Secured Wireless Connectivity With Machine Learning Optimized Flawless Iot

Document Type : Primary Research paper

Authors

1 Assistant Professor , PG & Research Dept of Computer Science, Muthurangam Govt. Arts College (Autonomous), Otteri Road , Vellore - 632002. Vellore Dist. , Tamil Nadu , India.

2 Associate Professor,Electronics and Communication Engineering, Galgotias College of Engineering & Technology,1,Knowledge Park Phase-II,Greater Noida-201310.

3 Assistant Professor,Electronics and Communication Engineering,Indrapratha Engineering College, Ghaziabad-201010

4 Professor, Computer Science and Engineering, CMR Institute of Technology, kandlakoya, Medchal,Hyderabad, 501401.

5 Professor, Department of Electronics and Communication Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India – 638057.

6 Associate Professor ,Department of Computer Science & Engineering,Koneru Lakshmaiah Education Foundation (KLEF),Greenfields, Vaddeswaram,Guntur-522502

Abstract

The advancement of the Internet of Things (IoT) model led to advancements in
hardware and software, in connectivity, and convergence of digital technology, along with
declining cost and efficiency. Several billion computers connecting to the Internet are part
of IoT ecosystem. Besides, IoT devices are an integral part of ICT infrastructure which
supports many day-to-day activities. In recent years, considerable attention has been paid
to the protection of these IoT applications. The volume of data generated daily has sparked
interest in technology like machine learning and artificial intelligence, another big recent
development. In improving the safety of IoT systems, we explore the promise of machine
learning techniques. The key emphasis is the use of supervised, unattended learning
strategies and improving learning in the IoT context, both for host and network security
solutions. Finally, we speak about some of the complexities of learning machinery that
must be overcome to introduce and operate them successfully so that IoT devices can be
properly secured.

Keywords