Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study

IF 1 4区 心理学 Q3 PSYCHOLOGY, CLINICAL
J. Chen, Kong-Long Lai
{"title":"Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study","authors":"J. Chen, Kong-Long Lai","doi":"10.36548/JSCP.2020.4.005","DOIUrl":null,"url":null,"abstract":"In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.","PeriodicalId":48202,"journal":{"name":"Journal of Social and Clinical Psychology","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Social and Clinical Psychology","FirstCategoryId":"102","ListUrlMain":"https://doi.org/10.36548/JSCP.2020.4.005","RegionNum":4,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"PSYCHOLOGY, CLINICAL","Score":null,"Total":0}
引用次数: 17

Abstract

In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.
基于混合深度学习方法的物联网(IoT)认证和访问控制研究
在设备计算的历史上,物联网(IoT)是发展最快的领域之一,面临着许多安全挑战。应该有效解决物联网网络中的安全和隐私问题。物联网设备基本上是资源控制设备,为网络攻击者提供常规的吸引印象。物联网参与节点正在迅速增加,更多的资源受到限制,从而实时创造了更具挑战性的条件。现有的方法对有效的物联网设备的任务提供了无效的响应。此外,涉及物联网网络的完整安全和安全范围是不够的。由于现有的算法没有丰富到可以在实时环境中保护物联网生物网络。现有的系统不足以检测到嵌入式设备中授权人的代理。而且,这些方法只适用于单个模型域。因此,在行为特征和生理特征相结合的多模态领域,其有效性正在下降。嵌入式智能技术将通过深度学习(DL)技术为物联网设备和网络提供安全保障。DL方法解决了实时环境中出现的各种安全问题。本文重点介绍了与强化学习(RL)相结合的深度学习技术在攻击过程中的性能,并与现有技术进行了比较。此外,我们在这里讨论了几种技术的深度学习与强化学习的结合,并确定了更高精度的安全解决方案算法。最后,讨论了基于深度学习的物联网安全系统的未来决策方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
2.90
自引率
0.00%
发文量
20
期刊介绍: This journal is devoted to the application of theory and research from social psychology toward the better understanding of human adaptation and adjustment, including both the alleviation of psychological problems and distress (e.g., psychopathology) and the enhancement of psychological well-being among the psychologically healthy. Topics of interest include (but are not limited to) traditionally defined psychopathology (e.g., depression), common emotional and behavioral problems in living (e.g., conflicts in close relationships), the enhancement of subjective well-being, and the processes of psychological change in everyday life (e.g., self-regulation) and professional settings (e.g., psychotherapy and counseling). Articles reporting the results of theory-driven empirical research are given priority, but theoretical articles, review articles, clinical case studies, and essays on professional issues are also welcome. Articles describing the development of new scales (personality or otherwise) or the revision of existing scales are not appropriate for this journal.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信