Security System for IoT Applications Based on Hybrid Fuzzy Possibility C-Means Clustering

With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT...

Full description

Saved in:
Bibliographic Details
Published in:2024 International Conference on Integrated Circuits, Communication, and Computing Systems (ICIC3S) Vol. 1; pp. 1 - 5
Main Authors: Parmar, Monika, Kaur, Navneet, Tripathy, Ramamani, Singh, Hakam, Gupta, Lipika
Format: Conference Proceeding
Language:English
Published: IEEE 08.06.2024
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:With improved applications in a variety of industries, the Internet of Things (IoT) and distributed ledger innovation are captivating services and industrial advancements. The IoT and blockchain industries are expected to grow by a factor of three by 2025. As computational power increases, many IoT applications confront substantial challenges with regard to data security and scalability. Additionally, Proof-of-work suffers from a number of problems that make it impractical for IoT applications, therefore Practical Byzantine Fault Tolerance (PBFT) is a widely utilized type of decentralized agreement. Nevertheless, the network node's trust in PBFT is not assured, and the approach to achieving consensus consumes a substantial quantity of network resources. This research proposes a new consensus mechanism known as a Hybrid consensus blockchain algorithm. This includes the features that provide safety into the clustering algorithm for identifying and classifying attackers. To promote cluster diversity in wireless ad hoc networks, a technique called Hybrid fuzzy Possibility C Means Clustering (HFPCM) is developed. For detecting and organizing the intruders in order to create the organization more attack resilient, a Byzantine agreement based cooperative methodology is used.
DOI:10.1109/ICIC3S61846.2024.10602889