Abstract
The Internet of Things (IoT) represents a potential paradigm increase in the number of linked devices, referred to as things. Administering these things remains a difficulty. The advancement of Internet of Things technology has generated innovative techniques to resolve these issues. Within the context of the low speed, low fusion precision, and other issues of present Internet of Things data fusion techniques, an Internet of Things data fusion procedure based on an intelligent optimization method is developed with the goal of improving the Internet of Things heterogeneous data fusion effect. Although IoT systems truly provide the potential to enhance efficiency, ownership, transparency, and efficacy, they also experience a larger number of potential flaws. This study examines the security of IoT systems under the framework of smart-world critical setups. This study specifically performs an in-depth analysis of the risks in IoT-based critical infrastructures from the viewpoint of apps, networking, operating systems, software, rmware, and hardware. Additionally, this study highlights the three essential IoT-based cyber-physical infrastructures, viz. intelligent passage, intelligent build-up, and intelligent gridding. The current state of IoT research focuses mostly on the processing of scalar sensor data events and pays scant attention to the issues faced in multimedia-based events. In addition, this work conducts a comparative analysis of various ML techniques, such as the support vector machine, convolutional neural network, naive Bayes, and k-nearest neighbor techniques. By assessing sensors, networking, services, and implementation services offered by the IoT, this study analyzes the existing methods for the Internet of Multimedia Things.
Similar content being viewed by others
References
Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56(2):169–75
Wang X, Wang X, Mao S (2018) RF sensing in the internet of things: a general deep learning framework. IEEE Commun Mag 56(9):62–67
KonečnỳJ et al. (2016) Federated learning: strategies for improving communication efficiency. https://arxiv.org/abs/1610.05492. Accessed Dec. 1, 2019
Hu Y et al. (2019) FDML: a collaborative machine learning framework for distributed features. In: Proc. ACM SIGKDD, pp. 2232–40
TeerapittayanonS, McDanel B, Kung HT (2017) Distributed deep neural networks over the cloud, the edge and end devices. In: Proc. IEEE ICDCS, pp. 328–39
McMahanHB et al. (2016) Communication-efficient learning of deep networks from decentralized data. https://arxiv.org/abs/1602.05629. Accessed Dec. 1, 2019
Nedić AO, Rabbat MG (2018) Network topology and communication-computation tradeoffs in decentralized optimization. Proc IEEE 106(5):953–76
Ying KY, Sayed AH (2018) Supervised learning under distributed features. IEEE Trans Signal Process 67(4):977–92
Hu Y et al. (2019) Learning privately over distributed features: An ADMM sharing approach. https://arxiv.org/abs/1907.07735. Accessed Dec 1, 2019
ZayasD, Merino P (2017) The 3GPP NB-IoT system architecture for the Internet of Things. In: Proc. IEEE ICC Wksps, pp. 277–82
Du R, Magnússon S, Fischione C (2020) The Internet of Things as a deep neural network. https://arxiv.org/abs/2003.10538, 2020, Accessed Mar. 25, 2020
Muhammad K et al (2020) Cost-effective video summarization using deep Cnn with hierarchical weighted fusion for Iot surveillance networks. IEEE Internet Things J 7(5):4455–4463
International Data Corporation: Worldwide Global DataSphere IoT Device and Data Forecast, 2019–2023. Available online: https://www.iotplaybook.com/tags/worldwide-global-datasphere-iot-device-and-data-forecast-2019-2023. Accessed on 21 June 2021
Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on Internet of Things. J Netw Comput Appl 97:48–65
Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560
Infamous IoT Hacks and Vulnerabilities.In: IoT World Congress 2018. Available online: https://www.iotsworldcongress.com/5-infamous-iot-hacks-and-vulnerabilities/. Accessed on 11 September 2020
Wang EK, Liu X, Chen CM, Kumari S, Shojafar M, Hossain MS (2020) Voice-transfer attacking on industrial voice control systems in 5G-aided IIoT domain. Available online: https://ieeexplore.ieee.org/document/9195003. Accessed on 11 September 2020
Jemec M (2021) PackETH, Open source ethernet packet generator. Available online: http://packeth.sourceforge.net/. Accessed on 20 February 2021
Olsson R (2005) Pktgen the linux packet generator. Proc Linux Symp 2:11–24
Gates M, Tirumala A, Dugan J, Gibbs K (2005) Iperf 1.2-The TCP/UDP bandwidth measurement tool. Iperf Proj. Available online: http://sourceforge.net/projects/iperf/. Accessed on 20 February 2021
Patil BR, Moharir M, Mohanty PK, Shobha G, Sajeev S (2017) Ostinato-A powerful traffic generator. In :Proceedings of the 2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bengaluru, India, 21–23 December 2017; pp. 1–5
Telecom, ZTI. IP Traffic-Test & Measure. 2013. Available online: http://www.zti-telecom.com. Accessed on 20 February 2021
Shahid MR, Blanc G, Zhang Z, Debar H (2018) Iot devices recognition through network traffic analysis. Proc IEEE Int Conf Big Data 10–13:5187–5192
Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2021) Iotsense: behavioral fingerprinting of IoT devices. https://arxiv.org/pdf/1804.03852.pdf. Accessed on 20 February 2021
Ortiz J, Crawford C, Le F (2019) DeviceMien: network device behavior modeling for identifying unknown IoT devices. Proc Int Conf Internet Things Des Implement 15–18:106–117
Hashim MM, Mohd Rahim MS (2017) Image steganography based on odd/even pixels distribution scheme and two parameters random function. J Theor Appl Inf Technol 95(22):5977–5986
Inan Y (2018) “Assesment of the image distortion in using various bit lengths of steganographic. LSB 01026:1–10
RashmiN, Jyothi K (2018) An improved method for reversible data hiding steganography combined with cryptography. In: Proc. 2nd Int. Conf. Inven. Syst. Control. ICISC 2018, no. Icisc, pp. 81–84
Neapolitan RE, Jiang X (2018) Neural networks and deep learning. In: Artificial Intelligence. CRC Press Taylor& Francis Group: Boca Raton, FL, USA
Jia B, Zong Z, Huang B, Baker T (2021) A DNN-based WiFi-RSSI Indoor Localization Method in IoT. In: Gao H, Fan P, Wun J, Xiaoping X, Yu J, Wang Y (eds.), Communications and networking. China. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 352. Springer, Cham. https://doi.org/10.1007/978-3-030-67720-6_14
Funding
The authors received no specific funding for this study.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflicts of interest to report regarding the present study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kumaran, S.S., Balakannan, S.P. & Li, J. A deep analysis of object capabilities for intelligence considering wireless IoT devices with the DNN approach. J Supercomput 78, 4745–4758 (2022). https://doi.org/10.1007/s11227-021-04064-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-04064-0