z-logo
open-access-imgOpen Access
Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study
Author(s) -
Joy Iong Zong Chen,
Kong-Long Lai
Publication year - 2021
Publication title -
journal of soft computing paradigm
Language(s) - English
Resource type - Journals
ISSN - 2582-2640
DOI - 10.36548/jscp.2020.4.005
Subject(s) - computer science , internet of things , computer security , authentication (law) , access control , embedding , domain (mathematical analysis) , reinforcement learning , field (mathematics) , artificial intelligence , computer network , mathematical analysis , mathematics , pure mathematics
In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom