Open Access Open Access  Restricted Access Subscription Access

Survey on Machine Learning Integrated with IOT

Aasha M. J, E.A. Mary Anita

Abstract


The Internet of Things (IoT) in the future has a deep influence on financial, enterprise, and social lives. The links in these networks square area typically resource concerned, which causes certain victims alluring for cyber offenses. Throughout this, in-depth efforts were created to deal with the privacy and security obstacles in such networks through classical science strategies. Anyhow, the properties of IoT nodes are well-defined which furnishes the prevailing clarifications skimpy to embrace the whole security spectrum of the IoT networks. This is partially, due to the resource no uniformity, constraints, period of time knowledge generated by the IoT devices.

Full Text:

PDF

References


Novo, O., Beijar, N., Ocak, M., Kjällman, J., Komu, M., & Kauppinen, T. (2015, December). Capillary networks-bridging the cellular and IoT worlds. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (pp. 571-578). IEEE.

Hussain, F. (2017). Internet of things: Building blocks and business models (No. 978-3, pp. 319-55404). Springer International Publishing.

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE communications surveys & tutorials, 17(4), 2347-2376.

Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials, 17(3), 1294-1312.

Mosenia, A., & Jha, N. K. (2016). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.

Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8-27.

Witten, I. H., & Frank, E. (2002). Data mining: practical machine learning tools and techniques with Java implementations. Acm Sigmod Record, 31(1), 76-77.

Brownlee, J. (2016). Master Machine Learning Algorithms: discover how they work and implement them from scratch. Machine Learning Mastery.

Yap, B. W., Abd Rani, K., Abd Rahman, H. A., Fong, S., Khairudin, Z., & Abdullah, N. N. (2014). An application of oversampling, undersampling, bagging and boosting in handling imbalanced datasets. In Proceedings of the first international conference on advanced data and information engineering (DaEng-2013) (pp. 13-22). Springer, Singapore.


Refbacks

  • There are currently no refbacks.