It is approximately calculated that the number of connected devices will increase to 40 billion by end of 2020. But the latest research says that it may further exceed 60 billion because of this pandemic situation that we are undergoing. Hence, it becomes the call of the hour to put up our keen study and implementation ideas to provide a real-time response to do the diagnose data processing and analysis to have been applied with the machine learning techniques with data retrieval to make the decision accurate and timely which is the goal of this data-based work.
2.9 Conclusion
In this strategic study, the surveyed paradigm includes the security aspect of IoT and what is being carried out over it as a thoughtful concern of today’s era and as well as the prospective which need further concern. It renders over the architectural infrastructure IOT-enabled devices and the design model of the computational intelligent approach which is applied over with machine learning algorithms. It also looks upon the perfect analysis of the vulnerabilities of the related devices over the cloud which limits the failure ratio by the use of cognitive intelligence techfacts and forms. It also overhauls the cryptographic protocols which would enable IOT devices to process the computational data signals without the interventions of intruding threats. It gives us a dynamic efficacy for a secured communication, thereby developing schemes to address the security in context. Besides, it clearly reflects the security in context to both defense as well as attack.
The machine learning algorithm acts as a cyberweapon and an automated tool for automating the correlated cyber activities, with use of which this leverages the sophisticated power of adversarial machine learning. This study can be better basis for future resources dynamically analyzing the existing security solutions and develop a scalable cyber security system. It is also observed the extracted high-order implicable technology can further be modified where single malicious node can give signals to multiple identities and thus reducing the effectiveness of their faults schemes.
Hence, we may brief up as follows: Whenever a contravention occurs, the earlier it is detected and responded to the maximum is the opportunity of reducing loss vividly in a dynamic and vulnerable incidental operation.
References
1. Atlam, H.F., Alenezi, A., Alharthi, A., Walters, R.J., Wills, G.B., Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE International Conferenece, Exeter, UK, 2017, https://ieeexplore.ieee.org/document/8276823.
2. Tweneboah-Koduah, S., Skouby, K.E., Tadayoni, R., Cyber Security Threats to IoT Applications and Service Domains, Wireless Personal Communications. Int. J., 94, 4, June 2017. Springer.
3. https://www.softwaretestinghelp.com/iot-devices/
4. Hossain, Md. M., Fotouhi, M., Hasan, R., Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. IEEE 11th World Congress on Services, New York, NY, USA, June 2015, https://www.researchgate.net/publication/279801184_Towards_an_Analysis_of_Security_Issues_Challenges_and_Open_Problems_in_the_Internet_of_Things.
5. https://www.scnsoft.com/services/iot
6. Buch, R., Borad, N., Kalola, P., World of Cyber Security and Cybercrime. STM J., August 2018. https://www.researchgate.net/publication/327110771.
7. Saravanan, A. and Sathya Bama, S., A Review on Cyber Security and the Fifth Generation Cyberattacks. Orien. J. Comput. Sci. Technol., 12, 2, 50–56, 2019.
8. Fruhlinger, J., What is a cyber attack? Recent examples show disturbing trends, CSO |, 27 February 2020. https://www.csoonline.com/article/3237324/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html.
9. Wikipedia, https://en.wikipedia.org/wiki/Cyberattack.
10. Fruhlinger, J., Malware explained: How to prevent, detect and recover from it CSO |, 17 May 2019. https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-beyond.html.
11. Fruhlinger, J., What is phishing? How this cyber attack works and how to prevent it CSO|, 4 September 2020. https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html.
12. Fruhlinger, J., Ransomware explained: How it works and how to remove it, CSO |, 19 June 2020. https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-works-and-how-to-remove-it.html.
13. Wikipedia, https://en.wikipedia.org/wiki/Spyware
14. Gunjan, V.K., Kumar, A., Avdhanam, S., A Survey of Cyber Crime in India. Conference: ICACT, 2013.
15. https://www.ntsc.org/assets/pdfs/cyber-security-report-2020.pdf
16. Hilt, S., Kropotov, V., Mercês, F., Rosario, M., Sancho, D., The Internet of Things in the Cybercrime Underground, Trend Micro Research, For Raimund Genes, 1963–2017.
17. Kaufman, L.M., BAE Systems, Data Security in the World of Cloud Computing, Security & Privacy IEEE, ieeexplore.ieee.org, 2009.
18. IBM cloud education, in: Cloud Storage 24th, June 2019, https://www.ibm.com/cloud/learn/cloud-storage.
19. Wikipedia, https://en.wikipedia.org/wiki/Cloud_computing_security.
20. Carroll, M., van der Merwe, A., Kotzé, P., Secure Cloud Computing: Benefits, Risks and Controls. Conference: Information Security South Africa (ISSA), IEEE Xplore, 2011.
21. Survey, A., Integration of cloud computing and Internet of Things. Future Gener. Comput. Syst., 56, 2015. https://www.researchgate.net/publication/283236612_Integration_of_Cloud_computing_and_Internet_of_Things_A_survey.
22. Russel, S.J. and Norvig, P., Artificial Intelligence: A modern Approach, 2nd Edition, Pearson Education, Inc., Dorling Kindersley (India) Pvt. Ltd, 2007.
23. Sethi, A., Supervised Learning vs. Unsupervised Learning, 2020.