Security Threat Exploration on Smart Living Style based on Twitter Data

Authors

  • Tahani AlSaedi Applied College, Taibah University, Madina 42353, Saudi Arabia
  • Misbah Mehmood University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi, Pakistan
  • Asad Mahmood University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi, Pakistan
  • Saif Ur Rehman University Institute of Information Technology, PMAS Arid Agriculture University, Rawalpindi, Pakistan
  • Mahwsh Kundi Maynooth International Engineering College, Maynooth University, Ireland
Volume: 14 | Issue: 4 | Pages: 15522-15532 | August 2024 | https://doi.org/10.48084/etasr.7257

Abstract

The Internet of Things (IoT) has revolutionized individuals’ homes with smart devices, but it has also brought security worries due to the huge amounts of data they generate. This study aims to uncover common security problems, like malware, cyber-attacks, and data storage flaws, in such smart setups. To tackle these issues, this study suggests beefing up security measures and educating users about safe device practices. A new approach was followed in this study, using Convolutional Neural Networks (CNNs) instead of the traditional Natural Language Processing (NLP) methods. CNNs are great at understanding complex patterns in text, especially on platforms like Twitter where messages can be brief and unclear. By applying CNN to analyze Twitter data, specific entities linked to security issues could be pinpointed, giving a deeper insight into smart home security challenges. The findings showed that the employed CNN model was exceptionally efficient at sorting out tweets regarding security problems in smart homes. It achieved an accuracy of around 87%, precision of 76.78%, recall of 82.49%, and F1-score of 84.87% surpassing the other methods it was compared with. These findings underscore the CNN model's effectiveness in accurately classifying security-related tweets in diverse topics within smart living environments.

Keywords:

IoT, connected devices, home assistants, smart living environments, convolutional neural networks, named entity recognition, Twitter data analysis

Downloads

Download data is not yet available.

References

S. A. Alshaya, "IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 11992–12000, Dec. 2023.

W. Almukadi, "Smart Scarf: An IOT-based Solution for Emotion Recognition," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10870–10874, Jun. 2023.

F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, "Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models," Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, Jan. 2024.

M. Luperto et al., "Integrating Social Assistive Robots, IoT, Virtual Communities and Smart Objects to Assist at-Home Independently Living Elders: the MoveCare Project," International Journal of Social Robotics, vol. 15, no. 3, pp. 517–545, Mar. 2023.

V. Demertzi, S. Demertzis, and K. Demertzis, "An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities," Applied Sciences, vol. 13, no. 2, Jan. 2023, Art. no. 790.

A. Khang, S. K. Gupta, S. Rani, and D. A. Karras, Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques. Boca Raton, FL, USA: CRC Press, 2023.

Z. Chen and I. C. C. Chan, "Smart cities and quality of life: a quantitative analysis of citizens’ support for smart city development," Information Technology & People, vol. 36, no. 1, pp. 263–285, Jan. 2022.

P. Nayak and G. Swapna, "Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview," Internet of Things, vol. 21, Apr. 2023, Art. no. 100641.

C. L. Stergiou, E. Bompoli, and K. E. Psannis, "Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario," Applied Sciences, vol. 13, no. 2, Jan. 2023, Art. no. 758.

M. Hosseini Shirvani and M. Masdari, "A survey study on trust-based security in Internet of Things: Challenges and issues," Internet of Things, vol. 21, Apr. 2023, Art. no. 100640.

A. Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, "Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks," Computers in Industry, vol. 144, Jan. 2023, Art. no. 103801.

U. Chatterjee and S. Ray, "Security Issues on IoT Communication and Evolving Solutions," in Soft Computing in Interdisciplinary Sciences, S. Chakraverty, Ed. New York, NY, USA: Springer, 2022, pp. 183–204.

A. Alamsyah, W. Rizkika, D. D. A. Nugroho, F. Renaldi, and S. Saadah, "Dynamic Large Scale Data on Twitter Using Sentiment Analysis and Topic Modeling," in 6th International Conference on Information and Communication Technology, Bandung, Indonesia, Dec. 2018, pp. 254–258.

J. R. Saura, D. Palacios-Marqués, and A. Iturricha-Fernández, "Ethical design in social media: Assessing the main performance measurements of user online behavior modification," Journal of Business Research, vol. 129, pp. 271–281, May 2021.

M. Alam, F. Abid, C. Guangpei, and L. V. Yunrong, "Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications," Computer Communications, vol. 154, pp. 129–137, Mar. 2020.

W. M. Webberley, S. M. Allen, and R. M. Whitaker, "Retweeting beyond expectation: Inferring interestingness in Twitter," Computer Communications, vol. 73, pp. 229–235, Jan. 2016.

H. Hu, L. Yang, S. Lin, and G. Wang, "A Case Study of the Security Vetting Process of Smart-home Assistant Applications," in IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2020, pp. 76–81.

O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose, "SoK: Security Evaluation of Home-Based IoT Deployments," in IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 2019, pp. 1362–1380.

D. Kim, K. Park, Y. Park, and J.-H. Ahn, "Willingness to provide personal information: Perspective of privacy calculus in IoT services," Computers in Human Behavior, vol. 92, pp. 273–281, Mar. 2019.

P. E. Naeini et al., "Privacy Expectations and Preferences in an {IoT} World," in Thirteenth Symposium on Usable Privacy and Security, Santa Clara, CA, USA, Jul. 2017, pp. 399–412.

J. R. Saura, D. Ribeiro-Soriano, and D. Palacios-Marqués, "Setting B2B digital marketing in artificial intelligence-based CRMs: A review and directions for future research," Industrial Marketing Management, vol. 98, pp. 161–178, Oct. 2021.

H. Jelodar et al., "Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey," Multimedia Tools and Applications, vol. 78, no. 11, pp. 15169–15211, Jun. 2019.

S. Ribeiro-Navarrete, J. R. Saura, and D. Palacios-Marques, "Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy," Technological Forecasting and Social Change, vol. 167, Jun. 2021, Art. no. 120681.

M. Rizwan Rashid Rana et al., "Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework," Computer Systems Science and Engineering, vol. 46, no. 2, pp. 2415–2428, 2023.

M. Iram, S. U. Rehman, S. Shahid, and S. A. Mehmood, "Anatomy of Sentiment Analysis of Tweets Using Machine Learning Approach : Anatomy of Sentiment Analysis of Tweets," Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, vol. 59, no. 2, pp. 61–73, Aug. 2022.

M. R. R. Rana, S. U. Rehman, A. Nawaz, T. Ali, and M. Ahmed, "A conceptual model for decision support systems using aspect based sentiment analysis," Proceedings of the Romanian Academy Series A - Mathematics Physics Technical Sciences Information Science, vol. 22, no. 4, pp. 371–380.

A. Abbas, U. Maqsood, S. U. Rehman, K. Mahmood, T. AlSaedi, and M. Kundi, "An Artificial Intelligence Framework for Disease Detection in Potato Plants," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12628–12635, Feb. 2024.

U. Maqsood, S. Ur Rehman, T. Ali, K. Mahmood, T. Alsaedi, and M. Kundi, "An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection," Applied Computational Intelligence and Soft Computing, vol. 2023, no. 1, 2023, Art. no. 6648970.

S. Hussain, S. Rehman, S. Raza, A. Mahmood, and S. Kundi, "Significance of Education Data Mining in Student’s Academic Performance Prediction and Analysis," International Journal of Innovations in Science & Technology, vol. 5, no. 3, pp. 215–231, Sep. 2023.

S. U. Rehman, S. Ali, G. Adeem, S. Hussain, and S. S. Raza, "Computational Intelligence Approaches for Analysis of the Detection of Zero-day Attacks," University of Wah Journal of Science and Technology, vol. 6, pp. 27–36, Dec. 2022.

Downloads

How to Cite

[1]
AlSaedi, T., Mehmood, M., Mahmood, A., Ur Rehman, S. and Kundi, M. 2024. Security Threat Exploration on Smart Living Style based on Twitter Data. Engineering, Technology & Applied Science Research. 14, 4 (Aug. 2024), 15522–15532. DOI:https://doi.org/10.48084/etasr.7257.

Metrics

Abstract Views: 190
PDF Downloads: 325

Metrics Information

Most read articles by the same author(s)