2020
DOI: 10.1109/access.2020.3018170
|View full text |Cite
|
Sign up to set email alerts
|

Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey

Abstract: Through three development routes of authentication, communication, and computing, the Internet of Things (IoT) has become a variety of innovative integrated solutions for specific applications. However, due to the openness, extensiveness and resource constraints of IoT, each layer of the three-tier IoT architecture suffers from a variety of security threats. In this work, we systematically review the particularity and complexity of IoT security protection, and then find that Artificial Intelligence (AI) method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
78
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 133 publications
(81 citation statements)
references
References 77 publications
0
78
0
3
Order By: Relevance
“…8, takes place when multiple requests are sent using a botnet army, ultimately overwhelming the victim. All the servers are designed to handle a particular number of requests at a time, and attackers try to reach this threshold and exceed that by an enormous amount to overwhelm and ultimately deny the server to perform further [59]. IoT devices are exploited by attackers because of software, hardware, physical vulnerabilities.…”
Section: Insecure Connectionmentioning
confidence: 99%
“…8, takes place when multiple requests are sent using a botnet army, ultimately overwhelming the victim. All the servers are designed to handle a particular number of requests at a time, and attackers try to reach this threshold and exceed that by an enormous amount to overwhelm and ultimately deny the server to perform further [59]. IoT devices are exploited by attackers because of software, hardware, physical vulnerabilities.…”
Section: Insecure Connectionmentioning
confidence: 99%
“…According to the process of gathering information, transmission, and processing from IoT systems, IoT has an entity-based architecture that is divided in three main layers. These layers are usually named: terminal perception layer, network transport layer, and application service layer [ 2 ]. The terminal perception layer is composed by the source of IoT data collection.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the network transport layer transmits the information gathered by the perception layer to the application service layer. Finally, the application service layer process the data transmitted from the network transport layer to various industries or entities, providing services for different users through different fields, such as smart grids, smart homes, and smart cities [ 2 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Openness in IoT systems offer multitude of benefits [10], but security is never assured [12,13]. Security and privacy goals are at the top of the agenda for the industry, yet a growing number of smaller IoT vendors, typically startups, whose core competence does not focus on security, brings a bigger challenge to set-up a secure IoT infrastructure [14][15][16].…”
Section: Introductionmentioning
confidence: 99%