{"title":"Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study","authors":"J. Chen, Kong-Long Lai","doi":"10.36548/JSCP.2020.4.005","DOIUrl":null,"url":null,"abstract":"In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.","PeriodicalId":48202,"journal":{"name":"Journal of Social and Clinical Psychology","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2021-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Social and Clinical Psychology","FirstCategoryId":"102","ListUrlMain":"https://doi.org/10.36548/JSCP.2020.4.005","RegionNum":4,"RegionCategory":"心理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"PSYCHOLOGY, CLINICAL","Score":null,"Total":0}
引用次数: 17
Abstract
In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.
期刊介绍:
This journal is devoted to the application of theory and research from social psychology toward the better understanding of human adaptation and adjustment, including both the alleviation of psychological problems and distress (e.g., psychopathology) and the enhancement of psychological well-being among the psychologically healthy. Topics of interest include (but are not limited to) traditionally defined psychopathology (e.g., depression), common emotional and behavioral problems in living (e.g., conflicts in close relationships), the enhancement of subjective well-being, and the processes of psychological change in everyday life (e.g., self-regulation) and professional settings (e.g., psychotherapy and counseling). Articles reporting the results of theory-driven empirical research are given priority, but theoretical articles, review articles, clinical case studies, and essays on professional issues are also welcome. Articles describing the development of new scales (personality or otherwise) or the revision of existing scales are not appropriate for this journal.