Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
A signature-based data security and authentication framework for internet of...IJECEIAES
This document presents a research paper that proposes a signature-based data security and authentication framework for Internet of Things (IoT) applications. The paper introduces a novel computational model that establishes a unique authentication process using a simplified encryption strategy. The model considers both local and global IoT environments and implements an authentication mechanism using challenge-response exchanges between communicating nodes. A digital signature is generated using parameters like random seeds, secret keys, prime values, and data packets. Simulation results show that the proposed system offers efficient security and data transmission performance in the presence of unknown adversaries, performing better than commonly used security solutions in vulnerable IoT environments.
A data quarantine model to secure data in edge computingIJECEIAES
Edge computing provides an agile data processing platform for latencysensitive and communication-intensive applications through a decentralized cloud and geographically distributed edge nodes. Gaining centralized control over the edge nodes can be challenging due to security issues and threats. Among several security issues, data integrity attacks can lead to inconsistent data and intrude edge data analytics. Further intensification of the attack makes it challenging to mitigate and identify the root cause. Therefore, this paper proposes a new concept of data quarantine model to mitigate data integrity attacks by quarantining intruders. The efficient security solutions in cloud, ad-hoc networks, and computer systems using quarantine have motivated adopting it in edge computing. The data acquisition edge nodes identify the intruders and quarantine all the suspected devices through dimensionality reduction. During quarantine, the proposed concept builds the reputation scores to determine the falsely identified legitimate devices and sanitize their affected data to regain data integrity. As a preliminary investigation, this work identifies an appropriate machine learning method, linear discriminant analysis (LDA), for dimensionality reduction. The LDA results in 72.83% quarantine accuracy and 0.9 seconds training time, which is efficient than other state-of-the-art methods. In future, this would be implemented and validated with ground truth data.
Risk assessment optimization for decision support using intelligent model bas...abdulkareemmerhej
Due to the unreliability of wired communications and the risks of controlling the process of transmitting data besides the complications that affecting data protection and the high costs of systems infrastructure, led to use wireless communications instead of wires media, but these networks are vulnerable towards illegal attacks. The side effects of these attacks are modifying data or penetrate the security system and discover its weaknesses, which leads to great material losses. These risks and difficulties led to the reluctance of wires communications and propose intelligent techniques and robust encryption algorithms for preventing data transmitted over wireless networks to keep it safe from cyber security attacks. So, there is a persistent need for providing intelligent techniques and robust algorithms to preserve conveyed information using wireless network. This paper introduces scenario for proposing intelligent technique to increase data reliability and provides a new way to improve high level of protection besides reduces infrastructure cost. The proposed system relies on two models, where the first model based on producing a knowledge base of risk rules while the aim of the second module is a risk assessment outcomes and encryption process according to attacks type. In this system, reducing risks levels based on renewable rules whereas a novel security system established on non-periodic keys with unsystematic operations using fuzzy system. We concluded that the proposed system has the ability to protect the transmitted data, increases its reliability, and reduces the potential risks. MATLAB Toolkit 2014, then the Weka open source package, was used in encryption and data mining for the proposed system.
The document provides a survey of trust management techniques for the Internet of Things (IoT). It summarizes four key trust management techniques:
1) E-LITHE enhances DTLS security for constrained IoT devices by adding a trusted third party to share secret keys and reduce denial-of-service attacks.
2) GTRS is a graph-based recommender system that calculates trust between IoT devices based on ratings and social relationships to select trusted service providers.
3) TWGA is a trustworthy gateway architecture that establishes trusted paths between domains using device identifiers and public/private keys to authenticate and forward data packets securely.
4) TBBS monitors the behavior and trust of vehicles in an Io
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
An authenticated key management scheme for securing big data environmentIJECEIAES
If data security issues in a big data environment are considered, then the distribution of keys, their management, and the ability to transfer them between server users in a public channel will be one of the most critical issues that must consider on. In which the importance of keys management may outweigh the importance of the encryption algorithm strength. Therefore, this paper raised a new proposed scheme called authenticated key management scheme (AKMS) that works through two levels of security. First, to concerns how the user communicates with the server with preventing any attempt to penetrate senders/receivers. Second, to make the data sent vague by encrypting it, and unreadable by others except for the concerned receiver, thus the server function be limited only as a passageway for communication between the sender and receiver. In the presented work some concepts discussed related to analysis and evaluation as keys security, data security, public channel transmission, and security isolation inquiry which demonstrated the rich value that AKMS scheme carried. As well, AKMS scheme achieved very satisfactory results about computation cost, communication cost, and storage overhead which proved that AKMS scheme is appropriate, secure, and practical to use and protect the user's private data in big data environments.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: November 03, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
The increase in the deployment of IoT networks has improved productivity of humans and organisations.
However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent
weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS
attack in IoT networks by classifying incoming network packets on the transport layer as either
“Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep
learning algorithms and two clustering algorithms were independently trained for mitigating DDoS
attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and
UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during
the experimentation phase. The accuracy score and normalized-mutual-information score are used to
quantify the classification performance of the four algorithms. Our results show that the autoencoder
performed overall best with the highest accuracy across all the datasets.
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: December 01, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: November 09, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
DDoS Attack Detection on Internet o Things using Unsupervised Algorithmsijfls
The increase in the deployment of IoT networks has improved productivity of humans and organisations. However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS attack in IoT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDoS attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF)
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
Rough set method-cloud internet of things: a two-degree verification scheme ...IJECEIAES
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dealing with them is essential. But the question raised in this regard is that what are the strategies and policies to deal with security threats that must be taken to ensure the security of computer networks? In this context, the present study intends to do a review of the literature by using earlier researches and library approach, to provide security solutions in the face of threats to their computer networks. The results of this research can lead to more understanding of security threats and ways to deal with them and help to implement a secure information platform.
The document summarizes various technologies used for cloud computing security. It discusses three main methods: data splitting, data anonymization, and cryptographic techniques.
Data splitting involves separating confidential data into fragments that are stored in different locations. Data anonymization irreversibly hides data to protect sensitive information while still allowing analysis. Cryptographic techniques like encryption can be used to encrypt data before outsourcing, but limit cloud capabilities unless advanced encryption methods are used.
The document compares the advantages and disadvantages of each method for security, overhead, functionality, and key criteria. It provides an overview of approaches for maintaining data security in cloud computing.
Vector space model, term frequency-inverse document frequency with linear sea...CSITiaesprime
For Muslims, the Hadith ranks as the secondary legal authority following the Quran. This research leverages hadith data to streamline the search process within the nine imams’ compendium using the vector space model (VSM) approach. The primary objective of this research is to enhance the efficiency and effectiveness of the search process within Hadith collections by implementing pre-filtering techniques. This study aims to demonstrate the potential of linear search and Django object-relational mapping (ORM) filters in reducing search times and improving retrieval performance, thereby facilitating quicker and more accurate access to relevant Hadiths. Prior studies have indicated that VSM is efficient for large data sets because it assigns weights to every term across all documents, regardless of whether they include the search keywords. Consequently, the more documents there are, the more protracted the weighting phase becomes. To address this, the current research pre-filters documents prior to weighting, utilizing linear search and Django ORM as filters. Testing on 62,169 hadiths with 20 keywords revealed that the average VSM search duration was 51 seconds. However, with the implementation of linear and Django ORM filters, the times were reduced to 7.93 and 8.41 seconds, respectively. The recall@10 rates were 79% and 78.5%, with MAP scores of 0.819 and 0.814, accordingly.
Electro-capacitive cancer therapy using wearable electric field detector: a r...CSITiaesprime
Electro-capacitive cancer therapy (ECCT), a less invasive and more targeted approach using wearable electric field detectors, is revolutionizing cancer therapy, a complex process involving traditional methods like surgery, chemotherapy, and radiation. The review aims to investigate the safety and efficacy of electric field exposure in vital organs, particularly in cancer therapy, to improve medical advancements. It will investigate the impact on cytokines and insulation integrity, as well as contribute to improving diagnostic techniques and safety measures in medical and engineering fields. Wearable electric field detectors have revolutionized cancer therapy by offering a non-invasive and personalized approach to treatment. These devices, such as smart caps or patches, measure changes in electric fields by detecting capacitance alterations. Their lightweight, comfortable, and easy to-wear nature allows for real-time monitoring, providing valuable data for personalized treatment plans. The portability of wearable detectors allows for long-term surveillance outside clinical settings, increasing therapy efficacy. The ability to collect data over extended periods provides a comprehensive view of electric field dynamics, aiding researchers in understanding tumor growth and progression. Technology advancements in electro-capacitive therapy, including wearable devices, have revolutionized cancer treatment by adjusting electric field intensity in real-time, enhancing personalized medicine, and improving treatment outcomes and patient quality of life.
More Related Content
Similar to Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means (20)
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: November 03, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
The increase in the deployment of IoT networks has improved productivity of humans and organisations.
However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent
weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS
attack in IoT networks by classifying incoming network packets on the transport layer as either
“Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep
learning algorithms and two clustering algorithms were independently trained for mitigating DDoS
attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and
UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during
the experimentation phase. The accuracy score and normalized-mutual-information score are used to
quantify the classification performance of the four algorithms. Our results show that the autoencoder
performed overall best with the highest accuracy across all the datasets.
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: December 01, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
International Journal of Fuzzy Logic Systems (IJFLS)ijflsjournal087
Call For Papers...!!!
International Journal of Fuzzy Logic Systems (IJFLS)
Web page link: http://wireilla.com/ijfls/index.html
Submission Deadline: November 09, 2024
Submission link: http://allcfps.com/wireilla/submission/index.php
Contact Us:wirelinux@wireilla.org
DDoS Attack Detection on Internet o Things using Unsupervised Algorithmsijfls
The increase in the deployment of IoT networks has improved productivity of humans and organisations. However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS attack in IoT networks by classifying incoming network packets on the transport layer as either “Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep learning algorithms and two clustering algorithms were independently trained for mitigating DDoS attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during the experimentation phase. The accuracy score and normalized-mutual-information score are used to quantify the classification performance of the four algorithms. Our results show that the autoencoder performed overall best with the highest accuracy across all the datasets.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
Novel authentication framework for securing communication in internet-of-things IJECEIAES
Internet-of-Things (IoT) offers a big boon towards a massive network of connected devices and is considered to offer coverage to an exponential number of the smart appliance in the very near future. Owing to the nascent stage of evolution of IoT, it is shrouded by security loopholes because of various reasons. Review of existing research-based solution highlights the usage of conventional cryptographic-based solution over the traditional mechanism of data forwarding process between IoT nodes and gateway. The proposed system presents a novel solution to this problem by a model that is capable of performing a highly secured and cost-effective authentication process. The proposed system introduces Authentication Using Signature (AUS) as well as Security with Complexity Reduction (SCR) for the purpose to resist participation of any form of unknown threats. The outcome of the model shows better security strength with faster response time and energy saving of the IoT nodes.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF)
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
The introduction of Internet of Things (IoT) applications into daily life has raised serious privacy concerns
among consumers, network service providers, device manufacturers, and other parties involved. This paper
gives a high-level overview of the three phases of data collecting, transmission, and storage in IoT systems
as well as current privacy-preserving technologies. The following elements were investigated during these
three phases:(1) Physical and data connection layer security mechanisms(2) Network remedies(3)
Techniques for distributing and storing data. Real-world systems frequently have multiple phases and
incorporate a variety of methods to guarantee privacy. Therefore, for IoT research, design, development,
and operation, having a thorough understanding of all phases and their technologies can be beneficial. In
this Study introduced two independent methodologies namely generic differential privacy (GenDP) and
Cluster-Based Differential privacy ( Cluster-based DP) algorithms for handling metadata as intents and
intent scope to maintain privacy and security of IoT data in cloud environments. With its help, we can
virtual and connect enormous numbers of devices, get a clearer understanding of the IoT architecture, and
store data eternally. However, due of the dynamic nature of the environment, the diversity of devices, the
ad hoc requirements of multiple stakeholders, and hardware or network failures, it is a very challenging
task to create security-, privacy-, safety-, and quality-aware Internet of Things apps. It is becoming more
and more important to improve data privacy and security through appropriate data acquisition. The
proposed approach resulted in reduced loss performance as compared to Support Vector Machine (SVM) ,
Random Forest (RF) .
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
Rough set method-cloud internet of things: a two-degree verification scheme ...IJECEIAES
The quick development of innovations and increasing use of the internet of things (IoT) in human life brings numerous challenges. It is because of the absence of adequate capacity resources and tremendous volumes of IoT information. This can be resolved by a cloud-based architecture. Consequently, a progression of challenging security and privacy concerns has emerged in the cloud based IoT context. In this paper, a novel approach to providing security in cloud based IoT environments is proposed. This approach mainly depends on the working of rough set rules for guaranteeing security during data sharing (rough set method-cloud IoT (RSM-CIoTD)). The proposed RSM-CIoTD conspire guarantees secure communication between the user and cloud service provider (CSP) in a cloud based IoT. To manage unauthorized users, an RSM-CIoTD scheme utilizes a registered authority which plays out a two-degree confirmation between the network substances. The security and privacy appraisal techniques utilize minimum and maximum trust benefits of past communication. The experiments show that our proposed system can productively and safely store the cloud service while outperforming other security methods.
Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
Network security is one of the foremost anxieties of the modern time. Over
the previous years, numerous studies have been accompanied on the
intrusion detection system. However, network security is one of the foremost
apprehensions of the modern era this is due to the speedy development and
substantial usage of altered technologies over the past period. The
vulnerabilities of these technologies security have become a main dispute
intrusion detection system is used to classify unapproved access and unusual
attacks over the secured networks. For the implementation of intrusion
detection system different approaches are used machine learning technique
is one of them. In order to comprehend the present station of application of
machine learning techniques for solving the intrusion discovery anomalies in
internet of thing (IoT) based big data this review paper conducted. Total 55
papers are summarized from 2010 and 2021 which were centering on the
manner of the single, hybrid and collaborative classifier design. This review
paper also includes some of the basic information like IoT, big data, and
machine learning approaches are discussed.
Improving blockchain security for the internet of things: challenges and sol...IJECEIAES
Due to its uniquely suited to the knowledge era, the blockchain technology has currently become highly appealing to the next generation. In addition, such technology has been recently extended to the internet of things (IoT). In essence, the blockchain concept necessitates the use of a decentralized data operation system to store as well as to distribute data and the transactions across the net. Therefore, this study examines the specific concept of the blockchain as a decentralized data management system in the face of probable protection threats. Furthermore, it discusses the present solutions that can be used to counteract those attacks. The blockchain security enhancement solutions are included in this study by summarizing the key points of these solutions. Several blockchain systems and safety devices that register security defenselessness can be developed using such key points. At last, this paper discusses the pending matters and the outlook research paths of blockchain-IoT systems.
The spread of information networks in communities and organizations have led to a daily huge volume of information exchange between different networks which, of course, has resulted in new threats to the national organizations. It can be said that information security has become today one of the most challenging areas. In other words, defects and disadvantages of computer network security address irreparable damage for enterprises. Therefore, identification of security threats and ways of dealing with them is essential. But the question raised in this regard is that what are the strategies and policies to deal with security threats that must be taken to ensure the security of computer networks? In this context, the present study intends to do a review of the literature by using earlier researches and library approach, to provide security solutions in the face of threats to their computer networks. The results of this research can lead to more understanding of security threats and ways to deal with them and help to implement a secure information platform.
The document summarizes various technologies used for cloud computing security. It discusses three main methods: data splitting, data anonymization, and cryptographic techniques.
Data splitting involves separating confidential data into fragments that are stored in different locations. Data anonymization irreversibly hides data to protect sensitive information while still allowing analysis. Cryptographic techniques like encryption can be used to encrypt data before outsourcing, but limit cloud capabilities unless advanced encryption methods are used.
The document compares the advantages and disadvantages of each method for security, overhead, functionality, and key criteria. It provides an overview of approaches for maintaining data security in cloud computing.
Vector space model, term frequency-inverse document frequency with linear sea...CSITiaesprime
For Muslims, the Hadith ranks as the secondary legal authority following the Quran. This research leverages hadith data to streamline the search process within the nine imams’ compendium using the vector space model (VSM) approach. The primary objective of this research is to enhance the efficiency and effectiveness of the search process within Hadith collections by implementing pre-filtering techniques. This study aims to demonstrate the potential of linear search and Django object-relational mapping (ORM) filters in reducing search times and improving retrieval performance, thereby facilitating quicker and more accurate access to relevant Hadiths. Prior studies have indicated that VSM is efficient for large data sets because it assigns weights to every term across all documents, regardless of whether they include the search keywords. Consequently, the more documents there are, the more protracted the weighting phase becomes. To address this, the current research pre-filters documents prior to weighting, utilizing linear search and Django ORM as filters. Testing on 62,169 hadiths with 20 keywords revealed that the average VSM search duration was 51 seconds. However, with the implementation of linear and Django ORM filters, the times were reduced to 7.93 and 8.41 seconds, respectively. The recall@10 rates were 79% and 78.5%, with MAP scores of 0.819 and 0.814, accordingly.
Electro-capacitive cancer therapy using wearable electric field detector: a r...CSITiaesprime
Electro-capacitive cancer therapy (ECCT), a less invasive and more targeted approach using wearable electric field detectors, is revolutionizing cancer therapy, a complex process involving traditional methods like surgery, chemotherapy, and radiation. The review aims to investigate the safety and efficacy of electric field exposure in vital organs, particularly in cancer therapy, to improve medical advancements. It will investigate the impact on cytokines and insulation integrity, as well as contribute to improving diagnostic techniques and safety measures in medical and engineering fields. Wearable electric field detectors have revolutionized cancer therapy by offering a non-invasive and personalized approach to treatment. These devices, such as smart caps or patches, measure changes in electric fields by detecting capacitance alterations. Their lightweight, comfortable, and easy to-wear nature allows for real-time monitoring, providing valuable data for personalized treatment plans. The portability of wearable detectors allows for long-term surveillance outside clinical settings, increasing therapy efficacy. The ability to collect data over extended periods provides a comprehensive view of electric field dynamics, aiding researchers in understanding tumor growth and progression. Technology advancements in electro-capacitive therapy, including wearable devices, have revolutionized cancer treatment by adjusting electric field intensity in real-time, enhancing personalized medicine, and improving treatment outcomes and patient quality of life.
Technology adoption model for smart urban farming-a proposed conceptual modelCSITiaesprime
Technological advancements have made their way into the heart of human civilization across numerous fields, namely healthcare, logistics, and agriculture. Amidst the sprouting issues and challenges in the agriculture sector, particularly, the growing trend of integrating agriculture and technologies is roaring. The public and private sectors work hand in hand with regard to addressing these complex issues and challenges that arise, aiming for efficient and sustainable possible solutions. This study is a continuation of a previous systematic literature review; hence, the main objective is to deliver a proposed conceptual model for technology adoption specifically for smart urban farming. Innovation diffusion theory (IDT) is used as the main foundation of the proposed conceptual model, supplemented with additional factors drawn from other exisiting technology adoption models both the originals and extended versions. The outcome of the study is expected to reveal valuable insights into the components affecting the technology adoption model in smart urban farming, which will be further laid out upon in the upcoming study, offering a robust framework for future studies and applications in smart urban farming.
Optimizing development and operations from the project success perspective us...CSITiaesprime
By merging development and operation disciplines, the approach known as development and operations (DevOps) can significantly improve the efficiency and effectiveness of software development. Despite its potential benefits, successfully implementing DevOps within traditional project management frameworks presents significant challenges. This study explores the critical factors influencing the implementation of DevOps practices from the project management perspective, specifically focusing on software development projects in the Ministry of Finance. This study utilizes the analytic hierarchy process (AHP) to prioritize the critical elements of project success criteria and DevOps factors necessary for effective implementation. The findings indicate that stakeholder satisfaction, quality, and value creation are the primary criteria for project success. Moreover, knowledge and skills, collaboration and communication, and robust infrastructure are pivotal factors for facilitating DevOps within project management. The study provides actionable insights for organizations aiming to improve their project outcomes by incorporating DevOps and offers a systematic approach to decision-making using AHP. This study recognizes limitations due to its focus on specific contexts and emphasizes the need for future research in diverse organizational environments to validate and expand these findings.
Unraveling Indonesian heritage through pattern recognition using YOLOv5CSITiaesprime
This research focuses on three iconic Indonesian batik patterns-Kawung, Mega Mendung, and Parang-due to their cultural significance and recognition. Kawung symbolizes harmony, Mega Mendung represents power, and Parang signifies protection and spiritual power. Using the YOLOv5 deep learning model, the study aimed to accurately identify these patterns. Results showed mean average precision (mAP) scores of 77% for Kawung, 80% for Parang, and an impressive 99% for Mega Mendung. The highest precision results were 91% for Kawung, 88% for Parang, and 77% for Mega Mendung. These findings highlight the potential of pattern recognition in preserving cultural heritage. Understanding these designs contributes to the appreciation of Indonesia s culture. The research suggests applications in cultural studies, digital archiving, and the textile industry, ensuring the legacy of these patterns endures.
Capabilities of cellebrite universal forensics extraction device in mobile de...CSITiaesprime
The powerful digital forensics tool cellebrite universal forensics extraction device (UFED) extracts and analyzes mobile device data, helping investigators solve criminal and cybersecurity cases. Advanced methods and algorithms allow Cellebrite UFED to recover data from erased or obscured devices. Cellebrite UFED can pull data from call logs, texts, emails, and social media, providing valuable evidence for investigations. The use of smartphones and tablets in personal and professional settings has spurred the development of mobile device forensics. The intuitive user interface speeds up data extraction and analysis, revealing crucial information. It can decrypt encrypted data, recover deleted files, and extract data from multiple devices. The sector's best data extraction functionality, Cellebrite UFED, helps forensic analysts gather crucial evidence for investigations. Legal and ethical considerations are crucial in mobile device forensics. Legal considerations include allowing access to data, protecting privacy, and adhering to chain of custody protocols. Ethics include transparency, defamation, and information exploitation protection. Using Cellebrite UFED, researchers can navigate complex data on mobile devices more efficiently and precisely. Artificial intelligence (AI) and machine learning (ML) algorithms may automate data extraction in future tools. Examiners must train, maintain, and establish clear protocols for using Cellebrite UFED in forensic investigations.
Company clustering based on financial report data using k-meansCSITiaesprime
Stock investment is the act of providing funds or assets to obtain future payments for gifts given. In its application, novice investors often make mistakes, one of which is not knowing the health condition of the company they want to target. By applying the machine learning clustering method based on company financial report data, it was found that 2 clusters were formed. This can show the current condition of the company so that it can be a consideration for investors, such as clusters of companies that have a profit trend that is always stable and increasing, or clusters of companies that are in the process of developing their business and groups of companies that have large amounts of debt from year to year.
Securing DNS over HTTPS traffic: a real-time analysis toolCSITiaesprime
DNS over HTTPS (DoH) is a developing protocol that uses encryption to secure domain name system (DNS) queries within hypertext transfer protocol secure (HTTPS) connections, thereby improving privacy and security while browsing the web. This study involved the development of a live tool that captures and analyzes DoH traffic in order to classify it as either benign or malicious. We employed machine learning (ML) algorithms such as K-nearest neighbors (K-NN), random forest (RF), decision tree (DT), deep neural network (DNN), and support vector machine (SVM) to categorize the data. All of the algorithms, namely KNN, RF, and DT, achieved exceptional performance, with F1 scores of 1.0 or above for both precision and recall. The SVM and DNN both achieved exceptionally high scores, with only slight differences in accuracy. This tool employs a voting mechanism to arrive at a definitive classification decision. By integrating with the Mallory tool, it becomes possible to locally resolve DNS, which in turn allows for more accurate simulation of DoH queries. The evaluation results clearly indicate outstanding performance, confirming the tool's effectiveness in analyzing DoH traffic for network security and threat detection purposes.
Adversarial attacks in signature verification: a deep learning approachCSITiaesprime
Handwritten signature recognition in forensic science is crucial for identity and document authentication. While serving as a legal representation of a person’s agreement or consent to the contents of a document, handwritten signatures de termine the authenticity of a document, identify forgeries, pinpoint the suspects and support other pieces of evidence like ink or document analysis. This work focuses on developing and evaluating a handwritten signature verification sys tem using a convolutional neural network (CNN) and emphasising the model’s efficacy using hand-crafted adversarial attacks. Initially, handwritten signatures have been collected from sixteen volunteers, each contributing ten samples, fol lowed by image normalization and augmentation to boost synthetic data samples and overcome the data scarcity. The proposed model achieved a testing accu racy of 91.35% using an 80:20 train-test split. Additionally, using the five-fold cross-validation, the model achieved a robust validation accuracy of nearly 98%. Finally, the introduction of manually constructed adversarial assaults on the sig nature images undermines the model’s accuracy, bringing the accuracy down to nearly 80%. This highlights the need to consider adversarial resilience while designing deep learning models for classification tasks. Exposing the model to real look-alike fake samples is critical while testing its robustness and refining the model using trial and error methods.
Optimizing classification models for medical image diagnosis: a comparative a...CSITiaesprime
The surge in machine learning (ML) and artificial intelligence has revolutionized medical diagnosis, utilizing data from chest ct-scans, COVID-19, lung cancer, brain tumor, and alzheimer parkinson diseases. However, the intricate nature of medical data necessitates robust classification models. This study compares support vector machine (SVM), naïve Bayes, k-nearest neighbors (K-NN), artificial neural networks (ANN), and stochastic gradient descent on multi-class medical datasets, employing data collection, Canny image segmentation, hu moment feature extraction, and oversampling/under-sampling for data balancing. Classification algorithms are assessed via 5-fold cross-validation for accuracy, precision, recall, and F-measure. Results indicate variable model performance depending on datasets and sampling strategies. SVM, K-NN, ANN, and SGD demonstrate superior performance on specific datasets, achieving accuracies between 0.49 to 0.57. Conversely, naïve Bayes exhibits limitations, achieving precision levels of 0.46 to 0.47 on certain datasets. The efficacy of oversampling and under-sampling techniques in improving classification accuracy varies inconsistently. These findings aid medical practitioners and researchers in selecting suitable models for diagnostic applications.
Acoustic echo cancellation system based on Laguerre method and neural networkCSITiaesprime
Acoustic echo cancellation (AEC) is a fundamental requirement of signal processing to increase the quality of teleconferences. In this paper, a system that combines the Laguerre method with neural networks is proposed for AEC. In particular, the signal is processed using the Laguerre method to effectively handle nonlinear transmission line system. The results after applying the Laguerre method are then fed into a neural network for training and acoustic echo cancellation. The proposed system is tested on both linear and nonlinear transmission lines. Simulation results show that combining the Laguerre method with neural networks is highly effective for AEC in both linear and nonlinear transmission lines system. The AEC results obtained by the proposed method achieves a significant improvement in nonlinear transmission lines and it is the basis for building a practical echo cancellation system.
Smart irrigation system using node microcontroller unit ESP8266 and Ubidots c...CSITiaesprime
The agricultural irrigation system is extremely important. For optimal harvest yields, farmers must manage rice plant quality by monitoring water, soil, and temperature on agricultural fields. If market demand rises, traditional rice field irrigation in Indonesia will make things harder for farmers. This modern era requires a system that lets farmers monitor and regulate agricultural fields anywhere, anytime. We need a solution that can control the irrigation system remotely using an internet of things (IoT) device and a smartphone. This study employed the Ubidots IoT cloud platform. In addition, the study uses soil moisture and temperature sensors to monitor conditions in agricultural regions, while pumps function as irrigation systems. The test results indicate the proper design of the system. Each trial collected data. The pump will turn on and off automatically based on soil moisture criteria, with the pump active while the soil moisture is less than 20% and deactivated when the soil moisture exceeds 20%. In simulation mode, the pump operates for an average of 0–5 seconds of watering. The monitoring system shows the current soil temperature and moisture levels. Temperature sensors respond in 1-3 seconds, whereas soil moisture sensors respond in 0–4 seconds.
Development of learning videos for natural science subjects in junior high sc...CSITiaesprime
The purpose of this study was to determine the development procedure and the feasibility of learning media for whiteboard animation in Natural Sciences subjects at SMP Padindi, Tangerang Regency. This study uses a research and development (R&D) approach. The development model in this study is the analysis design development implementation evaluation (ADDIE) model. The feasibility test is carried out by means of individual testing (one to one) on 3 experts, namely material experts, learning experts, and media experts, as well as 3 students. In addition, a small group test was also carried out on 9 students. The results showed that: i) the material expert test was 87.5%, the learning expert was 85%, the media expert was 84.44%, 3 students were 88.84%, and the small group was 90%; and ii) this whiteboard animation learning media is suitable for use based on the results of media trials by experts and students.
Clustering of uninhabitable houses using the optimized apriori algorithmCSITiaesprime
Clustering is one of the roles in data mining which is very popularly used for data problems in solving everyday problems. Various algorithms and methods can support clustering such as Apriori. The Apriori algorithm is an algorithm that applies unsupervised learning in completing association and clustering tasks so that the Apriori algorithm is able to complete clustering analysis in Uninhabitable Houses and gain new knowledge about associations. Where the results show that the combination of 2 itemsets with a tendency value for Gas Stove fuel of 3 kg and the installed power meter for the attribute item criteria results in a minimum support value of 77% and a minimum confidence value of 87%. This proves that a priori is capable of clustering Uninhabitable Houses to help government work programs.
Improving support vector machine and backpropagation performance for diabetes...CSITiaesprime
Diabetes mellitus is a glucose disorder disease in the human body that contributes significantly to the high mortality rate. Various studies on early detection and classification have been conducted as a diabetes mellitus prevention effort by applying a machine learning model. The problems that may occur are weak model performance and misclassification caused by imbalanced data. The existence of dominating (majority) data causes poor model performance in identifying minority data. This paper proposed handling the problem of imbalanced data by performing the synthetic minority oversampling technique (SMOTE) and observing its effect on the classification performance of the support vector machine (SVM) and Backpropagation artificial neural network (ANN) methods. The experiment showed that the SVM method and imbalanced data achieved 94.31% accuracy, and the Backpropagation ANN achieved 91.56% accuracy. At the same time, the SVM method and balanced data produced an accuracy of 98.85%, while the Backpropagation ANN method and balanced data produced an accuracy of 94.90%. The results show that oversampling techniques can improve the performance of the classification model for each data class.
Video shot boundary detection based on frames objects comparison and scale-in...CSITiaesprime
The most popular source of data on the Internet is video which has a lot of information. Automating the administration, indexing, and retrieval of movies is the goal of video structure analysis, which uses content-based video indexing and retrieval. Video analysis requires the ability to recognize shot changes since video shot boundary recognition is a preliminary stage in the indexing, browsing, and retrieval of video material. A method for shot boundary detection (SBD) is suggested in this situation. This work proposes a shot boundary detection system with three stages. In the first stage, multiple images are read in temporal sequence and transformed into grayscale images. Based on correlation value comparison, the number of redundant frames in the same shots is decreased, from this point on, the amount of time and computational complexity is reduced. Then, in the second stage, a candidate transition is identified by comparing the objects of successive frames and analyzing the differences between the objects using the standard deviation metric. In the last stage, the cut transition is decided upon by matching key points using a scale-invariant feature transform (SIFT). The proposed system achieved an accuracy of 0.97 according to the F-score while minimizing time consumption.
Machine learning-based anomaly detection for smart home networks under advers...CSITiaesprime
As smart home networks become more widespread and complex, they are capable of providing users with a wide range of applications and services. At the same time, the networks are also vulnerable to attack from malicious adversaries who can take advantage of the weaknesses in the network's devices and protocols. Detection of anomalies is an effective way to identify and mitigate these attacks; however, it requires a high degree of accuracy and reliability. This paper proposes an anomaly detection method based on machine learning (ML) that can provide a robust and reliable solution for the detection of anomalies in smart home networks under adversarial attack. The proposed method uses network traffic data of the UNSW-NB15 and IoT-23 datasets to extract relevant features and trains a supervised classifier to differentiate between normal and abnormal behaviors. To assess the performance and reliability of the proposed method, four types of adversarial attack methods: evasion, poisoning, exploration, and exploitation are implemented. The results of extensive experiments demonstrate that the proposed method is highly accurate and reliable in detecting anomalies, as well as being resilient to a variety of types of attacks with average accuracy of 97.5% and recall of 96%.
Transfer learning: classifying balanced and imbalanced fungus images using in...CSITiaesprime
Identifying the genus of fungi is known to facilitate the discovery of new medicinal compounds. Currently, the isolation and identification process is predominantly conducted in the laboratory using molecular samples. However, mastering this process requires specific skills, making it a challenging task. Apart from that, the rapid and highly accurate identification of fungus microbes remains a persistent challenge. Here, we employ a deep learning technique to classify fungus images for both balanced and imbalanced datasets. This research used transfer learning to classify fungus from the genera Aspergillus, Cladosporium, and Fusarium using InceptionV3 model. Two experiments were run using the balanced dataset and the imbalanced dataset, respectively. Thorough experiments were conducted and model effectiveness was evaluated with standard metrics such as accuracy, precision, recall, and F1 score. Using the trendline of deviation knew the optimum result of the epoch in each experimental model. The evaluation results show that both experiments have good accuracy, precision, recall, and F1 score. A range of epochs in the accuracy and loss trendline curve can be found through the experiment with the balanced, even though the imbalanced dataset experiment could not. However, the validation results are still quite accurate even close to the balanced dataset accuracy.
Implementation of automation configuration of enterprise networks as software...CSITiaesprime
Software defined network (SDN) is a new computer network configuration concept in which the data plane and control plane are separated. In Cisco system, the SDN concept is implemented in Cisco Application Centric Infrastructure (Cisco ACI), which by default can be configured through the main controller, namely the Application Policy Infrastructure Controller (APIC). Conventional configuration on Cisco ACI creates problems, i.e.: the large number of required configurations causes the increase of time required for configuration and the risk of misconfiguration due to repetitive works. This problem reduces the productivity of network engineers in managing Cisco system. In overcoming these problems, this research work proposes an automation tool for Cisco ACI configuration using Ansible and Python as an SDN implementation for optimizing enterprise network configuration. The SDN is implemented and experimented at PT. NTT Indonesia Technology network, as a case study. The experimental result shows the proposed SDN successfully performs multiple routers configurations accurately and automatically. Observations on manual configuration takes 50 minutes and automatic configuration takes 6 minutes, thus, the proposed SDN achieves 833.33% improvement.
Hybrid model for detection of brain tumor using convolution neural networksCSITiaesprime
The development of aberrant brain cells, some of which may turn cancerous, is known as a brain tumor. Magnetic resonance imaging (MRI) scans are the most common technique for finding brain tumors. Information about the aberrant tissue growth in the brain is discernible from the MRI scans. In numerous research papers, machine learning, and deep learning algorithms are used to detect brain tumors. It takes extremely little time to forecast a brain tumor when these algorithms are applied to MRI pictures, and better accuracy makes it easier to treat patients. The radiologist can make speedy decisions because of this forecast. The proposed work creates a hybrid convolution neural networks (CNN) model using CNN for feature extraction and logistic regression (LR). The pre-trained model visual geometry group 16 (VGG16) is used for the extraction of features. To reduce the complexity and parameters to train we eliminated the last eight layers of VGG16. From this transformed model the features are extracted in the form of a vector array. These features fed into different machine learning classifiers like support vector machine (SVM), naïve bayes (NB), LR, extreme gradient boosting (XGBoost), AdaBoost, and random forest for training and testing. The performance of different classifiers is compared. The CNN-LR hybrid combination outperformed the remaining classifiers. The evaluation measures such as recall, precision, F1-score, and accuracy of the proposed CNN-LR model are 94%, 94%, 94%, and 91% respectively.
ISTQB Foundation Level – Chapter 4: Test Design Techniqueszubair khan
This presentation covers Chapter 4: Test Design Techniques from the ISTQB Foundation Level syllabus. It breaks down core concepts in a simple, visual, and easy-to-understand format — perfect for beginners and those preparing for the ISTQB exam.
✅ Topics covered:
Static and dynamic test techniques
Black-box testing (Equivalence Partitioning, Boundary Value Analysis, Decision Tables, State Transition Testing, etc.)
White-box testing (Statement and Decision coverage)
Experience-based techniques (Exploratory Testing, Error Guessing, Checklists)
Choosing appropriate test design techniques based on context
🎓 Whether you're studying for the ISTQB certification or looking to strengthen your software testing fundamentals, these slides will guide you through the essential test design techniques with clarity and real-world relevance.
The proposed regulatory framework for Artificial Intelligence and the EU General Data Protection Regulation oblige automated reasoners to justify their conclusions in human-understandable terms. In addition, ethical and legal concerns must be provably addressed to ensure that the advice given by AI systems is aligned with human values. Value-aware systems tackle this challenge by explicitly representing and reasoning with norms and values applicable to a problem domain. For instance, in the context of a public administration such systems may provide support to decision-makers in the design and interpretation of administrative procedures and, ultimately, may enable the automation of (parts of) these administrative processes. However, this requires the capability to analyze as to how far a particular legal model is aligned with a certain value system. In this work, we take a step forward in this direction by analysing and formally representing two (political) strategies for school place allocation in educational institutions supported by public funds. The corresponding (legal) norms that specify this administrative process differently weigh human values such as equality, fairness, and non-segregation. We propose the use of s(LAW), a legal reasoner based on Answer Set Programming that has proven capable of adequately modelling administrative processes in the presence of vague concepts and/or discretion, to model both strategies. We illustrate how s(LAW) simultaneously models different scenarios, and how automated reasoning with these scenarios can answer questions related to the value-alignment of the resulting models.
CLI, HTTP, GenAI and MCP telemetry/observability in JavaPavel Vlasov
This presentation demonstrates Nasdanika telemetry/observability capabilities for CLI, HTTP, GenAI and MCP in Java.
With these capabilities you can build observable custom Java-based CLI tools, including MCP & HTTP servers, deployed to workstations, build pipelines, servers, Docker images, etc. and track usage of individual commands and their use of other resources - HTTP, AI Chat and Embeddings, MCP servers. You can also track MCP and HTTP server requests.
The CLI approach allows to leverage CPUs/GPUs of local workstations and local LLMs.
While local LLMs may not be very fast, they can be used in a batch mode, e.g. overnight. For example, generating code, analyzing merge requests, or tailoring resumes for job postings (using a CrewAI example - https://nasdanika-knowledge.github.io/crew-ai-visual-synopsis/tailor-job-applications/index.html).
Also, CLI-based tools can be used to deliver fine-grained functionality specific to a particular group of people. For example, a custom bundled RAG/Chat on top of a document base for, say, mortgage agents.
With the onset of digital transformation journeys for enterprises across the world, APIs have become a
natural strategy for enterprises to provide access to their products and services. APIs enable easy
communication and integration of various systems that help accomplish enterprise business goals. What was
once a sizeable undertaking of building custom code that involved understanding the internals of other
systems, building, and configuring the adapters, has now become an API-based integration that is both easy
and familiar for the developer community to integrate with. It is safe to say that if API is not part of the
strategy for the product or a service, the real business value of the product may never be realized.
A Product Information Management (PIM) system helps businesses deliver consistent, accurate, and up-to-date product data across all sales channels—websites, marketplaces, apps, and more—ensuring better customer experience and higher conversion rates.
Autopilot for Everyone Series - Session 3: Exploring Real-World Use CasesUiPathCommunity
Welcome to 'Autopilot for Everyone Series' - Session 3: Exploring Real-World Use Cases!
Join us for an interactive session where we explore real-world use cases of UiPath Autopilot, the AI-powered automation assistant.
📕 In this engaging event, we will:
- demonstrate how UiPath Autopilot enhances productivity by combining generative AI, machine learning, and automation to streamline business processes
- discover how UiPath Autopilot enables intelligent task automation with natural language inputs and AI-powered decision-making for smarter workflows
Whether you're new to automation or a seasoned professional, don't miss out on this opportunity to transform your approach to business automation.
Register now and step into the future of efficient work processes!
Jeremy Millul - A Junior Software DeveloperJeremy Millul
Jeremy Millul is a junior software developer specializing in scalable applications. With expertise in databases like MySQL and MongoDB, Jeremy ensures efficient performance and seamless user experiences. A graduate of NYU, and living in Rochester, NY, with a degree in Computer Science, he also excels in frameworks such as React and Node.js. Jeremy’s commitment to delivering robust, high-quality solutions is matched by his dedication to staying ahead in the ever-evolving tech landscape.
"Collab Space is an innovative collaboration platform designed to streamline teamwork, foster creativity, and enhance productivity. Whether you're working with colleagues, clients, or partners, Collab Space provides the tools you need to communicate effectively, manage projects effortlessly, and collaborate in real time—from anywhere in the world."
Navigating common mistakes and critical success factors
Is your team considering or starting a database migration? Learn from the frontline experience gained guiding hundreds of high-stakes migration projects – from startups to Google and Twitter. Join us as Miles Ward and Tim Koopmans have a candid chat about what tends to go wrong and how to steer things right.
We will explore:
- What really pushes teams to the database migration tipping point
- How to scope and manage the complexity of a migration
- Proven migration strategies and antipatterns
- Where complications commonly arise and ways to prevent them
Expect plenty of war stories, along with pragmatic ways to make your own migration as “blissfully boring” as possible.
"Smarter, Faster, Autonomous: A Deep Dive into Agentic AI & Digital Agents"panktiskywinds12
Discover how Agentic AI and AI Agents are revolutionizing business automation. This presentation introduces the core concepts behind machines that can plan, learn, and act autonomously—without constant human input.
Learn what makes an AI Agent more than just a bot, and explore their real-world applications in customer support, supply chains, finance, and marketing. We’ll also cover the challenges businesses must navigate and how to get started with frameworks.
UiPath Automation Developer Associate 2025 Series - Career Office HoursDianaGray10
This event is being scheduled to check on your progress with your self-paced study curriculum. We will be here to answer any questions you have about the training and next steps for your career
Low-velocity penetration impact behavior of Triply Periodic Minimal Surface s...Javier García Molleja
Authors: Lucía Doyle, Javier García-Molleja, Carlos González
Published in: Advanced Engineering Materials, 2025, 24002999
Because of copyright transfer to Wiley-VCH only the first page is provided. Available at:
https://doi.org/10.1002/adem.202402999
Beginners: Radio Frequency, Band and Spectrum (V3)3G4G
Welcome to this tutorial where we break down the complex topic of radio spectrum in a clear and accessible way.
In this video, we explore:
✅ What is spectrum, frequency, and bandwidth?
✅ How does wavelength affect antenna design?
✅ The difference between FDD and TDD
✅ 5G spectrum ranges – FR1 and FR2
✅ The role of mmWave, and why it's misunderstood
✅ What makes 5G Non-Standalone (NSA) different from 5G Standalone (SA)
✅ Concepts like Carrier Aggregation, Dual Connectivity, and Dynamic Spectrum Sharing (DSS)
✅ Why spectrum refarming is critical for modern mobile networks
✅ Evolution of antennas from legacy networks to Massive MIMO
Whether you're just getting started with wireless technology or brushing up on the latest in 5G and beyond, this video is designed to help you learn and stay up to date.
👍 Like the video if you find it helpful
🔔 Subscribe for more tutorials on 5G, 6G, and mobile technology
💬 Drop your questions or comments below—we’d love to hear from you!
All our #3G4G5G slides, videos, blogs and tutorials are available at:
Tutorials: https://www.3g4g.co.uk/Training/
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
Our channels:
3G4G Website – https://www.3g4g.co.uk/
The 3G4G Blog – https://blog.3g4g.co.uk/
Telecoms Infrastructure Blog – https://www.telecomsinfrastructure.com/
Operator Watch Blog – https://www.operatorwatch.com/
Connectivity Technology Blog – https://www.connectivity.technology/
Free 5G Training – https://www.free5gtraining.com/
Free 6G Training – https://www.free6gtraining.com/
Private Networks Technology Blog - https://blog.privatenetworks.technology/
Introducing Agnetic AI: Redefining Intelligent Customer Engagement for the Future of Business
In a world where data is abundant but actionable insights are scarce, Agnetic AI emerges as a transformative force in AI-powered customer engagement and predictive intelligence solutions. Our cutting-edge platform harnesses the power of machine learning, natural language processing, and real-time analytics to help businesses drive deeper connections, streamline operations, and unlock unprecedented growth.
Whether you're a forward-thinking startup or an enterprise scaling globally, Agnetic AI is designed to automate customer journeys, personalize interactions at scale, and deliver insights that move the needle. Built for performance, agility, and results, this AI solution isn’t just another tool—it’s your competitive advantage in the age of intelligent automation.
A Guide to Smart Building Open Standards 101Memoori
Are you confused by the Open Standards Landscape in Smart Building Technology? Our presentation slides serve as a non-technical guide to the types of protocols, and data frameworks used in commercial buildings and why they matter! Improve your understanding of open standards & their impact on smart buildings!
A Guide to Smart Building Open Standards 101Memoori
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means
1. Computer Science and Information Technologies
Vol. 5, No. 2, July 2024, pp. 176~185
ISSN: 2722-3221, DOI: 10.11591/csit.v5i2.pp176-185 176
Journal homepage: http://iaesprime.com/index.php/csit
Clustering man in the middle attack on chain and graph-based
blockchain in internet of things network using k-means
Sari Nuzulastri1
, Deris Stiawan1
, Hadipurnawan Satria2
, Rahmat Budiarto3
1
Department of Computer Engineering, University of Sriwijaya, Palembang, Indonesia
2
Department of Informatics Engineering, University of Sriwijaya, Palembang, Indonesia
3
Department of Computer Science, College of Computing and Information, Al-Baha University, Al Bahah, Saudi Arabia
Article Info ABSTRACT
Article history:
Received Dec 6, 2023
Revised May 27, 2024
Accepted Jun 4, 2024
Network security on internet of things (IoT) devices in the IoT development
process may open rooms for hackers and other problems if not properly
protected, particularly in the addition of internet connectivity to computing
device systems that are interrelated in transferring data automatically over
the network. This study implements network detection on IoT network
security resembles security systems from man in the middle (MITM) attacks
on blockchains. Security systems that exist on blockchains are decentralized
and have peer to peer characteristics which are categorized into several parts
based on the type of architecture that suits their use cases such as blockchain
chain based and graph based. This study uses the principal component
analysis (PCA) to extract features from the transaction data processing on
the blockchain process and produces 9 features before the k-means algorithm
with the elbow technique was used for classifying the types of MITM attacks
on IoT networks and comparing the types of blockchain chain-based and
graph-based architectures in the form of visualizations as well. Experimental
results show 97.16% of normal data and 2.84% of MITM attack data were
observed.
Keywords:
Blockchain
Internet of things
K-means
Man in the middle
Network security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Deris Stiawan
Department of Computer Engineering, University of Sriwijaya
Indralaya, Ogan Ilir-30662, Palembang, Indonesia
Email: deris@unsri.ac.id
1. INTRODUCTION
The development of internet of things (IoT) as a smart device in several technologies [1]–[4] that
changes the world with the development of internet networks [5]–[8] are seen in collecting data, and controlling
tools to do certain things through the internet network. Self organization and communication using the cloud as
a data storage medium are vulnerable to attacks because many devices are connected to the internet [9], [10].
Network security in IoT devices is used to protect data during the data transmission process to keep them safe
because devices connected to IoT devices can open gaps for hackers and other problems [11]. Mallik et al. [12]
and Nayak and Samaddar [13] explain about the type of man in the middle (MITM) attack that aims to retrieve
information in a network protocol or secure sockets layer and transport layer security (SSL/TLS) MITM attack
and the domain name system (DNS) spoofing attack that provides different data (data falsification) [14].
Choi, et al. [15] explain the blockchain-based MITM security system that detects MITM attacks by filtering,
detecting, and comparing networks implemented on a network security system on the blockchain in the IoT.
Singh et al. [16], Li and Kassem [17] describe the distributed ledger technology (DLT) which is part
of the blockchain that provides a decentralized data management system in storing and sharing data on every
network transaction. Ferraro et al. [18] explain the directed acyclic graphs (DAGs) in the blockchain
2. Comput Sci Inf Technol ISSN: 2722-3221
Clustering man in the middle attack on chain and graph-based blockchain in … (Sari Nuzulastri)
177
architecture for the DLT can make transactions easier and more linear because the network is peer to peer
[19]–[21]. It provides a detailed analysis of security attack patterns applied to IoT devices. The security
system that exists on a decentralized blockchain that stores and shares data is a decentralized data
management system [22] and peer to peer characteristics can hinder the improvement of blockchain
technology in several aspects of life.
Blockchain technology is categorized into several parts based on the type of architecture that suits
its use case. In the context of blockchain chain based and graph based, there are two types of data structures
used by blockchain to store transaction data and build evidence of consensus [23]. The chain-based
blockchain has a data structure in each block forming a chain and it will continue to grow. In contrast, graph-
based uses a random graph-shaped data structure and each transaction can be directly connected to several
other transactions in the network whose use depends on the purpose of the blockchain being used [24].
The use of the k-means algorithm in the IoT network for grouping data according to their
characteristics has been implemented such as in [25], [26] and show the accuracy in the clustering process of
99.94% with confusion matrix accuracy in the true negative section of 98.62%, true positive of 100%, false
negative of 0.00% and false positive of 1.38%. Related research on DLT in IoT networks that had been
carried out previously discussed the benefits of the data transmission transaction process [27], [28]. These
studies explain the stochastic mechanism in the transaction process that existed in the blockchain architecture
for DLT to make transactions faster and more stable using the Markov chain Monte Carlo (MCMC)
algorithm, which was proven by a numerical balance of 25% on each transaction sent through the protocol.
In general, in security system processes of the IoT networks, it is very important to have an
immutable transaction record to analyze a parasitic chain attack, which aims to see the resilience and security
by using the MCMC algorithm in reducing parasitic chain attacks [28]. As for some research, it was found
that the improvement process that focuses on the number of transactions called Tangle [29], [30] have proven
that by using the tip selection algorithm (TSA) method, the level of confidence and sustainability were
getting better along with the increase in the number of transactions. On the other hand, research in 2021
[31]–[33] explains that attacks on IoT networks have increased by up to 20% for the security level of the
identification process in IoT networks integrated with blockchain technology. The use of the elliptic curve
cryptography (ECC)-based algorithm was needed because of the privacy of the security protocol [10]. The
development of IoT aims to connect data through the internet network in the issue of identity security (data
privacy) [34] from various attacks such as MITM attacks that steal passwords, and personal identification
numbers [35]. It generally estimates the theoretical complexity of attacks that allow for multiple
combinations of increased MITM attacks [15], [36].
Therefore, it is necessary to analyze the improvement in the detection of attacks in producing a lower
rate of misclassification of attacks so that the process of sending data in transmission is safe and integrated using
the k-means method. This research discusses the comparison of the performance of blockchain chain-based and
graph-based transactions on data of MITM attack on IoT networks where the traffic features are extracted using
principal component analysis (PCA) and clustered using the k-means method. The results then were displayed
in the form of visualizations. The discussion in this research was as follows: section 2 discusses the proposed
method in determining the data to be clustered. Section 3 provides the results of clustering data of the MITM
attacks and section 4 provides conclusions and hopes for future research.
2. METHOD
In general, the steps in the research methodology used to assist in the preparation of this research
required a clear framework in its stages. The research framework is shown in Figure 1, which consists of a
literature review by reviewing research in recent years, followed by data preparation using a dataset of
550,000 data samples. Next is data preprocessing by performing feature extraction followed by testing,
analyzing the results and drawing conclusions.
Figure 1. Research methodology
3. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 5, No. 2, July 2024: 176-185
178
2.1. Feature extraction
Feature extraction is an important part of this process. In this study, datasets were taken from a journal
data [29], which were then preprocessed using the PCA method to reduce the dimensions of the data without
significantly reducing the characteristics of the data. The flow of data preprocessing was depicted in Figure 2.
This preprocessing stage can be divided into two, i.e.: feature extraction process and feature selection process
using PCA method that can reduce the dimensionality of data without significantly reducing the
characteristics of the data [37], [38]. In this process the data was made using simpler features so that it could
be analyzed and interpreted properly in order to produce accurate and reliable data using several techniques
including data cleaning, data transformation and data reduction. The processed data was saved in csv format.
Figure 3 shows an example of a dataset that had been saved in csv format.
Figure 2. Dataset preprocessing flow
Figure 3. Research dataset in CSV format
2.2. Clustering with k-means
Stages of clustering with the k-means method is a grouping with a specified number of clusters
using different cluster shapes [39], [40]. The MITM types are grouped in the form of sample data that has a
lot in common with each other. The flow chart of the working system can be seen in Figure 4.
Figure 4. K-Means clustering flowchart
4. Comput Sci Inf Technol ISSN: 2722-3221
Clustering man in the middle attack on chain and graph-based blockchain in … (Sari Nuzulastri)
179
Determining the number of clusters at each center point (centroid) by presenting the cluster, the
centroid value can be found using the formula in (1).
𝑐 = ∑
𝑥𝑖
𝑛
𝑛
𝑖=1 (1)
Where, c is centroid value, 𝑥𝑖 is point value/the i-th object, n is number of objects. The formula
in (1) can be rewritten as (2).
µ𝑘 =
1
𝑁𝑘
∑ 𝑥𝑞
𝑁𝑘
𝑞=1 (2)
where, 𝜇𝑘 is centroid of the k-th cluster, 𝑥𝑞 is the q-th object from the k-th cluster, and 𝑁𝑘 is number
of data (samples) from the k-th cluster.
2.3. Confusion matrix calculation
The proposed method’s performances are measured, in terms of accuracy, sensitivity, precision, and
F1 score using a confusion matrix. Confusion matrix has four values, i.e.: True positive (TP), false positive
(FP), true negative (TN), and false negative (FN). Accuracy describes how accurate the model is in
classifying correctly. it can be calculated by dividing the number of correct predictions by the total number of
predictions made, the accuracy calculation uses (3).
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
𝑇𝑃+𝑇𝑁
𝑇𝑃+𝐹𝑃+𝑇𝑁+𝐹𝑁
(3)
The correctly predicted precision can be calculated by dividing the number of positive prediction
results by the number of positive predictions using (4).
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
𝑇𝑃
𝑇𝑃+𝐹𝑃
(4)
Sensitivity measures how good the model is at identifying positive classes by dividing the number
of positive predictions by the total number of positive cases as in (5).
𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 =
𝑇𝑃
𝑇𝑃+𝐹𝑁
(5)
F1 score provides a balanced average value between sensitivity and precision and expressed as (6).
𝐹1 𝑠𝑐𝑜𝑟𝑒 =
2∗(𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛∗𝑠𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦)
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑠𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦
(6)
3. RESULTS AND DISCUSSION
This section presents the results of the experiments of the MITM attack on the blockchain of the IoT
network. Results of the feature data extraction process used in the clustering process is discussed first,
followed by the clustering result itself. Since the clustering is done with k-means, it is silhouette score is also
analyzed to determine the quality of the clusters. After that, the evaluation result is discussed.
3.1. Feature extraction
The PCA was used to extract and compress the dataset. This stage was carried out to select features
that were used for clustering. Initially the raw data consists of 16 blockchain features. Some of the features
were dropped because they are deemed unsuitable to be used with k-means. Also, some of the blockchain
features must be first transformed into numerical forms. This leaves the number of features down to seven.
Then all the data are normalized before being fed to the PCA which reduces the number of features to three.
With the dimension reduced to three, the dataset can be easily visualized with 3D graphs. Figure 5 shows the
features that were used before and after the PCA process. PCA generates new features that are a linear
combination of actual features, as such the resulting features have no associated meaning with the actual
blockchain.
5. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 5, No. 2, July 2024: 176-185
180
Figure 5. Blockchain features used for clustering
3.2. Clustering results with k-means
To measure the quality of the similarities within clusters and the differences between clusters as the
result of clustering using k-means method its silhouette score is calculated. This score uses a measurement
range of [-1,1] which means the higher the score of the silhouette, the more optimal number of clusters. The
result of the quality test measurement with silhouette score with six clusters was 0.417. This score indicates
that the K- Means was able to create distinct enough clusters while perhaps not the best possible.
Figure 6 shows the silhouettes of each cluster with the vertical line marking the average silhouette
score. The cluster heights in the figure denote the variation of the nodes within each cluster. Most clusters
have consistent height, except cluster 4. The maximum scores of each cluster are in fact close to 0.7, which is
considered strong. But some clusters have negative scores, notably cluster 1, 2 4 and 5. These negative scores
indicate outliers but their existences are still minimal. Nevertheless, they are responsible for reducing the
average down to 0.4 even though all clusters have maximum scores above 0.6.
Figure 6. Silhouette score of the clustering
The clustering with k-means method produced a total of six clusters, shown in Figure 7 where nodes
belonging to cluster 0, cluster 1, cluster 2, cluster 3, cluster 4 and cluster 5 are marked with color blue,
yellow, green, brown and red respectively. As can be seen in the figure, most clusters have notably clear
boundaries and contain nodes that are all close together with only a few outlier nodes. Cluster 4 (purple)
though, has more spread-out nodes. Compared to other clusters, cluster 4 also has the least amount of nodes.
This is consistent with the previously discussed silhouette plot where it was the only cluster with low height
or score variations.
To help understanding the clustering result, Figure 8 shows the parallel coordinates plot of each
cluster against all of the features. Using this plot, the relation of each feature of data nodes and the cluster
they belong to can be analyzed. Note that the values in y axis are normalized, hence only their relative values
are meaningful for the analysis. Also note that all six subfigures are scaled differently, their maximum values
in the y axis are different and must be considered when comparing one cluster to the others.
In the Figure 8, cluster 0 (blue) and cluster 2 (green) appear to be very similar, only differing at
sender, where cluster 0 has values around 0 and cluster has values around 1. Furthermore, values of feature
gas_price on both clusters gather in two groups, one group near zero and another group near six. These two
clusters are the only one exhibiting this trait. Compared to other clusters, the other distinct traits are the very
low values of timestamp, height and gas_consumed.
6. Comput Sci Inf Technol ISSN: 2722-3221
Clustering man in the middle attack on chain and graph-based blockchain in … (Sari Nuzulastri)
181
Figure 7. Clustering result
Figure 8. Mapping clusters to each feature
7. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 5, No. 2, July 2024: 176-185
182
Cluster 1 (green) in particular is more compressed than other clusters, as signified by it is figure’s y
axis max value of 0.5, while other clusters max values are as high as 12. Generally speaking, all features of
this cluster are near zero. Feature nonce, gas_limit, gas_price and gas_consumed are the most compressed,
with all nodes having values nearing 0. feature sender has the most spread-out values, ranging from -1.5 to
0.5 while timestamp and height are somewhere in between.
Cluster 3 (brown) and cluster 5 (red) are actually quite similar even though their general shapes
appear different. Just like most clusters the nodes in these clusters have nonce, gas_limit, gas_price and
gas_consumed values near zero. The rest of the features though are notably different. The sender values of
cluster 3 are more compressed than those of cluster 5. On the contrary, the values of timestamp and height of
cluster 5 are more compressed and on the higher side in comparison to cluster 3.
Cluster 4 is the most distinctive among the six clusters. It is sender, timestamp and height values are
quite similar to other clusters, in that all the values are near zero. But it has multiple groups of values for
gas_price, gas_consumed and gas_limit. Also, its nonce values are the most spread out, ranging from zero to
around 11. Another notable distinction is the multiple appearance of solitary values of the gas_limit feature
which may indicate outlier nodes within the cluster. Determination of the cluster class based on the similarity
of features in the clustering process on the blockchain includes several aspects such as transaction time which
is a significant feature because it can identify at a certain time, transaction size where data grouping is based
on the size of the data to be transferred, transaction security in identifying groups based on security
characteristics (transaction security attributes such as digital signatures).
3.3. Validation result
The following are the results of simulation experiments from scenarios focused on MITM attacks, as
for attacks carried out by changing the value in packet data. Based on the number of validation results in the
training and testing phases of the dataset with 550,000 data samples. The data visualization in Figure 9 shows
that the normal data (represented by blue) is 97.16% and MITM attacks are 2.84% (represented by orange),
which means that normal data amounted to 534,380 data and as much as 15,620 data were MITM attacks.
Confusion matrix usually uses training data to train the proposed model and measure the
performance of the clustering algorithm on the testing data. The following parameters were used to measure
the performance, namely TP, FP, TN and FN. Then, the results of the Confusion Matrix calculation can
measure how accurate the results of the Man in the Middle attack detection. Figure 10 displays the confusion
matrix observations.
For validation purposes, training data of 80% and the testing data of 20% are used, and obtained an
accuracy value of 99.78%. Table 1 shows the confusion matrix using 80% off the testing data. The use
confusion matrix in the use of K-Mean’s method is to show the level of accuracy of the prediction results that
have been done in seeing the accuracy value of the data labeling that has been done.
Figure 9. Visualization data transaction
8. Comput Sci Inf Technol ISSN: 2722-3221
Clustering man in the middle attack on chain and graph-based blockchain in … (Sari Nuzulastri)
183
Figure 10. Confusion matrix display
Table 1. Confusion matrix using 80% testing data
Measurement Value
True Positive (TP) 8,562
True Negative (TN) 234
False Positive (FP) 1
False Negative (FN) 18
Based on the results obtained using the k-means method which shows the advantages in identifying
patterns and finding data for those tested. This is in accordance with the advantages of k-means, namely
simplicity and efficiency. In addition, k-means is easily applied to large data and has better data computation
time efficiency than other methods, while the disadvantage is that it must determine the initial number of
clusters (k value). In this study, the determination of the initial cluster value (k) uses the silhouette score
technique in clustering.
4. CONCLUSION
The PCA method used in feature extraction from incoming transaction data on the IoT network,
reduces the number of features from 16 to 3 features to build a classification model in the clustering process.
The clustering process with the k-means method implemented on the IoT network was carried out by
performing an extraction process on the MITM attack data types. The results of the clustering analysis using
the k-means method with 6 clusters in the transaction process with a silhouette score were 0.417. The
detected Normal data was 97.16%, while the MITM attacks data was 2.84%. In the future, it is hoped that
newly available datasets on the blockchain can be applied to get different features and characteristics using
the implementation of the GMM clustering method and spherical k-means clustering to see better results and
visualization. Other clustering methods can also be explored, especially methods that are derived from
k-means but with more suitable characteristics to be used with the blockchain dataset.
REFERENCES
[1]. S. Kumar, P. Tiwari, and M. Zymbler, “Internet of things is a revolutionary approach for future technology enhancement: a
review,” Journal of Big Data, vol. 6, no. 1, Dec. 2019, doi: 10.1186/s40537-019-0268-2.
[2]. “Number of internet of things (IoT) connected devices worldwide from 2019 to 2030, by vertical,” Statista. [Online]. Available:
https://www.statista.com/statistics/1194682/iot-connected-devices-vertically/
[3]. “Internet of things (IoT) annual revenue from 2020 to 2030, by region,” Statista. [Online]. Available:
https://www.statista.com/statistics/1194715/iot-annual-revenue-regionally/
[4]. S. Sinha, “State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally,” IoT Analitics. [Online].
Available: https://iot-analytics.com/number-connected-iot-devices/
[5]. I. Mistry, S. Tanwar, S. Tyagi, and N. Kumar, “Blockchain for 5G-enabled IoT for industrial automation: A systematic review,
solutions, and challenges,” Mechanical Systems and Signal Processing, vol. 135, Jan. 2020, doi: 10.1016/j.ymssp.2019.106382.
[6]. A. Vaghani, K. Sood, and S. Yu, “Security and QoS issues in blockchain enabled next-generation smart logistic networks: A
tutorial,” Blockchain: Research and Applications, vol. 3, no. 3, Sep. 2022, doi: 10.1016/j.bcra.2022.100082.
[7]. T. Rathod et al., “Blockchain for future wireless networks: a decade survey,” Sensors, vol. 22, no. 11, May 2022, doi:
10.3390/s22114182.
9. ISSN: 2722-3221
Comput Sci Inf Technol, Vol. 5, No. 2, July 2024: 176-185
184
[8]. E. Borgia, “The internet of things vision: key features, applications and open issues,” Computer Communications, vol. 54, pp. 1–
31, Dec. 2014, doi: 10.1016/j.comcom.2014.09.008.
[9]. J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based iot: challenges, countermeasures, and
future directions,” IEEE Communications Magazine, vol. 55, no. 1, pp. 26–33, 2017.
[10]. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,”
Computer Networks, vol. 76, pp. 146–164, Jan. 2015, doi: 10.1016/j.comnet.2014.11.008.
[11]. O. Eigner, P. Kreimel, and P. Tavolato, “Detection of man-in-the-middle attacks on industrial control networks,” in 2016
International Conference on Software Security and Assurance (ICSSA), IEEE, Aug. 2016, pp. 64–69. doi:
10.1109/ICSSA.2016.19.
[12]. A. Mallik, A. Ahsan, M. M. Z. Shahadat, and J.-C. Tsou, “Man-in-the-middle-attack: Understanding in simple words,”
International Journal of Data and Network Science, pp. 77–92, 2019, doi: 10.5267/j.ijdns.2019.1.001.
[13]. G. Nath Nayak and S. Ghosh Samaddar, “Different flavours of man-in-the-middle attack, consequences and feasible solutions,” in
2010 3rd International Conference on Computer Science and Information Technology, IEEE, Jul. 2010, pp. 491–495. doi:
10.1109/ICCSIT.2010.5563900.
[14]. B. Bhushan, G. Sahoo, and A. K. Rai, “Man-in-the-middle attack in wireless and computer networking-A review,” in 2017 3rd
International Conference on Advances in Computing, Communication and Automation (ICACCA) (Fall), IEEE, Sep. 2017, pp. 1–
6. doi: 10.1109/ICACCAF.2017.8344724.
[15]. J. Choi, B. Ahn, G. Bere, S. Ahmad, H. A. Mantooth, and T. Kim, “Blockchain-based man-in-the-middle (MITM) attack
detection for photovoltaic systems,” in 2021 IEEE Design Methodologies Conference (DMC), IEEE, Jul. 2021, pp. 1–6. doi:
10.1109/DMC51747.2021.9529949.
[16]. S. Singh, A. S. M. S. Hosen, and B. Yoon, “blockchain security attacks, challenges, and solutions for the future distributed IoT
network,” IEEE Access, vol. 9, pp. 13938–13959, 2021, doi: 10.1109/ACCESS.2021.3051602.
[17]. J. Li and M. Kassem, “Applications of distributed ledger technology (DLT) and Blockchain-enabled smart contracts in
construction,” Automation in Construction, vol. 132, Dec. 2021, doi: 10.1016/j.autcon.2021.103955.
[18]. P. Ferraro, C. King, and R. Shorten, “On the stability of unverified transactions in a DAG-based distributed ledger,” IEEE
Transactions on Automatic Control, vol. 65, no. 9, pp. 3772–3783, Sep. 2020, doi: 10.1109/TAC.2019.2950873.
[19]. J. Sedlmeir, H. U. Buhl, G. Fridgen, and R. Keller, “The energy consumption of blockchain technology: beyond Myth,” Business
and Information Systems Engineering, vol. 62, no. 6, pp. 599–608, Dec. 2020, doi: 10.1007/s12599-020-00656-x.
[20]. S. Kably, M. Arioua, and N. Alaoui, “Lightweight direct acyclic graph blockchain for enhancing resource-constrained IoT
environment,” Computers, Materials and Continua, vol. 71, no. 3, pp. 5271–5291, 2022, doi: 10.32604/cmc.2022.020833.
[21]. R. Paulavičius, S. Grigaitis, A. Igumenov, and E. Filatovas, “A decade of blockchain: review of the current status, challenges, and
future directions,” Informatica, vol. 30, no. 4, pp. 729–748, Jan. 2019, doi: 10.15388/Informatica.2019.227.
[22]. A. Abdelmaboud et al., “Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research
directions,” Electronics, vol. 11, no. 4, Feb. 2022, doi: 10.3390/electronics11040630.
[23]. Q. Zhu, J. Pei, X. Liu, and Z. Zhou, “Analyzing commercial aircraft fuel consumption during descent: A case study using an
improved K-means clustering algorithm,” Journal of Cleaner Production, vol. 223, pp. 869–882, Jun. 2019, doi:
10.1016/j.jclepro.2019.02.235.
[24]. H. Y. Wu, X. Yang, C. Yue, H.-Y. Paik, and S. S. Kanhere, “Chain or DAG? Underlying data structures, architectures, topologies
and consensus in distributed ledger technology: A review, taxonomy and research issues,” Journal of Systems Architecture, vol.
131, Oct. 2022, doi: 10.1016/j.sysarc.2022.102720.
[25]. D. Stiawan et al., “Ping flood attack pattern recognition using a k-means algorithm in an internet of things (IoT) network,” IEEE
Access, vol. 9, pp. 116475–116484, 2021, doi: 10.1109/ACCESS.2021.3105517.
[26]. M. J. Brusco, E. Shireman, and D. Steinley, “A comparison of latent class, K-means, and K-median methods for clustering
dichotomous data.,” Psychological Methods, vol. 22, no. 3, pp. 563–580, Sep. 2017, doi: 10.1037/met0000095.
[27]. S. Popov, O. Saa, and P. Finardi, “Equilibria in the tangle,” Computers and Industrial Engineering, vol. 136, pp. 160–172, Oct.
2019, doi: 10.1016/j.cie.2019.07.025.
[28]. A. Cullen, P. Ferraro, C. King, and R. Shorten, “On the resilience of DAG-based distributed ledgers in IoT applications,” IEEE
Internet of Things Journal, vol. 7, no. 8, pp. 7112–7122, Aug. 2020, doi: 10.1109/JIOT.2020.2983401.
[29]. F. Guo, X. Xiao, A. Hecker, and S. Dustdar, “Characterizing IOTA tangle with empirical data,” in GLOBECOM 2020 - 2020
IEEE Global Communications Conference, IEEE, Dec. 2020, pp. 1–6. doi: 10.1109/GLOBECOM42002.2020.9322220.
[30]. P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, A. Jolfaei, and A. K. M. Najmul Islam, “A blockchain-orchestrated deep learning
approach for secure data transmission in IoT-enabled healthcare system,” Journal of Parallel and Distributed Computing, vol.
172, pp. 69–83, Feb. 2023, doi: 10.1016/j.jpdc.2022.10.002.
[31]. B. K. Mohanta, D. Jena, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Addressing security and privacy issues of
iot using blockchain technology,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 881–888, Jan. 2021, doi:
10.1109/JIOT.2020.3008906.
[32]. H. H. A. Emira, “Authenticating IoT devices issues based on blockchain,” Journal of Cybersecurity and Information
Management, pp. 35–40, 2020, doi: 10.54216/JCIM.010202.
[33]. Q. Fan, J. Chen, L. J. Deborah, and M. Luo, “A secure and efficient authentication and data sharing scheme for Internet of Things
based on blockchain,” Journal of Systems Architecture, vol. 117, Aug. 2021, doi: 10.1016/j.sysarc.2021.102112.
[34]. C. Fan, S. Ghaemi, H. Khazaei, and P. Musilek, “Performance evaluation of blockchain systems: a systematic survey,” IEEE
Access, vol. 8, pp. 126927–126950, 2020, doi: 10.1109/ACCESS.2020.3006078.
[35]. N. Sivasankari and S. Kamalakkannan, “Detection and prevention of man-in-the-middle attack in iot network using regression
modeling,” Advances in Engineering Software, vol. 169, Jul. 2022, doi: 10.1016/j.advengsoft.2022.103126.
[36]. A. Canteaut, M. Naya-Plasencia, and B. Vayssière, “Sieve-in-the-middle: improved MITM attacks,” in Annual Cryptology
Conference, 2013, pp. 222–240. doi: 10.1007/978-3-642-40041-4_13.
[37]. L. Smith, “A tutorial on PCSA,” Department of Computer Science, University of Otago., pp. 12–28, 2006.
[38]. H. Choi, H. Lee, and H. Kim, “Fast detection and visualization of network attacks on parallel coordinates,” Computers and
Security, vol. 28, no. 5, pp. 276–288, Jul. 2009, doi: 10.1016/j.cose.2008.12.003.
[39]. M. Ahmed, R. Seraj, and S. M. S. Islam, “The k-means algorithm: a comprehensive survey and performance evaluation,”
Electronics, vol. 9, no. 8, Aug. 2020, doi: 10.3390/electronics9081295.
[40]. H. Qabbaah, G. Sammour, and K. Vanhoof, “Using k-means clustering and data visualization for monetizing logistics data,” in
2019 2nd
International Conference on New Trends in Computing Sciences, ICTCS 2019-Proceedings, 2019. doi:
10.1109/ICTCS.2019.8923108.
10. Comput Sci Inf Technol ISSN: 2722-3221
Clustering man in the middle attack on chain and graph-based blockchain in … (Sari Nuzulastri)
185
BIOGRAPHIES OF AUTHORS
Sari Nuzulastri currently a Master student in Universitas Sriwijaya. She received
her undergraduate degree in the same university, majoring in informatics. Her areas of interest
include internet of things, machine learning, and cyber security. She can be contacted at email:
sari.anhar88@gmail.com.
Deris Stiawan received his Ph.D. degree in Computer Engineering from
Universiti Teknologi Malaysia, Malaysia. He is currently a Professor at Department of
Computer Engineering, Faculty of Computer Science, Universitas Sriwijaya. His research
interests include computer networks, intrusion detection/prevention system, and heterogeneous
networks. He can be contacted at email: deris@unsri.ac.id.
Hadipurnawan Satria received his Ph.D. degree in Computer Science from Sun
Moon University, South Korea. He is currently a Lecturer at the Department of Informatics
Engineering, Faculty of Computer Science, Universitas Sriwijaya. His research interests
include platform-based development, embedded systems, and software engineering. He can be
contacted at email: hadi@ilkom.unsri.ac.id.
Rahmat Budiarto received his Doctor of Engineering in Computer Science from
Nagoya Institute of Technology, Japan in 1998. Currently, he is a full professor at Department
of Computer Science, College of Computing and Information, Albaha University, Saudi
Arabia. His research interests include intelligent systems, brain modeling, IPv6, network
security, wireless sensor networks, and MANETs. He can be contacted at email:
rahmat@bu.edu.sa.