperature Control and Security Protection for Smart Buildings
    Zaman, Mostafa
    Al Islam, Maher
    Zohrabi, Nasibeh
    Abdelwahed, Sherif
    2024 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING, SMARTCOMP 2024, 2024, : 290 - 295
  • [42] Security of Machine Learning-Based Anomaly Detection in Cyber Physical Systems
    Jadidi, Zahra
    Pal, Shantanu
    Nayak, Nithesh K.
    Selvakkumar, Arawinkumaar
    Chang, Chih-Chia
    Beheshti, Maedeh
    Jolfaei, Alireza
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [43] Machine Learning-Based Security Evaluation and Overhead Analysis of Logic Locking
    Yeganeh Aghamohammadi
    Amin Rezaei
    Journal of Hardware and Systems Security, 2024, 8 (1) : 25 - 43
  • [44] A Learning-Based Approach to Reactive Security
    Barth, Adam
    Rubinstein, Benjamin I. P.
    Sundararajan, Mukund
    Mitchell, John C.
    Song, Dawn
    Bartlett, Peter L.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 482 - 493
  • [45] A Learning-Based Approach to Reactive Security
    Barth, Adam
    Rubinstein, Benjamin I. P.
    Sundararajan, Mukund
    Mitchell, John C.
    Song, Dawn
    Bartlett, Peter L.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6052 : 192 - +
  • [46] Explaining Machine Learning-Based Feature Selection of IDS for IoT and CPS Devices
    Akintade, Sesan
    Kim, Seongtae
    Roy, Kaushik
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2023, PT II, 2023, 676 : 69 - 80
  • [47] Anomaly detection in IoT-based healthcare: machine learning for enhanced security
    Khan, Maryam Mahsal
    Alkhathami, Mohammed
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [48] Towards Machine Learning Enabled Security Framework for IoT-based Healthcare
    Pirbhulal, Sandeep
    Pombo, Nuno
    Felizardo, Virginie
    Garcia, Nuno
    Sodhro, Ali Hassan
    Mukhopadhyay, Subhas Chandra
    2019 13TH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST), 2019,
  • [49] A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective
    Neto, Euclides Carlos Pinto
    Dadkhah, Sajjad
    Sadeghi, Somayeh
    Molyneaux, Heather
    Ghorbani, Ali A.
    COMPUTER COMMUNICATIONS, 2024, 213 : 61 - 77
  • [50] IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review
    Idrissi, Idriss
    Azizi, Mostafa
    Moussaoui, Omar
    2020 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS), 2020,