Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A top-down survey on securing IoT with machine learning: : goals, recent advances and challenges

Published: 01 January 2022 Publication History

Abstract

The Internet of Things (IoT) has seen it all from being just another innovation to a leading technology; it is now a binding force that interconnects various aspects of our lives. The IoT's tremendous growth is driven by emerging applications and evolving business models, reinforced by falling cost resources and computing. However, it's heterogeneous nature and restricted existence raise various security concerns for the network operators, IoT service providers, and consumers alike. Machine learning has established itself as an inherent part of several IoT applications and is now taking over to address IoT's critical security challenges. The use of machine learning for securing IoT provides the IoT infrastructure with autonomously updated real-time security features. This paper performs a top-down survey on various active attacks faced by IoT networks and aims to showcase how machine learning has become an integral part of the IoT security model.

Index Terms

  1. A top-down survey on securing IoT with machine learning: goals, recent advances and challenges
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image International Journal of Wireless and Mobile Computing
            International Journal of Wireless and Mobile Computing  Volume 22, Issue 1
            2022
            103 pages
            ISSN:1741-1084
            EISSN:1741-1092
            DOI:10.1504/ijwmc.2022.22.issue-1
            Issue’s Table of Contents

            Publisher

            Inderscience Publishers

            Geneva 15, Switzerland

            Publication History

            Published: 01 January 2022

            Author Tags

            1. IoT
            2. internet of things
            3. IoT security
            4. IoT security goals
            5. machine learning
            6. machine learning algorithms
            7. deep learning
            8. active attacks
            9. security challenges

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 17 Dec 2024

            Other Metrics

            Citations

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media