IRO Journals

Journal of Soft Computing Paradigm

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Energy Management System in the Vehicles using Three Level Neuro Fuzzy Logic
Volume-3 | Issue-3

Cloud Load Estimation with Deep Logarithmic Network for Workload and Time Series Optimization
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Review on Data Securing Techniques for Internet of Medical Things
Volume-3 | Issue-3

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Population Based Meta Heuristics Algorithm for Performance Improvement of Feed Forward Neural Network
Volume-2 | Issue-1

Comparative Analysis of an Efficient Image Denoising Method for Wireless Multimedia Sensor Network Images in Transform Domain
Volume-3 | Issue-3

A Comprehensive Review on Power Efficient Fault Tolerance Models in High Performance Computation Systems
Volume-3 | Issue-3

An Integrated Approach for Crop Production Analysis from Geographic Information System Data using SqueezeNet
Volume-3 | Issue-4

An Accurate Bitcoin Price Prediction using logistic regression with LSTM Machine Learning model
Volume-3 | Issue-3

Design of Distribution Transformer Health Management System using IoT Sensors
Volume-3 | Issue-3

Design of a Food Recommendation System using ADNet algorithm on a Hybrid Data Mining Process
Volume-3 | Issue-4

Automatic Diagnosis of Alzheimer’s disease using Hybrid Model and CNN
Volume-3 | Issue-4

Effective Prediction of Online Reviews for Improvement of Customer Recommendation Services by Hybrid Classification Approach
Volume-3 | Issue-4

Acoustic Features Based Emotional Speech Signal Categorization by Advanced Linear Discriminator Analysis
Volume-3 | Issue-4

Analysis of Statistical Trends of Future Air Pollutants for Accurate Prediction
Volume-3 | Issue-4

Identification of Electricity Threat and Performance Analysis using LSTM and RUSBoost Methodology
Volume-3 | Issue-4

Review on Data Securing Techniques for Internet of Medical Things
Volume-3 | Issue-3

Home / Archives / Volume-2 / Issue-4 / Article-5

Volume - 2 | Issue - 4 | december 2020

Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method - A Study
Pages: 236-245
Published
19 January, 2021
Abstract

In the history of device computing, Internet of Things (IoT) is one of the fastest growing field that facing many security challenges. The effective efforts should have been made to address the security and privacy issues in IoT networks. The IoT devices are basically resource control device which provide routine attract impression for cyber attackers. The IoT participation nodes are increasing rapidly with more resource constrained that creating more challenging conditions in the real time. The existing methods provide an ineffective response to the tasks for effective IoT device. Also, it is an insufficient to involve the complete security and safety spectrum of the IoT networks. Because of the existing algorithms are not enriched to secure IoT bionetwork in the real time environment. The existing system is not enough to detect the proxy to the authorized person in the embedding devices. Also, those methods are believed in single model domain. Therefore, the effectiveness is dropping for further multimodal domain such as combination of behavioral and physiological features. The embedding intelligent technique will be securitizing for the IoT devices and networks by deep learning (DL) techniques. The DL method is addressing different security and safety problems arise in real time environment. This paper is highlighting hybrid DL techniques with Reinforcement Learning (RL) for the better performance during attack and compared with existing one. Also, here we discussed about DL combined with RL of several techniques and identify the higher accuracy algorithm for security solutions. Finally, we discuss the future direction of decision making of DL based IoT security system.

Keywords

Deep learning Cyber security Reinforcement Learning

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here