scholarly journals Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network

Author(s):  
Gamini Joshi ◽  
Vidushi Sharma

Abstract The exposure of IoT nodes to the internet makes them vulnerable to malicious attacks and failures. These failures affect the survivability, integrity, and connectivity of the network. Thus the detection and elimination of attacks in a timely manner become an important factor to maintain the network connectivity. Trust-based techniques are used in understanding the behavior of nodes in the network. Several researchers have proposed conventional trust models that are power-hungry and demand large storage space. Succeeding this Hidden Markov Models have also been developed to calculate trust but the survivability of network achieved from them is low. To improve the survivability selfish and malicious nodes present in the network are required to be treated separately. Hence, an improved Hidden Markov Trust (HMT) Model is developed in this paper which accurately detects the selfish and malicious nodes that illegally intercept the network. An algorithm is generalized for learning the behavior of nodes using the HMT model with the expected output. The evaluated node’s likelihood functions differentiate the selfish node from the malicious node and provide independent timely treatment to both types of nodes. Further, comparative analysis for attacks such as black-hole, grey-hole, and sink-hole has been done and performance parameters have been extended to survivability-rate, power-consumption, delay, and false-alarm-rate, for different networks sizes and vulnerability. Simulation result provides a 10% higher PDR, 29% lower overhead, and 15% higher detection rate when compared to FUCEM, FTCSPM, and OADM trust models presented in the literature.

recognition of human movement is one of the huge growing generation. It has a massive feature for example supervision (movements evaluation), safety (walker detection), manage (character-computer interfaces); content material- based video retrieval, and plenty of others. Human interest reputation device of is a device of identifying a selection of Human sports activities beside a few saved sample Human interest. In this paper Human activity reputation machine for popularity of man or woman is provided. It gets facts of individual photo and look for comparable interior the store pics. Human interest can be visible as fit or now not fit if there can be in shape or not matched in stop result. consumer cannot create a few form of regulate inside the stored photo documents, i.e. a purchaser isn't always accredited to insert or dispose of photographs from the garage records. The manager of the scheme has verification to make changes in the storage facts. The supervisor of the scheme has verification to make adjustments inside the storage statistics. Biometrics device of automatic Human hobby recognition system acting recognition is supplied. Extraction of capabilities is finished through the usage of the use of Gabor filter out to this tool. function extraction of the picture is convolving with Gabor clear out and extra person pattern era set of guidelines is used to determine a hard and rapid of realistic and non redundant functions of Gabor. Hidden Markov models for matching the input Human interest photograph to the stored pics is used.


2015 ◽  
Vol 135 (12) ◽  
pp. 1517-1523 ◽  
Author(s):  
Yicheng Jin ◽  
Takuto Sakuma ◽  
Shohei Kato ◽  
Tsutomu Kunitachi

Author(s):  
M. Vidyasagar

This book explores important aspects of Markov and hidden Markov processes and the applications of these ideas to various problems in computational biology. It starts from first principles, so that no previous knowledge of probability is necessary. However, the work is rigorous and mathematical, making it useful to engineers and mathematicians, even those not interested in biological applications. A range of exercises is provided, including drills to familiarize the reader with concepts and more advanced problems that require deep thinking about the theory. Biological applications are taken from post-genomic biology, especially genomics and proteomics. The topics examined include standard material such as the Perron–Frobenius theorem, transient and recurrent states, hitting probabilities and hitting times, maximum likelihood estimation, the Viterbi algorithm, and the Baum–Welch algorithm. The book contains discussions of extremely useful topics not usually seen at the basic level, such as ergodicity of Markov processes, Markov Chain Monte Carlo (MCMC), information theory, and large deviation theory for both i.i.d and Markov processes. It also presents state-of-the-art realization theory for hidden Markov models. Among biological applications, it offers an in-depth look at the BLAST (Basic Local Alignment Search Technique) algorithm, including a comprehensive explanation of the underlying theory. Other applications such as profile hidden Markov models are also explored.


2004 ◽  
Vol 15 (3) ◽  
pp. 246-246
Author(s):  
M.A. Tony ◽  
A. Butschke ◽  
J. Zagon ◽  
H. Broll ◽  
M. Schauzu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document