5
indicated the context of IoT using ML techniques
concerning data security and privacy protection. This
survey also described three challenges with respect to
ML application in IoT environments (i.e.,
communication and computation overhead, partial state
consideration, and backup security justifications).
Numerous survey studies, including [31, 32], have
examined the use of data mining and ML methods in
cybersecurity to assist intrusion detection. Above all,
they reviewed anomaly detections and misuse in
cyberspace [32]. The methodology was based on several
classes of AI (artificial intelligence) methods from the
point of view of an IoT context, and the opportunities of
applying those approaches in IoT environments were
observed. However, that work did not emphasize the
implementation of DL an IoT perceptive. The review of
[3] also provided ML techniques in IoT security where
they offered future challenges and current solutions.
Another survey of ML methods for wireless sensor
networks (WSNs) was appeared in [33].
The motivation of that study was to review ML
methods in real-life WSN applications. i.e., clustering,
localization, routing and unrealistic aspects of quality of
service (QoS) and security. The framework of WSNs in
DL methods was described in the work of [34]. On the
other hand, this work emphasizes network configuration.
Besides, it differs from the proposed survey that focuses
on DL/ML methods for ensuring IoT security. Some
traditional ML techniques [35] were considered with
advanced methods, including DL methods [36] for
processing big data. Above all, the relationship of several
ML techniques for signal processing approaches was
focused on investigating and processing relevant big
data. An overview of DL is offered on state-of-the-art
approaches [37]. The survey proposed the opportunities
and challenges of various existing solutions with their
uses and evolution. The essential principles of several
DL classifiers were evaluated with their procedures in
addition to developments of DL methods in several uses
[38, 39], for example, speech processing, pattern
recognition, and computer vision. In mobile advertising,
a review of improvement in DL methods was used for
recommendation systems, which show a crucial role
[40]. Various effective ML applications [41] were
similarly conducted in self-organizing networks. The
survey focused on the merits and demerits of various
methods and offered future opportunities and challenges
in expanding artificial intelligence and future network
design [42]. The significance of 5G in artificial
intelligence was highlighted. Intrusion detection using
data mining was covered in [43]. Application of
multimedia mobile was surveyed conducting DL
methods as well [44]. Recent DL techniques in mobile
security, speech recognition, mobile healthcare,
language translation, and ambient intelligence were
focused. Similar research was conducted on the most
advanced, state-of-the-art deep learning approaches used
in a diversity of IoT data analytics applications [45]. On
the other hand, our survey covers a complete review of
recent progress in deep learning approaches and cutting-
edge machine learning approaches for ensuring security
in IoT. This review compares and identifies the
advantages, prospects and weaknesses of different
DL/ML approaches for security in IoT. This paper also
discusses numerous future directions and challenges and
discuss the realized problems and future prospects based
on a study of possible DL/ML applications in the context
of IoT security, thus offering an effective guideline for
researchers or scholars to modify the security of IoT
environment from simply empowering a secure
communication between IoT modules to end on IoT
security on the basis of intelligence methods.
3. IoT Threat
Several heterogeneous sensing systems
communicating with one another through a local area
network (LAN) are referred to as the IoT [46]. The risks
in IoT are distinct from those posed by traditional
networks, owing in large part to the capabilities
accessible to end devices [47]. The traditional Internet
relies on powerful computers and servers with plenty of
resources, while the IoT relies on equipment with low
memory and computing power. That is why an IoT
device in the real world cannot continue employing
multifactor authentication and dynamic protocols like a
regular network. Wireless protocols applied by IoT
devices, for example, ZigBee and LoRa are less secure
than those used by traditional networks. A lack of a
standard operating system and particular features inside
IoT applications have resulted in various data contents
and formats in the systems, making the creation of a
uniform security protocol complicated [48]. There are
several security and privacy problems associated with the
IoT because of these flaws. As a network grows in size,
the risk of an attack rises. Since the IoT has no firewalls,
its network is more vulnerable than a traditional office or
company network. IoT systems that exchange data with
one another are frequently multi-vendor systems,
adhering to a wide range of spectra and protocols from
different manufacturers. The connection between such
devices is difficult, necessitating the use of a trustworthy
third party as a bridge [49]. Additionally, many reports
have posed concerns about how billions of smart devices
receive app updates [50, 51]. Since an IoT device has
small computing resources, its ability to cope with
advanced threats is harmed. To conclude, IoT
weaknesses may be classified as either essential or
widespread. For example, although vulnerabilities such
as battery drain attacks, insufficient standardization, and
insufficient confidence are exclusive to IoT systems,
vulnerabilities in internet-inherited systems may be
considered general. Numerous IoT risks have been
identified and classified in the past [32, 52-55]. We
address the most often identified challenges to the IoT
over the last ten years and try to categorize them into
privacy and protection classifications. Privacy and
security are basic principles that turn around network
availability [56-58]. On the internet of things, data may