A Novel Approach for Distributed Security Over IoT in Learning Environment DOI
Justino Lourenço, Catarina Lucas, Joana Paulo

et al.

Smart innovation, systems and technologies, Journal Year: 2023, Volume and Issue: unknown, P. 621 - 631

Published: Jan. 1, 2023

Language: Английский

A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions DOI

Khushi Jatinkumar Raval,

Nilesh Kumar Jadav, Tejal Rathod

et al.

International Journal of Critical Infrastructure Protection, Journal Year: 2023, Volume and Issue: 44, P. 100647 - 100647

Published: Dec. 9, 2023

Language: Английский

Citations

14

AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure DOI Creative Commons
Tejal Rathod, Nilesh Kumar Jadav, Sudeep Tanwar

et al.

Sensors, Journal Year: 2023, Volume and Issue: 23(21), P. 8928 - 8928

Published: Nov. 2, 2023

The Internet of Things (IoT) is the most abundant technology in fields manufacturing, automation, transportation, robotics, and agriculture, utilizing IoT's sensors-sensing capability. It plays a vital role digital transformation smart revolutions critical infrastructure environments. However, handling heterogeneous data from different IoT devices challenging perspective security privacy issues. attacker targets sensor communication between two to jeopardize regular operations IoT-based infrastructure. In this paper, we propose an artificial intelligence (AI) blockchain-driven secure dissemination architecture deal with First, reduced dimensionality using principal component analysis (PCA) explainable AI (XAI) approaches. Furthermore, applied classifiers such as random forest (RF), decision tree (DT), support vector machine (SVM), perceptron, Gaussian Naive Bayes (GaussianNB) that classify data, i.e., malicious or non-malicious. employ interplanetary file system (IPFS)-driven blockchain network offers non-malicious data. addition, strengthen classifiers, analyze poisoning attacks on dataset manipulate sensitive mislead classifier, resulting inaccurate results classifiers. To overcome issue, provide anomaly detection approach identifies instances removes poisoned dataset. proposed evaluated performance evaluation metrics accuracy, precision, recall, F1 score, receiver operating characteristic curve (ROC curve). findings show RF classifier transcends other terms 98.46%.

Language: Английский

Citations

5

Towards Efficient Information Retrieval in Internet of Things Environments Via Machine Learning Approaches DOI
Qin Yuan,

Yuping Lai

Journal of The Institution of Engineers (India) Series B, Journal Year: 2024, Volume and Issue: unknown

Published: Nov. 17, 2024

Language: Английский

Citations

1

Garlic Routing-based Privacy Preserving Framework for Secure Data Exchange Between IoMVs with 5G DOI
Nilesh Kumar Jadav, Rajesh Gupta, Sudeep Tanwar

et al.

Published: Sept. 1, 2023

Vehicular communication is one of the major outbreaks in that makes smart connected and autonomous vehicles (SCDVs) a reality. Nowadays, almost all verticals, such as military, surveillance, industrial Internet things (IIoT), etc., these play vital role. Among these, SCDVs have great scope military applications for border surveillance. They are referred to (IoMVs), These exchange information via an open wireless network, which highly susceptible various security privacy attacks. Existing solutions based on traditional cryptography (single-layer encryption) onion routing protocol (multi-layer encryption). Single-layer encryption can be cracked using quantum computing, but routing, every single message encrypted triple layer (using algorithm), computationally expensive. issues eliminated garlic protocol, sends bundle messages together two different algorithms. Motivated by this, this paper proposes routing-based preserving framework secure data between IoMVs. The performance proposed evaluated considering anonymity rate bit error parameters. has high 68% low rates compared existing schemes

Language: Английский

Citations

2

AI-based Secure Intrusion Detection Framework for Digital Twin-enabled Critical Infrastructure DOI

Tanisha Patel,

Nilesh Kumar Jadav, Tejal Rathod

et al.

Published: Dec. 26, 2023

This paper discusses the importance of securing modern society's critical infrastructure in face physical and digital threats. It emphasizes vulnerabilities introduced by programmable logic controllers (PLCs) supervisory control data acquisition (SCADA) systems that highlight potential twins to enhance security. The presents a research contribution aimed at improving integrity exchange among PLCs equipped with systems. leverages artificial intelligence (AI) algorithms detect mitigate different security attacks, such as denial service (DoS), injection tampering attacks. proposed framework efficiently classifies malicious non-malicious twin-based infrastructure. Further, trained AI model is deployed on infrastructure's intrusion detection system continuously monitors network traffic logs real time, identifying unusual patterns or behaviors may indicate an intrusion. performance evaluated using accuracy, log loss, validation curves.

Language: Английский

Citations

2

Securing Layers: The Synergy of Mix Networks and Shamir's Secret Sharing in Onion Routing DOI

Aniketh Vasudev Jambha,

Dutta Swetchana,

Karru Sushrutha

et al.

Published: Jan. 4, 2024

In the contemporary digital landscape, where online privacy and security face escalating challenges due to evolving cyber threats, this investigation uncovers vulnerabilities within traditional measures. The study presents a pioneering integrated cryptographic approach leveraging Mix Networks, Shamir's Secret Sharing, Onion Routing, reinforcing framework supporting secure communication. By seamlessly blending attributes such as anonymity, data dispersion, layered encryption, these methods signify monumental shift in securing interactions. Overcoming inherent limitations adeptly counters threats like single points of compromise amplifies anonymity communication, while enhancing resilience offering adaptable solutions for diverse communication scenarios. Through meticulous technical analyses empirical investigations, substantiates pivotal role fabric Validation system's functionality precision through successful implementations node-to-node connections lays groundwork proactive defense against spectrum threats.

Language: Английский

Citations

0

Efficient IoT-based heart disease prediction framework with Weight Updated Trans-Bidirectional Long Short Term Memory-Gated Recurrent Unit DOI

K. Sasirekha,

D. Asha,

P. Sivaganga

et al.

Web Intelligence, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 28

Published: May 16, 2024

The integrated system has generated numerous features for the users, like as identifying heart disease by its symptoms, forwarding information to doctors regarding phase of probability well aiding fix it. When an emergency situation exists, forwards alert respective doctor. Moreover, automatic is needed diagnose but, larger data not sufficient train model. Thus, Internet Things (IoT) employed manage huge amount data. Therefore, a novel prediction diseases implemented with aid IoT-based deep learning approaches. Here, collected from three standard databases and then perform preprocessed over gathered IoT assisted model performed predict related accurately. Further, acquired are selected using developed Hybrid Chameleon Electric Fish Swarm Optimization (HCEFSO) via Algorithm (CSA) (EFO). Then, optimally fed training process, where Trans-Bi-directional Long Short-Term Memory Gated Recurrent Unit (Trans-Bi-LSTM-GRU) adopted predicting diseases. weights updated HCEFSO while validating phase. trained Trans-Bi-LSTM-GRU network used in testing

Language: Английский

Citations

0

Optimal and Secure Routing Protocol based on Key Management for IoT DOI
Salwa Othmen,

Radhia Khdhir,

Aymen Belghith

et al.

2022 8th International Conference on Control, Decision and Information Technologies (CoDIT), Journal Year: 2024, Volume and Issue: unknown, P. 2955 - 2960

Published: July 1, 2024

Language: Английский

Citations

0

A Novel Approach for Distributed Security Over IoT in Learning Environment DOI
Justino Lourenço, Catarina Lucas, Joana Paulo

et al.

Smart innovation, systems and technologies, Journal Year: 2023, Volume and Issue: unknown, P. 621 - 631

Published: Jan. 1, 2023

Language: Английский

Citations

0