IoT Security Techniques Based on Machine Learning

Preprint English OPEN
Xiao, Liang; Wan, Xiaoyue; Lu, Xiaozhen; Zhang, Yanyong; Wu, Di;
(2018)
  • Subject: Computer Science - Cryptography and Security

Internet of things (IoT) that integrate a variety of devices into networks to provide advanced and intelligent services have to protect user privacy and address attacks such as spoofing attacks, denial of service attacks, jamming and eavesdropping. In this article, we i... View more
  • References (30)
    30 references, page 1 of 3

    [1] X. Li, R. Lu, X. Liang, and X. Shen, “Smart community: An Internet of Things application,” IEEE Commun. Magazine, vol. 49, no. 11, pp. 68-75, Nov. 2011.

    [2] Z. Sheng, S. Yang, Y. Yu, and A. Vasilakos, “A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities,” IEEE Wireless Commun., vol. 20, no. 6, pp. 91-98, Dec. 2013.

    [3] X. Liu, M. Zhao, S. Li, F. Zhang, and W. Trappe, “A security framework for the Internet of Things in the future Internet architecture,” Future Internet, vol. 9, no. 3, pp. 1-28, Jun. 2017.

    [4] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, “Internet of Things: Security vulnerabilities and challenges,” in Proc. IEEE Symposium on Computers and Commun, pp. 180-187, Larnaca, Cyprus, Feb. 2015.

    [5] R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed Internet of Things,” Computer Networks, vol. 57, no. 10, pp. 2266-2279, Jul. 2013.

    [6] S. Chen, H. Xu, D. Liu, and B. Hu, “A vision of IoT: Applications, challenges, and opportunities with china perspective,” IEEE Internet of Things Journal, vol. 1, no. 4, pp. 349-359, Jul. 2014.

    [7] J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: Challenges,” IEEE Commun. Magazine, vol. 55, no. 1, pp. 26-33, Jan. 2017.

    [8] L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” IEEE Trans. Vehicular Technology, vol. 65, no. 12, pp. 10037-10047, Dec. 2016.

    [9] M. Abu Alsheikh, S. Lin, D. Niyato, and H. P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Commun. Surveys and Tutorials, vol. 16, no. 4, pp. 1996-2018, Apr. 2014.

    [10] L. Xiao, C. Xie, T. Chen, and H. Dai, “A mobile offloading game against smart attacks,” IEEE Access, vol. 4, pp. 2281-2291, May 2016.

  • Metrics
Share - Bookmark