Content uploaded by Sanjay Misra
Author content
All content in this area was uploaded by Sanjay Misra on May 28, 2024
Content may be subject to copyright.
Application of Machine Learning
for Ransomware Detection in IoT Devices
Roseline Oluwaseun Ogundokun , Joseph Bamidele Awotunde ,
Sanjay Misra, Oluwakemi Christiana Abikoye, and Oluwafemi Folarin
Abstract Internet users have been faced with a lot of threats with the growth of
malware around the world. Ransomware, one of the significant types of malware,
encrypts sensitive information and will not release the files until the user paid a
ransom. Internet of Things (IoT) structure is an extensive area of Internet-associated
instruments with additional computational capabilities with storage capacities that
have the potential to be harmed by ransomware developers. The IoT has been speedily
becoming more intense over the earlier years, and meanwhile, in these phases, one of
the weakest areas is security. Security affairs had continued to be a crucial worry for
businesses, despite the efficiency and prevalence of IoT growth. Therefore, the paper
presents a machine learning model to detect ransomware attacks on IoT devices. The
study used Power—to track and review the power consumption in 500 ms internals
of all operating processes. The paper used three devices to perform the experiments,
namely: Android device, Laptop computer, and Projector. The model was used to the
monitoring power consumption of IoT devices using various procedures to catego-
rize Ransomware outside non-malicious operations. Comparing the proposed system
with the existing model outperforms concerning correctness ratio, precision ratio,
recall ratio, and F-measure were considered.
Keywords Internet of things ·Ransomware ·Machine learning ·Malware ·
Encryption
R. O. Ogundokun (B)
Department of Computer Science, Landmark University, Omu Aran, Kwara, Nigeria
e-mail: Ogundokun.roseline@lmu.edu.ng
J. B. Awotunde ·O. C. Abikoye
Department of Computer Science, University of Ilorin, Ilorin, Nigeria
S. Misra
Department of Electrical and Information Engineering, Covenant University, Ota, Nigeria
O. Folarin
Center for System and Information Services, Landmark University, Omu Aran, Kwara, Nigeria
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2021
S. Misra and A. Kumar Tyagi (eds.), Artificial Intelligence for Cyber Security: Methods,
Issues and Possible Horizons or Opportunities, Studies in Computational Intelligence
972, https://doi.org/10.1007/978-3-030-72236-4_16
393
394 R. O. Ogundokun et al.
1 Introduction
In recent centuries the Internet of Things was emerged into mainstream public view
[1,2]. The IoT is a broad collection of gadgets consisting of sensors or actuators linked
via wired or wireless structures [3,4]. Over the last decade, IoT has developed rapidly,
and protection has been described as one of the weakest areas of IoT during develop-
ment [5,6]. There are currently more than six billion Internet-connected devices and a
projected 25 billion associated by 2020 [7,8]. The Internet of Things (IoT) denotes the
interconnected system of connections of intellectual instruments, radars, entrenched
processes how heterogeneous data is stored, processed and communicated [9–11]. In
the meantime, IoT is growing inefficiency and prevalence; security concerns remain
a critical concern for industries [12,13]. Internet-associated gadgets, in addition
to those installed in an IoT structure, are progressively directed by cyber-felonious
appropriated to their ubiquity [12,13] together with the capability to employ the
negotiated gadgets to additionally bout the fundamental structure [13,14].
In recent years, the prevalence of malware has increased dramatically.
Ransomware has grown into one of the most prominent strains of cybercrime [15,
16]. We see more Ransomware cases in 2017 than we have ever seen before due
to its ability to autonomously propagate across the network [12,13,17,18]. The
malevolent scheme, including adventure equipment, has constantly been regarded
as a significant device in virtual felonious [19,20]. Ransomware has been involved
into being a significant universal risk in the past two years with the FBI approxi-
mating that $1 Billion of ransoms requests were remunerated in 2016 [20–23]; thus
denotes 400% intensified from the preceding time [24–26]. During the same time-
frame, the U.S. witnessed a rise of 300% in the number of regular ransomware attacks
[27,28] and doubled the cost of the average demand for ransom [26,29,30]. For
example, in the condition of Ransomware, gadgets which can store a fair volume of
statistics (e.g., Android and iOS devices) are likely to be targeted [12,13,18,31].
Securing IoT knots in contrast to risks which includes Ransomware is, therefore, a
subject of continued concern [32–38]. While research into ransomware discovery and
alleviation is presently fresh, ransomware discovery and alleviation stay disputed.
Ransomware is, by comparison, a novel form of ad injector which makes an effort to
scramble data from a negotiated computer employing a powerful encoding procedure
[12,13,39,40]. The target will, at that moment, have to reimburse the hacker to get
the password or decryption key [21,41] (usually using bitcoins).
Botnet discovery and mitigation for IoT nodes have been described as solitary of
many investigation problems, including prospects, and still currently an investigation
subject [42–45]. Detection approaches include malware-based characteristics (for
instance, code autographs) and pursuit of malevolent behavior together with its vigor
devouring [46–49]. Several machine learning methods and systems for ransomware
detection have been suggested and implemented [20,22,50]. Dynamic computa-
tional methods, however, have drawbacks in that novel types of Ransomware can be
revamped to overtake the detection frequency through machine learning procedures
[20,51,52].
Application of Machine Learning for Ransomware Detection … 395
Hence, the paper uses machine learning techniques to perceive Ransomware on
IoT nodes based on their energy-use patterns. The proposed model grinds classify
and aggregate the power consumption of the unit into subsamples to increase the
detection rate to 98.35%.
The remaining section of this paper is systematized as thus: Sector 2 converses the
fundamental concepts of IoT, the safety issues of the IoT, and research trends in IoT
and Artificial Intelligence (A.I.) Techniques. Section 3presents overview concepts
of Ransomware, types of Ransomware and Ransomware spreading and infection.
Section 4discusses the rationale for the choice of machine learning procedures
for ransomware discovery in IoT gadgets. Section 5presents the practical case of
ransomware detection in IoT devices using Machine Learning Techniques. Finally,
Sect. 6concludes the study and addresses potential works to realize productive
utilization of machine learning aimed at perceiving Ransomware in IoT.
2 The Fundamental Concepts of IoT
Over the last year, IoT generated enormous interest in science. The concept of IoTs
seen as part of the future Internet and will consist of billions of smart things communi-
cating with each other. Some early IoT implementations in the healthcare, transporta-
tion, and automotive industries have already been developed [53,54]. IoT systems
are currently in their infancy; however, there have been several recent advances
throughout the integration of sensor objects into the cloud-based internet [53–56]. IoT
creation includes several issues, including communication networks, applications,
protocols and standards [53,57]. The terms Internet and Things refer to a worldwide
interconnected network emphasizing visual technologies, networking, information-
processing and connectivity, the latest version of interaction, which could be ICT [58].
Smart sensing and wireless communication technologies, in particular, became some
of the IoT’s components and the newest opportunities and forensic horizons appeared
[59]. Figure 1displays some of the domains where successful implementation of IoT
has been demonstrated.
IoT is triggered by Radio Frequency Identification technology [60,61], becoming
much more popular in various industries such as manufacturing and retail [62].
Disruptive technologies are the term used for technological advances that have
changed how ordinary products are done globally. The Internet of Things (IoT)
has been implemented in many aspects of daily life as part of the Disruptive Tech-
nology community. It is projected that the demand for IoT devices will rise to 20–30
billion by 2020 [63]. So far, IoT has provided a range of innovations, for example,
a remote detector network, barcodes, intelligent monitoring, RFID [64], NFC, fast
energy digital communications, cloud storage, etc. [57,65–67]. Such technology
evolutions introduce innovations to IoT [68–70].
It is projected that the demand for IoT devices will rise to 20–30 billion by
2020 [63,71–74]. The growing value of the Internet of Things (IoT) would have
a major effect on the economy, according to a study [71–74]. The IDC estimates
396 R. O. Ogundokun et al.
Fig. 1 Internet of things
that IoT devices have future earnings of $8.9 trillion [75,76]. Companies take note
and invest in this region. With IoT’s rising effect, we can see a rise in demand for
qualified professionals to support this business. Universities have begun introducing
IoT related courses in computing majors to meet this need, and many credential
awarding organizations have started.
The linking of physical objects to the Internet enables remote sensor data to
be accessed, and the physical environment monitored from a distance [77,78]. A
smart entity, the Internet of Things building block is just another word embedded
in the internet network [79–81]. Radio Frequency Identification is another tech-
nology pointing in the same direction as IoT. Radio Frequency Identification system
is an evolution of overwhelmingly powerful optical barcodes used on many everyday
goods. It allows an intelligent, low-cost electromagnetic identification tag to be added
to the label so that a product’s identity can be decoded from a distance [81]. The
tagged item is a smart object by adding more information into the I.D. tags. IoT inno-
vation does not in any groundbreaking new technology but rather in the ubiquitous
deployment of intelligent products.
For several years the notions of intelligent computers, tablets, intelligent automo-
biles, smart homes, smart cities called a digital planet have been advocated [82–84].
To date, several different and sometimes disjoint researchers have investigated how
these are done. Five such influential research groups are the IoT, personal computing,
ubiquitous computing (P.C.), remote device networks, and, most recently, virtual-
physical systems. Nonetheless, in both of these fields, as technology and solutions
advance, the convergence and integration of concepts and investigating questions is
growing. Most computer science, electronic engineering, and electrical engineering
are interested in the smart world view. Greater connections will promote development
in these groups [82–84].
Application of Machine Learning for Ransomware Detection … 397
2.1 The Security Issues of the Internet of Things
Internet of Things (IoT) is a modern concept incorporating elements and technologies
that came arising out of diverse perspectives [74]. Worldwide estimate, omnipresent
estimate, Online Network rule of conduct, identifying automation, networking
automation including entrenched devices are combined to create a network in which
the physical and expert system planets converge and are constantly communicating
in a symbolic manner [74,85]. The intelligent entity is the building block of the IoT
dream [14,79,80].
The IoT was initially anticipated in the preceding centenary, though attraction has
improved beyond the late 20 years [86], and several possible benefits exist. A recent
analysis found that by 2025 IoT would possess a probable fiscal effect of $3.9tn to
$11tn yearly [86–88]. Forecasting on the number of IoT gadgets that are associated
differs widely. A commonly cited figure is arising out of Cisco, which predicts fifty
billion items together with gadgets been associated in 2020 [89,90].
Although the IoT holds a great deal of promise, several security concerns
have been reported [91–93]. The Open Platform Application Protection Project
(OWASP) listed the 10 highest ranked affairs affecting IoT gadgets [94–99]. These
security problems are defined thus: apprehensive network communication; inade-
quate verification and authorization; apprehensive system facilities; nonexistence
of transport scrambling; confidentiality concerns; apprehensive cloud interchange;
apprehensive mobile communication; inadequate device arrangements; apprehen-
sive program/firmware; in addition to weak environmental protection [96–99]. This
is reverberated by work started by H.P. Fortify, and the results have been shown in
Fig. 2in general, deduced 70% of the extremely utilized IoT gadgets encompasses
safety vulnerabilities, including a typical amount of 25 safety issues are observed for
each system.
Health, confidentiality, and evidence security are essential apprehensions of
Internet of Things (IoT) product manufacturers [65,97]. Therefore, while there isn’t a
huge extent of dependability as concerns safety requirements, a little protection stage
is not suitable to household facilities concerning people’s protection and well-being
[97–101].
Each connected computer in IoT may be a possible gateway within the IoT
substructure or individual figures [37,102–107]. From initial design to operating
services, security must be discussed across the IoT lifecycle [108–110]. Data secu-
rity, privacy, and confidence are crucial research issues in the IoT scenario [92,111,
112]. Figure 3shows the pressures for IoT security. Old-style protection instru-
ments would be incompetent to completely support IoT gadgets because the greatest
part of the gadgets possesses cordless restrictions, including inadequate possessions;
nevertheless, they need additional possessions [92].
398 R. O. Ogundokun et al.
Fig. 2 Device-surface IoT safety susceptibilities. Source H.P. Fortify
Fig. 3 Design of security apprehensions in an internet of things milieu
Application of Machine Learning for Ransomware Detection … 399
2.2 Research Trends in IoT and Artificial Intelligence (A.I.)
Techniques
Technology is still a gateway to human society [113–115]. Human society has under-
gone three radical changes until now. Agricultural technology made the first revo-
lution; these innovations were the new age of human civilization started with colo-
nization [116,117]. The 2nd breakthrough was made with the locomotive, which
shifted the power source from animals to machines [118–120]. The industrial age
had its transformations, beginning with engine power [121,122]. With the aid of
large-scale production systems just like a conveyor belt, the dimension of manufac-
turing had transformed dramatically [123,124]. Once the substantial affluence is
met, the humanoid pursuit progresses to the subsequent stage of society [125–127].
More than 20 years have passed since information technology made the last revo-
lution. It is time to plan for the next revolution after the Neolithic revolt, the manu-
facturing revolt and the technology revolt, dubbed ‘the fourth wave.’ [117,128].
It can often be referred to as the ‘4th industrialization (industry 4.0)’ concerning
heat-powered machines, mass production systems, and I.T. [129–131]. Technologies
converge not only with communities but also with every human being in industry 4.0,
according to the World Economic Forum [124,132,133]. Technologies that make
integration possible, therefore, become the main innovations.
Machine intelligence is a technology developed to reflects, reason and handle
information. Smartness with A.I. can be done in several different services [134,
135]. Amenities ought to identify the setting’s framework where they are installed
to be smart and to decide astronomically what to do in the given situation to achieve
the objective. Primary issues in A.I. include improving the depth of knowledge
through symbolic and numerical approaches, rationalizing knowledge base, implicit
knowledge and applying knowledge base to intelligent services [136,137]. Recent
developments in machine learning techniques have triggered significant growth in
creativity and technology [138,139].
AI-based techniques and strategies are expected to be gradually incorporated into
the IoT Stack’s various IoT architectural layers and to create an application for
artificial intelligence of things for IoT’s next-generation [140]. The existing segment
of the Artificial Intelligence (A.I.) industry is segmented and has no shared vision of
where A.I. can help humans, defined by most operations relying on a line approach
to solutions. In IoT, Artificial Intelligence could be used to improve privacy, protect
resources and minimize theft. It’s not quite clear how to use Artificial Intelligence
for the good of man globally.
Today, A.I. includes the understanding and application of different computational
tools, including the collection of data and simulation, data management (including
language processing, machine learning), but also analysis through analytics and visu-
alization of IoT system [55,141] and the development of potential IoT applications
for A.I. of things (AIoT). AI-based includes understanding and applying various
400 R. O. Ogundokun et al.
computational techniques, including data analysis and processing and data manage-
ment [134,142,143]. It also involves algorithms, insightful learning and interpreta-
tion of natural language by modelling and simulation, among others [144,145]. A.I.
methods are gradually integrated into the architectural layers of IoT and IoT Layer
[55,140]. Then build A.I. of things (AIoT) applications for the Internet of things
applications in the coming years. They are implementing AI-based technologies to
process IoT data for automated strategic decisions in different IoT architectural layers
introduces sensibly integrated IoT environments that could be merged with emerging
technologies (A.I., bots, automation, AR/VR) to create cognitive solutions through
a cognitive IoT partnership system [140,146] as results of high available computing
capacities. The IoT and Deep learning (DL) has been commonly used in Personal-
ized Healthcare (P.H.) applications [147–149]. In general, these systems are a series
of interconnected IoT tools for predictive analysis, diagnosis, remote monitoring,
preventive analysis and, in some cases, surgery [147,150–152]. Through develop-
ments in IoT, machine intelligence, and networking technology, cloud computing
provides a new approach to the issue by partially or fully processing the data at the
edge of a control network [153,154].
3 Overview Concepts of Ransomware
Ransomware as-a-service archetypal aiding smooth accessibility and arrangement
has to turn out to be a substantial universal risk, and the probable aimed at huge returns
forming a practical felonious enterprise archetypal. Ransomware is an extortion-
based malware attacker; it locks/encrypts the data on the victim’s machine and asks
for a ransom (money) payable in Bitcoin, thus, name ransomware [155,156]. From
the last four to five years, some high-profile ransomware attack was reported and
got attention. Due to the WannaCry attack, which affected the British Health care
system, this type of attack got attention [157–159]. Ransomware tries to coerce
currency from its target by scrambling archives and requesting reimbursement in
exchange for recovery [21,23]. Typically aimed archives are the victim’s Archives
files, electronic mail, images, and melody. Gradually, Ransomware poses a threat to
the security of the information infrastructure. Unlawful deployment of Ransomware
has inflicted millions of dollars of monetary damage on end-users and businesses
[155]. Malware intrusion into end-user devices and subsequent theft of their network
or data, Ransomware has emerged as a danger that the cyber-security community
needs urgent attention and containment. It now accounts for nearly $1 billion in
damages [23,160–166].
With an estimated 7 billion devices worldwide in 2018 and a rise of over 22 billion
devices by 2025 [70,167], the Internet of Things (IoT) affects all aspects of life.
Ransomware is malware designed for one particular purpose: to block access to
computers or files before a sum of money is charged, usually in bitcoin [28,168,169].
The average payment for Ransomware ranges from $500 to $5000, but payments
were recorded as high as $150,000 [28,169]. Ransomware costs to companies and
Application of Machine Learning for Ransomware Detection … 401
Fig. 4 Ransomware lifecycle
customers alike were projected at about $8 billion, and the cost rises to $20 billion by
2021 [170]. Ransomware is a lucrative industry for criminals and has risen by 56%
from the end of 2016 to the beginning of 2018 [171–173] to no surprise. Cybercrim-
inals will have new ways to reveal company vulnerabilities and extort money from
customers with the steady growth of IoT apps [174–177]. Ransomware’s success has
created a unique cybercriminal ecosystem. Consequently, this study aims to provide
a detailed understanding of the threat of Ransomware in IoT devices, address recent
detection techniques used and use a machine learning approach to detect it in IoT
devices. The positive attack on Ransomware has significant financial consequences,
which are fueled by many sophisticated enablers such as encryption technology,
cyber currency, and accessibility.
3.1 Ransomware Lifecycle
Due to the rapid growth of its attacks and the development of new variants able
to circumvent antivirus and anti-, Ransomware has attracted considerable attention
from cybersecurity experts in recent years [176,178]. There are seven stages in the
ransomware lifecycle, as shown in Fig. 4[176]. The development stage also includes
refining the codes at the end of each cycle to improve the Ransomware’s potency.
3.2 Taxonomy of IoT Security
Figure 5shows the taxonomy built based on different criteria, including threats,
requirements, IEEE standards, deployment levels, and technologies.
402 R. O. Ogundokun et al.
Fig. 5 Taxonomy of IoT security [92]
3.2.1 Threats
In IoT, systems material can be exposed or lost. So, it is essential to protect personal
uprightness, keys and credentials [92,179,180]. Subsequently, vulnerable IoT apps,
together with their gadgets, reveal entrenched ownership procedures that might
be effortlessly copied illegally or scrutinized [181], intellectual property can be
compromised. To avoid discovering unknown bugs, it is recommended that reverse
engineering, study, or manipulation of the code is usually made more difficult for
hackers.
3.2.2 Requirements
Strategies for authenticity are used to ensure the continuity and reliability of the data.
Digital signatures and hash functions are used to ensure data integrity. Besides, data
concealment must be maintained in the direction of storage position and the system
route in the IoT system. It applies to shield information from unauthorized access
and divulgation. An IoT system, for example, does not disclose the sensor reading
to its surroundings.
Application of Machine Learning for Ransomware Detection … 403
3.2.3 IEEE Standards
The standardized IEEE P1363 specifies irregular encoding procedures, such as math-
ematical essentials for concealed password creation. Additionally, it employs a very
mathematical foundation in consideration of the cryptosystem structure.
3.2.4 Deployment Level
Safeguarding of devices or facilities is a significant issue, and the implementation
of superlative routine which includes confining outside computer connections, deac-
tivating impressionable gadgets/endpoints from undeviating online network entree,
certifying that only particularized networks are allowed, safe loading (exploiting
passwords) and safe firmware, implementing system verification in everylink facility,
Revamping and repairing devices on O.S., creating whitelisting links, and introducing
stable key exchanges [180]. External and system protection solutions are efficient for
segregating delicate shreds of evidence. The amenity contributor has to acquire and
generate certificates of affirmation [182]. Cloud protection and IT-industries require
special attention. Most IoT created data is stored in the cloud [183].
Motivation-Rational for choosing Machine Learning techniques for
Ransomware detection in IoT devices
Artificial Intelligence systems provide tremendous advantages, which can be mali-
ciously used. Extremely focused and difficult attacks in friendly carriers [184], such
as DeepLocker, demonstrated a deliberate use of Artificial Internet for negative
purposes [185,186]. Over the past years, artificial intelligence (A.I.) technologies
have progressed rapidly, and their capabilities have extended into several domains
[187]. From smart governance, smart buildings, smart transportation, and smart grids
to smart “anything,” A.I. turns the flood of data into actionable information [134].
These A.I. technologies are important to internet security by gathering large quanti-
ties of amounts of information and then process easily to detect malicious patterns
and anomalous behaviors [188–194].
Therefore, conventional information gathering, management, and analysis
methods might not operate on this scale [195,196]. Also, the complexity of the
data produced by IoT provides a different front for the existing data processing
mechanisms [197–200]. Personal security and data protection are two of the main
considerations in the company implementation of IoT facilities and implementations
[102,198]. The shortcomings of the IoT systems and the world in which they work
present additional security problems for software and systems [102,201,202]. To
present, protection and confidentiality problems in the IoT domain have been thor-
oughly investigated from various perspectives such as communication protection,
data security, privacy, architecture security, authentication, malware detection, etc.
[203–205]. Therefore, this study is based on ML’s applications in providing IoT
protection and privacy services again Ransomware.
404 R. O. Ogundokun et al.
4 Practical Case of Ransomware Detection in IoT Devices
Using Machine Learning Techniques
The Ransomware comes accompanying the goal to tackle and govern computer
systems and elementary substructures; thus, they are exceptional and improved mali-
cious programs. The threats are majorly pointed at straightforwardly or circuitously
assembling coinage from preys requesting for ransoms in trading for decoding
secured passwords [206].
4.1 Modeling the Power Consumption
The universal energy devouring of a gadget can be modeled as the quantity of the
energy devouring of each solitary gadget constituent. The level of approximation of
the model is given both by the precision of the measurements for the single compo-
nents and by the completeness of the component set. It is said that a good approx-
imation of a complete set of components allowing precise measures of the power
consumption of a smartphone is: CPU, Screen, Wi-Fi, Cellular radio, GPS, Flash
memory, GPU, Bluetooth, Audio amplifier. This modeling leads to the formulation
of the equation shown below, where Ciis the energy devouring of the ith gadget
constituent at a specified cordless dimension.
C=
i
Ci(1)
Assumed an action scheduled the gadget (for example document conveyance)
the universal devouring is modeled on the point that the quantity of the aids of the
whole hardware constituents connected to the schedule and of the aids to power
devouring that are self-governing as of from the same action (considered as “corrupt
devouring”). Thus, universal consumption C is defined as:
C=
i
(fi+gi)=B+P8(2)
where
fiis the ith component of the base consumption;
giis the activity for the ith component associated with a precise autho-
rized/malevolent consumption;
B=
i
fiis the base consumption of the complete constituents;
P8=
i
giis universal consumption associated with precise action?
The consumption footprint of a particular operation (Ps) can be extracted by calcu-
lating the amount of the base consumption of all components (B) and by subtracting
Application of Machine Learning for Ransomware Detection … 405
such value from the global one calculated in a given moment. In practical terms,
calculating global power consumption requires creating a proper software measure-
ment module for each hardware device capable of capturing its unique characteristics.
The first contribution to that task was given in Curti et al. [207], where a model for
the Wi-Fi component was defined correspondent software module was provided.
4.2 Refining the Model for the Wi-Fi Consumption
Just as shown in the preceding segment, the general model isolates the energy contri-
butions of diverse hardware constituents, which ought to be independently deter-
mined by ad hoc units. The process of populating the sum with the appropriate
contributions has been started in [207,208], where a model for the Wi-Fi has been
provided and, through experiments, the value set of the model parameters have been
empirically assessed. In fact, in Eq. 2, while all the f components may be considered
negligible compared to the power consumption due to the specific activity, it is not
possible to assume that all the g components but the Wi-Fi are null. It is instead
necessary to get to this formulation: Thus, the global consumption C is defined as:
C=
i
(fi+gi)=B+Ps+Gw+GC(3)
where
fiis the ith component of the base consumption;
giis the activity for the ith component associated with a precise autho-
rized/malevolent consumption;
B=
i
fias previously defined, the base consumption of the complete
components;
Ps=
i
giis the global consumption associated with the specific activity of
authorized/malevolent for all hardware components except Ww−FCand CPU?
4.3 The CPU Consumption
CCPU =If∗Vf∗T(4)
where If is the current absorbed by the CPU at operating frequency f,Vff, is the
voltage needed at operating frequency f, and T is the duration of the time frame in
which we assume the operating frequency is constant. While the model is general,
it contains parameters whose values are specific for single hardware, namely Ifand
Vf.
406 R. O. Ogundokun et al.
4.4 The Long Short-Term Memory (LSTM)
There are four neural network layers in the framework of LSTM that interact to
delete or add information to the cell state. The input tier vector xt, each accepts
three inputs, ht−1the output of the preceding tier and Ct−1value in the cell from
the previous cycle. The first step in LSTM is to determine how much preceding
information must be stored in the cell. The forgotten gate layer is defined by the
sigmoid layer. The sigmoid activation function (σ)takes xtand ht−1returns a value
between 0 and 1 as output, multiplied by the value of Ct−1. A production of 1 for
the sigmoid will maintain the previous value completely, and it will be replaced by
a value 0. LSTM’s structure comprises four neural network layers, networking to
delete or add information to the cell’s value from the previous process.
ft=σWfht−1,xt+bf(5)
The next move is to change the value of the memory cells. It has two parts and the
first is a sigmoid layer that determines which values are modified, and the second is
a tanh layer (δ)that is a hyperbolic tangent function that returns values between 1
and −1. The tanh layer generates Ctthe vector for new candidate values.
it=σWiht−1,xt+bi(6)
Ct=tanhWCht−1,xt+bC(7)
The old ct −1 state is multiplied by f t, which forgets the values we agreed on in
the previous step. The result will then be appended it∗ct. The consequence is the
new nominee value that will be stored in the cell. We were gathering new information
in the cell at this point.
The final step is the current-cycle output ht. The output is a filtered, cell-state
version of the value. Next, we run the sigmoid layer to determine which part of the
cell state we will be outputting. The cell-state value is given to the tanh function, the
output of which is multiplied by the sigmoid layer output. The production is then
moved to the next LSTM device within the network.
Ot=σWoht−1,xt+bo(8)
ht=Ot∗tanh(Ct)(9)
Application of Machine Learning for Ransomware Detection … 407
5 Proposed Method
The power usage of targeted applications is required for developing a ransomware
energy consumption for IoT devices. The study used Power—to track and review
the power consumption in 500 ms internals of all operating processes [13,18,208].
At a given model interval of each phase, Power-generated a log file containing an
arrangement of generated power practice in the direction of an accustomed experi-
ment intermission. The paper used three devices to perform the experiments, namely:
Android device, Laptop computer, and Projector. Some common applications such as
Gmail (version 9.6.83), Facebook (version 99.0.0.26.69), Google Chrome (version
53.0.2785.124), YouTube (version 11.39.56), and Skype (version 7.20.0.411) have
been installed to collect Ransomware and good-ware energy usage logs, and four
models of Ransomware have been running on all computers.
Power-Tutor was used to track and document the power consumption system
for 10 min when running Ransomware and the applications separately. Good-ware,
defined as running programs, imaged real-world use of user interactions. This process
was repetitive five times per device; thus, we obtained 10repeation ×3devices =30
energy custom models for separate applications, including Ransomware. The Power
employed for the entire gadgets has been planned to a limited extent because the CPU
of each device has its specification for power users to make a reasonable evaluation.
Across all controlled processes on the machines, the CPU power usage has been
standardized to [0, 1], where 1 provides the maximum CPU power utilization and 0
implies no power consumption. Codes were inscribed to implement logfiles, deduce,
and standardize control practice rates, together with creating row-standardized data
to extract and normalize power usage values. What row consists of a mark (i.e.,
good-ware or Ransomware) besides a structured energy consumption arrangement
for five minutes of operation.
Models of power consumption are divided into submodels to resolve a wide distri-
bution of characteristics before using categorization procedures towards classifying
the sticky tag of the submodels. It was assumed that a fixed window size (interval)
divides the power consumption models when the process began and pushes them
onward, beginning from the preliminary opinion of every illustration, thus adding a
novel submodel towards a collection of submodels in every stage. The model set defi-
nition receives, aperture extent w together with the directory created for the submodel
was described in algorithm 1. The submodel (Aperture) is a period-rate. Therefore,
for 6 Power-Tutor intervals it includes w =10 of the submodel, its time-length is 10
=5000 ms.
408 R. O. Ogundokun et al.
Algorithm I
Input: Model set
Input: aperture extent w
Output: Submodel set DB
DB ← { }
for i ← 1- n do
i ← 1
while (l + w), length(model) do
Appned (Label, Pi, …, Pi + w) to D.B.
l ← l + 1
end
end
return D.B.
={Model1,Model2, , Modeln}
To evaluate the model class for each submodel, each submodel has to be assigned
a name. The D.B. submodel database was trained in algorithm 2 using the classifier.
The model classification algorithm (1) was used after the model was split into a
series of submodels to classify the mark by the qualified classifier for each submodel.
Depending on the design, nearly all very much alike objects in the submodel database,
the method identifies the model class dependent. It determines its final label by
combining the labels of all submodels.
Algorithm II
Input: Submodel database DB & Model
Output: Label {R, G}
Labels ← { }
Classifier = Train-Classifier (DB)
Submodel = Grind Model Employing Algorithm 1
i ← 1
while i < dimensions (Submodels) do
L ← Classifier (Submodel i)
Append L to Labels
i ← i + 1
end
return most recurrent element in labels
Application of Machine Learning for Ransomware Detection … 409
The next section discusses the results.
6 Results and Discussion
LSTM network implementation was performed using R programming. The training
network is composed of 3 layers, with 64 LSTM nodes in each layer. The proposed
method used sigmoid as the activation function and Adam optimizer, as this is a
problem with binary sequences classification. The experiment was conducted using
various window sizes, ranging from 5 to 50 in each case with an increment of 5.
Therefore, each dataset includes submodels of the length w of the window size. The
classifier was used for the classification of all submodels of each sample. Using
LSTM, the ground data was measured. To summarize the results, another setting (K
=5, 10) was omitted, and K =1 is the setting with higher efficiency.
The assessment of success in machine learning has been used to assess the
proposed method. The following metrics widely used in the literature, namely: accu-
racy, recall, precision, and F-measure, were used to test the efficacy of the proposed
technique, along with other algorithms of machine learning. For the proposed
approach, the following machine learning was used as a comparison: Random Forest
(RF), Support Vector Machine (SVM), Neural Network (NN), and Dynamic Time
Warping (DTW) for k-Nearest Neighbor (KNN).
Table 1summarizes a performance comparison between the proposed model and
other related machine learning in IoT devices for ransomware detection. It can be seen
from the table that the built model performed better with 96.42% accuracy, followed
by KNN with DTW with 94.27% accuracy. SVM has an accuracy of 91.19%, NN
has 90.67% accuracy, and RF has 87.56% accuracy. The LSTM model with power
consumption ransomware detection for IoT obtained the best results. The LSTM
outperformed the other machine learning based on the devices used. The developed
LSTM machine learning algorithm for ransomware detection of power consumption
for IoT devices showed better performances across all evaluation metrics than similar
approaches.
Tabl e 1 Performance and evaluation metrics of machine learning procedures comparison overview
Model Accuracy Recall Precision F-measure
RF 87.56 78.57 88.89 81.20
SVM 91.19 94.20 88.37 88.44
NN 90.67 88.41 86.96 86.96
KNN and DTW 94.27 95.65 89.19 92.31
Proposed method 96.42 95.75 91.07 93.17
410 R. O. Ogundokun et al.
7 Conclusion and Future Work
The large-scale implementation of IoT and the technologies that include networking,
data storage, management, and analytics endanger and expose it to attacks by
Ransomware. The need for a secure and productive connection grows as the Internet
is more deeply incorporated through the IoT platform into our business operations.
When attacks have occurred, they will have enduring and crippling effects on IoT
growth. With the increased prevalence of things in our data-centric society and
Internet-connected devices, the security of IoT devices cannot be overemphasized.
The successful compromise of any IoT devices could hold the device to ransom.
For instance, the case of Ransomware holding any device and denying access or
not available for use to information in the IoT environment may perhaps harmfully
influence the process, thus causes reputation destruction to industries and result in
substantial financial damage.
The research presented an approach that uses its power consumption to detect
Ransomware in IoT devices. Precisely, to distinguish Ransomware from non-
malicious applications, use the single resident fingerprint of the energy consumption
of Ransomware. The power-use subsample sequences were created from splitting into
several sequences of energy consumption applications; thus, classified to create the
class labels of collected subsamples. The proposed model adopts a recurrent LSTM
classifier for the neural network, equipped with an improved version of the back-
propagation algorithm. Quality evaluation findings show the efficacy of the proposed
model for improving ransomware detection in IoT systems. The results of the exper-
iments showed that the method achieved a 96.42% detection rate and a 91.07%
accuracy rate. The proposed system only used LSTM for ransomware detection in
IoT devices. Future work, therefore, will seek to use feature selection algorithms to
select more informative features for better classification. It will also help create a
reliable framework by combining more than one machine learning technique, thereby
improving system output accuracy. In the future, to classify power consumption at
the line rate, the classifier will be written in C++ as a stream processing kernel to
speed up the classification process. Therefore, the proposed model will be proficient,
appropriately and proficiently active in real-time situations.
References
1. Wollschlaeger, M., Sauter, T., & Jasperneite, J. (2017). The future of industrial communica-
tion: Automation networks in the era of the internet of things and industry 4.0. IEEE industrial
electronics magazine,11(1), 17–27.
2. Granell, C., Kamilaris, A., Kotsev, A., Ostermann, F. O., & Trilles, S. (2020). Internet of
things. In Manual of digital earth (pp. 387–423). Springer, Singapore.
3. Dai, H. N., Wang, H., Xu, G., Wan, J., & Imran, M. (2019). Big data analytics for manu-
facturing internet of things: Opportunities, challenges and enabling technologies. Enterprise
Information Systems, 1–25.
Application of Machine Learning for Ransomware Detection … 411
4. Makkar, A., Garg, S., Kumar, N., Hossain, M. S., Ghoneim, A., & Alrashoud, M. (2020). An
efficient spam detection technique for IoT devices using machine learning. IEEE Transactions
on Industrial Informatics.
5. Vignau, B., Khoury, R., & Hallé, S. (2019). 10 years of IoT malware: A feature-based
taxonomy. In 2019 IEEE 19th International Conference on Software Quality, Reliability and
Security Companion (QRS-C) (pp. 458–465). IEEE.
6. Wallace, T. (2019). An increasing reliance on and use of the internet of things (IoT): Security
issues, best practices, and benefits (Doctoral dissertation, Utica College).
7. Benamar, L., Balagué, C., & Zhong, Z. (2020). Internet of things devices appropriation
process: The dynamic interactions value appropriation (DIVA) ramework. Technovation, 89,.
8. Poongodi, T., Krishnamurthi, R., Indrakumari, R., Suresh, P., & Balusamy, B. (2020). Wear-
able devices and IoT. In A handbook of internet of things in biomedical and cyber physical
system (pp. 245–273). Springer, Cham.
9. Adesola, F., Misra, S., Omoregbe, N., Damasevicius, R., & Maskeliunas, R. (2019). An IOT-
based architecture for crime management in Nigeria. In Data, engineering and applications
(pp. 245–254). Springer, Singapore.
10. Gill, S. S., Tuli, S., Xu, M., Singh, I., Singh, K. V., Lindsay, D., … Pervaiz, H. (2019). Internet
of things.
11. Rakshith, G., Rahul, M. V., Sanjay, G. S., Natesha, B. V., & Reddy, G. R. M. (2018). Resource
provisioning framework for IoT applications in fog computing environment. In 2018 IEEE
International Conference on Advanced Networks and Telecommunications Systems (ANTS)
(pp. 1–6). IEEE.
12. Dash, A., Pal, S., & Hegde, C. (2018). Ransomware auto-detection in IoT devices using
machine learning. International Journal of Engineering Science, 19538.
13. Azmoodeh, A., Dehghantanha, A., Conti, M., & Choo, K. K. R. (2018). Detecting crypto-
ransomware in IoT networks based on energy consumption footprint. Journal of Ambient
Intelligence and Humanized Computing, 9(4), 1141–1152.
14. Fortino, G., Rovella, A., Russo, W., & Savaglio, C. (2014). On the classification of
cyberphysical smart objects in the internet of things. In UBICITEC (pp. 86–94).
15. Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited.
16. Formby, D., Durbha, S., & Beyah, R. (2017). Out of control: Ransomware for industrial
control systems. In RSA conference.
17. Bhardwaj, A. (2017). Ransomware: A rising threat of new age digital extortion. In Online
banking security measures and data protection (pp. 189–221). IGI Global.
18. Azmoodeh, A., Dehghantanha, A., & Choo, K. K. R. (2018). Robust malware detection for
internet of (battlefield) things devices using deep eigenspace learning. IEEE Transactions on
Sustainable Computing, 4(1), 88–95.
19. Allodi, L., Kotov, V., & Massacci, F. (2013). Malwarelab: Experimentation with cybercrime
attack tools. In Presented as part of the 6th Workshop on Cyber Security Experimentation and
Test .
20. Alhawi, O. M., Baldwin, J., & Dehghantanha, A. (2018). Leveraging machine learning
techniques for windows ransomware network traffic detection. In Cyber threat intelligence
(pp. 93–106). Springer, Cham.
21. Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention.
International Management Review, 13(1), 10.
22. Baldwin, J., & Dehghantanha, A. (2018). Leveraging support vector machine for opcode
density based detection of crypto-ransomware. In Cyber threat intelligence (pp. 107–136).
Springer, Cham.
23. O’Kane, P., Sezer, S., & Carlin, D. (2018). Evolution of ransomware. IET Networks, 7(5),
321–327.
24. Hernandez-Castro, J., Cartwright, E., & Stepanova, A. (2017). Economic analysis of
ransomware. Available at SSRN 2937641.
25. Minnaar, A. (2019). Cybercriminals, cyber-extortion, online blackmailers and the growth of
ransomware. Acta Criminologica: African Journal of Criminology & Victimology, 32(2), 105.
412 R. O. Ogundokun et al.
26. Cartwright, A., Hernandez-Castro, J., & Cartwright, E. (2020). An economic analysis of
ransomware and its welfare consequences.
27. Hernandez-Castro, J., Cartwright, A., & Cartwright, E. (2020). An economic analysis of
ransomware and its welfare consequences. Royal Society Open Science, 7(3),
28. Butt, U. J., Abbod, M. F., & Kumar, A. (2020). Cyber threat ransomware and marketing to
networked consumers. In Handbook of research on innovations in technology and marketing
for the connected consumer (pp. 155–185). IGI Global.
29. Wilner, A., Jeffery, A., Lalor, J., Matthews, K., Robinson, K., Rosolska, A., et al. (2019). On
the social science of ransomware: Technology, security, and society. Comparative Strategy,
38(4), 347–370.
30. Hull, G., John, H., & Arief, B. (2019). Ransomware deployment methods and analysis: Views
from a predictive model and human responses. Crime Science, 8(1), 2.
31. Alzahrani, A. D. A. (2019). Intelligent behavior-based ransomware detection system for
android platform (Doctoral dissertation, Oakland University).
32. Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure routing for internet of things: A
survey. Journal of Network and Computer Applications, 66, 198–213.
33. Bertino, E., Choo, K. K. R., Georgakopolous, D., & Nepal, S. (2016). Internet of things (IoT):
Smart and secure service delivery. ACM Trans.
34. Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy
issues. International Journal of Computers and Applications, 90(11), 20–26.
35. Abomhara, M., & Kien, G. (2015) Cyber security and the internet of things: Vulnerabilities,
threats, intruders and attacks. Journal of Cyber Security.
36. Daryabar, F., Dehghantanha, A., Udzir, N. I., binti Mohd Sani, N. F., & bin Shamsuddin, S.
(2012) Towards secure model for SCADA systems. In: Proceedings title: 2012 International
Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) (pp. 60–64).
37. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues
in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.
38. Banerjee, M., Lee, J., & Choo, K. K. R. (2018). A blockchain future for internet of things
security: A position paper. Digital Communications and Networks, 4(3), 149–160.
39. Scaife, N., Carter, H., Traynor, P., & Butler, K. R. (2016). Cryptolock (and drop it): Stopping
ransomware attacks on user data. In 2016 IEEE 36th International Conference on Distributed
Computing Systems (ICDCS) (pp. 303–312). IEEE.
40. Gonzalez, D., & Hayajneh, T.(2017). Detection and prevention of crypto-ransomware. In 2017
IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference
(UEMCON) (pp. 472–478). IEEE.
41. Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., …
McCoy, D. (2018). Tracking ransomware end-to-end. In 2018 IEEE Symposium on Security
and Privacy (S.P.) (pp. 618–631). IEEE.
42. FBI. (2016). How to protecting your networks from ransomware. Technical report, USA
Government. https://www.justice.gov/criminalccips/file/872771/download. Accessed 10 Feb
2017.
43. Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.
44. Dovom, E. M., Azmoodeh, A., Dehghantanha, A., Newton, D. E., Parizi,R. M., & Karimipour,
H. (2019). Fuzzy pattern tree for edge malware detection and categorization in IoT. Journal
of Systems Architecture, 97, 1–7.
45. Vishwakarma, R., & Jain, A. K. (2020). A survey of DDoS attacking techniques and defence
mechanisms in the IoT network. Telecommunication Systems, 73(1), 3–25.
46. Nahmias, D., Cohen, A., Nissim, N., & Elovici, Y. (2020). Deep feature transfer learning for
trusted and automated malware signature generation in private cloud environments. Neural
Networks, 124, 243–257.
47. Cimino, M. G., De Francesco, N., Mercaldo, F., Santone, A., & Vaglini, G. (2020). Model
checking for malicious family detection and phylogenetic analysis in mobile environment.
Computers & Security, 90,.
Application of Machine Learning for Ransomware Detection … 413
48. Kumara, A., & Jaidhar, C. D. (2018). Automated multi-level malware detection system based
on reconstructed semantic view of executables using machine learning techniques at VMM.
Future Generation Computer Systems, 79, 431–446.
49. Damshenas, M., Dehghantanha, A., & Mahmoud, R. (2013). A survey on malware propaga-
tion, analysis, and detection. International Journal of Cyber-Security and Digital Forensics,
2(4), 10–29.
50. Maniath, S., Ashok, A., Poornachandran, P., Sujadevi, V. G., Sankar, A. P., & Jan, S. (2017).
Deep learning LSTM based ransomware detection. In 2017 Recent developments in control,
automation & power engineering (RDCAPE) (pp. 442–446). IEEE.
51. Cohen, A., & Nissim, N. (2018). Trusted detection of ransomware in a private cloud using
machine learning methods leveraging meta-features from volatile memory. Expert Systems
with Applications, 102, 158–178.
52. Hwang, J., Kim, J., Lee, S., & Kim, K. (2020). Two-stage ransomware detection using dynamic
analysis and machine learning techniques. Wireless Personal Communications, 1–13.
53. Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: A survey. Information Systems
Frontiers, 17(2), 243–259.
54. Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IOT. International Advanced Research
Journal in Science, Engineering and Technology, 5(1), 41–44.
55. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A
vision, architectural elements, and future directions. Future Generation Computer Systems,
29(7), 1645–1660.
56. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and
cloud computing. Future Generation Computer Systems, 78, 964–975.
57. Atzori, L., Iera, A., & Morabito, G. (2017). Understanding the internet of things: Definition,
potentials, and societal role of a fast evolving paradigm. Ad Hoc Networks, 56, 122–140.
58. Chahal, R. K., Kumar, N., & Batra, S. (2020). Trust management in social Internet of Things:
A taxonomy, open issues, and challenges. Computer Communications, 150, 13-46.
59. Srivastava, G., Parizi, R. M., & Dehghantanha, A. (2020). The future of blockchain tech-
nology in healthcare internet of things security. In Blockchain cybersecurity, trust and privacy
(pp. 161–184). Springer, Cham.
60. Adebiyi, M., Oladeji, F., Onyido, S., Ori, D., Ogundokun, R., Adeniyi, E., & Okesola, O.
(2019). A 3-D model of an institutional location navigation system (NaVILOC) (a case study
of covenant university). International Journal of Civil Engineering and Technology, 10(1),
746–756.
61. Adebiyi, M. O., Adigun, E. B., Ogundokun, R. O., Adeniyi, A. E., Ayegba, P., & Oladipupo,
O. O. (2020). Semantics-based clustering approach for similar research area detection.
Telkomnika (Telecommunication Computing Electronics and Control), 18(4), 1874–1883.
62. Shafique, M. N., Khurshid, M. M., Rahman, H., Khanna, A., & Gupta, D. (2019). The role of
big data predictive analytics and radio frequency identification in the pharmaceutical industry.
IEEE Access, 7, 9013–9021.
63. Georgakopoulos, D., Jayaraman, P. P., Fazia, M., Villari, M., & Ranjan, R. (2016). Internet of
things and edge cloud computing roadmap for manufacturing. IEEE Cloud Computing, 3(4),
66–73.
64. Adebiyi, M. O., Adeka, E. E., Oladeji, F. O., Ogundokun, R. O., Arowolo, M. O., & Adebiyi,
A. A. (2020). Evaluation of load balancing algorithms on overlappiing wireless accesspoints.
Indonesian Journal of Electrical Engineering and Computer Science, 21(2), 895–902.
65. Wang, P., Chaudhry, S., Li, L., Li, S., Tryfonas, T., & Li, H. (2016). The internet of things: A
security point of view. Internet Research.
66. Emmanuel, A. A., Adedoyin, A. E., Mukaila, O., & Roseline, O. O. (2020). Application of
smartphone qrcode scanner as a means of authenticating student identity card. International.
Journal of Engineering Research and Technology, 13(1), 48–53.
67. Emmanuel, A. A., Mukaila, O., Olubunmi, A. M., Roseline, O. O., Folaranmi, L. A., Elizabeth,
A. A., Ojochenemi, A. P., & Anyaiwe, E. P. (2019). Vehicle-caused road accidents of four
major cities in north-central region of Nigeria (2010–2015). International Journal of Civil
Engineering and Technology, 10(2), 124–134.
414 R. O. Ogundokun et al.
68. Arthur, W. B. (2009). The nature of technology: What it is and how it evolves.Simonand
Schuster.
69. Xu, L. D., & Duan, L. (2019). Big data for cyber physical systems in industry 4.0: a survey.
Enterprise Information Systems,13(2), 148–169.
70. Khanna, A., & Kaur, S. (2019). Evolution of internet of things (IoT) and its significant impact
in the field of precision agriculture. Computers and Electronics in Agriculture, 157, 218–231.
71. Jamali, M. A. J., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2020). Some
cases of smart use of the IoT. In Towards the internet of things (pp. 85–129). Springer, Cham.
72. Turcu, C., & Turcu, C. (2019). Improving the quality of healthcare.
73. Edquist, H., Goodridge, P., & Haskel, J. (2019). The internet of things and economic growth
in a panel of countries. Economics of Innovation and New Technology, 1–22.
74. Pool, R., van Berkel, J., van den Braak, S., Harbers, M., & Bargh, M. S. (2020). The internet
of things in a smart society: How government policy can help seize opportunities and mitigate
threats. In Beyond smart and connected governments (pp. 25–48). Springer, Cham.
75. Thierer, A., & Castillo, A. (2015). Projecting the growth and economic impact of the internet
of things. George Mason University, Mercatus Center.
76. Mirani, A. A., Memon, M. S., Rahu, M. A., Bhatti, M. N., & Shaikh, U. R. (2019). A review
of agro-industry in IoT: Applications and challenges. Quest research Journal, 17(01), 28–33.
77. Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of
things. In From active data management to event-based systems and more (pp. 242–259).
Springer, Berlin, Heidelberg.
78. Borgia, E. (2014). The internet of things vision: Key features, applications and open issues.
Computer Communications, 54, 1–31.
79. Kortuem, G., Kawsar, F., Sundramoorthy, V., & Fitton, D. (2009). Smart objects as building
blocks for the internet of things. IEEE Internet Computing, 14(1), 44–51.
80. Evangelos, A. K., Nikolaos, D. T., & Anthony, C. B. (2011). Integrating RFIDs and smart
objects into a UnifiedInternet of things architecture. Advances in Internet of Things.
81. Firouzi, F., Farahani, B., & Bojnordi, M. N. (2020). The smart “things” in IoT. In Intelligent
internet of things (pp. 51–95). Springer, Cham.
82. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things
Journal, 1(1), 3–9.
83. Yigitcanlar, T., Kamruzzaman, M., Foth, M., Sabatini-Marques, J., da Costa, E., & Ioppolo,
G. (2019). Can cities become smart without being sustainable? A systematic review of the
literature. Sustainable Cities and Society, 45, 348–365.
84. Figueiredo, S. M., Krishnamurthy, S., & Schroeder, T. (Eds.). (2019). Architecture and the
smart city. Routledge.
85. Nikolov, R., Jekov, B., & Mihaylova, P. (2015). Big data in a smart city ecosystem: Models,
challenges and trends. Big Data, Knowledge and Control Systems Engineering, 101.
86. Tankard, C. (2015). The security issues of the internet of things. Computer Fraud & Security,
2015(9), 11–14.
87. Dalipi, F., & Yayilgan, S. Y. (2016). Security and privacy considerations for IoT application
on smart grids: Survey and research challenges. In 2016 IEEE 4th International Conference
on Future Internet of Things and Cloud Workshops (FiCloudW) (pp. 63–68). IEEE.
88. Thangavel, C., & Sudhaman, P. (2017). Security challenges in the IoT paradigm for enterprise
information systems. In Connected environmentsfor the internet of things (pp. 3–17). Springer,
Cham.
89. Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., & Henry, J. (2017). IoT fundamentals:
Networking technologies, protocols, and use cases for the internet of things. Cisco Press.
90. Commoner, B. (2020). The closing circle: Nature, man, and technology. Dover Publications.
91. Farahani, B., Firouzi, F., Chang, V., Badaroglu, M., Constant, N., & Mankodiya, K. (2018).
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare.
Future Generation Computer Systems, 78, 659–676.
92. Yaqoob, I., Hashem, I. A. T., Ahmed, A., Kazmi, S. A., & Hong, C. S. (2019). Internet
of things forensics: Recent advances, taxonomy, requirements, and open challenges. Future
Generation Computer Systems, 92, 265–275.
Application of Machine Learning for Ransomware Detection … 415
93. Shackelford, S. (2020). Smart factories, dumb policy?: Managing cybersecurity and data
privacy risks in the industrial internet of things. Minnesota Journal of Law, Science &
Technology, 18–80.
94. Wong, M. M. R., & Said, A. M. (2020). Consequences of the 2004 Indian Ocean Tsunami in
Malaysia. Safety Science, 121, 619–631.
95. Niclas, H. (2019). Cyber situational security awareness architecture (CSSA) for industrial
control systems (Master’s thesis, NTNU).
96. Jeannotte, B., & Tekeoglu, A. (2019). Artorias: IoT security testing framework. In 2019 26th
International Conference on Telecommunications (ICT) (pp. 233–237). IEEE.
97. Sánchez-Pérez, L. M., Velásquez-Pérez, T., & Camargo-Pérez, J. C. (2019). Good practice
guide around the security of the internet of things in smart homes. In Journal of Physics:
Conference Series (Vol. 1386, No. 1, p. 012142). IOP Publishing.
98. Sehgal, N. K., Bhatt, P. C. P., & Acken, J. M. (2020). Additional security considerations for
cloud. In Cloud computing with security (pp. 193–215). Springer, Cham.
99. Agarwal, S., Oser, P., & Lueders, S. (2019). Detecting IoT devices and how they put large
heterogeneous networks at security risk. Sensors, 19(19), 4107.
100. Assefa, Y. T., Babel, M. S., Sušnik, J., & Shinde, V. R. (2019). Development of a generic
domestic water security index, and its application in Addis Ababa, Ethiopia. Wat e r, 11(1), 37.
101. Chopra, G., Jha, R. K., & Jain, S. (2017). A survey on ultra-dense network and emerging
technologies: Security challenges and possible solutions. Journal of Network and Computer
Applications, 95, 54–78.
102. Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis
of commodity IoT applications for security and privacy: Challenges and opportunities. ACM
Computing Surveys (CSUR), 52(4), 1–30.
103. Blythe, J. M., & Johnson, S. D. (2019). A systematic review of crime facilitated by the
consumer internet of things. Security Journal, 1–29.
104. Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey
on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in
smart cities. Sustainable Cities and Society.
105. Elmisery, A. M., Rho, S., & Aborizka, M. (2019). A new computing environment for collec-
tive privacy protection from constrained healthcare devices to IoT cloud services. Cluster
Computing, 22(1), 1611–1638.
106. Aly, M., Khomh, F., Haoues, M., Quintero, A., & Yacout, S. (2019). Enforcing security in
internet of things frameworks: A systematic literature review. Internet of Things, 100050.
107. Mendhurwar, S., & Mishra, R. (2019). Integration of social and IoT technologies: Archi-
tectural framework for digital transformation and cyber security challenges. Enterprise
Information Systems, 1–20.
108. Mahmoud, R., Yousuf, T., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security:
Current status, challenges and prospective measures. In 2015 10th International Conference
for Internet Technology and Secured Transactions (ICITST) (pp. 336–341). IEEE.
109. Ziegler, S., Crettaz, C., Kim, E., Skarmeta, A., Bernabe, J. B., Trapero, R., & Bianchi, S.
(2019). Privacy and security threats on the internet of things. In Internet of things security
and data protection (pp. 9–43). Springer, Cham.
110. Sidhu, S., Mohd, B. J., & Hayajneh, T.(2019). Hardware security in IoT devices with emphasis
on hardware trojans. Journal of Sensor and Actuator Networks, 8(3), 42.
111. Skarmeta, A. F., Hernandez-Ramos, J. L., & Moreno, M. V. (2014). A decentralized approach
for security and privacy challenges in the internet of things. In 2014 IEEE world forum on
internet of things (WF-IoT) (pp. 67–72). IEEE.
112. Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust
in internet of things: The road ahead. Computer Networks, 76, 146–164.
113. Pacey, A. (1991). Technology in world civilization: A thousand-year history. MIT Press.
114. Kokkinos, C. (2013). The signification of objects in the context of a critical examination of
technological civilization: An interdisciplinary approach. International Journal of Humanities
and Social Science, 3(4), 57–65.
416 R. O. Ogundokun et al.
115. Belenkova, O. A., Vanchukhina, L. I., & Leibert, T. B. (2019). Creative potential of the human
capital as the key resource of development of the techogenic civilization.
116. Beniger, J. (2009). The control revolution: Technological and economic origins of the
information society. Harvard university press.
117. Chun, K. W., Kim, H., & Lee, K. (2018). A study on research trends of technologies for industry
4.0; 3D printing, artificial intelligence, big data, cloud computing, and internet of things. In
Advanced multimedia and ubiquitous engineering (pp. 397–403). Springer, Singapore.
118. Stearns, P. N. (2012). The industrial revolution in world history. Westview press.
119. Brynjolfsson, E., & McAfee, A. (2014). The second machine age: Work, progress, and
prosperity in a time of brilliant technologies.WWNorton&Company.
120. Wiener, N. (2019). Cybernetics or control and communication in the animal and the machine.
MIT press.
121. Nuvolari, A. (2004). Collective invention during the British industrial revolution: The case of
the Cornish pumping engine. Cambridge Journal of Economics, 28(3), 347–363.
122. Mantoux, P. (2013). The industrial revolution in the eighteenth century: An outline of the
beginnings of the modern factory system in England. Routledge.
123. Hughes, T. P. (1987). The evolution of large technological systems. In The social construction
of technological systems: New directions in the sociology and history of technology (Vol. 82).
124. Xu, L. D., Xu, E. L., & Li, L. (2018). Industry 4.0: state of the art and future trends.
International Journal of Production Research, 56(8), 2941–2962.
125. Diamond, S. (2017). In search of the primitive: A critique of civilization. Taylor & Francis.
126. Baum, S. D., Armstrong, S., Ekenstedt, T., Häggström, O., Hanson, R., Kuhlemann, K.,
Matthijs, M.
127. Du, X., Zhou, D., Chao, Q., Wen, Z., Huhe, T., & Liu, Q. (2020). The history of human
civilization. In Overview of low-carbon development (pp. 1–40). Springer, Singapore.
128. Kvasˇnovský, T. (2020). Autonomous weapon systems as the next revolution in warfare and
implications of technology deployment for global security.
129. Liao, Y., Deschamps, F., Loures, E. D. F. R., & Ramos, L. F. P. (2017). Past, present and future
of industry 4.0-a systematic literature review and research agenda proposal. International
journal of production research,55(12), 3609–3629.
130. Stani´c, V., Hadjina, M., Fafandjel, N., & Matulja, T. (2018). Toward shipbuilding 4.0-an
industry 4.0 changing the face of the shipbuilding industry. Brodogradnja: Teorija i Praksa
Brodogradnje i Pomorske Tehnike,69(3), 111–128.
131. Badem, A. C., & Kilinç, Y. (2019). Industry 4.0 revolution and the future of accounting
applications. Economic Issues: Global and Local Perspectives, 44.
132. Sung, T. K. (2018). Industry 4.0: A Korea perspective. Technological Forecasting and Social
Change, 132, 40–45.
133. Oztemel, E., & Gursev, S. (2020). Literature review of industry 4.0 and related technologies.
Journal of Intelligent Manufacturing,31(1), 127–182.
134. Kaloudi, N., & Li, J. (2020). The AI-based cyber threat landscape: A survey. ACM Computing
Surveys (CSUR), 53(1), 1–34.
135. Yigitcanlar, T., Desouza, K. C., Butler, L., & Roozkhosh, F. (2020). Contributions and risks
of artificial intelligence (A.I.) in building smarter cities: insights from a systematic review of
the literature. Energies,13(6), 1473.
136. Lambert, B., & Fahlman, S. E. (2007). Knowledge-driven learning and discovery. In Proceed-
ings of the National Conference on Artificial Intelligence (Vol. 22, No. 2, p. 1880). Menlo
Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999.
137. Dhingra, B., Zaheer, M., Balachandran, V., Neubig, G., Salakhutdinov, R., & Cohen, W. W.
(2020). Differentiable reasoning over a virtual knowledge base. arXiv preprint arXiv:2002.
10640.
138. Aghion, P., Jones, B. F., & Jones, C. I. (2017). Artificial intelligence and economic growth
(No. w23928). National Bureau of Economic Research.
139. Acemoglu, D., & Restrepo, P. (2018). Artificial intelligence, automation and work (No.
w24196). National Bureau of Economic Research.
Application of Machine Learning for Ransomware Detection … 417
140. Serrano, M., Dang, H. N., & Nguyen, H. M. Q. (2018). Recent advances on artificial intel-
ligence and internet of things convergence for human-centric applications: Internet of things
science. In Proceedings of the 8th International Conferenceon the Internet of Things (pp. 1–5).
141. Vasconcelos, F. F., Sarmento, R. M., Rebouças Filho, P. P., & de Albuquerque, V. H. C.
(2020). Artificial intelligence techniques empowered edge-cloud architecture for brain C.T.
image analysis. Engineering Applications of Artificial Intelligence,91, 103585.
142. Fowler, A. (2000). The role of AI-based technology in support of the knowledge management
value activity cycle. The Journal of Strategic Information Systems, 9(2–3), 107–128.
143. Ho, T. B., Kawasaki, S., & Granat, J. (2007). Knowledge acquisition by machine learning and
data mining. In Creative environments (pp. 69–91). Springer, Berlin, Heidelberg.
144. Jordan, M. I., & Mitchell, T.M. (2015). Machine learning: Trends, perspectives, and prospects.
Science, 349(6245), 255–260.
145. Liu, W., Wang, Z., Liu, X., Zeng, N., Liu, Y., & Alsaadi, F. E. (2017). A survey of deep neural
network architectures and their applications. Neurocomputing, 234, 11–26.
146. Chen, C., Seff, A., Kornhauser, A., & Xiao, J. (2015). Deepdriving: Learning affordance for
direct perception in autonomous driving. In Proceedings of the IEEE International Conference
on Computer Vision (pp. 2722–2730).
147. Ahamed, F.,& Farid, F. (2018). Applying internet of things and machine-learning for personal-
ized healthcare: Issues and challenges. In 2018 International Conference on Machine Learning
and Data Engineering (iCMLDE) (pp. 19–21). IEEE.
148. Kumar, P. M., & Gandhi, U. D. (2018). A novel three-tier internet of things architecture with
machine learning algorithm for early detection of heart diseases. Computers & Electrical
Engineering, 65, 222–235.
149. Yousefi, S., Derakhshan, F., & Karimipour, H. (2020). Applications of big data analytics and
machine learning in the Internet of things. In Handbook of big data privacy (pp. 77–108).
Springer, Cham.
150. Fahey, M. (2019). U.S. patent No. 10,282,963. U.S. Patent and Trademark Office, Washington,
DC.
151. Pramanik, P. K. D., Upadhyaya, B. K., Pal, S., & Pal, T. (2019). Internet of things, smart
sensors, and pervasive systems: Enabling connected and pervasive healthcare. In Healthcare
data analytics and management (pp. 1–58). Academic Press.
152. Mohanta, B., Das, P., & Patnaik, S. (2019). Healthcare 5.0: A paradigm shift in digital health-
care system using artificial intelligence, IOT and 5G communication. In 2019 International
Conference on Applied Machine Learning (ICAML) (pp. 191–196). IEEE.
153. Wu, Q., Ding, G., Xu, Y., Feng, S., Du, Z., Wang, J., et al. (2014). Cognitive internet of things:
A new paradigm beyond connection. IEEE Internet of Things Journal, 1(2), 129–143.
154. Ke, R., Zhuang, Y., Pu, Z., & Wang, Y. (2020). A smart, efficient, and reliable parking surveil-
lance system with edge artificial intelligence on IoT devices. arXiv preprint arXiv:2001.
00269.
155. Hampton, N., & Baig, Z. A. (2015). Ransomware: Emergence of the cyber-extortion menace.
156. Young, A. L., & Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of
Ransomware. Communications of the ACM, 60(7), 24–26.
157. Pascariu, C., Barbu, I. D., & Bacivarov, I. C. (2017). Investigative analysis and technical
overview of ransomware based attacks. case study: WannaCry. International Journal of
Information Security and Cybercrime (IJISC), 6, 57–62.
158. Bhagwat, L. B., & Patil, B. M. (2020). Detection of ransomware attack: A review.
In Proceeding of International Conference on Computational Science and Applications
(pp. 15–22). Springer, Singapore.
159. Bada, M., & Nurse, J. R. (2020). The social and psychological impact of cyberattacks. In
Emerging cyber threats and cognitive vulnerabilities (pp. 73–92). Academic Press.
160. O’Rourke, M. (2017). The year in risk 2017. Risk Management, 64(11), 20–25.
161. Salvi, M. H. U., & Kerkar, M. R. V. (2016). Ransomware: A cyber extortion. Asian Journal
For Convergence In Technology (AJCT),2.
162. Rivera, L., & Yoon, J. Ransomware: An overview of a global problem. Prevention,14, 17.
418 R. O. Ogundokun et al.
163. Skaja, P. (2019). Ransomware and the internet of things (Doctoral dissertation, Utica College).
164. Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
165. Mercaldo, F., Nardone, V., & Santone, A. (2016). Ransomware inside out. In 2016 11th
International Conference on Availability, Reliability and Security (ARES) (pp. 628–637).
IEEE.
166. Akcora, C. G., Li, Y., Gel, Y. R., & Kantarcioglu, M. (2019). BitcoinHeist: Topological
data analysis for ransomware detection on the bitcoin blockchain. arXiv preprint arXiv:1906.
07852.
167. Reka, S. S., & Dragicevic, T. (2018). Future effectual role of energy delivery:A comprehensive
review of internet of things and smart grid. Renewable and Sustainable Energy Reviews, 91,
90–108.
168. Cimitile, A., Mercaldo, F., Nardone, V., Santone, A., & Visaggio, C. A. (2018). Talos: No
more ransomware victims with formal methods. International Journal of Information Security,
17(6), 719–738.
169. Paquet-Clouston, M., Haslhofer, B., & Dupont, B. (2019). Ransomware payments in the
bitcoin ecosystem. Journal of Cybersecurity, 5(1), tyz003.
170. Downes, C. (2018). Strategic blind-spots on cyber threats, vectors and campaigns. The Cyber
Defense Review, 3(1), 79–104.
171. Pazik, E. (2017). Ransomware: Attack vectors,mitigation and recovery (Doctoral dissertation,
Utica College).
172. Chaurasia, R. (2018). Ransomware: The cyber extortionist. In Handbook of research on
information and cyber security in the fourth industrial revolution (pp. 64–111). IGI Global.
173. Tapsoba, K. (2018). Ransomware: Offensive warfare using cryptography as a weapon
(Doctoral dissertation, Utica College).
174. Fong, K., Hepler, K., Raghavan, R., & Rowland, P. (2018). rIoT: Quantifying consumer costs
of insecure internet of things devices.University of California Berkeley, School of Information
Report. Retrieved from: https://groups.ischool.berkeley.edu/riot.
175. Aidan, J. S., & Garg, U. (2018). Advanced Petya ransomware and mitigationstrategies. In 2018
First International Conference on Secure Cyber Computing and Communication (ICSCCC)
(pp. 23–28). IEEE.
176. Kok, S., Abdullah, A., Jhanjhi, N., & Supramaniam, M. (2019). Ransomware, threat and
detection techniques: A review. International Journal of Computer Science and Network
Security,19(2), 136.
177. Al-rimy, B. A. S., Maarof, M. A., & Shaid, S. Z. M. (2018). Ransomware threat success
factors, taxonomy, and countermeasures: A survey and research directions. Computers &
Security, 74, 144–166.
178. Thiyagarajan, P. (2020). A review on cyber security mechanisms using machine and deep
learning algorithms. In Handbook of research on machine and deep learning applications for
cyber security (pp. 23–41). IGI Global.
179. Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy.
Telecommunications Policy, 41(10), 1027–1038.
180. Daghighi, B., Kiah, M. L. M., Shamshirband, S., & Rehman, M. H. U. (2015). Toward secure
group communication in wireless mobile environments: Issues, solutions, and challenges.
Journal of Network and Computer Applications, 50, 1–14.
181. Riahi, A., Natalizio, E., Challal, Y., Mitton, N., & Iera, A. (2014). A systemic and cognitive
approach for IoT security. In 2014 International Conference on Computing, Networking and
Communications (ICNC) (pp. 183–188). IEEE.
182. Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., et al.
(2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open
challenges. IEEE Wireless Communications, 24(3), 10–16.
183. Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M., et al. (2017).
The role of big data analytics in internet of things. Computer Networks, 129, 459–471.
184. Rickli, J. M. (2018). The economic, security and military implications of artificial intelligence
for the Arab Gulf countries.
Application of Machine Learning for Ransomware Detection … 419
185. Mugavero, R., Abaimov, S., Benolli, F., & Sabato, V. (2018). Cyber security vulnerability
management in CBRN industrial control systems (ICS). International Journal of Information
Systems for Crisis Response and Management (IJISCRAM), 10(2), 49–78.
186. Hoanca, B., & Mock, K. J. (2020). Artificial intelligence-based cybercrime. In Encyclopedia
of criminal activities and the deep web (pp. 36–51). IGI Global.
187. Jarrahi, M. H. (2018). Artificial intelligence and the future of work: Human-AI symbiosis in
organizational decision making. Business Horizons, 61(4), 577–586.
188. Buczak, A. L., & Guven, E. (2015). A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
1153–1176.
189. Vähäkainu, P., & Lehto, M. (2019). Artificial intelligence in the cyber security environment.
In ICCWS 2019 14th International Conference on Cyber Warfare and Security: ICCWS 2019
(p. 431). Academic Conferences and publishing limited.
190. Truong, T. C., Zelinka, I., Plucar, J., ˇ
Candík, M., & Šulc, V. (2020). Artificial intelligence
and cybersecurity: Past, presence, and future. In Artificial intelligence and evolutionary
computations in engineering systems (pp. 351–363). Springer, Singapore.
191. Makridakis, S. (2017). The forthcoming artificial intelligence (A.I.) revolution: Its impact on
society and firms. Futures, 90, 46–60.
192. Pierce, G., Cleary, P., Holland, C., & Rabrenovic, G. (2017). Security challenges in the 21 st
century: The changing nature of risk, security and sustainability. In International Conference
on Applied Human Factors and Ergonomics (pp. 180–190). Springer, Cham.
193. Mishra, A., Gupta, N., & Gupta, B. B. (2020). Security threats and recent countermeasures in
cloud computing. In Modern principles, practices, and algorithms for cloud security (pp. 145–
161). IGI Global.
194. Gupta, R., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Machine learning models for secure
data analytics: A taxonomy and threat model. Computer Communications.
195. Habeeb, R. A. A., Nasaruddin, F., Gani, A., Hashem, I. A. T., Ahmed, E., & Imran, M.
(2019). Real-time big data processing for anomaly detection: A Survey. International Journal
of Information Management, 45, 289–307.
196. Babar, M., & Arif, F. (2019). Real-time data processing scheme using big data analytics in
internet of things based smart transportation environment. Journal of Ambient Intelligence
and Humanized Computing, 10(10), 4167–4177.
197. Chang, C., Srirama, S. N., & Buyya, R. (2019). Internet of things (IoT) and new computing
paradigms. In Fog and edge computing: Principles and paradigms, 1–23.
198. Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2019). Machine learning in IoT
security: Current solutions and future challenges. arXiv preprint arXiv:1904.05735.
199. Mahdavinejad, M. S., Rezvan, M., Barekatain, M., Adibi, P., Barnaghi, P., & Sheth,
A. P. (2018). Machine learning for internet of things data analysis: A survey. Digital
Communications and Networks, 4(3), 161–175.
200. Lamba, A., Singh, S., Balvinder, S., Dutta, N., & Rela, S. (2018). Embedding machine and
deep learning for mitigating security and privacy issues in IoT enabled devices and networks.
International Journal for Technological Research in Engineering.
201. Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in
technology and standardization. Wireless Personal Communications, 58(1), 49–69.
202. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:
Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
203. Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: A survey
of existing protocols and open research issues. IEEE Communications Surveys & Tutorials,
17(3), 1294–1312.
204. Kumar, P., Lin, Y., Bai, G., Paverd, A., Dong, J. S., & Martin, A. (2019). Smart grid metering
networks: A survey on security, privacy and open research issues. IEEE Communications
Surveys & Tutorials, 21(3), 2886–2927.
205. Hamad, S. A., Sheng, Q. Z., Zhang, W. E., & Nepal, S. (2020). Realizing an internet of
secure things: A survey on issues and enabling technologies. IEEE Communications Surveys
& Tutorials.
420 R. O. Ogundokun et al.
206. Maigida, A. M., Olalere, M., Alhassan, J. K., Chiroma, H., & Dada, E. G. (2019). Systematic
literature review and metadata analysis of ransomware attacks and detection mechanisms.
Journal of Reliable Intelligent Environments, 5(2), 67–89.
207. Curti, M., Merlo, A., Migliardi, M., & Schiappacasse, S. (2013). Towards energy-aware
intrusion detection systems on mobile devices. In 2013 International Conference on High
Performance Computing & Simulation (HPCS) (pp. 289–296). IEEE.
208. Merlo, A., Migliardi, M., & Fontanelli, P. (2015). Measuring and estimating power consump-
tion in android to support energy-based intrusion detection. Journal of Computer Security,
23(5), 611–637.
209. Nicolescu, R., Craggs, B., Lupu, E., & Rashid, A. (2019). Safety and security. Cybersecurity
of the Internet of Things,26.
210. Karake, Z., Shalhoub, R. A., & Ayas, H. (2019). Enforcing cybersecurity in developing and
emerging economies.