This work is licensed under a Creative Commons Attribution 3.0 License.
For more information, see http://creativecommons.org/licenses/by/3.0/.
This article has been accepted for publication in
a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2924045,
IEEE Access
Vikas Hassija et al.: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
which are discussed below.
•
Support Vector Machine: SVM is a training al-
gorithm for non-linear and linear classifications,
principal component analysis, text categorization,
speaker identification, and regression. It maxi-
mizes the gap between the decision boundary and
training patterns. Authors of [190] have discussed
the use of SVM in digital fingerprinting in detail.
They have also compared it with other traditional
models. A feature vector is built based on pixel
values of the fingerprint, and it is used to train the
SVM. Various patterns behind the fingerprint are
analyzed, and then the matching of a fingerprint is
done based on patterns identified.
•
Artificial Neural Networks: ANN is one of the
most commonly used algorithms in the machine
learning. It offers many advantages like fault
tolerance, adaptive learning, and generalization.
In [191] a framework has been proposed for using
ANN to identify fingerprints digitally. The digital
values of various features in the fingerprint like
minutiae, ridge ending, and bifurcation is applied
as the input to the neural network for training pur-
pose using back propagation algorithm of ANN.
The verification of the fingerprint is done based
on the previous experiential values stored in the
database.
The fundamental need in IoT is to secure all the systems
and devices that are connected to the network. The role of
ML is to use and train algorithms to detect anomalies in IoT
devices or to detect any unwanted activity taking place in IoT
system to prevent data loss or other issues. Therefore, ML
provides a promising platform to overcome the difficulties
faced in securing IoT devices. Further contributions in this
field are required to maintain the growth of IoT.
Chia sẻ với bạn bè của bạn: