Soft computing based Machine Learning Enhancement Approach for Privacy and Security in Macro Layer IoT Devices Using Cyber Security Techniques

Authors

  • Ebenezer V Roselin, Victor. S. P

Keywords:

Machine learning, IoT, Cyber security, Macro layer, Privacy data

Abstract

The communication and access domination of IoT devices from human to machine or machine to human are one way controllable through user or administrator in the entire communication system with easier manner but it is entirely different on machine to machine communicating IoT devices.  The timing of data communication may be unknown for the user/administrator in machine to machine focused IoT devices and more number of cases with wireless mode than with the wired mode.  The process of collecting the data, ordering the data, and checks for privacy and security issues in a machine to machine IoT device is a complex process to implement.  The existing methodologies focus on the IoT device connection management to the network and verify the communication among several network devices either in local server or to a remote server.  This research article proposes anoptimistic machine learning enhancement approach for privacy and security in macro layer IoT devices using cyber security techniques.  In future this research paper will be extended with the implementation ofautomated privacy and security module towards all the major layers of IoT devices such as micro, mini and macro layer IoT devices.

Downloads

Download data is not yet available.

References

Tongе A. M., Kasturе S. S., Chaudhari S. R., Cyber security: challenges for sociеty-litеraturе review, IOSR Journal of Computer Еnginееring (IOSR-JCЕ), е-ISSN: 2278-0661, p-ISSN: 2278-8727, 12(2), 67-75 (2013).

Agarwal K., Dubеy S. K., Network Security: Attacks and Dеfеncе, International Journal of Advance Foundation and Research in Sciеncе&Еnginееring (IJAFRSЕ), 1(3), 8-16 (2014).

Homеr J., Zhang S., Ou X., Schmidt D., Du Y., Rajagopalan S. R., and Singhal A.. Aggregating vulnerability metrics in еntеrprisе nеtworks using attack graphs, Journal of Computer Security, 21(4), 561–597 (2014).

Cеrrudo C., AnЕmеrging US (and World) Threat: CitiеsWidеOpеn to Cyber Attacks; rеtriеvеd from https:// ioactivе.com/pdfs/IOActivе_HackingCitiеsPapеr_ CеsarCеrrudo.pdf, accessed on 30.09.2017.

Kizza J. M., Guidе to Complete Network Security, 4thЕdition, Springer International Publishing, ISBN: 978- 3-319-55605-5 (2017).

Noura, M., Atiquazzaman, M. and Gaedke, M. Interoperability in Internet of Things: Taxonomies and Open Challenges. Mobile Networks and Applications, 24, 796-809, (2020)

IOT Analytics: Market Insight for IOT; Top 10 IoT Applications in 2020. https://iot-analytics.com/top-10-iot-applications-in-2020

https://kaggle.com

www.github.com

https://www.kali.org/

https://www.ossec.net/

Downloads

Published

17.05.2023

How to Cite

Ebenezer V Roselin. (2023). Soft computing based Machine Learning Enhancement Approach for Privacy and Security in Macro Layer IoT Devices Using Cyber Security Techniques. International Journal of Intelligent Systems and Applications in Engineering, 11(6s), 856–869. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7115

Issue

Section

Research Article