• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.027 seconds

Genetic Algorithm based hyperparameter tuned CNN for identifying IoT intrusions

  • Alexander. R;Pradeep Mohan Kumar. K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.755-778
    • /
    • 2024
  • In recent years, the number of devices being connected to the internet has grown enormously, as has the intrusive behavior in the network. Thus, it is important for intrusion detection systems to report all intrusive behavior. Using deep learning and machine learning algorithms, intrusion detection systems are able to perform well in identifying attacks. However, the concern with these deep learning algorithms is their inability to identify a suitable network based on traffic volume, which requires manual changing of hyperparameters, which consumes a lot of time and effort. So, to address this, this paper offers a solution using the extended compact genetic algorithm for the automatic tuning of the hyperparameters. The novelty in this work comes in the form of modeling the problem of identifying attacks as a multi-objective optimization problem and the usage of linkage learning for solving the optimization problem. The solution is obtained using the feature map-based Convolutional Neural Network that gets encoded into genes, and using the extended compact genetic algorithm the model is optimized for the detection accuracy and latency. The CIC-IDS-2017 and 2018 datasets are used to verify the hypothesis, and the most recent analysis yielded a substantial F1 score of 99.23%. Response time, CPU, and memory consumption evaluations are done to demonstrate the suitability of this model in a fog environment.

Development of an IoT-based Unmanned Home-Delivery Box System (사물인터넷(IoT) 기반의 무인 택배함 시스템 개발)

  • Park, Chan Hee;Kang, Hyun Tae;Kang, Chang Soon
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.129-138
    • /
    • 2017
  • This paper is concerned with an Internet of Things (IoT)-based unmanned home-delivery box system, in which the system is developed with a prototype using a weight sensor, shock sensor, the Arduino and Raspberry-Pi of open-source hardware platforms. The developed system provides several functions such as a safe storage means, prevention of delivery-theft, and remote control of the home-delivery box, etc. Specifically, the system recognizes the arrival of goods by detecting the weight of deliveries and sends the arrived message of deliveries to the recipient' smartphone, and also controls (i.e., open and close) the locker of the unmanned home-delivery box system remotely with the smartphone. Furthermore, the developed system provides automatically a warning alarm around the unmanned home-delivery box when an external shock is applied to the home-delivery box, and sends a message on the shock to the recipient' smartphone. The major functions of the developed home-delivery box system have been verified in a realistic environment, and confirmed to work well. With the application of the developed home-delivery box system to the homes and offices where recipients are always not to stay, it is expected to significantly improve the safety of delivered goods as well as to effectively prevent the delivery operatives posing as a crime.

Detection of Deterioration of Traffic Signal Controller Through Real-Time Monitoring (실시간 감시를 통한 교통신호제어기의 열화 감지)

  • Kim, Eun Y.;Jang, Joong S.;Oh, Bong S.;Park, Sang C.
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.153-160
    • /
    • 2018
  • Purpose: A traffic signal controller needs to control and coordinate to ensure that traffic and pedestrians move as smoothly as possible. Since a traffic signal controller has a significant impact on the safety of vehicles and pedestrians, it is important to monitor the failure and deterioration of the traffic signal controller. The purpose of this paper is to propose an IoT (Internet of Things)-based monitoring system for a traffic signal controller. Methods: Every traffic signal controller has a nominal system trajectory specified when it is deployed. The proposed IoT-based monitoring system collects the system trajectory information through real-time monitoring. By comparing the nominal system trajectory and the monitored system trajectory, we are able to detect the failure and deterioration of the traffic signal controller. Conclusion: The proposed IoT-based monitoring system can contribute to the safety of vehicles and pedestrians by maximizing the availability of a traffic signal controller.

An energy-efficient technique for mobile-wireless-sensor-network-based IoT

  • Singla, Jatin;Mahajan, Rita;Bagai, Deepak
    • ETRI Journal
    • /
    • v.44 no.3
    • /
    • pp.389-399
    • /
    • 2022
  • Wireless sensor networks (WSNs) are one of the basic building blocks of Internet of Things (IoT) systems. However, the wireless sensing nodes in WSNs suffer from energy constraint issues because the replacement/recharging of the batteries of the nodes tends to be difficult. Furthermore, a number of realistic IoT scenarios, such as habitat and battlefield monitoring, contain mobile sensing elements, which makes the energy issues more critical. This research paper focuses on realistic WSN scenarios that involve mobile sensing elements with the aim of mitigating the attendant energy constraint issues using the concept of radio-frequency (RF) energy extraction. The proposed technique incorporates a cluster head election workflow for WSNs that includes mobile sensing elements capable of RF energy harvesting. The extensive simulation analysis demonstrated the higher efficacy of the proposed technique compared with the existing techniques in terms of residual energy, number of functional nodes, and network lifetime, with approximately 50% of the nodes found to be functional at the 4000th, 5000th, and 6000th rounds for the proposed technique with initial energies of 0.25, 0.5 and 1 J, respectively.

Progressive Retrieval Method using Intimacy between SNS Users in Internet of Things (사물인터넷에서 소셜 네트워크 사용자 친밀도를 이용한 점진적 검색 기법)

  • Kim, Sungrim;Kwon, Joonhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.1-10
    • /
    • 2018
  • Social network services allow you to share your thoughts and preferences more easily. They share your views with a large number of people who are friends with you without restriction of time or place. In the IoT environment, the amount of data is massively increasing as social network services spread rapidly. This change in the environment is driving the need for research into new retrieval methods that are different from conventional retrieval methods. In this paper, we propose a progressive retrieval method using the intimacy of social network users in the IoT. The first thing is to extract the user with the highest intimacy by using the property that the number of the owner of the information stored in the IoT environment is small. By accessing information in objects owned by these extracted users, the amount of information retrieved is reduced. It also improves retrieval efficiency by gradually retrieving information according to the user's level of interest. We present a new retrieval method and algorithm. The scenario also illustrates the effectiveness of the proposed method.

A Design of an AES-based Security Chip for IoT Applications using Verilog HDL (IoT 애플리케이션을 위한 AES 기반 보안 칩 설계)

  • Park, Hyeon-Keun;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.1
    • /
    • pp.9-14
    • /
    • 2018
  • In this paper, we introduce an AES-based security chip for the embedded system of Internet of Things(IoT). We used Verilog HDL to implement the AES algorithm in FPGA. The designed AES module creates 128-bit cipher by encrypting 128-bit plain text and vice versa. RTL simulations are performed to verify the AES function and the theory is compared to the results. An FPGA emulation was also performed with 40 types of test sequences using two Altera DE0-Nano-SoC boards. To evaluate the performance of security algorithms, we compared them with AES implemented by software. The processing cycle per data unit of hardware implementation is 3.9 to 7.7 times faster than software implementation. However, there is a possibility that the processing speed grow slower due to the feature of the hardware design. This can be solved by using a pipelined scheme that divides the propagation delay time or by using an ASIC design method. In addition to the AES algorithm designed in this paper, various algorithms such as IPSec can be implemented in hardware. If hardware IP design is set in advance, future IoT applications will be able to improve security strength without time difficulties.

A Design of Cooperation Coordinator using Band-Cloud

  • Min, Seongwon;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.90-97
    • /
    • 2017
  • The Internet of Things(IoT) market is expected to grow from 15.5billion to 75.4 billion by 2015-2025. As the number of IoT devices increases, the amount of data that is sent to the cloud is increasing. Today's Cloud Computing models are not suited to handle the vast amount of data generated by IoT devices. In this paper, we propose a Cooperation Coordinator System that reduces server load and improved real-time processing capability under specific circumstances by using Band-Cloud. The cooperation coordinator system dynamically forms the cloud when cooperation is needed between mobile devices located near. It is called Band-Cloud. Band-Cloud provides services entrusted by Central Cloud. This paper describes the proposed system and shows the cooperation process using the Android-based mobile devices and Wi-Fi Direct technology. Such a system can be applied to cases where real-time processing is required in a narrow area such as a hospital ward or a school classroom.

Side channel Attacks on LEA and Its Countermeasures (LEA에 대한 부채널 분석 및 대응 방법)

  • Park, Jin-Hak;Kim, Tae-Jong;An, Hyun-Jin;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.449-456
    • /
    • 2015
  • Recently, information security of IoT(Internet of Things) have been increasing to interest and many research groups have been studying for cryptographic algorithms, which are suitable for IoT environment. LEA(Lightweight Encryption Algorithm) developed by NSRI(National Security Research Institute) is commensurate with IoT. In this paper, we propose two first-order Correlation Power Analysis(CPA) attacks for LEA and experimentally demonstrate our attacks. Additionally, we suggest the mask countermeasure for LEA defeating our attacks. In order to estimate efficiency for the masked LEA, its operation cost is compared to operation time of masked AES.

A Novel Duty Cycle Based Cross Layer Model for Energy Efficient Routing in IWSN Based IoT Application

  • Singh, Ghanshyam;Joshi, Pallavi;Raghuvanshi, Ajay Singh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1849-1876
    • /
    • 2022
  • Wireless Sensor Network (WSN) is considered as an integral part of the Internet of Things (IoT) for collecting real-time data from the site having many applications in industry 4.0 and smart cities. The task of nodes is to sense the environment and send the relevant information over the internet. Though this task seems very straightforward but it is vulnerable to certain issues like energy consumption, delay, throughput, etc. To efficiently address these issues, this work develops a cross-layer model for the optimization between MAC and the Network layer of the OSI model for WSN. A high value of duty cycle for nodes is selected to control the delay and further enhances data transmission reliability. A node measurement prediction system based on the Kalman filter has been introduced, which uses the constraint based on covariance value to decide the scheduling scheme of the nodes. The concept of duty cycle for node scheduling is employed with a greedy data forwarding scheme. The proposed Duty Cycle-based Greedy Routing (DCGR) scheme aims to minimize the hop count, thereby mitigating the energy consumption rate. The proposed algorithm is tested using a real-world wastewater treatment dataset. The proposed method marks an 87.5% increase in the energy efficiency and reduction in the network latency by 61% when validated with other similar pre-existing schemes.

Feature Selection for Traffic Classification in SDN (SDN환경에서 트래픽 분류를 위한 특징 선택 기법)

  • Lim, Hwan-Hee;Kim, Dong-Hyun;Lee, Byung-Jun;Kim, Kyung-tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.43-44
    • /
    • 2018
  • 본 논문에서는 SDN환경에서 트래픽 분류를 위한 특징 선택 기법을 제안한다. 최근 들어 다양한 스마트폰 어플리케이션이나 다양한 IoT 기기들이 등장하고 있다. 다양한 IoT 기기나 어플리케이션은 엄청난 양의 트래픽을 발생시킨다. 엄청난 양의 트래픽은 전송속도를 저하시킬 뿐만 아니라, 높은 Quality of Service(QoS)를 보장하기가 힘들다. 또한 이러한 문제점들을 보안하기 위해 Software Defined Networking(SDN)이라는 기술이 빠른속도로 발전하고 있으며, 본 논문에서는 다양한 어플리케이션과 IoT 기기의 트래픽을 SDN환경에서 분류 하며, 트래픽의 분류 정확도와 더 빠른 분류를 위해 트래픽의 특징 선택 기법을 제안한다. 특징 선택을 수행한 뒤, 트래픽 분류를 진행하면 트래픽 분류 정확도를 높이고, 트래픽 분류시간은 줄어드는 효과를 보이며, 높은 QoS를 보장함으로써, 기존 네트워크 트래픽의 부하가 줄어드는 우수한 성능을 보인다.

  • PDF