A Self-Learning Framework for the IoT Security

A Self-Learning Framework for the IoT Security

Sitalakshmi Venkatraman
Copyright: © 2019 |Pages: 20
ISBN13: 9781522578116|ISBN10: 1522578110|EISBN13: 9781522578123
DOI: 10.4018/978-1-5225-7811-6.ch003
Cite Chapter Cite Chapter

MLA

Venkatraman, Sitalakshmi. "A Self-Learning Framework for the IoT Security." Smart Devices, Applications, and Protocols for the IoT, edited by Joel J. P. C. Rodrigues, et al., IGI Global, 2019, pp. 34-53. https://doi.org/10.4018/978-1-5225-7811-6.ch003

APA

Venkatraman, S. (2019). A Self-Learning Framework for the IoT Security. In J. Rodrigues, A. Gawanmeh, K. Saleem, & S. Parvin (Eds.), Smart Devices, Applications, and Protocols for the IoT (pp. 34-53). IGI Global. https://doi.org/10.4018/978-1-5225-7811-6.ch003

Chicago

Venkatraman, Sitalakshmi. "A Self-Learning Framework for the IoT Security." In Smart Devices, Applications, and Protocols for the IoT, edited by Joel J. P. C. Rodrigues, et al., 34-53. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7811-6.ch003

Export Reference

Mendeley
Favorite

Abstract

The internet of things (IoT) is a complex system of heterogeneous devices connected to a network. While IoT can significantly add value to people's everyday activities around the world, there are numerous security risks and privacy breaches imposed by the IoT landscape. Traditional security solutions are not applicable for the IoT as they require high-end processing capacity. The objective of this chapter is two-fold. Firstly, it provides a comprehensive summary of the recent advancements in the IoT and identifies their vulnerabilities. Secondly, it proposes the paradigm of self-learning as an intelligent and sustainable mechanism that is capable of automatically detecting suspicious activities in the IoT. Overall, this chapter presents a contemporary coverage of the recent developments in the IoT scene, the security and privacy challenges confronting the security experts, a proposal of a self-learning framework for performing health check of the IoT environment, and finally a set of high-level implementation guidelines and conclusions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.