Applying Supervised Machine Learning to Classification Tasks through a Sensor-Reduction Technique
Keywords:
protocols, Public Key, Cryptography, Communication signals, IoT devicesAbstract
There is a tremendous quantity of data flowing between IoT devices and their users.Some of the material shared in these conversations is very private, including details about specific businesses, military units, or individual patients. As a result, several systems and procedures for security have been proposed. Communication signals these systems' methods of operation may include Elliptic Curve Cryptography, Public Key Infrastructure, and Block chain. Radio frequency identification and a physically unclonable function. To this end, in this article, the benefits and drawbacks of various plans are analyzed. Weaknesses. This data shows that the vast majority of these there are several concerns with the safety, speed, and privacy of protocols.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.