Security System for IoT Applications Based on Hybrid Fuzzy Possibility C-Means Clustering
With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT...
Uloženo v:
| Vydáno v: | 2024 International Conference on Integrated Circuits, Communication, and Computing Systems (ICIC3S) Ročník 1; s. 1 - 5 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
08.06.2024
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT applications confront substantial challenges with regard to data security and scalability. Additionally, Proof-of-work suffers from a number of problems that make it impractical for IoT applications, therefore Practical Byzantine Fault Tolerance (PBFT) is a widely utilized type of decentralized agreement. Nevertheless, the network node's trust in PBFT is not assured, and the approach to achieving consensus consumes a substantial quantity of network resources. This research proposes a new consensus mechanism known as a Hybrid consensus blockchain algorithm. This includes the features that provide safety into the clustering algorithm for identifying and classifying attackers. To promote cluster diversity in wireless ad hoc networks, a technique called Hybrid fuzzy Possibility C Means Clustering (HFPCM) is developed. For detecting and organizing the intruders in order to create the organization more attack resilient, a Byzantine agreement based cooperative methodology is used. |
|---|---|
| AbstractList | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT applications confront substantial challenges with regard to data security and scalability. Additionally, Proof-of-work suffers from a number of problems that make it impractical for IoT applications, therefore Practical Byzantine Fault Tolerance (PBFT) is a widely utilized type of decentralized agreement. Nevertheless, the network node's trust in PBFT is not assured, and the approach to achieving consensus consumes a substantial quantity of network resources. This research proposes a new consensus mechanism known as a Hybrid consensus blockchain algorithm. This includes the features that provide safety into the clustering algorithm for identifying and classifying attackers. To promote cluster diversity in wireless ad hoc networks, a technique called Hybrid fuzzy Possibility C Means Clustering (HFPCM) is developed. For detecting and organizing the intruders in order to create the organization more attack resilient, a Byzantine agreement based cooperative methodology is used. |
| Author | Singh, Hakam Kaur, Navneet Parmar, Monika Tripathy, Ramamani Gupta, Lipika |
| Author_xml | – sequence: 1 givenname: Monika surname: Parmar fullname: Parmar, Monika email: monika.parmar@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 2 givenname: Navneet surname: Kaur fullname: Kaur, Navneet email: navneet.kaur_cse@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 3 givenname: Ramamani surname: Tripathy fullname: Tripathy, Ramamani email: ramamani.tripathy@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 4 givenname: Hakam surname: Singh fullname: Singh, Hakam email: hakam.singh@chitkarauniversity.edu.in organization: Chitkara University School of Engineering and Technology Chitkara University,Himachal Pradesh,India – sequence: 5 givenname: Lipika surname: Gupta fullname: Gupta, Lipika email: lipikagupta21@gmail.com organization: Chitkara University Institute of Engineering and Technology, Chitkara University,Punjab,India |
| BookMark | eNo1j71OwzAAhI0EA5S-AYN5gAT_xbHHYlEaqQikZGGqbMdGltIkspMhfXqCgOmW7z7d3YHrfugdAI8Y5Rgj-VSpStGaY8F4ThBhOUYcESHkFdjKUgpaIMoZEuIWfNbOzjFMC6yXNLkz9EOE1dDA3Th2weopDH2Czzq5Fg49PCwmhhbu58tlgR9DSsGE7qetsjenV1J186qJof-6Bzded8lt_3IDmv1Low7Z8f21UrtjFiSeMuJta21JLRfE-GJdRaRGEmFCSi6lYcIXjtGWlEazQhNMvdQUW1wK5og1dAMefrXBOXcaYzjruJz-D9NvM3hQ4Q |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICIC3S61846.2024.10602889 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350364088 |
| EndPage | 5 |
| ExternalDocumentID | 10602889 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i91t-2fcdcc73c682bf564029a0901227699b48f5e43d27ba45a213f9a31c1784e2cb3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 07 05:31:02 EDT 2024 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i91t-2fcdcc73c682bf564029a0901227699b48f5e43d27ba45a213f9a31c1784e2cb3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_10602889 |
| PublicationCentury | 2000 |
| PublicationDate | 2024-June-8 |
| PublicationDateYYYYMMDD | 2024-06-08 |
| PublicationDate_xml | – month: 06 year: 2024 text: 2024-June-8 day: 08 |
| PublicationDecade | 2020 |
| PublicationTitle | 2024 International Conference on Integrated Circuits, Communication, and Computing Systems (ICIC3S) |
| PublicationTitleAbbrev | ICIC3S |
| PublicationYear | 2024 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8724756 |
| Snippet | With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Blockchain Technology Byzantine fault tolerance Clustering algorithm Clustering algorithms Fault tolerance Fault tolerant systems Industries IoT Proof of Work Routing Scalability |
| Title | Security System for IoT Applications Based on Hybrid Fuzzy Possibility C-Means Clustering |
| URI | https://ieeexplore.ieee.org/document/10602889 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LSgMxFA22iLhSseKbCG5TZ_KYJEsdLO3CUmgXdVXyGijIjLQdof16k3TqY-HCXQgJgRvCueSecw8A91QkmZHSICUKgSjDGkkrKbLGZ_NYJSyxJppN8OFQTKdy1IjVoxbGORfJZ64bhrGWbytTh68y_8IzD4dCtkCL82wr1joAd03fzIdBPsjJODiYBO4Bpt3d-l_OKRE4ekf_PPIYdL4leHD0BS4nYM-Vp-B13LjNwW2jcegzTjioJvDxRxkaPnlgsrAqYX8d5FiwV282aziqlg0Tdg1z9OI8RMH8rQ59EvwBHTDpPU_yPmq8EdBcpiuEC2ON4cRkAuuCZT6uUiUy1Ml4JqWmomCOEou5VpQpnJJCKpKalAvqsNHkDLTLqnTnAGIuOeNW88RgyqzTWmHK_T7siBQ4vQCdEJbZ-7b7xWwXkcs_5q_AYQh-pFOJa9BeLWp3A_bNx2q-XNzGO_sEqPGZHA |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB60inpSseLbCF5Td7PZTXLUxdLFthTaQz2VzWOhILvSdoX215tstz4OHryFwDAwQ_iGzHzzAdxT7kVKCIVTnnFMQyKx0IJirWw1T1Iv9LSqxCZYv8_HYzGoyeoVF8YYUw2fmZY7Vr18XajSfZXZFx5ZOORiG3acdFZN19qDu3pz5kMSJ3EwdBombvqA0NbG4pd2SgUd7cN_Oj2C5jcJDw2-4OUYtkx-Aq_DWm8OrVeNI1tzoqQYoccfjWj0ZKFJoyJHnaUjZKF2uVot0aCY17OwSxTjnrEgheK30m1KsA6aMGo_j-IOrtUR8FT4C0wypZVigYo4kVkY2ciK1BOuU8YiISTlWWhooAmTKQ1T4geZSANf-YxTQ5QMTqGRF7k5A0SYYCHTknmK0FAbKVNCmbUjJhCc-OfQdGGZvK_3X0w2Ebn44_4W9jujXnfSTfovl3DgElENV_EraCxmpbmGXfWxmM5nN1X-PgHSiJxl |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2024+International+Conference+on+Integrated+Circuits%2C+Communication%2C+and+Computing+Systems+%28ICIC3S%29&rft.atitle=Security+System+for+IoT+Applications+Based+on+Hybrid+Fuzzy+Possibility+C-Means+Clustering&rft.au=Parmar%2C+Monika&rft.au=Kaur%2C+Navneet&rft.au=Tripathy%2C+Ramamani&rft.au=Singh%2C+Hakam&rft.date=2024-06-08&rft.pub=IEEE&rft.volume=1&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICIC3S61846.2024.10602889&rft.externalDocID=10602889 |