The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Securing the IoT System of Smart Cities by Interactive Layered Neuro-Fuzzy Inference Network Classifier With Asymmetric Cryptography
|
Author(s): B. Prakash (Computing Technologies, School of Computing, SRM Institute of Science and Technology, India), P. Saravanan (Computing Technologies, School of Computing, SRM Institute of Science and Technology, India), V. Bibin Christopher (Computing Technologies, School of Computing, SRM Institute of Science and Technology, India), A. Saranya (School of Computing, SRM Institute of Science and Technology, India)and P. Kirubanantham (Computing Technologies, School of Computing, SRM Institute of Science and Technology, India)
Copyright: 2024
Pages: 27
Source title:
Innovative Machine Learning Applications for Cryptography
Source Author(s)/Editor(s): J. Anitha Ruth (SRM Institute of Science and Technology, Vadapalani, India), G.V. Mahesh Vijayalakshmi (BMS Institute of Technology and Management, India), P. Visalakshi (Department of Networking and Communications, College of Engineering and Technology, SRM Institute of Science and Technology, Katankulathur, India), R. Uma (Sri Sairam Engineering College, Chennai, India)and A. Meenakshi (SRM Institute of Science and Technology, Vadapalani, India)
DOI: 10.4018/979-8-3693-1642-9.ch014
Purchase
|
Abstract
Smart environments (SE) aim to improve daily comfort in the form of the internet of things (IoT). It starts many everyday services due to its stable and easy-to-use operations. Any real-world SE based on IoT architecture prioritises privacy and security. Internet of things systems are vulnerable to security flaws, affecting SE applications. To identify attacks on IoT smart cities, an IDS based on an iterative layered neuro-fuzzy inference network (ILNFIN) is presented. Initially the TON-IoT dataset was preprocessed, and the sparse wrapper head selection approach isolates attack-related features. The Iterative stacking neuro-fuzzy inference network classifies attacked data from the normal data. The asymmetric prime chaotic Rivest Shamir Adleman technique ensures the secure transmission of non-attacked data. To show the effectiveness of the suggested secure data transfer techniques, the authors compare their experimental results to existing approaches.
Related Content
Preeti Mariam Mathews, Anjali Sandeep Gaikwad, Mathu Uthaman, B. Sreelekshmi, V. Dankan Gowda.
© 2024.
26 pages.
|
Dankan Gowda V., Joohi Garg, Shaifali Garg, K. D. V. Prasad, Sampathirao Suneetha.
© 2024.
20 pages.
|
K. Sriprasadh.
© 2024.
24 pages.
|
R. Valarmathi, R. Uma, P. Ramkumar, Srivatsan Venkatesh.
© 2024.
20 pages.
|
R. Jayashree, J. Venkata Subramanian.
© 2024.
14 pages.
|
M. Indira, K. S. Mohanasundaram, M. Saranya.
© 2024.
14 pages.
|
R. Thenmozhi, D. Vetriselvi, A. Arokiaraj Jovith.
© 2024.
26 pages.
|
|
|