{"title":"The Internet of Things Privacy is Provided Through Object Identification","authors":"Saurabh Lahoti","doi":"10.1109/AISC56616.2023.10085469","DOIUrl":null,"url":null,"abstract":"Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.