[HTML][HTML] Challenges in internet of things towards the security using deep learning techniques

KC Ravikumar, P Chiranjeevi, NM Devarajan… - Measurement …, 2022 - Elsevier
Measurement: Sensors, 2022Elsevier
Securing IoT devices and delivering end-to-end security in an IoT ecosystem presents a
variety of issues. Regardless of the way that security concerns are not new with regards to
data innovation, the qualities of numerous IoT arrangements give new and special security
issues. It's anything but a main concern to resolve these issues and guarantee the security of
IoT items and administrations. Clients should have certainty that IoT gadgets and related
information administrations are secure, especially as this innovation develops more …
Abstract
Securing IoT devices and delivering end-to-end security in an IoT ecosystem presents a variety of issues. Regardless of the way that security concerns are not new with regards to data innovation, the qualities of numerous IoT arrangements give new and special security issues. It's anything but a main concern to resolve these issues and guarantee the security of IoT items and administrations. Clients should have certainty that IoT gadgets and related information administrations are secure, especially as this innovation develops more unavoidable and coordinated into our day by day lives. The goal of this article is to provide an overview of the Internet of Things and to go through all of the known security concerns that the Internet of Things faces today. All of the findings are based on publicly available documentation for essential Internet of Things components. Threats to IoT security, both inherent and newly developed, are discussed, as well as numerous potentials. The attack surfaces of the IoT system are examined, as well as the potential hazards associated with each surface. We then, at that point go over the benefits, weaknesses, and qualities of every Deep Learning approach for IoT security. We talk about the advantages and disadvantages of applying Deep Learning to IoT security. Future exploration headings could be founded on these chances and difficulties.
Elsevier
以上显示的是最相近的搜索结果。 查看全部搜索结果