Machine Learning Using Big Data Link Stability Based Node Observation for IoT Security

R. Ganesh Babu, S. Yuvaraj, A. Vedanthsrivatson, T. Ramachandran, G. Vikram, N. Niffarudeen
{"title":"Machine Learning Using Big Data Link Stability Based Node Observation for IoT Security","authors":"R. Ganesh Babu, S. Yuvaraj, A. Vedanthsrivatson, T. Ramachandran, G. Vikram, N. Niffarudeen","doi":"10.3233/apc210299","DOIUrl":null,"url":null,"abstract":"IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Trends in Intensive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/apc210299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.
基于节点观察的大数据链路稳定性机器学习用于物联网安全
物联网系统在需要发送数据组的移动设备之间创建多跳组织结构。gadget框架的显著特性使得相互竞争的手持设备之间的通信相互连接。大多数生理指挥显示不相信安全的联系都是通过束通信来组织高通信能力和遗传障碍,这也导致了策划者延迟增加和束减少。只有随着物联网网络的持续增长和转型,对此类物联网系统的攻击才会以惊人的速度增加。我们的目的是为研究人员提供有关物联网安全最新研究模式的研究资源。作为我们研究物联网安全和机器学习问题的主要驱动力。本文对物联网安全研究文献中的文献进行了分析,发现了一些非常关键的当前研究,这些研究将产生组织调查。随着各种物联网威胁的快速出现,开发能够整合尖端大数据分析和机器学习先进技术的框架至关重要。有效性是形成实时或接近实时检测物联网威胁的最佳方法和算法的关键质量变量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信