Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 275 - 286
Published: Dec. 13, 2024
Researchers
and
business
owners
place
significant
importance
on
the
security
of
IoT
networks
as
it
directly
affects
availability
services
privacy
connected
users.
To
address
this
concern,
an
intrusion
detection
system
is
used
to
identify
thwart
attacks
provide
multi-layer
security.
In
study,
a
novel
developed
Security
network
authentication
using
machine
learning.
This
approach
combines
algorithm
for
system.
Additionally,
oversampling
technique
employed
improve
quality
classification
results.Various
experiments
were
conducted
with
different
layers,
well
two
distinct
techniques
developing
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 303 - 318
Published: Dec. 13, 2024
Password
authentication
is
among
the
most
effective
ways
to
authenticate
for
security
resiliency.
The
challenge
of
securely
keeping
credentials
one
important
ones.
Based
on
Negative
Database
(NDB),
a
cryptographic
hash
function,
and
symmetric
encryption,
our
study
suggests
Encrypted
(ENP)
password
protection
approach.
Methods:
This
paper
verification
structure
protected
storage
that
may
be
effectively
incorporated
into
existing
systems.
A
hybrid
method
used
encrypt
client's
plain
password.
Additionally,
system
built
ENP
presented.
Because
it
value
each
user's
password,
secret
key
in
almost
always
unique
does
not
have
separately
produced
maintained.
As
result,
passwords
can
using
encryption.
Advances in computational intelligence and robotics book series,
Journal Year:
2024,
Volume and Issue:
unknown, P. 275 - 286
Published: Dec. 13, 2024
Researchers
and
business
owners
place
significant
importance
on
the
security
of
IoT
networks
as
it
directly
affects
availability
services
privacy
connected
users.
To
address
this
concern,
an
intrusion
detection
system
is
used
to
identify
thwart
attacks
provide
multi-layer
security.
In
study,
a
novel
developed
Security
network
authentication
using
machine
learning.
This
approach
combines
algorithm
for
system.
Additionally,
oversampling
technique
employed
improve
quality
classification
results.Various
experiments
were
conducted
with
different
layers,
well
two
distinct
techniques
developing