DS Journal of Artificial Intelligence and Robotics (DS-AIR)

Research Article | Open Access | Download Full Text

Volume 1 | Issue 1 | Year 2023 | Article Id: AIR-V1I1P104 DOI: https://doi.org/10.59232/AIR-V1I1P104

Machine Learning-based Secure Cloud-IoT Monitoring System for Wireless Communications

P. Rajadurai

ReceivedRevisedAcceptedPublished
14 Apr 202316 Jun 202328 Jun 202307 Jul 2023

Citation

P. Rajadurai. “Machine Learning-based Secure Cloud-IoT Monitoring System for Wireless Communications.” DS Journal of Artificial Intelligence and Robotics, vol. 1, no. 1, pp. 37-43, 2023.

Abstract

The Internet of Things (IoT) paradigm presents a number of security challenges because of the growing scale and mobility of the user base. Additionally, flexibility and connection with a cloud network are necessary for operating a central security architecture. In this paper, a novel secure IoT monitoring (Sec-IoTM) system has been proposed, which improves the security features in cloud-assisted IoT environments. The proposed system consists of three phases, namely spoof detection, trust monitoring, and authentication system. The spoof detection phase makes use of a support vector machine (SVM), which classifies the request as an attack or not. This will remove the unauthorized user at the initial stage. The trust monitoring phase contains an intrusion detection system and an intrusion prevention system that will detect and prevent the data from the attack. The authentication system will authenticate the user, and if it is an unauthenticated user, then it will be blocked. If the user is an authenticated one, then the message will be encrypted using Advanced Encryption Standard (AES) algorithm. The performance metrics of the proposed Sec-IoTM method have been evaluated in terms of parameters like performance metrics, detection times, and false positive rates. The proposed method achieves high accuracy, 96% better than existing techniques.

Keywords

Internet of Things (IoT), Machine learning, IoT monitoring system, Security, Encryption, AES algorithm

References

[1] Gagandeep Kaur et al., "Face Mask Recognition System using CNN Model," Neuroscience Informatics, vol. 2, no. 3, p.100035, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[2] P. Yogendra Prasad et al., "Implementation of Machine Learning Based Google Teachable Machine in Early Childhood Education," International Journal of Early Childhood, vol. 14, no. 3, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Gunes Gürsoy, Asaf Varol, and Serkan Varol, "Impact of Machine Learning in Digital Marketing Applications," 3rd International Informatics and Software Engineering Conference, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Philip Tovstogan, Xavier Serra, and Dmitry Bogdanov, "Similarity of Nearest-Neighbor Query Results in Deep Latent Spaces," Proceedings of the Sound and Music Computing 2022 Music Technology and Design, pp. 287-294, 2022.

[Google Scholar] [Publsisher Link]

[5] Muhammad Shafiq et al., "The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-based Security Attacks," Wireless Communications and Mobile Computing, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Abid Ali et al., "Advanced Security Framework for Internet of Things (IoT)," Technologies, vol. 10, no. 3, p. 60, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[7] Giancarlo Fortino et al., “Iot Platforms and Security: An Analysis of the Leading Industrial/Commercial Solutions,” Sensors, vol. 22, no. 6, p. 2196, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[8] Caroline Omoanatse Alenoghena et al., "Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges," Journal of Sensor and Actuator Networks, vol. 12, no. 2, p. 20, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Muhammad Naeem Tahir, Pekka Leviäkangas, and Marcos Katz, "Connected Vehicles: V2V and V2I Road Weather and Traffic Communication using Cellular Technologies," Sensors, vol. 22, no. 3, p. 1142, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[10] Chetna Monga et al., "Secure Techniques for Channel Encryption in Wireless Body Area Network without the Certificate," Wireless Communications and Mobile Computing, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[11] Adam A. Alli, and Muhammad Mahbub Alam, "SecOFF-FCIoT: Machine Learning based Secure Offloading in Fog-Cloud of Things for Smart City Applications," Internet of Things, vol. 7, p. 100070, 2019.

[CrossRef] [Google Scholar] [Publisher Link]

[12] Kamal Upreti et al., "Enhanced Algorithmic Modelling and Architecture in Deep Reinforcement Learning based on Wireless Communication Fintech Technology," Optik, vol. 272, p. 170309, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[13] G. Vijayasekaran, and M. Duraipandian, "An Efficient Clustering and Deep Learning-based Resource Scheduling for Edge Computing to Integrate Cloud-IoT," Wireless Personal Communications, vol. 124, pp. 2029-2044, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[14] Liang Xiao et al., "A Reinforcement Learning and Blockchain-based Trust Mechanism for Edge Networks," IEEE Transactions on Communications, vol. 68, no. 9, pp. 5460-5470, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

[15] Muhammad Adnan Khan et al., "A Machine Learning Approach for Blockchain-based Smart Home Networks Security," IEEE Network, vol. 35, no. 3, pp. 223-229, 2020.

[CrossRef] [Google Scholar] [Publisher Link]

Machine Learning-based Secure Cloud-IoT Monitoring System for Wireless Communications