2022
DOI: 10.1016/j.compeleceng.2022.107754
|View full text |Cite
|
Sign up to set email alerts
|

Decision tree based user-centric security solution for critical IoT infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Using feature selection and principal component analysis, it is possible to create new brand components that explain the most important data. As part of machine-learning-based security modeling, these enhanced signature properties may make it easier to manage large amounts of IoT security data, such as identifying anomalies in IoT network traffic [ 103 ].…”
Section: Resultsmentioning
confidence: 99%
“…Using feature selection and principal component analysis, it is possible to create new brand components that explain the most important data. As part of machine-learning-based security modeling, these enhanced signature properties may make it easier to manage large amounts of IoT security data, such as identifying anomalies in IoT network traffic [ 103 ].…”
Section: Resultsmentioning
confidence: 99%
“…A novel sidechannel attack variant that aims to extract the global AES-CCM key used by Philips to encrypt and authenticate new firmware is one example of such a vulnerability (Ronen et al 2017). Another type of threat involves vulnerability attacks targeting the TCP/IP communication mode, which poses significant risks because TCP/IPfocused security frameworks frequently allow devices to connect and communicate before authentication, leading to ineffective security foundations (Puthal et al 2022), i.e.intruders get huge space to be part of the communication system before authentication happens (Puthal et al 2020). Furthermore, the security issues associated with outsourced chip production pose a significant threat to the semiconductor supply chain.…”
Section: Direct Communicationmentioning
confidence: 99%
“…Promising and effective outcomes in solving complicated challenges, for instance, automatic system diagnostics and identification [ 22 ], fault detection in wireless system [ 23 , 24 ], cyber threat detection [ 25 ], and specific security problems in other fields have been generated using ML tools throughout the past decade [ 26 , 27 ]. To detect intrusions, ML approaches can be highly effective.…”
Section: Introductionmentioning
confidence: 99%