Applying Supervised Machine Learning to Classification Tasks through a Sensor-Reduction Technique

Authors

  • NIBEDITA SIAL Author

Keywords:

protocols, Public Key, Cryptography, Communication signals, IoT devices

Abstract

There is a tremendous quantity of data flowing between IoT devices and their users.Some of the material shared in these conversations is very private, including details about specific businesses, military units, or individual patients. As a result, several systems and procedures for security have been proposed. Communication signals these systems' methods of operation may include Elliptic Curve Cryptography, Public Key Infrastructure, and Block chain. Radio frequency identification and a physically unclonable function. To this end, in this article, the benefits and drawbacks of various plans are analyzed. Weaknesses. This data shows that the vast majority of these there are several concerns with the safety, speed, and privacy of protocols.

Downloads

Download data is not yet available.

Published

30-08-2021

How to Cite

Applying Supervised Machine Learning to Classification Tasks through a Sensor-Reduction Technique. (2021). International Journal of Information Technology and Computer Engineering, 9(3), 101-107. https://ijitce.org/index.php/ijitce/article/view/246