-
آرشیو :
نسخه تابستان 1398
-
موضوع :
شبکه های کامپیوتری
-
نویسنده/گان :
سجاد اسفندياري، وحيد رافع
-
کلید واژه :
شبکه، اینترنت اشیا، امنیت شبکه، یادگیری ماشین، الگوریتمهای یادگیری ماشین.
-
Title :
An overview of IoT security using machine learning
-
مراجع :
[1] M. Ammar, G. Russello, and B. Crispo, "Internet of Things: A survey on the security of IOT frameworks," Journal of Information Security and Applications, vol. 38, pp. 8-27, 2018.
[2] N. M. Radwan, "A Study: The Future of the Internet of Things and its Home Applications," International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 1, 2020.
[3] S. Chowdhury, R. Jain, M. Thimmaiah, R. Prajwal, and K. Rakesh, "IOT based home automation and security systems: A literature survey," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 5, no. 2, 2019.
[4] H. Hosseinian, H. Damghani, L. Damghani, G. Nezam, and H. Hosseinian, "Home appliances energy management based on the IOT system," International Journal of Nonlinear Analysis and Applications, vol. 10, no. 1, pp. 167-175, 2019.
[5] S. P. Yadav, A. Kumbhare, and R. Parab, "Smart Home Application using Internet of Things," perception, vol. 6, no. 02, 2019.
[6] Z. Zhao et al., "A novel framework of three-hierarchical offloading optimization for MEC in industrial IOT networks," IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5424-5434, 2019.
[7] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, "Security and privacy challenges in industrial internet of things," in 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 2015, pp. 1-6: IEEE.
[8] T. Perković, S. Damjanović, P. Šolić, L. Patrono, and J. J. Rodrigues, "Meeting Challenges in IOT: Sensing, Energy Efficiency, and the Implementation," in Fourth International Congress on Information and Communication Technology, 2020, pp. 419-430: Springer.
[9] K. D. Kumar, M. Sudhakara, and R. K. Poluru, "Towards the Integration of Blockchain and IOT for Security Challenges in IOT: A Review," in Transforming Businesses With Bitcoin Mining and Blockchain Applications: IGI Global, 2020, pp. 45-67.
[10] S. Stankovski, G. Ostojić, L. Tarjan, M. Stanojević, and M. Babić, "CHALLENGES OF IOT PAYMENTS IN SMART SERVICES," Annals of DAAAM & Proceedings, vol. 30, 2019.
[11] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, " IOT security: ongoing challenges and research opportunities," in 2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230-234: IEEE.
[12] K. Tabassum, A. Ibrahim, and S. A. El Rahman, "Security issues and challenges in IOT," in 2019 International Conference on Computer and Information Sciences (ICCIS), 2019, pp. 1-5: IEEE.
[13] F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine learning in IOT security: current solutions and future challenges," IEEE Communications Surveys & Tutorials, 2020.
[14] M. A. Khan and K. Salah, " IOT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, vol. 82, pp. 395-411, 2018.
[15] S. Zeadally and M. Tsikerdekis, "Securing Internet of Things (IOT) with machine learning," International Journal of Communication Systems, vol. 33, no. 1, p. e4169, 2020.
[16] F. Mclay, "Privacy law: How to save face: Data and privacy safeguards," Governance Directions, vol. 70, no. 4, p. 202, 2018.
[17] M. T. Gardner, C. Beard, and D. Medhi, "Using SEIRS epidemic models for IOT botnets attacks," in DRCN 2017-Design of Reliable Communication Networks; 13th International Conference, 2017, pp. 1-8: VDE.
[18] L. Munoz Gonzalez and E. Lupu, "The secret of machine learning," 2018.
[19] L. E. Kane, J. J. Chen, R. Thomas, V. Liu, and M. Mckague, "Security and Performance in IOT: A Balancing Act," IEEE Access, vol. 8, pp. 121969-121986, 2020.
[20] P. Williams, P. Rojas, and M. Bayoumi, "Security Taxonomy in IOT–A Survey," in 2019 IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS), 2019, pp. 560-565: IEEE.
[21] Y. Yang, X. Zheng, W. Guo, X. Liu, and V. Chang, "Privacy-preserving smart IOT-based healthcare big data storage and self-adaptive access control system," Information Sciences, vol. 479, pp. 567-592, 2019.
[22] N. Nesa, T. Ghosh, and I. Banerjee, "Non-parametric sequence-based learning approach for outlier detection in IOT," Future Generation Computer Systems, vol. 82, pp. 412-421, 2018.
[23] F. Li, J. Hong, and A. A. Omala, "Efficient certificateless access control for industrial internet of things," Future Generation Computer Systems, vol. 76, pp. 285-292, 2017.
[24] B. Chatterjee, D. Das, S. Maity, and S. Sen, "RF-PUF: Enhancing IOT security through authentication of wireless nodes using in-situ machine learning," IEEE Internet of Things Journal, vol. 6, no. 1, pp. 388-398, 2018.
[25] H. Liu and B. Lang, "Machine learning and deep learning methods for intrusion detection systems: A survey," Applied Sciences, vol. 9, no. 20, p. 4396, 2019.
[26] R. Doshi, N. Apthorpe, and N. Feamster, "Machine learning ddos detection for consumer internet of things devices," in 2018 IEEE Security and Privacy Workshops (SPW), 2018, pp. 29-35: IEEE.
[27] J. Canedo and A. Skjellum, "Using machine learning to secure IOT systems," in 2016 14th annual conference on privacy, security and trust (PST), 2016, pp. 219-222: IEEE.
[28] P. C. M. Arachchige, P. Bertok, I. Khalil, D. Liu, S. Camtepe, and M. Atiquzzaman, "A trustworthy privacy preserving framework for machine learning in industrial IOT systems," IEEE Transactions on Industrial Informatics, vol. 16, no. 9, pp. 6092-6102, 2020.
- صفحات : 33-49
-
دانلود فایل
( 958 KB )