R. Ganesh Babu, S. Yuvaraj, A. Vedanthsrivatson, T. Ramachandran, G. Vikram, N. Niffarudeen
{"title":"基于节点观察的大数据链路稳定性机器学习用于物联网安全","authors":"R. Ganesh Babu, S. Yuvaraj, A. Vedanthsrivatson, T. Ramachandran, G. Vikram, N. Niffarudeen","doi":"10.3233/apc210299","DOIUrl":null,"url":null,"abstract":"IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Machine Learning Using Big Data Link Stability Based Node Observation for IoT Security\",\"authors\":\"R. Ganesh Babu, S. Yuvaraj, A. Vedanthsrivatson, T. Ramachandran, G. Vikram, N. Niffarudeen\",\"doi\":\"10.3233/apc210299\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.\",\"PeriodicalId\":429440,\"journal\":{\"name\":\"Recent Trends in Intensive Computing\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Recent Trends in Intensive Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/apc210299\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Trends in Intensive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/apc210299","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Machine Learning Using Big Data Link Stability Based Node Observation for IoT Security
IoT systems create a multi-hop organizational structure among mobile devices in required to send on data groups. The remarkable properties of gadgets frameworks cause communications to interconnect among competing handheld devices. Most physiological directing displays don’t believe secure associations all through bundle communication to organize high communicate ability and genetic blocks that also prompts increased delay as well as bundle decreasing in mastermind. Only with continued growth and transformation of IoT networks, attacks on such IoT systems are increasing at an alarming rate. Our purpose will provide researchers with a research resource on latest research patterns in IoT security. As the primary driver of with us research problem concerning IoT security as well as machine learning. This analysis of the literature among the most research literature in IoT security recognized some very key current research which will generate organizational investigations. Only with fast emergence of different IoT threats, it is essential to develop frameworks that could integrate cutting-edge big data analytics and machine learning advanced technologies. Effectiveness are critical quality variables in shaping the best methods and algorithms for detecting IoT threats in real-time or close to real time.