- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 267字
- 2021-06-10 18:42:26
Autonomous systems
The IoT connectivity layer is starting to enable the introduction of pervasive autonomy. We are already seeing how this works in the consumer space, with integrations between vehicles and smart homes as an example. New research in both academia and industry are pushing autonomous systems and capabilities even further. Swarms of drones can work together with no human intervention. Machines can independently process and settle transactions between each other. Self-Driving Vehicles (SDVs) can form platoons that coordinate among themselves on the road. These are just a few examples of the coming age of autonomy.
Different types of autonomous vehicles (cars, drones, ships, and so on) take input from distributed sensors that might include cameras, LIDAR, RADAR, Global Positioning System (GPS), and even intertial measurements. These inputs are transmitted to fusion systems and then processed through navigation, guidance, and mission subsystems, which are integrated with propulsion and other platform sub-systems. Autonomy algorithms that might be employed in a system such as this include sense and avoid, pattern detection, object identifications, vector determination, and collision predictions.
Machine Learning (ML) is used heavily within autonomous systems. ML algorithms learn over time by training on large datasets. A critical research area for IoT ML is associated with the use of adversarial examples that can train systems to identify malicious inputs into the algorithms. For example, research has shown that it is possible to slightly alter images to fool ML models into thinking that something is not what it really is. Injecting adversarial examples into the ML process can help prepare algorithms to identify and react to attempted abuse.
- Extending Symfony2 Web Application Framework
- 云原生安全:攻防實踐與體系構(gòu)建
- 信息安全導(dǎo)論(在線實驗+在線自測)
- API安全實戰(zhàn)
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實踐
- Wireshark 2 Quick Start Guide
- 黑客攻防入門秘笈
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實踐指南
- Learning Pentesting for Android Devices
- Learn Azure Sentinel
- Web安全攻防從入門到精通
- Practical Internet of Things Security
- 隱私保護機器學(xué)習(xí)
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)