Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Machine Learning for Security at the IoT Edge-A Feasibility Study
RISE - Research Institutes of Sweden (2017-2019).ORCID iD: 0000-0002-2772-4661
Ericsson AB, Sweden.
RISE - Research Institutes of Sweden (2017-2019).
RISE - Research Institutes of Sweden (2017-2019).ORCID iD: 0000-0001-8192-0893
2019 (English)In: Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems Workshops, MASSW 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 7-12Conference paper, Published paper (Refereed)
Abstract [en]

Benefits of edge computing include reduced latency and bandwidth savings, privacy-by-default and by-design in compliance with new privacy regulations that encourage sharing only the minimal amount of data. This creates a need for processing data locally rather than sending everything to a cloud environment and performing machine learning there. However, most IoT edge devices are resource-constrained in comparison and it is not evident whether current machine learning methods are directly employable on IoT edge devices. In this paper, we analyze the state-of-the-art machine learning (ML) algorithms for solving security problems (e.g. intrusion detection) at the edge. Starting from the characteristics and limitations of edge devices in IoT networks, we assess a selected set of commonly used ML algorithms based on four metrics: computation complexity, memory footprint, storage requirement and accuracy. We also compare the suitability of ML algorithms to different cybersecurity problems and discuss the possibility of utilizing these methods for use cases.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc. , 2019. p. 7-12
Keywords [en]
Artificial Intelligence, Edge, IoT, Machine Learning, Security, Data Sharing, Digital storage, Internet of things, Intrusion detection, Privacy by design, Cloud environments, Computation complexity, Feasibility studies, Machine learning methods, Privacy regulation, Reduced latencies, Security problems, Storage requirements
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:ri:diva-45017DOI: 10.1109/MASSW.2019.00009Scopus ID: 2-s2.0-85084111495ISBN: 9781728141213 (print)OAI: oai:DiVA.org:ri-45017DiVA, id: diva2:1431969
Conference
16th IEEE International Conference on Mobile Ad Hoc and Smart Systems Workshops, MASSW 2019, 4 November 2019 through 7 November 2019
Note

Conference code: 159126; Export Date: 25 May 2020; Conference Paper; Funding details: VINNOVA; Funding details: 830927; Funding text 1: This work has received partial funding from VINNOVA Sweden for the H2020 CONCORDIA (grant agreement No 830927), and partial from RISE Cybersecurity KP.

Available from: 2020-05-25 Created: 2020-05-25 Last updated: 2023-11-06Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Wang, HanRaza, Shahid

Search in DiVA

By author/editor
Wang, HanRaza, Shahid
By organisation
RISE - Research Institutes of Sweden (2017-2019)
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 72 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf