Biblio
Filters: Author is Sundaram, B. Barani [Clear All Filters]
IoT Enhancement with Automated Device Identification for Network Security. 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI). :531—535.
.
2022. Even as Internet of Things (IoT) network security grows, concerns about the security of IoT devices have arisen. Although a few companies produce IP-connected gadgets for such ranging from small office, their security policies and implementations are often weak. They also require firmware updates or revisions to boost security and reduce vulnerabilities in equipment. A brownfield advance is necessary to verify systems where these helpless devices are present: putting in place basic security mechanisms within the system to render the system powerless possibly. Gadgets should cohabit without threatening their security in the same device. IoT network security has evolved into a platform that can segregate a large number of IoT devices, allowing law enforcement to compel the communication of defenseless devices in order to reduce the damage done by its unlawful transaction. IoT network security appears to be doable in well-known gadget types and can be deployed with minimum transparency.
Analysis of Efficient Network Security using Machine Learning in Convolutional Neural Network Methods. 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC). :170—173.
.
2022. Several excellent devices can communicate without the need for human intervention. It is one of the fastest-growing sectors in the history of computing, with an estimated 50 billion devices sold by the end of 2020. On the one hand, IoT developments play a crucial role in upgrading a few simple, intelligent applications that can increase living quality. On the other hand, the security concerns have been noted to the cross-cutting idea of frameworks and the multidisciplinary components connected with their organization. As a result, encryption, validation, access control, network security, and application security initiatives for gadgets and their inherent flaws cannot be implemented. It should upgrade existing security measures to ensure that the ML environment is sufficiently protected. Machine learning (ML) has advanced tremendously in the last few years. Machine insight has evolved from a research center curiosity to a sensible instrument in a few critical applications.