Skip to main content

Advertisement

Log in

A deep analysis of object capabilities for intelligence considering wireless IoT devices with the DNN approach

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) represents a potential paradigm increase in the number of linked devices, referred to as things. Administering these things remains a difficulty. The advancement of Internet of Things technology has generated innovative techniques to resolve these issues. Within the context of the low speed, low fusion precision, and other issues of present Internet of Things data fusion techniques, an Internet of Things data fusion procedure based on an intelligent optimization method is developed with the goal of improving the Internet of Things heterogeneous data fusion effect. Although IoT systems truly provide the potential to enhance efficiency, ownership, transparency, and efficacy, they also experience a larger number of potential flaws. This study examines the security of IoT systems under the framework of smart-world critical setups. This study specifically performs an in-depth analysis of the risks in IoT-based critical infrastructures from the viewpoint of apps, networking, operating systems, software, rmware, and hardware. Additionally, this study highlights the three essential IoT-based cyber-physical infrastructures, viz. intelligent passage, intelligent build-up, and intelligent gridding. The current state of IoT research focuses mostly on the processing of scalar sensor data events and pays scant attention to the issues faced in multimedia-based events. In addition, this work conducts a comparative analysis of various ML techniques, such as the support vector machine, convolutional neural network, naive Bayes, and k-nearest neighbor techniques. By assessing sensors, networking, services, and implementation services offered by the IoT, this study analyzes the existing methods for the Internet of Multimedia Things.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

(source: ITU-T)

Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig.7

Similar content being viewed by others

References

  1. Abeshu A, Chilamkurti N (2018) Deep learning: the frontier for distributed attack detection in fog-to-things computing. IEEE Commun Mag 56(2):169–75

    Article  Google Scholar 

  2. Wang X, Wang X, Mao S (2018) RF sensing in the internet of things: a general deep learning framework. IEEE Commun Mag 56(9):62–67

    Article  Google Scholar 

  3. KonečnỳJ et al. (2016) Federated learning: strategies for improving communication efficiency. https://arxiv.org/abs/1610.05492. Accessed Dec. 1, 2019

  4. Hu Y et al. (2019) FDML: a collaborative machine learning framework for distributed features. In: Proc. ACM SIGKDD, pp. 2232–40

  5. TeerapittayanonS, McDanel B, Kung HT (2017) Distributed deep neural networks over the cloud, the edge and end devices. In: Proc. IEEE ICDCS, pp. 328–39

  6. McMahanHB et al. (2016) Communication-efficient learning of deep networks from decentralized data. https://arxiv.org/abs/1602.05629. Accessed Dec. 1, 2019

  7. Nedić AO, Rabbat MG (2018) Network topology and communication-computation tradeoffs in decentralized optimization. Proc IEEE 106(5):953–76

    Article  Google Scholar 

  8. Ying KY, Sayed AH (2018) Supervised learning under distributed features. IEEE Trans Signal Process 67(4):977–92

    Article  MathSciNet  Google Scholar 

  9. Hu Y et al. (2019) Learning privately over distributed features: An ADMM sharing approach. https://arxiv.org/abs/1907.07735. Accessed Dec 1, 2019

  10. ZayasD, Merino P (2017) The 3GPP NB-IoT system architecture for the Internet of Things. In: Proc. IEEE ICC Wksps, pp. 277–82

  11. Du R, Magnússon S, Fischione C (2020) The Internet of Things as a deep neural network. https://arxiv.org/abs/2003.10538, 2020, Accessed Mar. 25, 2020

  12. Muhammad K et al (2020) Cost-effective video summarization using deep Cnn with hierarchical weighted fusion for Iot surveillance networks. IEEE Internet Things J 7(5):4455–4463

    Article  Google Scholar 

  13. International Data Corporation: Worldwide Global DataSphere IoT Device and Data Forecast, 2019–2023. Available online: https://www.iotplaybook.com/tags/worldwide-global-datasphere-iot-device-and-data-forecast-2019-2023. Accessed on 21 June 2021

  14. Alaa M, Zaidan AA, Zaidan BB, Talal M, Kiah MLM (2017) A review of smart home applications based on Internet of Things. J Netw Comput Appl 97:48–65

    Article  Google Scholar 

  15. Wang N, Jiang T, Lv S, Xiao L (2017) Physical-layer authentication based on extreme learning machine. IEEE Commun Lett 21(7):1557–1560

    Article  Google Scholar 

  16. Infamous IoT Hacks and Vulnerabilities.In: IoT World Congress 2018. Available online: https://www.iotsworldcongress.com/5-infamous-iot-hacks-and-vulnerabilities/. Accessed on 11 September 2020

  17. Wang EK, Liu X, Chen CM, Kumari S, Shojafar M, Hossain MS (2020) Voice-transfer attacking on industrial voice control systems in 5G-aided IIoT domain. Available online: https://ieeexplore.ieee.org/document/9195003. Accessed on 11 September 2020

  18. Jemec M (2021) PackETH, Open source ethernet packet generator. Available online: http://packeth.sourceforge.net/. Accessed on 20 February 2021

  19. Olsson R (2005) Pktgen the linux packet generator. Proc Linux Symp 2:11–24

    Google Scholar 

  20. Gates M, Tirumala A, Dugan J, Gibbs K (2005) Iperf 1.2-The TCP/UDP bandwidth measurement tool. Iperf Proj. Available online: http://sourceforge.net/projects/iperf/. Accessed on 20 February 2021

  21. Patil BR, Moharir M, Mohanty PK, Shobha G, Sajeev S (2017) Ostinato-A powerful traffic generator. In :Proceedings of the 2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bengaluru, India, 21–23 December 2017; pp. 1–5

  22. Telecom, ZTI. IP Traffic-Test & Measure. 2013. Available online: http://www.zti-telecom.com. Accessed on 20 February 2021

  23. Shahid MR, Blanc G, Zhang Z, Debar H (2018) Iot devices recognition through network traffic analysis. Proc IEEE Int Conf Big Data 10–13:5187–5192

    Google Scholar 

  24. Bezawada B, Bachani M, Peterson J, Shirazi H, Ray I, Ray I (2021) Iotsense: behavioral fingerprinting of IoT devices. https://arxiv.org/pdf/1804.03852.pdf. Accessed on 20 February 2021

  25. Ortiz J, Crawford C, Le F (2019) DeviceMien: network device behavior modeling for identifying unknown IoT devices. Proc Int Conf Internet Things Des Implement 15–18:106–117

    Google Scholar 

  26. Hashim MM, Mohd Rahim MS (2017) Image steganography based on odd/even pixels distribution scheme and two parameters random function. J Theor Appl Inf Technol 95(22):5977–5986

    Google Scholar 

  27. Inan Y (2018) “Assesment of the image distortion in using various bit lengths of steganographic. LSB 01026:1–10

    Google Scholar 

  28. RashmiN, Jyothi K (2018) An improved method for reversible data hiding steganography combined with cryptography. In: Proc. 2nd Int. Conf. Inven. Syst. Control. ICISC 2018, no. Icisc, pp. 81–84

  29. Neapolitan RE, Jiang X (2018) Neural networks and deep learning. In: Artificial Intelligence. CRC Press Taylor& Francis Group: Boca Raton, FL, USA

  30. Jia B, Zong Z, Huang B, Baker T (2021) A DNN-based WiFi-RSSI Indoor Localization Method in IoT. In: Gao H, Fan P, Wun J, Xiaoping X, Yu J, Wang Y (eds.), Communications and networking. China. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 352. Springer, Cham. https://doi.org/10.1007/978-3-030-67720-6_14

Download references

Funding

The authors received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Senthil Kumaran.

Ethics declarations

Conflict of interest

The authors declare that they have no conflicts of interest to report regarding the present study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumaran, S.S., Balakannan, S.P. & Li, J. A deep analysis of object capabilities for intelligence considering wireless IoT devices with the DNN approach. J Supercomput 78, 4745–4758 (2022). https://doi.org/10.1007/s11227-021-04064-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04064-0

Keywords

Navigation