A Study on Classification and Integration of Research on Both AI and Security in the IoT Era

Ryoichi Sasaki*, Tomoko Kaneko, Nobukazu Yoshioka

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the arrival of the Internet of Things era, research combining AI and security is increasing. Because there are various types of research on both AI and security, the authors examined the classification of this research. There are four types of research related to both AI and security: (a) attacks using AI, (b) attacks by AI, (c) attacks on AI, and (d) security measures using AI. The research status and issues for each type were clarified. To realize highly secure measures using AI, we proposed combining the measures using AI with the three types of attacks to create a counter-measure that anticipates future attacks.

Original languageEnglish
Title of host publicationInformation Science and Applications - Proceedings of ICISA 2020
EditorsHyuncheol Kim, Kuinam J. Kim, Suhyun Park
PublisherSpringer Science and Business Media Deutschland GmbH
Pages43-52
Number of pages10
ISBN (Print)9789813363847
DOIs
Publication statusPublished - 2021
Externally publishedYes
EventiCatse International Conference on Information Science and Applications, ICISA 2020 - Busan, Korea, Republic of
Duration: 2020 Dec 162020 Dec 18

Publication series

NameLecture Notes in Electrical Engineering
Volume739 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceiCatse International Conference on Information Science and Applications, ICISA 2020
Country/TerritoryKorea, Republic of
CityBusan
Period20/12/1620/12/18

Keywords

  • AI
  • Integrated research
  • IoT
  • Machine learning
  • Security

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'A Study on Classification and Integration of Research on Both AI and Security in the IoT Era'. Together they form a unique fingerprint.

Cite this