Skip to main content


Detection of Fraudulent data in IOT devices using Machine Learning framework

Issue Abstract

Abstract
The Internet of Things (IoT) refers to a network of physical objects, or "things," that are based in software and other technologies in order to communicate and exchange data with other devices and systems over the internet. These gadgets range from common domestic items to high-tech industrial instruments. Currently more than 7 millions users are connected today. Experts predict that by 2023, there will be more than 10 billion connected IoT devices, and by 2026, there will be 23 billion. IoT devices generate a vast volume of data in a variety of modalities, with differing data quality characterised by their speed in terms of time and location reliance. In such a scenario, machine learning algorithms can play a critical role in providing biotechnology-based security and permission, as well as anomaly detection to improve the usability and security of internet-of-things (IoT) platforms The detection of IoT devices using the Machine Learning framework is offered to achieve this goal. Five machine learning models are evaluated using various metrics with a vast collection of input feature sets in this ML framework. Each model calculates a spam score based on the input attributes that have been adjusted. This score represents the IoT device's dependability under various conditions. The proposed technique is validated using certain common appliances. The acquired findings support the suggested scheme's effectiveness in comparison to other current schemes.
Keywords—IoT, detection, Security, machine learning


Author Information
Ms. P. Ramya Sri
Issue No
7
Volume No
4
Issue Publish Date
04 Jul 2022
Issue Pages
1-9

Issue References

References 
1. N. G. Rupp, "Further Investigation into the Causes of Flight Delays," in Department of Economics, East Carolina University, 2007.
2. "Bureau of Transportation Statistics (BTS) Databases and Statistics," [Online]. Available: http://www.transtats.bts.gov.
3. "Airports Council International, World Airport .
4. E. Cinar, F. Aybek, A. Caycar, C. Cetek, "Capacity and delay analysis for airport manoeuvring areas using simulation," Aircraft Engineering and Aerospace Technology, vol. 86, no. No. 1,pp. 43-55, 2013.
5. Navoneel, et al., Chakrabarty, "Flight Arrival Delay Prediction Using Gradient Boosting Classifier," in Emerging Technologies in Data Mining and Information Security, Singapore, 2019.
6. Y. J. Kim, S. Briceno, D. Mavris, Sun Choi, "Prediction of weatherinduced airline delays based on machine learning algorithms," in 35th Digital Avionics Systems Conference (DASC), 2016.
7. W.-d. Cao. a. X.-y. Lin, "Flight turnaround time analysis and delay prediction based on Bayesian Network," Computer Engineering and Design, vol. 5, pp. 1770-1772, 2011.
8. J. J. Robollo, Hamsa, Balakrishnan, "Characterization and Predictionof Air Traffic Delays".
9. S. Sharma, H. Sangoi, R. Raut, V. C. Kotak, S. Oza, "Flight Delay Prediction System Using Weighted Multiple Linear Regression,"International Journal of Engineering and Computer Science, vol. 4, no. 4, pp. 11668 - 11677, April 2015.
10. A. M. Kalliguddi, Area K., Leboulluec, "Predictive Modelling of Aircraft Flight Delay," Universal Journal of Management, pp. 485 - 491, 2017.
11. Noriko, Etani, "Development of a predictive model for on-time arrival fight of airliner by discovering correlation between fight and weather data," 2019.
12. [Online].Available:https://towards datascienc.com/metrics-toevaluate your-machine-learning-algorithm-f10ba6e38 234.
13. Viswanathan A, Arunachalam VP, Karthik S. Geographical division traceback for distributed denial of service. Journal of Computer Science. 2012;8(2):216..
14. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
15. Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015
16. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
17. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
18. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
19. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
20. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
21. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
22. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).
23. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z