Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/525075
Title: | Attack detection and secure IOT using adaptive neuro fuzzy inference scheme |
Researcher: | Duraisamy, A |
Guide(s): | Subramaniam, M |
Keywords: | Attack detection Computer Science Computer Science Information Systems Engineering and Technology Internet of Things Neuro fuzzy |
University: | Anna University |
Completed Date: | 2022 |
Abstract: | Nowadays, the wide adoption of the modern Internet of Things newline(IoT) paradigm has brought about the tremendous development of smart newlinecities. Smart cities operate in real-time world to promote ease and also the newlinehuman life quality with regard to efficiency and comfort. A security concern newlinealong with privacy is considered as a foremost issue in several smart cities. newlineThe security vulnerability in IoT-centered systems creates security threats newlinewhich affect smart surroundings applications. Therefore, there is basically a newlinerequirement for Intrusion Detection Systems (IDS) for mitigating the newlineIoT-related security outbreaks which took the entire benefits of security newlineliabilities. In existing works, the accuracy in the procedure of detection and newlinesecurity are the main challenge. To trounce these drawbacks, in the first stage newlineof the work the IDS are proposed intended for the identification of attacks in newlineIoT of city depending on the Deep Learning Modified Neural Networks newline(DLMNN) classification approach. Initially, the values of sensor from smart newlinecities are provided to the training phase of IDS system which is then newlineemployed for the purpose of testing values. Then, the step of preprocessing is newlinecarried out, followed by feature selection using entropy-Hummingbird newlineOptimization Algorithm (HOA). The classified outcomes are analyzed newlineafterwards and is employed for the prediction of outcome. Then, the task of newlinesecured data sharing is carried with the use of Krill Heard Advanced newlineEncryption Standard (KH-AES) approach. Finally, the resultant outcome is newlineforecasted. Experimental result of the suggested method employed in newlineclassification, feature selection, and secured data sharing are then compared newlinewith the traditional methods. newline newline |
Pagination: | xix,133p. |
URI: | http://hdl.handle.net/10603/525075 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 204.66 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 2.58 MB | Adobe PDF | View/Open | |
03_content.pdf | 16.82 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 124.85 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 516.28 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 449.39 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 933.41 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 729.53 kB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 584.32 kB | Adobe PDF | View/Open | |
10_annexures.pdf | 171.01 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 215.27 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: