物联网隐私通过对象识别实现

Saurabh Lahoti
{"title":"物联网隐私通过对象识别实现","authors":"Saurabh Lahoti","doi":"10.1109/AISC56616.2023.10085469","DOIUrl":null,"url":null,"abstract":"Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Internet of Things Privacy is Provided Through Object Identification\",\"authors\":\"Saurabh Lahoti\",\"doi\":\"10.1109/AISC56616.2023.10085469\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.\",\"PeriodicalId\":408520,\"journal\":{\"name\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AISC56616.2023.10085469\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AISC56616.2023.10085469","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络安全是一个重大问题,需要深入研究和寻找可持续的解决方案。这个假设讨论了物联网(Iot)本身如何提供保护并提高我们使用网络的效率。虽然物联网(IoT)确实带来了效用,但它也引发了更多对网络安全的担忧。它扩展了我们对日常生活的基本组成部分如何通过互联网相互连接以使我们的生活更简单的认识。其中一个可能的主张是,把互联网变成一个基于人工智能的系统,将是一种真正直截了当的生活方式。我们开发了一种利用流建模的多阶段隐含设计。本文旨在确定一组带宽(每个设备),其周期质量在多个时间框架(从一刻到一小时)计算,分类各种物联网连接设备的连接行为,以及它们的运行状态(包括启动,与消费者积极交谈,甚至处于空闲状态);我们对各种物联网设备的网络行为进行分类,并估计我们方法的成本和有效性之间的权衡,并说明我们的监控方法是如何运作的。我们在真实世界的交通轨迹上训练我们的算法,然后评估它们利用这些轨迹的表现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Internet of Things Privacy is Provided Through Object Identification
Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信