咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Machine Learning Empowered Sec... 收藏

Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

作     者:Sohaib Latif M.Saad Bin Ilyas Azhar Imran Hamad Ali Abosaq Abdulaziz Alzubaidi Vincent Karovic Jr. 

作者机构:Department of Computer ScienceThe University of ChenabGujrat50700Pakistan Department of Creative TechnologiesAir UniversityIslamabad42000Pakistan Computer Science DepartmentCollege of Computer Science and Information SystemsNajran UniversityNajran66244Saudi Arabia Department of Computer ScienceUmm Alqura UniversityAlQunfudah28821Saudi Arabia Department of Information SystemsFaculty of ManagementComenius University in BratislavaBratislava82005Slovakia 

出 版 物:《Intelligent Automation & Soft Computing》 (智能自动化与软计算(英文))

年 卷 期:2024年第39卷第2期

页      面:353-379页

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 081104[工学-模式识别与智能系统] 0839[工学-网络空间安全] 08[工学] 0835[工学-软件工程] 081201[工学-计算机系统结构] 0811[工学-控制科学与工程] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Machine learning internet of things blockchain data privacy security Industry 4.0 

摘      要:The Internet of Things(IoT)is growing rapidly and impacting almost every aspect of our lives,fromwearables and healthcare to security,traffic management,and fleet management *** has generated massive volumes of data and security,and data privacy risks are increasing with the advancement of technology and network *** access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF ***,conventional privacy preservation methods have high latency costs and overhead for resource-constrained *** machine learning approaches were also unable to detect denial-of-service(DoS)*** study introduced a novel decentralized and secure framework for blockchain *** avoid single-point OF failure,an accredited access control scheme is incorporated,combining blockchain with local peers to record each transaction and verify the signature to ***-based attribute-based cryptography is implemented to protect data storage privacy by generating threshold parameters,managing keys,and revoking users on the *** innovative contract-based DOS attack mitigation method is also incorporated to effectively validate devices with intelligent contracts as trusted or untrusted,preventing the server from becoming *** proposed framework effectively controls access,safeguards data privacy,and reduces the risk of *** results depict that the suggested framework outperforms the results in terms of accuracy,precision,sensitivity,recall,and F-measure at 96.9%,98.43%,98.8%,98.43%,and 98.4%,respectively.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分