Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 275 - 286
Published: Dec. 13, 2024
Researchers
and
business
owners
place
significant
importance
on
the
security
of
IoT
networks
as
it
directly
affects
availability
services
privacy
connected
users.
To
address
this
concern,
an
intrusion
detection
system
is
used
to
identify
thwart
attacks
provide
multi-layer
security.
In
study,
a
novel
developed
Security
network
authentication
using
machine
learning.
This
approach
combines
algorithm
for
system.
Additionally,
oversampling
technique
employed
improve
quality
classification
results.Various
experiments
were
conducted
with
different
layers,
well
two
distinct
techniques
developing
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 73 - 88
Published: Dec. 13, 2024
Since
they
are
used
in
an
array
of
real-life
uses,
wireless
sensor
equipment
Internet
Things
(IoT)
systems
will
be
among
the
biggest
prolific
sources
big
data
on
connection.
The
huge
quantity
collected
from
sensing
increases
transmission
overhead,
reducing
short
lifespan
IoT
equipment.
As
a
result,
it
is
required
to
cleanse
and
reduce
sensed
information
order
cut
costs
conserve
power
A
Data
Reduction
Cleansing
Technique
(DRCT)
for
consumption
IoT-based
networks
(WSNs)
suggested
this
research.
This
method
depends
2
levels
cleansing
reduction:
aggregation.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 217 - 230
Published: Dec. 13, 2024
The
application
of
the
Internet
Things
(IoT)
has
grown
tremendously
in
past
decade,
along
with
cybersecurity
issues.
Industrial
automation
procedures
smart
industries
are
most
prevalent
areas
where
IoT
innovation
creates
utmost
impact.
In
computation
setting,
undergone
huge
technological
and
operational
upheavals
recent
years,
data
science
leading
revolution.
This
paper
aims
exploring
use
science.
It
aids
for
transferring
real-time
crucial
between
gadgets
without
need
human
involvement.
presents
a
statistical
structure
protecting
entities
networking
traffics
associated
wireless
connectivity.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 231 - 242
Published: Dec. 13, 2024
The
Internet
of
Things
(IoT)
ensures
improved
cyber
security
using
various
technological
advancements
for
providing
enhanced
during
the
data
transmission.
By
assigning
each
physical
object
a
unique
Protocol
(IP)
address,
they
can
communicate
with
external
entities
over
internet.
However,
IoT
devices
face
risks
due
to
increasing
hacker
attacks
exchange
Internet.
To
establish
reliable
system,
it
is
crucial
detect
such
strong
attacks.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 451 - 468
Published: Dec. 13, 2024
This
paper
explores
IoT
solutions
aimed
at
enhancing
operational
efficiency
in
tourism
management,
with
a
focus
on
Peru,
country
renowned
for
its
diverse
and
culturally
rich
tourist
destinations,
particularly
Machu
Picchu.
The
integration
of
technologies
presents
promising
opportunities
to
streamline
various
aspects
operations,
including
visitor
resource
utilization,
sustainability
practices.
By
leveraging
sensors,
data
analytics,
automation,
stakeholders
the
industry
can
achieve
improved
decision-making
processes,
enhanced
customer
experiences,
optimized
allocation.
discussion
encompasses
current
state
adoption
tourism,
case
studies
from
potential
benefits
challenges
associated
implementing
these
technologies.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 243 - 260
Published: Dec. 13, 2024
The
proliferation
of
Internet
Things
(IoT)
devices
has
revolutionized
industries
and
daily
life
by
enabling
unprecedented
connectivity
automation.
However,
this
technological
advancement
also
introduced
significant
security
risks,
as
IoT
are
often
vulnerable
to
cyberattacks.
lack
standardized
measures
exacerbates
these
vulnerabilities,
making
regulatory
frameworks
essential
for
ensuring
the
safety
privacy
users.
This
paper
explores
legal
perspectives
on
designed
secure
devices.
It
examines
existing
regulations,
identifies
gaps
challenges,
analyzes
how
different
jurisdictions
approach
security.
By
comparing
various
models,
study
highlights
best
practices
proposes
recommendations
developing
comprehensive
frameworks.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 131 - 142
Published: Dec. 13, 2024
The
system
includes
sharing
and
controlling
access
to
data
among
Internet
of
Things
devices
using
blockchain
technology.
proposed
addresses
trust
challenges
in
authentication
faced
IoT
networks.
Its
objectives
encompass
establishing
authentication,
authorization
for
over
the
network.
To
efficiently
manage
control,
employs
smart
contracts
with
Access
Control
Contract.
ACC
governs
control
overall,
while
RC
verifies
identity
users
within
system,
JC
enforces
a
behavior
judgment
method
detect
any
user
misbehavior.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 189 - 202
Published: Dec. 13, 2024
Issues
regarding
cybersecurity
have
grown
in
tandem
with
the
prompt
expansion
of
IoT-internet
technology
past
decade.
Artificial
intelligence
(AI)
is
employed
to
develop
advanced
methods
protect
networking
and
structures,
such
as
IoTs
innovations,
are
at
top
cybersecurity.
Nevertheless,
attackers
found
ways
exploit
AI,
thus
they
starting
use
it
upon
their
competitors
carry
out
security
breaches.
Because
minimal
computational
analysis
storing
capabilities
IoT
systems,
traditional
insufficient
safeguard
an
platform.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 287 - 302
Published: Dec. 13, 2024
The
distinct
parts
of
a
multilayered
security
network
have
been
designed
in
such
manner
that
the
susceptibility
single
layer
does
not
impact
additional
layers,
and
therefore
entire
is
susceptible.
As
this
paper
provides
multiple-layer
protected
Internet
Things
(IoTs)
platform
idea
depending
on
machine
learning
(ML),
research
will
detail
creation
multilayer
system
for
authentication
using
ML.
Employing
fuzzy
inference
structure,
work
created
multi-layer
random
forest
intrusion
detection.
In
study,
advantages
filtering
wrapping
methods
are
merged
to
develop
an
increasingly
sophisticated
selecting
features
methodology
improves
security.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 319 - 334
Published: Dec. 13, 2024
Face
spoof
detection
and
authentication
systemhas
significant
role
in
IoT
application
that
include
validation
of
identity
for
computer
security
atm
access
crime
social
care.
Even
though
the
classification
system
are
vulnerable
to
different
types
attacks.
Presentation
attack
is
a
clear
threat
facial
biometric
based
applications.
The
discussed
issues
can
be
solved
using
artificial
neural
networks
face
proof
platform.
deep
learning
approaches
feature
extraction
multicolor
space
useful
obtaining
more
information
from
input
regarding
chrominance
luminance
data.
extracted
features
selected
combined
with
minimum
redundancy
maximum
relevance
algorithm
providing
discriminate
efficient
set.