Open Access Open Access  Restricted Access Subscription Access

A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm


Affiliations
1 Department of Computer Science Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, India
2 Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, India
 

In this paper, we come up with an effective approach for the management of security using machine learning, and we derive a solution for problems with privacy and security in Internet of Things devices. Recent apps' connections to numerous IoT devices, use of edge computing, and use of fog computing cause numerous DDoS attacks to be launched against the servers of the dynamic network. For computing on the edge of the Internet of Things, the upgraded Trust Negotiation Protocol is used, making use of better period data. The application of security management is used to maintain the automation, minimize the risk level, and reduce the complexity of the system. The fundamental objective of this system is to enable user-level security in all edge computing devices related to the Internet of Things. Using Machine Learning techniques, a proposed model is utilized to develop a secure environment for E2E IoT security at the user level. A low-cost solution is obtained using machine-learning-based security management techniques. The Enhanced Trust Negotiation Protocol is simulated, and the experiment results demonstrate that the suggested model is superior to the current one in terms of the efficiency with which security management approaches may be implemented.

Keywords

Secured IoT, IoT Network, Security Algorithm, Trust Protocol, Edge Computing, MLA (Machine Learning Algorithm).
User
Notifications
Font Size


  • A Novel Trust Negotiation Protocol for Analysing and Approving IoT Edge Computing Devices Using Machine Learning Algorithm

Abstract Views: 350  |  PDF Views: 1

Authors

V. Maruthi Prasad
Department of Computer Science Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, India
B. Bharathi
Department of Computer Science and Engineering, Sathyabama Institute of Science and Technology, Jeppiaar Nagar, Chennai, Tamil Nadu,, India

Abstract


In this paper, we come up with an effective approach for the management of security using machine learning, and we derive a solution for problems with privacy and security in Internet of Things devices. Recent apps' connections to numerous IoT devices, use of edge computing, and use of fog computing cause numerous DDoS attacks to be launched against the servers of the dynamic network. For computing on the edge of the Internet of Things, the upgraded Trust Negotiation Protocol is used, making use of better period data. The application of security management is used to maintain the automation, minimize the risk level, and reduce the complexity of the system. The fundamental objective of this system is to enable user-level security in all edge computing devices related to the Internet of Things. Using Machine Learning techniques, a proposed model is utilized to develop a secure environment for E2E IoT security at the user level. A low-cost solution is obtained using machine-learning-based security management techniques. The Enhanced Trust Negotiation Protocol is simulated, and the experiment results demonstrate that the suggested model is superior to the current one in terms of the efficiency with which security management approaches may be implemented.

Keywords


Secured IoT, IoT Network, Security Algorithm, Trust Protocol, Edge Computing, MLA (Machine Learning Algorithm).

References





DOI: https://doi.org/10.22247/ijcna%2F2022%2F217704