The Empowerment and Countermeasures of Artificial Intelligence in Internet of Things Security
DOI:
https://doi.org/10.54097/8g6ray94Keywords:
Intelligent defense, Adversarial challenges, Internet of Things.Abstract
Amid the backdrop of a surging number of Internet of Things (IoT) devices, a rapidly expanding attack surface, and the extension of security threats from the virtual realm to the physical world, traditional security mechanisms are confronted with severe challenges of insufficient scalability, real-time performance, and adaptability. Concurrently, the rapid development of artificial intelligence (AI) technology, particularly its advantages in pattern recognition, anomaly detection, and automated decision-making, offers new empowerment paths for IoT security protection. This research systematically reviews the key applications of AI in IoT security, including intelligent intrusion detection based on deep learning, continuous identity authentication based on behavior and radio frequency fingerprints, and privacy-enhanced threat detection relying on federated learning. These technologies have significantly improved the accuracy of threat identification, the real-time response, and the feasibility of cross-device collaborative defense. However, the research also delves into the new threat of "aggressive AI" formed by the exploitation of AI technology by attackers, including evading detection through generative adversarial networks, automated penetration based on reinforcement learning, and direct adversarial attacks against AI models themselves. This reveals that while AI enhances defense capabilities, it also introduces new vulnerabilities and adversarial dimensions. The conclusion of this study emphasizes that AI plays a dual role in IoT security, both empowering and attacking, driving the security game into a new stage of rapid escalation.
Downloads
References
[1] Zhang Y, Li J, Wang H. LSTM-based real-time DDoS detection for resource-constrained IoT gateways. IEEE Internet of Things Journal, 2023, 10 (8): 7123 - 7135.
[2] Kumar A, Park S. Lightweight autoencoder for botnet anomaly detection in industrial IoT. Computers & Security, 2021, 109: 102378.
[3] Chen X, Liu M, Ruan N. GNN-driven threat hunting by fusing network traffic and sensor logs in smart factories. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2022: 1841 - 1854.
[4] Ferretti M, Nicolazzo S, Nocera A. H2O: Secure interactions in IoT via behavioral fingerprinting. Future Internet, 2021, 13: 117.
[5] Li Z, Wang Q, Zhao Z B, et al. Continuous identity authentication method for power wireless terminals based on CSI radio frequency fingerprint. High Voltage Engineering, 2022, 48 (9): 3447 - 3455.
[6] Nguyen T V, Marchal S, Miettinen M, et al. DIoT-FL: A federated learning framework for distributed intrusion detection in large-scale IoT systems. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. 2022: 809 - 823.
[7] Wang H, Wang Z, Yang J. Fed-IDS: Federated learning-enabled intrusion detection scheme for IoT networks. IEEE Internet of Things Journal, 2022, 9 (22): 22455 - 22466.
[8] Wang X Z. BCS-FL: A blockchain-based privacy-preserving federated learning framework for industrial internet of things. Journal of Modeling and Simulation, 2025, 14 (5): 458 - 471.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Highlights in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







