scholarly journals Research of various Data Mining Techniques for IoT Applications

2019 ◽  
Vol 8 (2S11) ◽  
pp. 1083-1086

In recent years everything is connected and passing through the internet, but Internet of Things (IOT), which will change all aspects of our lives and future. While the things are connected to the internet, they will generate the huge amount of information which has to be processed. The information that gathered from various IoT devices has to be recognized and organized according to the environments of their type. To recognize and organize the data gathered from different things, the important task to be played is making things passing through different Data Mining Techniques (DMT). In this article, we mainly focus on analysis of various Data Mining Techniques over the data that has been generated by the IOT Devices which are connected over the internet using DBSCAN Technique. And also performed review over different Data Mining Techniques for Data Analysis

2018 ◽  
Vol 38 (1) ◽  
pp. 121-129 ◽  
Author(s):  
Pablo Antonio Pico Valencia ◽  
Juan A. Holgado-Terriza ◽  
Deiver Herrera-Sánchez ◽  
José Luis Sampietro

Recently, the scientific community has demonstrated a special interest in the process related to the integration of the agent-oriented technology with Internet of Things (IoT) platforms. Then, it arises a novel approach named Internet of Agents (IoA) as an alternative to add an intelligence and autonomy component for IoT devices and networks. This paper presents an analysis of the main benefits derived from the use of the IoA approach, based on a practical point of view regarding the necessities that humans demand in their daily life and work, which can be solved by IoT networks modeled as IoA infrastructures. It has been presented 24 study cases of the IoA approach at different domains ––smart industry, smart city and smart health wellbeing–– in order to define the scope of these proposals in terms of intelligence and autonomy in contrast to their corresponding generic IoT applications.


Author(s):  
Pheeha Machaka ◽  
Fulufhelo Nelwamondo

This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.


Author(s):  
Gopal Krishna

Social networks have drawn remarkable attention from IT professionals and researchers in data sciences. They are the most popular medium for social interaction. Online social networking (OSN) can be defined as involving networking for fun, business, and communication. Social networks have emerged as universally accepted communication means and boomed in turning this world into a global town. OSN media are generally known for broadcasting information, activities posting, contents sharing, product reviews, online pictures sharing, professional profiling, advertisements and ideas/opinion/sentiment expression, or some other stuff based on business interests. For the analysis of the huge amount of data, data mining techniques are used for identifying the relevant knowledge from the huge amount of data that includes detecting trends, patterns, and rules. Data mining techniques, machine learning, and statistical modeling are used to retrieve the information. For the analysis of the data, three methods are used: data pre-processing, data analysis, and data interpretation.


Author(s):  
Rahul Verma

The internet of things (IoT) is the new buzzword in technological corridors with most technology companies announcing a smart device of sorts that runs on internet of things (IoT). Cities around the world are getting “smarter” every day through the implementation of internet of things (IoT) devices. Cities around the world are implementing individual concepts on their way to becoming smart. The services are automated and integrated end to end using internet of things (IoT) devices. The chapter presents an array of internet of things (IoT) applications. Also, cyber physical systems are becoming more vulnerable since the internet of things (IoT) attacks are common and threatening the security and privacy of such systems. The main aim of this chapter is to bring more research in the application aspects of smart internet of things (IoT).


Author(s):  
Gopal Krishna

Social networks have drawn remarkable attention from IT professionals and researchers in data sciences. They are the most popular medium for social interaction. Online social networking (OSN) can be defined as involving networking for fun, business, and communication. Social networks have emerged as universally accepted communication means and boomed in turning this world into a global town. OSN media are generally known for broadcasting information, activities posting, contents sharing, product reviews, online pictures sharing, professional profiling, advertisements and ideas/opinion/sentiment expression, or some other stuff based on business interests. For the analysis of the huge amount of data, data mining techniques are used for identifying the relevant knowledge from the huge amount of data that includes detecting trends, patterns, and rules. Data mining techniques, machine learning, and statistical modeling are used to retrieve the information. For the analysis of the data, three methods are used: data pre-processing, data analysis, and data interpretation.


Author(s):  
Kamalendu Pal

The internet of things (IoT) is ushering a new age of technology-driven automation of information systems into the manufacturing industry. One of the main concerns with IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the safety of the data. Many security issues arise because of the centralized architecture of IoT-based information systems. Another concern is the lack of appropriate authentication and access control schemes to moderate the access to information generated by the IoT devices in the manufacturing industry. Hence, the question that arises is how to ensure the identity of the manufacturing machinery or the communication nodes. This chapter presents the advantages of blockchain technology to secure the operation of the modern manufacturing industry in a trustless environment with IoT applications. The chapter reviews the challenges and threats in IoT applications and how integration with blockchain can resolve some of the manufacturing enterprise information systems (EIS).


Author(s):  
Sreelakshmi K. K. ◽  
Ashutosh Bhatia ◽  
Ankit Agrawal

The internet of things (IoT) has become a guiding technology behind automation and smart computing. One of the major concerns with the IoT systems is the lack of privacy and security preserving schemes for controlling access and ensuring the security of the data. A majority of security issues arise because of the centralized architecture of IoT systems. Another concern is the lack of proper authentication and access control schemes to moderate access to information generated by the IoT devices. So the question that arises is how to ensure the identity of the equipment or the communicating node. The answer to secure operations in a trustless environment brings us to the decentralized solution of Blockchain. A lot of research has been going on in the area of convergence of IoT and Blockchain, and it has resulted in some remarkable progress in addressing some of the significant issues in the IoT arena. This work reviews the challenges and threats in the IoT environment and how integration with Blockchain can resolve some of them.


2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


Author(s):  
Govinda K.

The most recent couple of decades have seen a sharp rise in the number of elderly individuals. Furthermore, enquiry into this tells us that around 89% of the matured individuals are probably going to live autonomously. As the need be, giving a respectable personal satisfaction for matured individuals has turned into a genuine social test. Doctors need to have clear idea as to the health of these individuals, so they can use proper methodologies to cure them. Hence, IoT develops the idea of the internet and makes it more unavoidable. IoT permits consistent collaborations among various sorts of gadgets, for example, therapeutic sensors, observing cameras, home machines, and so on. This chapter proposes clinical data analysis using the internet of things.


Author(s):  
Pheeha Machaka ◽  
Fulufhelo Nelwamondo

This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks. The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores the motives, mechanisms and techniques used to execute a DDoS attack. The chapter further investigates the current data mining techniques that are used to combat and detect these attacks, their advantages and disadvantages are explored. Future direction of the research is also provided.


Sign in / Sign up

Export Citation Format

Share Document