Smart City Gnosys

Smart city article details

Title A Comprehensive Review On Embedded Systems Security Using Machine Learning
ID_Doc 938
Authors Podder D.; Sengupta Y.
Year 2025
Published Embedded Artificial Intelligence: Real-Life Applications and Case Studies
DOI http://dx.doi.org/10.1201/9781003481089-11
Abstract The market for embedded and integrated systems is expanding rapidly, and this has led to an increase in cybersecurity requirements and concerns across a wide range of industries, including smart cities, IoT, industrial-IoT, healthcare, automotive, armed forces, and remote intelligence, to mention a few. Over time, the end devices have evolved to offer higher-end user services. Because of the distributed development culture in the semiconductor industry, as well as the high level of sophistication of connected device architecture in many forms, including Vehicle-to-Anything, threat actors now have an easier time injecting and exploiting vulnerabilities that typically pass unseen from the verification phases or are introduced in the design. It is necessary to implement cybersecurity verification mechanisms to address the expanding attack surfaces and vulnerabilities. These mechanisms should detect, manage, and prevent the obsolescence of equipment manufactured because of security flaws, as well as safeguard user data to preserve confidentiality and privacy. But often, the volume of data is a significant challenge as well, necessitating the use of Artificial Intelligence and Machine Learning. © 2025 selection and editorial matter, Arpita Nath Boruah, Mrinal Goswami, Manoj Kumar, Octavio Loyola-González; individual chapters, the contributors.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
36064 View0.876Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
55462 View0.867Abdulla H.; Al-Raweshidy H.; Awad W.The Era Of Internet Of Things: Towards Better Security Using Machine Learning2023 International Conference on IT Innovation and Knowledge Discovery, ITIKD 2023 (2023)
35882 View0.863Nayak J.; Suresh Kumar P.; Reddy D.K.K.; Naik B.; Pelusi D.Machine Learning And Big Data In Cyber-Physical System: Methods, Applications And ChallengesCognitive Engineering for Next Generation Computing: A Practical Analytical Approach (2021)
30072 View0.858Abdallah E.E.; Aloqaily A.; Fayez H.Identifying Intrusion Attempts On Connected And Autonomous Vehicles: A SurveyProcedia Computer Science, 220 (2023)
36080 View0.856Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
10579 View0.853Alnıaçık F.; Yıldırım F.; Gönen S.; Alhan B.; Barışkan M.A.; Sayan H.H.; Yılmaz E.N.Artificial Intelligence-Supported Detection Systems On Embedded DevicesEl-Cezeri Journal of Science and Engineering, 11, 1 (2024)
33508 View0.852Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
35990 View0.852Chen Z.; Tian P.; Qian C.; Liao W.; Hussaini A.; Yu W.Machine Learning Frameworks In Iot Systems: A Survey, Case Study, And Future Research DirectionsSmart Spaces: a volume in Intelligent Data-Centric Systems (2024)
37090 View0.852Alqarni M.; Azim A.Mining Large Data To Create A Balanced Vulnerability Detection Dataset For Embedded Linux SystemProceedings - 2022 IEEE/ACM 9th International Conference on Big Data Computing, Applications and Technologies, BDCAT 2022 (2022)
6519 View0.852Mishra D.; Naik B.; Bhoi G.Advanced Machine Learning Approach For Designing Intelligent System For Iot Security FrameworkStudies in Computational Intelligence, 1167 (2024)