The Development of the Multi-Layer Security Network Authentication System Using Machine Learning DOI

B. Dhanalakshmi,

P. William,

Anupama Chadha

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 275 - 286

Published: Dec. 13, 2024

Researchers and business owners place significant importance on the security of IoT networks as it directly affects availability services privacy connected users. To address this concern, an intrusion detection system is used to identify thwart attacks provide multi-layer security. In study, a novel developed Security network authentication using machine learning. This approach combines algorithm for system. Additionally, oversampling technique employed improve quality classification results.Various experiments were conducted with different layers, well two distinct techniques developing

Language: Английский

Circular Economy: A Catalyst for Economic Growth - An Empirical Study DOI

K. V. N. Lakshmi,

S. Geetanjali,

H. R. Swapna

et al.

Circular Economy and Sustainability, Journal Year: 2024, Volume and Issue: unknown

Published: Oct. 10, 2024

Language: Английский

Citations

23

Data Reduction Techniques in Wireless Sensor Networks With Internet of Things DOI

Vijaya Gunturu,

C. Goswami,

Vinay Kumar Nassa

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 73 - 88

Published: Dec. 13, 2024

Since they are used in an array of real-life uses, wireless sensor equipment Internet Things (IoT) systems will be among the biggest prolific sources big data on connection. The huge quantity collected from sensing increases transmission overhead, reducing short lifespan IoT equipment. As a result, it is required to cleanse and reduce sensed information order cut costs conserve power A Data Reduction Cleansing Technique (DRCT) for consumption IoT-based networks (WSNs) suggested this research. This method depends 2 levels cleansing reduction: aggregation.

Language: Английский

Citations

17

Exploring the Use of the Internet of Things in Cybersecurity and Data Science DOI
Vinay Kumar Nassa, Konda Hari Krishna,

Ranichandra Subbiah

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 217 - 230

Published: Dec. 13, 2024

The application of the Internet Things (IoT) has grown tremendously in past decade, along with cybersecurity issues. Industrial automation procedures smart industries are most prevalent areas where IoT innovation creates utmost impact. In computation setting, undergone huge technological and operational upheavals recent years, data science leading revolution. This paper aims exploring use science. It aids for transferring real-time crucial between gadgets without need human involvement. presents a statistical structure protecting entities networking traffics associated wireless connectivity.

Language: Английский

Citations

0

The Empirical Evaluation of Internet of Things-Based Techniques for Improving Cyber Security DOI
Mohit Tiwari, Akash Bag,

Keerthiraj

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 231 - 242

Published: Dec. 13, 2024

The Internet of Things (IoT) ensures improved cyber security using various technological advancements for providing enhanced during the data transmission. By assigning each physical object a unique Protocol (IP) address, they can communicate with external entities over internet. However, IoT devices face risks due to increasing hacker attacks exchange Internet. To establish reliable system, it is crucial detect such strong attacks.

Language: Английский

Citations

0

IoT Solutions for Operational Efficiency in Tourism Management DOI
Edwin Ramírez-Asís,

Martha Esther Guerra Muñoz,

Helena Judith Campos Cieza

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 451 - 468

Published: Dec. 13, 2024

This paper explores IoT solutions aimed at enhancing operational efficiency in tourism management, with a focus on Peru, country renowned for its diverse and culturally rich tourist destinations, particularly Machu Picchu. The integration of technologies presents promising opportunities to streamline various aspects operations, including visitor resource utilization, sustainability practices. By leveraging sensors, data analytics, automation, stakeholders the industry can achieve improved decision-making processes, enhanced customer experiences, optimized allocation. discussion encompasses current state adoption tourism, case studies from potential benefits challenges associated implementing these technologies.

Language: Английский

Citations

0

Regulatory Frameworks for Securing IoT Devices DOI

Sony Kulshrestha,

Nishtha Acharya

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 243 - 260

Published: Dec. 13, 2024

The proliferation of Internet Things (IoT) devices has revolutionized industries and daily life by enabling unprecedented connectivity automation. However, this technological advancement also introduced significant security risks, as IoT are often vulnerable to cyberattacks. lack standardized measures exacerbates these vulnerabilities, making regulatory frameworks essential for ensuring the safety privacy users. This paper explores legal perspectives on designed secure devices. It examines existing regulations, identifies gaps challenges, analyzes how different jurisdictions approach security. By comparing various models, study highlights best practices proposes recommendations developing comprehensive frameworks.

Language: Английский

Citations

0

Blockchain-Enabled Secure Data Sharing and Communication in IoT Networks DOI
Vinay Kumar Nassa,

G. Santhakumar,

Budesh Kanwer

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 131 - 142

Published: Dec. 13, 2024

The system includes sharing and controlling access to data among Internet of Things devices using blockchain technology. proposed addresses trust challenges in authentication faced IoT networks. Its objectives encompass establishing authentication, authorization for over the network. To efficiently manage control, employs smart contracts with Access Control Contract. ACC governs control overall, while RC verifies identity users within system, JC enforces a behavior judgment method detect any user misbehavior.

Language: Английский

Citations

0

Role of Neural Network, Fuzzy, and IoT in Integrating Artificial Intelligence as a Cybersecurity System DOI
Madan Kumar Sharma,

Abeda Dodamani,

M. Kalyan Chakravarthi

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 189 - 202

Published: Dec. 13, 2024

Issues regarding cybersecurity have grown in tandem with the prompt expansion of IoT-internet technology past decade. Artificial intelligence (AI) is employed to develop advanced methods protect networking and structures, such as IoTs innovations, are at top cybersecurity. Nevertheless, attackers found ways exploit AI, thus they starting use it upon their competitors carry out security breaches. Because minimal computational analysis storing capabilities IoT systems, traditional insufficient safeguard an platform.

Language: Английский

Citations

0

Implementation of Multi-Layer Security Network Identification System Using Machine Learning Techniques DOI

N. Rajendran,

P. William,

Suresh Talwar

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 287 - 302

Published: Dec. 13, 2024

The distinct parts of a multilayered security network have been designed in such manner that the susceptibility single layer does not impact additional layers, and therefore entire is susceptible. As this paper provides multiple-layer protected Internet Things (IoTs) platform idea depending on machine learning (ML), research will detail creation multilayer system for authentication using ML. Employing fuzzy inference structure, work created multi-layer random forest intrusion detection. In study, advantages filtering wrapping methods are merged to develop an increasingly sophisticated selecting features methodology improves security.

Language: Английский

Citations

0

The Classification Approach for Face Spoof Detection in Artificial Neural Networks Based on IoT Concepts DOI
Julia Punitha Malar Dhas, Martin Victor K,

P. Santhiya

et al.

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 319 - 334

Published: Dec. 13, 2024

Face spoof detection and authentication systemhas significant role in IoT application that include validation of identity for computer security atm access crime social care. Even though the classification system are vulnerable to different types attacks. Presentation attack is a clear threat facial biometric based applications. The discussed issues can be solved using artificial neural networks face proof platform. deep learning approaches feature extraction multicolor space useful obtaining more information from input regarding chrominance luminance data. extracted features selected combined with minimum redundancy maximum relevance algorithm providing discriminate efficient set.

Language: Английский

Citations

0