- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 267字
- 2021-06-10 18:42:26
Autonomous systems
The IoT connectivity layer is starting to enable the introduction of pervasive autonomy. We are already seeing how this works in the consumer space, with integrations between vehicles and smart homes as an example. New research in both academia and industry are pushing autonomous systems and capabilities even further. Swarms of drones can work together with no human intervention. Machines can independently process and settle transactions between each other. Self-Driving Vehicles (SDVs) can form platoons that coordinate among themselves on the road. These are just a few examples of the coming age of autonomy.
Different types of autonomous vehicles (cars, drones, ships, and so on) take input from distributed sensors that might include cameras, LIDAR, RADAR, Global Positioning System (GPS), and even intertial measurements. These inputs are transmitted to fusion systems and then processed through navigation, guidance, and mission subsystems, which are integrated with propulsion and other platform sub-systems. Autonomy algorithms that might be employed in a system such as this include sense and avoid, pattern detection, object identifications, vector determination, and collision predictions.
Machine Learning (ML) is used heavily within autonomous systems. ML algorithms learn over time by training on large datasets. A critical research area for IoT ML is associated with the use of adversarial examples that can train systems to identify malicious inputs into the algorithms. For example, research has shown that it is possible to slightly alter images to fool ML models into thinking that something is not what it really is. Injecting adversarial examples into the ML process can help prepare algorithms to identify and react to attempted abuse.
- 云原生安全:攻防實踐與體系構(gòu)建
- Android應用安全實戰(zhàn):Frida協(xié)議分析
- Practical Network Scanning
- 黑客攻防入門秘笈
- 走進新安全:讀懂網(wǎng)絡安全威脅、技術(shù)與新思想
- INSTANT Windows PowerShell
- 諸神之眼:Nmap網(wǎng)絡安全審計技術(shù)揭秘
- 防火墻技術(shù)與應用(第2版)
- Digital Forensics with Kali Linux
- 解密彩虹團隊非凡實戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊)
- 黑客攻防從入門到精通
- VMware vCloud Security
- 網(wǎng)絡空間安全導論
- 云計算安全:關(guān)鍵技術(shù)、原理及應用
- 黑客攻防與電腦安全從新手到高手(超值版)