Smart innovation, systems and technologies, Journal Year: 2023, Volume and Issue: unknown, P. 621 - 631
Published: Jan. 1, 2023
Language: Английский
Smart innovation, systems and technologies, Journal Year: 2023, Volume and Issue: unknown, P. 621 - 631
Published: Jan. 1, 2023
Language: Английский
International Journal of Critical Infrastructure Protection, Journal Year: 2023, Volume and Issue: 44, P. 100647 - 100647
Published: Dec. 9, 2023
Language: Английский
Citations
14Sensors, Journal Year: 2023, Volume and Issue: 23(21), P. 8928 - 8928
Published: Nov. 2, 2023
The Internet of Things (IoT) is the most abundant technology in fields manufacturing, automation, transportation, robotics, and agriculture, utilizing IoT's sensors-sensing capability. It plays a vital role digital transformation smart revolutions critical infrastructure environments. However, handling heterogeneous data from different IoT devices challenging perspective security privacy issues. attacker targets sensor communication between two to jeopardize regular operations IoT-based infrastructure. In this paper, we propose an artificial intelligence (AI) blockchain-driven secure dissemination architecture deal with First, reduced dimensionality using principal component analysis (PCA) explainable AI (XAI) approaches. Furthermore, applied classifiers such as random forest (RF), decision tree (DT), support vector machine (SVM), perceptron, Gaussian Naive Bayes (GaussianNB) that classify data, i.e., malicious or non-malicious. employ interplanetary file system (IPFS)-driven blockchain network offers non-malicious data. addition, strengthen classifiers, analyze poisoning attacks on dataset manipulate sensitive mislead classifier, resulting inaccurate results classifiers. To overcome issue, provide anomaly detection approach identifies instances removes poisoned dataset. proposed evaluated performance evaluation metrics accuracy, precision, recall, F1 score, receiver operating characteristic curve (ROC curve). findings show RF classifier transcends other terms 98.46%.
Language: Английский
Citations
5Journal of The Institution of Engineers (India) Series B, Journal Year: 2024, Volume and Issue: unknown
Published: Nov. 17, 2024
Language: Английский
Citations
1Published: Sept. 1, 2023
Vehicular communication is one of the major outbreaks in that makes smart connected and autonomous vehicles (SCDVs) a reality. Nowadays, almost all verticals, such as military, surveillance, industrial Internet things (IIoT), etc., these play vital role. Among these, SCDVs have great scope military applications for border surveillance. They are referred to (IoMVs), These exchange information via an open wireless network, which highly susceptible various security privacy attacks. Existing solutions based on traditional cryptography (single-layer encryption) onion routing protocol (multi-layer encryption). Single-layer encryption can be cracked using quantum computing, but routing, every single message encrypted triple layer (using algorithm), computationally expensive. issues eliminated garlic protocol, sends bundle messages together two different algorithms. Motivated by this, this paper proposes routing-based preserving framework secure data between IoMVs. The performance proposed evaluated considering anonymity rate bit error parameters. has high 68% low rates compared existing schemes
Language: Английский
Citations
2Published: Dec. 26, 2023
This paper discusses the importance of securing modern society's critical infrastructure in face physical and digital threats. It emphasizes vulnerabilities introduced by programmable logic controllers (PLCs) supervisory control data acquisition (SCADA) systems that highlight potential twins to enhance security. The presents a research contribution aimed at improving integrity exchange among PLCs equipped with systems. leverages artificial intelligence (AI) algorithms detect mitigate different security attacks, such as denial service (DoS), injection tampering attacks. proposed framework efficiently classifies malicious non-malicious twin-based infrastructure. Further, trained AI model is deployed on infrastructure's intrusion detection system continuously monitors network traffic logs real time, identifying unusual patterns or behaviors may indicate an intrusion. performance evaluated using accuracy, log loss, validation curves.
Language: Английский
Citations
2Published: Jan. 4, 2024
In the contemporary digital landscape, where online privacy and security face escalating challenges due to evolving cyber threats, this investigation uncovers vulnerabilities within traditional measures. The study presents a pioneering integrated cryptographic approach leveraging Mix Networks, Shamir's Secret Sharing, Onion Routing, reinforcing framework supporting secure communication. By seamlessly blending attributes such as anonymity, data dispersion, layered encryption, these methods signify monumental shift in securing interactions. Overcoming inherent limitations adeptly counters threats like single points of compromise amplifies anonymity communication, while enhancing resilience offering adaptable solutions for diverse communication scenarios. Through meticulous technical analyses empirical investigations, substantiates pivotal role fabric Validation system's functionality precision through successful implementations node-to-node connections lays groundwork proactive defense against spectrum threats.
Language: Английский
Citations
0Web Intelligence, Journal Year: 2024, Volume and Issue: unknown, P. 1 - 28
Published: May 16, 2024
The integrated system has generated numerous features for the users, like as identifying heart disease by its symptoms, forwarding information to doctors regarding phase of probability well aiding fix it. When an emergency situation exists, forwards alert respective doctor. Moreover, automatic is needed diagnose but, larger data not sufficient train model. Thus, Internet Things (IoT) employed manage huge amount data. Therefore, a novel prediction diseases implemented with aid IoT-based deep learning approaches. Here, collected from three standard databases and then perform preprocessed over gathered IoT assisted model performed predict related accurately. Further, acquired are selected using developed Hybrid Chameleon Electric Fish Swarm Optimization (HCEFSO) via Algorithm (CSA) (EFO). Then, optimally fed training process, where Trans-Bi-directional Long Short-Term Memory Gated Recurrent Unit (Trans-Bi-LSTM-GRU) adopted predicting diseases. weights updated HCEFSO while validating phase. trained Trans-Bi-LSTM-GRU network used in testing
Language: Английский
Citations
02022 8th International Conference on Control, Decision and Information Technologies (CoDIT), Journal Year: 2024, Volume and Issue: unknown, P. 2955 - 2960
Published: July 1, 2024
Language: Английский
Citations
0Smart innovation, systems and technologies, Journal Year: 2023, Volume and Issue: unknown, P. 621 - 631
Published: Jan. 1, 2023
Language: Английский
Citations
0