2021
DOI: 10.1002/eej.23333
|View full text |Cite
|
Sign up to set email alerts
|

Study on cyber‐security for IoT edge utilizing pattern match accelerator

Abstract: A malware detection algorithm that can be embedded in IoT edge computing is proposed in this study and validated using an emulator. This algorithm, with a pattern match accelerator, reduces the computing cost while maintaining a relatively high detection accuracy. For autonomous driving, complicated IoT edge computing must have a huge amount of embedded program codes. In such a situation, the invasion of malware can lead to compromised cybersecurity. In this study, a pattern match accelerator is implemented fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The privacy protection mechanism mainly needs to establish a hierarchical work system, starting from the management aspect, and integrate into a reasonable interconnection. A hierarchical work system can be effective for privacy protection by ensuring clear roles and responsibilities, access controls, employee training and awareness, regular monitoring and auditing, and a clear incident response plan for dealing with breaches (Kashiyama et al, 2021). Network equipment and corresponding information protection codes are enhanced to strengthen the management of data information, thereby providing an important security protection barrier for personal information settings (Yilmaz & Uludag, 2021).…”
Section: Stable and Reliable Privacy Protection Mechanismmentioning
confidence: 99%
“…The privacy protection mechanism mainly needs to establish a hierarchical work system, starting from the management aspect, and integrate into a reasonable interconnection. A hierarchical work system can be effective for privacy protection by ensuring clear roles and responsibilities, access controls, employee training and awareness, regular monitoring and auditing, and a clear incident response plan for dealing with breaches (Kashiyama et al, 2021). Network equipment and corresponding information protection codes are enhanced to strengthen the management of data information, thereby providing an important security protection barrier for personal information settings (Yilmaz & Uludag, 2021).…”
Section: Stable and Reliable Privacy Protection Mechanismmentioning
confidence: 99%
“…The algorithm utilized a pattern match accelerator to reduce computing costs while maintaining a relatively high detection accuracy. Through performance testing with a pseudo-emulator system and a selection of 641 malware samples, the algorithm demonstrated an identification performance of approximately 80%, showcasing its potential to enable edge computing with robust cybersecurity features at a reduced computational expense compared to AI-based characteristic extraction [2]. Tahir et al developed a novel DNA sequences pattern matching algorithm called EPMA, aiming to address the challenge of pattern matching between different species in bioinformatics.…”
Section: Iintroductionmentioning
confidence: 99%