论文标题
物联网安全和隐私的机器和深度学习:应用程序,挑战和未来方向
Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
论文作者
论文摘要
物联网(IoT)的集成将许多智能设备连接到最少的人类干扰,这些设备可以彼此相互作用。物联网正在计算机科学领域迅速出现。但是,通过在部署此类方案中涉及的多学科元素和物联网系统的横切设计提出了新的安全问题。无效的是安全协议的实施,即,针对物联网系统的身份验证,加密,应用程序安全和访问网络及其在安全方面的基本弱点。当前的安全方法也可以改善以有效保护物联网环境。近年来,深度学习(DL)/机器学习(ML)在各种关键实施中都取得了显着发展。因此,DL/ML方法对于将IoT系统保护至关重要,而不是简单地将物联网系统之间的安全接触到安全性的智能系统。这篇综述旨在在DL方法中包括对ML系统和最先进的开发的广泛分析,以改善增强的物联网设备保护方法。另一方面,机器和物联网证券深度学习的各种新见解说明了如何帮助未来的研究。发现与新兴或基本威胁有关的物联网保护风险,以及未来的物联网设备攻击以及与每个表面相关的可能威胁。然后,我们仔细分析了DL和ML物联网保护方法,并介绍每种方法的好处,可能性和弱点。这篇评论讨论了许多潜在的挑战和局限性。还包括IoT安全中DL/ML的未来作品,建议和建议。
The integration of the Internet of Things (IoT) connects a number of intelligent devices with a minimum of human interference that can interact with one another. IoT is rapidly emerging in the areas of computer science. However, new security problems were posed by the cross-cutting design of the multidisciplinary elements and IoT systems involved in deploying such schemes. Ineffective is the implementation of security protocols, i.e., authentication, encryption, application security, and access network for IoT systems and their essential weaknesses in security. Current security approaches can also be improved to protect the IoT environment effectively. In recent years, deep learning (DL)/ machine learning (ML) has progressed significantly in various critical implementations. Therefore, DL/ML methods are essential to turn IoT systems protection from simply enabling safe contact between IoT systems to intelligence systems in security. This review aims to include an extensive analysis of ML systems and state-of-the-art developments in DL methods to improve enhanced IoT device protection methods. On the other hand, various new insights in machine and deep learning for IoT Securities illustrate how it could help future research. IoT protection risks relating to emerging or essential threats are identified, as well as future IoT device attacks and possible threats associated with each surface. We then carefully analyze DL and ML IoT protection approaches and present each approach's benefits, possibilities, and weaknesses. This review discusses a number of potential challenges and limitations. The future works, recommendations, and suggestions of DL/ML in IoT security are also included.