Abstract:Internet of things (IoT) technology is growing exponentially in almost every sphere of life. IoT offers several innovation capabilities and features, but they are also prone to security vulnerabilities and risks. These vulnerabilities must be studied to protect these technologies from being exploited by others. Cryptography techniques and approaches are commonly used to address and deal with security vulnerabilities. In general, the message queuing telemetry transport (MQTT) is an application layer protocol vu… Show more
“…Because attacks that use viruses intelligently, a novel study of information security has been conducted [53]. Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.
“…Because attacks that use viruses intelligently, a novel study of information security has been conducted [53]. Also, through the implementation of a safe and efficient communication proxy, Yusoff et al [54] addressed the problem of IoT traffic security. In addition, for the physical level of the WSN that uses the message queuing telemetry transport (MQTT) protocol for data transfer and networking, a cyber-security method is described by Khudhur and Croock [55] and Magzoub et al [56].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
As a result of the expansions that have taken place in the field of networking and the increase in the number of users of networks, there have recently been breakthroughs made in the techniques and methods used for network security. In this paper, a virtual private network (VPN) is proposed as a means of providing the necessary level of security for particular connections that span across vast networks. After the network performance metrics such as time delay and throughput have been accomplished, the suggested VPN is recommended for the purpose of assuring network security. In addition, artificial intelligence attack predictors and virtual private networks have been implemented with the purpose of preventing harmful activity within such connections. Using a wide variety of machine learning methods like Random Forests and Nave Bays, malicious assaults of any kind can be identified and thwarted in their tracks. Another technique for anticipating attacks is the use of an artificial neural network, which is a type of system that engages in deep learning and learns the behaviors of attacks while it is being trained so that it can then predict attacks. The results of this study demonstrate that the use of machine learning and artificial intelligence techniques can significantly improve the security and performance of virtual private networks and can effectively identify and prevent malicious attacks on networks.
“…Before transmission, data must be filtered and compressed to an ideal size. 3) Edge IT data processing [67], [94], [100], [109], [122], [133], [140], [168]- [170], [216], [220]- [223] Before reaching the cloud center, the digitized and aggregated IoT data is processed further. Edge devices do sophisticated analytics and preprocessing, which may include machine learning and visual representation.…”
Section: Architecture Stagesmentioning
confidence: 99%
“…One way that IoT edge computing may be used to protect humans is to automatically shut down machines when someone enters a prohibited area at a factory. Autonomous cars require data in order to make critical real-time decisions that might mean the difference between life and death on the road [24], [26], [67], [100], [109], [133], [145], [184], [186], [216], [220], [221], [267], [268], [293], [297], [335].…”
Section: Edge Computing: Low Latency and Securitymentioning
The internet of things (IoT) is rapidly expanding and improving operations in a wide range of real-world applications, from consumer IoT and enterprise IoT to manufacturing and industrial IoT (IIoT). Consumer markets, wearable devices, healthcare, smart buildings, agriculture, and smart cities are just a few examples. This paper discusses the current state of the IoT ecosystem, its primary applications and benefits, important architectural stages, some of the problems and challenges it faces, and its future. This paper explains how an appropriate IoT architecture that saves data, analyzes it, and recommends corrective action improves the process's ground reality. The IoT system architecture is divided into three layers: device, gateway, and platform. This then cascades into the four stages of the IoT architectural layout: sensors and actuators; gateways and data acquisition systems; edge IT data processing; and datacenter and cloud, which use high-end apps to collect data, evaluate it, process it, and provide remedial solutions. This elegant combination provides excellent value in automatic action. In the future, IoT will continue to serve as the foundation for many technologies. Machine learning will become more popular in the coming years as IoT networks take center stage in a variety of industries.
“…Zainatul et al [8] used a lightweight and secure communication proxy to solve the security problem of the Internet of things (IoT) traffic. (IoT) devices have increased the quantity of information generated in various formats [9].…”
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (radius center-end (RCE)) represent the second key. While the diagonal-radius center and the retina vessel's end (diagonal-radius center-end (DRCE)) represent the third key. The results illustrate the process's validity and applicability. Also, improve the time required to decrypt the cipher-text by a brute force attack (BFA) from (4.358e+139) year in the compared technique to (1.3074e+140) year for retina3. The BFA time will increase with increasing the number of retina vessels, as in retina1, 2, and 3, which have 24, 53, and 103 retina vessels.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.