Research Article | Open Access | Download Full Text
Volume 1 | Issue 1 | Year 2023 | Article Id: AIR-V1I1P104 DOI: https://doi.org/10.59232/AIR-V1I1P104
Machine Learning-based Secure Cloud-IoT Monitoring System for Wireless Communications
P. Rajadurai
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 14 Apr 2023 | 16 Jun 2023 | 28 Jun 2023 | 07 Jul 2023 |
Citation
P. Rajadurai. “Machine Learning-based Secure Cloud-IoT Monitoring System for Wireless Communications.” DS Journal of Artificial Intelligence and Robotics, vol. 1, no. 1, pp. 37-43, 2023.
Abstract
Keywords
Internet of Things (IoT), Machine learning, IoT monitoring system, Security, Encryption, AES algorithm
References
[1] Gagandeep Kaur et al., "Face Mask Recognition System using CNN Model," Neuroscience Informatics, vol. 2, no. 3, p.100035, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[2] P. Yogendra Prasad et al., "Implementation of Machine Learning Based Google Teachable Machine in Early Childhood Education," International Journal of Early Childhood, vol. 14, no. 3, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Gunes Gürsoy, Asaf Varol, and Serkan Varol, "Impact of Machine Learning in Digital Marketing Applications," 3rd International Informatics and Software Engineering Conference, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Philip Tovstogan, Xavier Serra, and Dmitry Bogdanov, "Similarity of Nearest-Neighbor Query Results in Deep Latent Spaces," Proceedings of the Sound and Music Computing 2022 Music Technology and Design, pp. 287-294, 2022.
[Google Scholar] [Publsisher Link]
[5] Muhammad Shafiq et al., "The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-based Security Attacks," Wireless Communications and Mobile Computing, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Abid Ali et al., "Advanced Security Framework for Internet of Things (IoT)," Technologies, vol. 10, no. 3, p. 60, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Giancarlo Fortino et al., “Iot Platforms and Security: An Analysis of the Leading Industrial/Commercial Solutions,” Sensors, vol. 22, no. 6, p. 2196, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Caroline Omoanatse Alenoghena et al., "Telemedicine: A Survey of Telecommunication Technologies, Developments, and Challenges," Journal of Sensor and Actuator Networks, vol. 12, no. 2, p. 20, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Muhammad Naeem Tahir, Pekka Leviäkangas, and Marcos Katz, "Connected Vehicles: V2V and V2I Road Weather and Traffic Communication using Cellular Technologies," Sensors, vol. 22, no. 3, p. 1142, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Chetna Monga et al., "Secure Techniques for Channel Encryption in Wireless Body Area Network without the Certificate," Wireless Communications and Mobile Computing, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Adam A. Alli, and Muhammad Mahbub Alam, "SecOFF-FCIoT: Machine Learning based Secure Offloading in Fog-Cloud of Things for Smart City Applications," Internet of Things, vol. 7, p. 100070, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Kamal Upreti et al., "Enhanced Algorithmic Modelling and Architecture in Deep Reinforcement Learning based on Wireless Communication Fintech Technology," Optik, vol. 272, p. 170309, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] G. Vijayasekaran, and M. Duraipandian, "An Efficient Clustering and Deep Learning-based Resource Scheduling for Edge Computing to Integrate Cloud-IoT," Wireless Personal Communications, vol. 124, pp. 2029-2044, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Liang Xiao et al., "A Reinforcement Learning and Blockchain-based Trust Mechanism for Edge Networks," IEEE Transactions on Communications, vol. 68, no. 9, pp. 5460-5470, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Muhammad Adnan Khan et al., "A Machine Learning Approach for Blockchain-based Smart Home Networks Security," IEEE Network, vol. 35, no. 3, pp. 223-229, 2020.