2019
DOI: 10.1002/dac.4169
|View full text |Cite
|
Sign up to set email alerts
|

Securing Internet of Things (IoT) with machine learning

Abstract: Advances in hardware, software, communication, embedding computing technologies along with their decreasing costs and increasing performance have led to the emergence of the Internet of Things (IoT) paradigm. Today, several billions of Internet-connected devices are part of the IoT ecosystem.IoT devices have become an integral part of the information and communication technology (ICT) infrastructure that supports many of our daily activities. The security of these IoT devices has been receiving a lot of attent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 63 publications
(31 citation statements)
references
References 50 publications
0
31
0
Order By: Relevance
“…This shows that taxonomy perspectives are converging, making it less essential to define machine learning algorithms based on whether they are supervised or unsupervised [59]. Henceforth, we present an in-depth discussion of machine learning algorithms from a taxonomy perspective as described in [60], but in this section, we discuss the predominant machine learning techniques that are effective for cybersecurity solutions.…”
Section: A Machine Learningmentioning
confidence: 99%
“…This shows that taxonomy perspectives are converging, making it less essential to define machine learning algorithms based on whether they are supervised or unsupervised [59]. Henceforth, we present an in-depth discussion of machine learning algorithms from a taxonomy perspective as described in [60], but in this section, we discuss the predominant machine learning techniques that are effective for cybersecurity solutions.…”
Section: A Machine Learningmentioning
confidence: 99%
“…Supervised vs. unsupervised machine learning: Machine learning models are also used for anomaly and intrusion detection in order to solve some of the shortcomings of supervised machine learning models [28]. Supervised classifier models require large datasets that contain examples of each class that they are classifying (e.g., malicious or legitimate accounts).…”
Section: Detection Methodsmentioning
confidence: 99%
“…The research examined various shallow ML algorithms along with the performance accuracy and expose the challenges to implementation. However, Zeadally and Tsikerdekis [69] reviewed IoT device properties and some common attacks. Authors also classified host-based and network-based security solutions using supervised, unsupervised learning techniques as well as addressed the necessity of existing ML methods improvement to adopt the constrained IoT environment.…”
Section: Related Review Workmentioning
confidence: 99%