ESP Journal of Engineering & Technology Advancements |
© 2023 by ESP JETA |
Volume 3 Issue 2 |
Year of Publication : 2023 |
Authors : Amitava Podder, Shyamalendu Paul |
:10.56472/25832646/JETA-V3I6P105 |
Amitava Podder, Shyamalendu Paul, 2023. Recent Trends of Artificial Intelligence in the Internet of Things ESP Journal of Engineering & Technology Advancements 3(2): 101-109.
The integration of Artificial Intelligence (AI) and the Internet of Things (IoT) is rapidly transforming various industries and enabling innovative applications. In recent years, several trends have emerged in the application of AI in the IoT, including edge computing for real-time analysis, predictive maintenance, intelligent automation, smart homes and cities, and security. Edge computing enables IoT devices to perform real-time analysis and decision-making, while predictive maintenance allows for proactive maintenance and reduces downtime. Intelligent automation enhances the efficiency and effectiveness of IoT devices, while smart homes and cities enable IoT devices to adapt to the needs and preferences of their users. Security is becoming a more significant concern, and AI can be used to detect and prevent cyberattacks. Overall, the integration of AI with IoT has the potential to create a more intelligent and efficient world, and we can expect to see even more innovative applications emerge in the future.
[1] Evans D. The Internet of Things: how the next evolution of the internet is changing everything. Cisco Internet Business Solutions Group: Cisco; 2011.
[2] Lu Y, Xu LD. Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 2019;6(2):2103–15.
[3] Farivar F, Haghighi MS, Jolfaei A, Alazab M. Artifcial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT. IEEE Trans Ind Inf. 2020;16(4):2716–25. https://doi.org/10.1109/TII.2019.2956474.
[4] Vorakulpipat C, Rattanalerdnusorn E, Thaenkaew P, Hai HD. Recent challenges, trends, and concerns related to IoT security: aan evolutionary study. In: 2018 20th international conference on advanced communication technology (ICACT), Chuncheon-si Gangwon-do, Korea (South); 2018. p. 405–10.
[5] Linthicum D. App nirvana: when the internet of things meets the API economy. https://techbeacon.com/app-dev-testing/app-nirvana-wheninternet-things-meets-api-economy. Accessed 15 Nov 2019.
[6] Lakhani A. The role of artifcial intelligence in IoT and OT security. https://www.csoonline.com/article/3317836/the-role-of-artificial-intelligen ce-in-iot-and-ot-security.html. Accessed 11 Feb 2020.
[7] Roopak M, Yun Tian G, Chambers J. Models deep learning, for cyber security in IoT networks. In: IEEE 9th annual computing and communication workshop and conference (CCWC), Las Vegas, NV, USA. 2019;2019:0452–7.
[8] Radanliev P, De Roure D, Van Kleek M, Santos O, Ani U. Artifcial intelligence in cyber physical systems. AI & society. 2020; p. 1–14.
[9] Cañedo J, Skjellum A. Using machine learning to secure IoT systems. In: 2016 14th annual conference on privacy, security and trust (PST), Auckland; 2016. p. 219–22, https://doi.org/10.1109/PST.2016.7906930.
[10] Wang S, Qiao Z. Robust pervasive detection for adversarial samples of artifcial intelligence in IoT environments. IEEE Access. 2019;7:88693–704. https://doi.org/10.1109/ACCESS.2019.2919695.
[11] Pendse A. Transforming cybersecurity with AI and ML: view. https://ciso.economictimes.indiatimes.com/news/transforming-cybersecuritywith-ai-and-ml/67899197. Accessed 12 Feb 2020.
[12] Radanliev P, De Roure D, Page K, Nurse JR, Mantilla Montalvo R, Santos O, Maddox LT, Burnap P. Cyber risk at the edge: current and future trends on cyber risk analytics and artifcial intelligence in the industrial internet of things and industry 4.0 supply chains. Cybersecurity. 2020;3:1–21.
[13] Saptarshi Kumar Sarkar, Amitava Podder, Piyal Roy, 2023. "An Analysis of the Privacy and Security Related Problem with Social Networks" ESP Journal of Engineering & Technology Advancements 3(4): 37-43.
[14] Melamed T. An active man-in-the-middle attack on bluetooth smart devices. WIT Press, International Journal of Safety and Security Engineering. http://www.witpress.com/elibrary/sse-volumes/8/2/2120. Accessed 1 Feb 2018.
[15] Akram H, Dimitri K, Mohammed M. A comprehensive iot attacks survey based on a building-blocked reference mode. Int J Adv Comput Sci Appl. 2018. https://doi.org/10.14569/IJACSA.2018.090349.
[16] Biswas, S.K., Podder, A. (2022). Path Minimization Planning and Cost Estimation of Passive Optical Network Using Algorithm for Sub-optimal Deployment of Optical Fiber Cable. In: Mitra, M., Nasipuri, M., Kanjilal, M.R. (eds) Computational Advancement in Communication, Circuits and Systems. Lecture Notes in Electrical Engineering, vol 786. Springer, Singapore. https://doi.org/10.1007/978-981-16-4035-3_7
[17] Cekerevac Z, Dvorak Z, Prigoda L, Čekerevac P. Internet of things and the man-in-the-middle attacks–security and economic risks. Mest J. 2017;5:15–25. https://doi.org/10.12709/mest.05.05.02.03.
[18] Radanliev P, De Roure DC, Nurse JR, Montalvo RM, Cannady S, Santos O, Burnap P, Maple C. Future developments in standardisation of cyber risk in the Internet of Things (IoT). SN Appl Sci. 2020;2(2):169.
[19] Herberger C. DDoS fre & forget: PDoS—a permanent denial of service. Radware Blog, Radware Ltd. http://www.blog.radware.com/secur ity/2015/10/ddos-fre-forget-pdos-a-permanent-denial-of-service/. Accessed 12 Sept 2016.
[20] Mode G, Calyam P, Hoque K. False data injection attacks in Internet of Things and deep learning enabled predictive analytics; 2019.
[21] De Donno M, Dragoni N, Giaretta A, Spognardi A. Analysis of DDoS-capable IoT malwares. In: 2017 federated conference on computer science and information systems (FedCSIS), Prague; 2017. p. 807–16. https://doi.org/10.15439/2017F288.
[22] Rouse M. What is IoT (Internet of Things) and how does it work? IoT Agenda, TechTarget. http://www.internetofthingsagenda.techtarget.com/ defnition/Internet-of-Things-IoT. Accessed 11 Feb 2020.
[23] Woo S. The right security for IoT: physical attacks and how to counter them. In: Minj VP, editor. Proft From IoT. http://www.iot.electronicsforu .com/headlines/the-right-security-for-iot-physical-attacks-and-how-to-counter-them/. Accessed 13 June 2019.
[24] Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A. IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 2019;6(5):8182–201.
Artificial Intelligence, Internet of Things, Internet of Everything, Intelligent Systems, Cyber-physical systems.