**2. Background**

#### **2.1 IoT architecture**

Internet of Things (IoT) is a service-oriented paradigm that is built on the involvement of several technologies. Therefore, its architecture consists of layers starting from sensors and reaching to constructive data displayed on the system-analyzer screen.

In References [3–5], the main IoT architecture consists of devices that have sensors and edge computing which has embedded devices, fog computing such as gateway and servers, cloudlets such as base stations, and the last component being cloud computing, which can be any cloud platform. **Table 1** shows some IoT architectures with variations on the number of layers based on five different references. In general, there are three main layers that are devices, network, and cloud computing. However, the device layer can be divided into two sub-layers based on the type and functionality: The first sub-layer comprises of end-user devices that contain sensors; and the second sub-layer are devices that support machine-to-machine communication such


**Table 1.** *IoT ecosystem architecture comparison.*

### *Artificial Intelligence Deployment to Secure IoT in Industrial Environment DOI: http://dx.doi.org/10.5772/intechopen.104469*

as an Arduino platform. The network layer can be divided as well into two sub-layers based on the communication characteristics such as the speed and bandwidth: fog computing and cloudlet. The third layer is the cloud computing layer. **Figure 1** illustrates the authors' insights into IoT architecture after studying the literature. Layer one consists of IoT devices, layer two covers all networking related technologies and devices, and the third layer consists of cloud computing and related data analytics technologies.

The IoT layers are connected through networking media using wireless or wired connections. However, wireless technology evolvement is critical to extend IoT deployment as the complexity of energy impact and processing capacity are getting worse at the sensor's layer [6]. The emerging of 5G in wireless communication adds an advantage to IoT architecture since it improves the performance by allowing the transformation of more data in less time, which technically reduces service-latency and enhances real-time access to data [6, 8].

### **2.2 IoT security challenges**

The growing use of Internet of Things (IoT) technology in the industrial sector has posed new issues for the device and data security. Based on different world statistics, the number of devices connected to IoT networks is rapidly increasing. This expansion leads to experience different levels of vulnerabilities, which may—in turn—cause an increase in security threats and challenges. Security may be regarded as a big threat that leads to limitations of the IoT systems deployment. As a result thereof, it is the Authors' view that effective security practices may become more vital in the IoT industry.

The National Institute of Standards and Technology (NIST) designed programs to boost cybersecurity involvement in IoT [9]. This initiative promotes the development and implementation of cybersecurity standards, guidelines, and tools for IoT products, connected devices, and their deployment environment.

	- Because IoT involves various and diverse technologies, determining and understanding security needs is more complicated.

**Figure 1.** *IoT architecture.*


Satisfying all the above-mentioned requirements is a huge challenge because of the limitations and constraints associated with the IoT devices in terms of capability and capacity to deploy the conventional security solutions.
