SVM-Based Traffic Data Classification for Secured IoT-Based Road Signaling System

Author(s):  
Suresh Sankaranarayanan ◽  
Srijanee Mookherji

The traffic controlling systems at present are microcontroller-based, which is semi-automatic in nature where time is the only parameter that is considered. With the introduction of IoT in traffic signaling systems, research is being done considering density as a parameter for automating the traffic signaling system and regulate traffic dynamically. Security is a concern when sensitive data of great volume is being transmitted wirelessly. Security protocols that have been implemented for IoT networks can protect the system against attacks and are purely based on standard cryptosystem. They cannot handle heterogeneous data type. To prevent the issues on security protocols, the authors have implemented SVM machine learning algorithm for analyzing the traffic data pattern and detect anomalies. The SVM implementation has been done for the UK traffic data set between 2011-2016 for three cities. The implementation been carried out in Raspberry Pi3 processor functioning as an edge router and SVM machine learning algorithm using Python Scikit Libraries.

2019 ◽  
Vol 15 (1) ◽  
pp. 22-50 ◽  
Author(s):  
Suresh Sankaranarayanan ◽  
Srijanee Mookherji

The traffic controlling systems at present are microcontroller-based, which is semi-automatic in nature where time is the only parameter that is considered. With the introduction of IoT in traffic signaling systems, research is being done considering density as a parameter for automating the traffic signaling system and regulate traffic dynamically. Security is a concern when sensitive data of great volume is being transmitted wirelessly. Security protocols that have been implemented for IoT networks can protect the system against attacks and are purely based on standard cryptosystem. They cannot handle heterogeneous data type. To prevent the issues on security protocols, the authors have implemented SVM machine learning algorithm for analyzing the traffic data pattern and detect anomalies. The SVM implementation has been done for the UK traffic data set between 2011-2016 for three cities. The implementation been carried out in Raspberry Pi3 processor functioning as an edge router and SVM machine learning algorithm using Python Scikit Libraries.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Jiaxuan Fei ◽  
Qigui Yao ◽  
Mingliang Chen ◽  
Xiangqun Wang ◽  
Jie Fan

The construction of power Internet of things is an important development direction for power grid enterprises. Although power Internet of things is a kind of network, it is denser than the ordinary Internet of things points and more complex equipment types, so it has higher requirements for network security protection. At the same time, due to the special information perception and transmission mode in the Internet of things, the information transmitted in the network is easy to be stolen and resold, and traditional security measures can no longer meet the security protection requirements of the new Internet of things devices. To solve the privacy leakage and security attack caused by the illegal intrusion in the network, this paper proposes to construct a device portrait for terminal devices in the power Internet of things and detect abnormal traffic in the network based on device portrait. By collecting traffic data in the network environment, various network traffic characteristics are extracted, and abnormal traffic is analyzed and identified by the machine learning algorithm. By collecting the traffic data in the network environment, the features are extracted from the physical layer, network layer, and application layer of the message, and the device portrait is generated by a machine learning algorithm. According to the established attack mode, the corresponding traffic characteristics are analyzed, and the detection of abnormal traffic is achieved by comparing the attack traffic characteristics with the device portrait. The experimental results show that the accuracy of this method is more than 90%.


As a wrongdoing of utilizing specialized intends to take sensitive data of clients and users in the internet, phishing is as of now an advanced risk confronting the Internet, and misfortunes due to phishing are developing consistently. Recognition of these phishing scams is a very testing issue on the grounds that phishing is predominantly a semantics based assault, which particularly manhandles human vulnerabilities, anyway not system or framework vulnerabilities. Phishing costs. As a product discovery plot, two primary methodologies are generally utilized: blacklists/whitelists and machine learning approaches. Every phishing technique has different parameters and type of attack. Using decision tree algorithm we find out whether the attack is legitimate or a scam. We measure this by grouping them with diverse parameters and features, thereby assisting the machine learning algorithm to edify.


2018 ◽  
Author(s):  
C.H.B. van Niftrik ◽  
F. van der Wouden ◽  
V. Staartjes ◽  
J. Fierstra ◽  
M. Stienen ◽  
...  

Author(s):  
Kunal Parikh ◽  
Tanvi Makadia ◽  
Harshil Patel

Dengue is unquestionably one of the biggest health concerns in India and for many other developing countries. Unfortunately, many people have lost their lives because of it. Every year, approximately 390 million dengue infections occur around the world among which 500,000 people are seriously infected and 25,000 people have died annually. Many factors could cause dengue such as temperature, humidity, precipitation, inadequate public health, and many others. In this paper, we are proposing a method to perform predictive analytics on dengue’s dataset using KNN: a machine-learning algorithm. This analysis would help in the prediction of future cases and we could save the lives of many.


Sign in / Sign up

Export Citation Format

Share Document