2020
DOI: 10.1145/3417987
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy in IoT Using Machine Learning and Blockchain

Abstract: Security and privacy of users have become significant concerns due to the involvement of the Internet of Things (IoT) devices in numerous applications. Cyber threats are growing at an explosive pace making the existing security and privacy measures inadequate. Hence, everyone on the Internet is a product for hackers. Consequently, Machine Learning (ML) algorithms are used to produce accurate outputs from large complex databases, where the generated outputs can be used to predict and detect vulnerabilities in I… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(49 citation statements)
references
References 122 publications
0
29
0
Order By: Relevance
“…As discussed earlier that it may cause privacy concerns among users and data owners. Thereafter, traditional centralized healthcare applications find limited applicability due to privacy concerns [39,40,41]. To address the privacy issues in machine learning, researchers have been working on Federated learning (FL) and Transfer learning (TF).…”
Section: Machine Learning In Healthcarementioning
confidence: 99%
“…As discussed earlier that it may cause privacy concerns among users and data owners. Thereafter, traditional centralized healthcare applications find limited applicability due to privacy concerns [39,40,41]. To address the privacy issues in machine learning, researchers have been working on Federated learning (FL) and Transfer learning (TF).…”
Section: Machine Learning In Healthcarementioning
confidence: 99%
“…Granjal et al [16] have identified and analyzed the existing security threats of various protocol designed for IoT. Whereas, several other studies likewise [17][18][19][20] have addressed and evaluated the key management and cryptographic algorithms that is suitable for IoT paradigm. Sicari et al [21] have identified researchers' effort in order to address the confidentiality, privacy, access control and security with middleware for IoT systems.…”
Section: Background and Motivationsmentioning
confidence: 99%
“…Narrowing down the scope to BC and IoT systems, one sees research attempts to close the gaps of IoT systems by removing the centralized control as well as attack the problem of provenance, non-repudiation, and authenticity in IoT data streams with the help of BC [9], [18], [22], [23]. Other studies [31] attempt to close security and privacy IoT gaps with the help of the BC to ensure the reliability and availability of the data.…”
Section: Internet-of-things and Blockchainsmentioning
confidence: 99%