{"title":"Aspects of Security for Accelerating Artificial Intelligence inside Internet of Things Centric Distributed Storage Network","authors":"Fawad Mustafa, Murtaza Hussain Shaikh","doi":"10.1109/IMTIC53841.2021.9719866","DOIUrl":null,"url":null,"abstract":"The centricity of in-network storage is a methodology that allows the generated sensor data readings to be stored in slices, known as data fragments. Within the sensor network, fragments are stored at various storage nodes. As a result, the data is more secure. The IoT network shows failures and unauthorized admittance to the users. The role played, herein, by the storage nodes make them prone to various security attacks. In this research work, the preliminary investigation and the methods to employ to provide the solution for security and privacy problems in distributed sensor network storage. Deep learning technologies that are already in use in ioT contexts cannot assign compute tasks reasonably which leads to resources wasting. Artificial intelligence is made up of capabilities that assist gadgets in learning and processing information in the same way that people do. A quantifiable blend of artificial intelligence with the internet of things, popularly known as AAIoT, is something that is holding a promise of a more connected future. This article proposes an AAIoT based method for allocating each network layer's inference computation in a multi-layer internet of things system to each device This is, to the best of my knowledge, the first attempt to track down this criminal. When considering the cost of computing and communication, the design of this study effort is a programming algorithm to lower the response time. The simulation findings demonstrate that a method could improve the system's response time significantly.","PeriodicalId":172583,"journal":{"name":"2021 6th International Multi-Topic ICT Conference (IMTIC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Multi-Topic ICT Conference (IMTIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMTIC53841.2021.9719866","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The centricity of in-network storage is a methodology that allows the generated sensor data readings to be stored in slices, known as data fragments. Within the sensor network, fragments are stored at various storage nodes. As a result, the data is more secure. The IoT network shows failures and unauthorized admittance to the users. The role played, herein, by the storage nodes make them prone to various security attacks. In this research work, the preliminary investigation and the methods to employ to provide the solution for security and privacy problems in distributed sensor network storage. Deep learning technologies that are already in use in ioT contexts cannot assign compute tasks reasonably which leads to resources wasting. Artificial intelligence is made up of capabilities that assist gadgets in learning and processing information in the same way that people do. A quantifiable blend of artificial intelligence with the internet of things, popularly known as AAIoT, is something that is holding a promise of a more connected future. This article proposes an AAIoT based method for allocating each network layer's inference computation in a multi-layer internet of things system to each device This is, to the best of my knowledge, the first attempt to track down this criminal. When considering the cost of computing and communication, the design of this study effort is a programming algorithm to lower the response time. The simulation findings demonstrate that a method could improve the system's response time significantly.