Security Threat Exploration on Smart Living Style based on Twitter Data
Received: 14 march 2024 | Revised: 22 March 2024 | Accepted: 3 April 2024 | Online: 12 June 2024
Corresponding author: Saif Ur Rehman
Abstract
The Internet of Things (IoT) has revolutionized individuals’ homes with smart devices, but it has also brought security worries due to the huge amounts of data they generate. This study aims to uncover common security problems, like malware, cyber-attacks, and data storage flaws, in such smart setups. To tackle these issues, this study suggests beefing up security measures and educating users about safe device practices. A new approach was followed in this study, using Convolutional Neural Networks (CNNs) instead of the traditional Natural Language Processing (NLP) methods. CNNs are great at understanding complex patterns in text, especially on platforms like Twitter where messages can be brief and unclear. By applying CNN to analyze Twitter data, specific entities linked to security issues could be pinpointed, giving a deeper insight into smart home security challenges. The findings showed that the employed CNN model was exceptionally efficient at sorting out tweets regarding security problems in smart homes. It achieved an accuracy of around 87%, precision of 76.78%, recall of 82.49%, and F1-score of 84.87% surpassing the other methods it was compared with. These findings underscore the CNN model's effectiveness in accurately classifying security-related tweets in diverse topics within smart living environments.
Keywords:
IoT, connected devices, home assistants, smart living environments, convolutional neural networks, named entity recognition, Twitter data analysisDownloads
References
S. A. Alshaya, "IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 11992–12000, Dec. 2023.
W. Almukadi, "Smart Scarf: An IOT-based Solution for Emotion Recognition," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10870–10874, Jun. 2023.
F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, "Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models," Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, Jan. 2024.
M. Luperto et al., "Integrating Social Assistive Robots, IoT, Virtual Communities and Smart Objects to Assist at-Home Independently Living Elders: the MoveCare Project," International Journal of Social Robotics, vol. 15, no. 3, pp. 517–545, Mar. 2023.
V. Demertzi, S. Demertzis, and K. Demertzis, "An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities," Applied Sciences, vol. 13, no. 2, Jan. 2023, Art. no. 790.
A. Khang, S. K. Gupta, S. Rani, and D. A. Karras, Smart Cities: IoT Technologies, Big Data Solutions, Cloud Platforms, and Cybersecurity Techniques. Boca Raton, FL, USA: CRC Press, 2023.
Z. Chen and I. C. C. Chan, "Smart cities and quality of life: a quantitative analysis of citizens’ support for smart city development," Information Technology & People, vol. 36, no. 1, pp. 263–285, Jan. 2022.
P. Nayak and G. Swapna, "Security issues in IoT applications using certificateless aggregate signcryption schemes: An overview," Internet of Things, vol. 21, Apr. 2023, Art. no. 100641.
C. L. Stergiou, E. Bompoli, and K. E. Psannis, "Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario," Applied Sciences, vol. 13, no. 2, Jan. 2023, Art. no. 758.
M. Hosseini Shirvani and M. Masdari, "A survey study on trust-based security in Internet of Things: Challenges and issues," Internet of Things, vol. 21, Apr. 2023, Art. no. 100640.
A. Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, "Secure Intelligent Fuzzy Blockchain Framework: Effective Threat Detection in IoT Networks," Computers in Industry, vol. 144, Jan. 2023, Art. no. 103801.
U. Chatterjee and S. Ray, "Security Issues on IoT Communication and Evolving Solutions," in Soft Computing in Interdisciplinary Sciences, S. Chakraverty, Ed. New York, NY, USA: Springer, 2022, pp. 183–204.
A. Alamsyah, W. Rizkika, D. D. A. Nugroho, F. Renaldi, and S. Saadah, "Dynamic Large Scale Data on Twitter Using Sentiment Analysis and Topic Modeling," in 6th International Conference on Information and Communication Technology, Bandung, Indonesia, Dec. 2018, pp. 254–258.
J. R. Saura, D. Palacios-Marqués, and A. Iturricha-Fernández, "Ethical design in social media: Assessing the main performance measurements of user online behavior modification," Journal of Business Research, vol. 129, pp. 271–281, May 2021.
M. Alam, F. Abid, C. Guangpei, and L. V. Yunrong, "Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications," Computer Communications, vol. 154, pp. 129–137, Mar. 2020.
W. M. Webberley, S. M. Allen, and R. M. Whitaker, "Retweeting beyond expectation: Inferring interestingness in Twitter," Computer Communications, vol. 73, pp. 229–235, Jan. 2016.
H. Hu, L. Yang, S. Lin, and G. Wang, "A Case Study of the Security Vetting Process of Smart-home Assistant Applications," in IEEE Security and Privacy Workshops, San Francisco, CA, USA, May 2020, pp. 76–81.
O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose, "SoK: Security Evaluation of Home-Based IoT Deployments," in IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 2019, pp. 1362–1380.
D. Kim, K. Park, Y. Park, and J.-H. Ahn, "Willingness to provide personal information: Perspective of privacy calculus in IoT services," Computers in Human Behavior, vol. 92, pp. 273–281, Mar. 2019.
P. E. Naeini et al., "Privacy Expectations and Preferences in an {IoT} World," in Thirteenth Symposium on Usable Privacy and Security, Santa Clara, CA, USA, Jul. 2017, pp. 399–412.
J. R. Saura, D. Ribeiro-Soriano, and D. Palacios-Marqués, "Setting B2B digital marketing in artificial intelligence-based CRMs: A review and directions for future research," Industrial Marketing Management, vol. 98, pp. 161–178, Oct. 2021.
H. Jelodar et al., "Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey," Multimedia Tools and Applications, vol. 78, no. 11, pp. 15169–15211, Jun. 2019.
S. Ribeiro-Navarrete, J. R. Saura, and D. Palacios-Marques, "Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy," Technological Forecasting and Social Change, vol. 167, Jun. 2021, Art. no. 120681.
M. Rizwan Rashid Rana et al., "Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework," Computer Systems Science and Engineering, vol. 46, no. 2, pp. 2415–2428, 2023.
M. Iram, S. U. Rehman, S. Shahid, and S. A. Mehmood, "Anatomy of Sentiment Analysis of Tweets Using Machine Learning Approach : Anatomy of Sentiment Analysis of Tweets," Proceedings of the Pakistan Academy of Sciences: A. Physical and Computational Sciences, vol. 59, no. 2, pp. 61–73, Aug. 2022.
M. R. R. Rana, S. U. Rehman, A. Nawaz, T. Ali, and M. Ahmed, "A conceptual model for decision support systems using aspect based sentiment analysis," Proceedings of the Romanian Academy Series A - Mathematics Physics Technical Sciences Information Science, vol. 22, no. 4, pp. 371–380.
A. Abbas, U. Maqsood, S. U. Rehman, K. Mahmood, T. AlSaedi, and M. Kundi, "An Artificial Intelligence Framework for Disease Detection in Potato Plants," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12628–12635, Feb. 2024.
U. Maqsood, S. Ur Rehman, T. Ali, K. Mahmood, T. Alsaedi, and M. Kundi, "An Intelligent Framework Based on Deep Learning for SMS and e-mail Spam Detection," Applied Computational Intelligence and Soft Computing, vol. 2023, no. 1, 2023, Art. no. 6648970.
S. Hussain, S. Rehman, S. Raza, A. Mahmood, and S. Kundi, "Significance of Education Data Mining in Student’s Academic Performance Prediction and Analysis," International Journal of Innovations in Science & Technology, vol. 5, no. 3, pp. 215–231, Sep. 2023.
S. U. Rehman, S. Ali, G. Adeem, S. Hussain, and S. S. Raza, "Computational Intelligence Approaches for Analysis of the Detection of Zero-day Attacks," University of Wah Journal of Science and Technology, vol. 6, pp. 27–36, Dec. 2022.
Downloads
How to Cite
License
Copyright (c) 2024 Tahani AlSaedi, Misbah Mehmood, Asad Mahmood, Saif Ur Rehman, Mahwsh Kundi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.