2021
DOI: 10.1007/s43926-020-00001-4
|View full text |Cite
|
Sign up to set email alerts
|

Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity

Abstract: In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 160 publications
(68 citation statements)
references
References 18 publications
0
68
0
Order By: Relevance
“…The weighted fusion method weights the output of each sensor, and the final result is the fusion value. The premise of this method is to do a comprehensive analysis of the detection system and sensors, and to determine the appropriate weight ratio of each sensor [17,18].…”
Section: Multi-sensor Information Fusion Methods (1) Weight Coefficient Fusion Methodsmentioning
confidence: 99%
“…The weighted fusion method weights the output of each sensor, and the final result is the fusion value. The premise of this method is to do a comprehensive analysis of the detection system and sensors, and to determine the appropriate weight ratio of each sensor [17,18].…”
Section: Multi-sensor Information Fusion Methods (1) Weight Coefficient Fusion Methodsmentioning
confidence: 99%
“…AI is frequently used by attackers to uncover and exploit flaws far faster than developers can repair them. Machine learning can be used to create a clever fuzzing algorithm that generates incorrect data in order to detect device vulnerabilities [186].…”
Section: ) Machine Learning In Ble Securitymentioning
confidence: 99%
“…Access control mainly prevents illegal use of protected resources and defines the following four component roles: access initiator, access control enforcement function (AEF), access control decision function (ADF), and access target [15].…”
Section: Basic Principles Of Access Controlmentioning
confidence: 99%