Security System for IoT Applications Based on Hybrid Fuzzy Possibility C-Means Clustering
With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT...
Uložené v:
| Vydané v: | 2024 International Conference on Integrated Circuits, Communication, and Computing Systems (ICIC3S) Ročník 1; s. 1 - 5 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
08.06.2024
|
| Predmet: | |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT applications confront substantial challenges with regard to data security and scalability. Additionally, Proof-of-work suffers from a number of problems that make it impractical for IoT applications, therefore Practical Byzantine Fault Tolerance (PBFT) is a widely utilized type of decentralized agreement. Nevertheless, the network node's trust in PBFT is not assured, and the approach to achieving consensus consumes a substantial quantity of network resources. This research proposes a new consensus mechanism known as a Hybrid consensus blockchain algorithm. This includes the features that provide safety into the clustering algorithm for identifying and classifying attackers. To promote cluster diversity in wireless ad hoc networks, a technique called Hybrid fuzzy Possibility C Means Clustering (HFPCM) is developed. For detecting and organizing the intruders in order to create the organization more attack resilient, a Byzantine agreement based cooperative methodology is used. |
|---|---|
| AbstractList | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT applications confront substantial challenges with regard to data security and scalability. Additionally, Proof-of-work suffers from a number of problems that make it impractical for IoT applications, therefore Practical Byzantine Fault Tolerance (PBFT) is a widely utilized type of decentralized agreement. Nevertheless, the network node's trust in PBFT is not assured, and the approach to achieving consensus consumes a substantial quantity of network resources. This research proposes a new consensus mechanism known as a Hybrid consensus blockchain algorithm. This includes the features that provide safety into the clustering algorithm for identifying and classifying attackers. To promote cluster diversity in wireless ad hoc networks, a technique called Hybrid fuzzy Possibility C Means Clustering (HFPCM) is developed. For detecting and organizing the intruders in order to create the organization more attack resilient, a Byzantine agreement based cooperative methodology is used. |
| Author | Singh, Hakam Kaur, Navneet Parmar, Monika Tripathy, Ramamani Gupta, Lipika |
| Author_xml | – sequence: 1 givenname: Monika surname: Parmar fullname: Parmar, Monika email: monika.parmar@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 2 givenname: Navneet surname: Kaur fullname: Kaur, Navneet email: navneet.kaur_cse@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 3 givenname: Ramamani surname: Tripathy fullname: Tripathy, Ramamani email: ramamani.tripathy@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 4 givenname: Hakam surname: Singh fullname: Singh, Hakam email: hakam.singh@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 5 givenname: Lipika surname: Gupta fullname: Gupta, Lipika email: lipikagupta21@gmail.com organization: Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India |
| BookMark | eNo1j71OwzAAhI0EA5S-AYN5gAT_xbHHYlEaqQikZGGqbMdGltIkspMhfXqCgOmW7z7d3YHrfugdAI8Y5Rgj-VSpStGaY8F4ThBhOUYcESHkFdjKUgpaIMoZEuIWfNbOzjFMC6yXNLkz9EOE1dDA3Th2weopDH2Czzq5Fg49PCwmhhbu58tlgR9DSsGE7qetsjenV1J186qJof-6Bzded8lt_3IDmv1Low7Z8f21UrtjFiSeMuJta21JLRfE-GJdRaRGEmFCSi6lYcIXjtGWlEazQhNMvdQUW1wK5og1dAMefrXBOXcaYzjruJz-D9NvM3hQ4Q |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICIC3S61846.2024.10602889 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350364088 |
| EndPage | 5 |
| ExternalDocumentID | 10602889 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i91t-2fcdcc73c682bf564029a0901227699b48f5e43d27ba45a213f9a31c1784e2cb3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 07 05:31:02 EDT 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i91t-2fcdcc73c682bf564029a0901227699b48f5e43d27ba45a213f9a31c1784e2cb3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10602889 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-June-8 |
| PublicationDateYYYYMMDD | 2024-06-08 |
| PublicationDate_xml | – month: 06 year: 2024 text: 2024-June-8 day: 08 |
| PublicationDecade | 2020 |
| PublicationTitle | 2024 International Conference on Integrated Circuits, Communication, and Computing Systems (ICIC3S) |
| PublicationTitleAbbrev | ICIC3S |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8724756 |
| Snippet | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Blockchain Technology Byzantine fault tolerance Clustering algorithm Clustering algorithms Fault tolerance Fault tolerant systems Industries IoT Proof of Work Routing Scalability |
| Title | Security System for IoT Applications Based on Hybrid Fuzzy Possibility C-Means Clustering |
| URI | https://ieeexplore.ieee.org/document/10602889 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA62iHhSseKbCF5TN9nsJjnqYmlBS6FF6qlsXlCQXWm7wvbXm6RbHwcP3kIIDEwI30zm-2YAuHUokmhDGJJSSZegYItyZiOkuZYi1YzZwCZ8eWLDIZ9OxagRqwctjDEmkM9M1y9DLV-XqvJfZe6Fpw4OuWiBFmPpRqy1B26avpl3g2yQxWM_wcRzDwjtbs__mpwSgKN38E-Th6DzLcGDoy9wOQI7pjgGr-Nm2hzcNBqHLuKEg3IC73-UoeGDAyYNywL2ay_Hgr1qva7hqFw2TNgaZujZOIiC2Vvl-yQ4Ax0w6T1Osj5qZiOgucArRKzSSrFYpZxIm6QuCxR5JHydjKVCSMptYmisCZM5TXKCYyvyGCvMODVEyfgEtIuyMKcAuhAs0dLFURGzNJGC-1J0brghEcUqxWeg490ye990v5htPXL-x_4F2PfOD3Qqfgnaq0VlrsCu-ljNl4vrcGefk-eZFg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60inpSseLbCF5Xd7PZTXLUxdLFthRapJ7K5gUF2ZW2K7S_3mS79XHw4C0EwsCE8M1kvm8G4NaiSKQ0pp4QUtgEJTBeRo3vKaYEjxWlpmITvnRor8dGI96vxeqVFkZrXZHP9J1bVrV8VcjSfZXZFx5bOGR8E7YiQrC_kmvtwE3dOfM-TdIkHLgZJo59gMnd-sSv2SkVdLT2_2n0AJrfIjzU_4KXQ9jQ-RG8Dup5c2jVahzZmBOlxRA9_ChEo0cLTQoVOWovnCALtcrlcoH6xazmwi5Q4nW1BSmUvJWuU4I10IRh62mYtL16OoI34cHcw0YqKWkoY4aFiWKbB_LM565SRmPOBWEm0iRUmIqMRBkOQsOzMJABZURjKcJjaORFrk8A2SAsUsJGUj41JBKcuWJ0ppnGPglkHJxC07ll_L7qfzFee-Tsj_1r2G0Pu51xJ-09n8Oeu4iKXMUuoDGflvoStuXHfDKbXlX39wm6w5xd |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+International+Conference+on+Integrated+Circuits%2C+Communication%2C+and+Computing+Systems+%28ICIC3S%29&rft.atitle=Security+System+for+IoT+Applications+Based+on+Hybrid+Fuzzy+Possibility+C-Means+Clustering&rft.au=Parmar%2C+Monika&rft.au=Kaur%2C+Navneet&rft.au=Tripathy%2C+Ramamani&rft.au=Singh%2C+Hakam&rft.date=2024-06-08&rft.pub=IEEE&rft.volume=1&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICIC3S61846.2024.10602889&rft.externalDocID=10602889 |