1. OSSIoT: An ontology-based Operational Security model for Social Internet of Things using Machine Learning Techniques.
- Author
-
Santhosh Kumar, K. S., J., Hanumanthappa, Shiva Prakash, S. P., and Krinkin, Kirill
- Subjects
MACHINE learning ,INTERNET of things ,PSEUDOPOTENTIAL method ,INTERNET security ,INTERPOLATION - Abstract
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine the relationships between devices through object profiling and ontological models. To address this need, we have proposed an ontology-based operational security model for the SIoT. In our approach, the interpolation method is used to establish relationships, while fiduciary relationships are employed to detect threats. Furthermore, the encryption of heterogeneous device data, coupled with the implementation of an operationbased intrusion detection system, proves highly effective in identifying potential threats.Invalid relationships are identified as intruders and validated using machine learning techniques. Encrypting heterogeneous device data, along with an operationbased intrusion detection system, efficiently identifies threats in the ever-evolving dynamic nature of the SIoT environment. the encryption of heterogeneous device data, coupled with an operation-based intrusion detection system, effectively identifies threats. Invalid relationships are promptly identified as attackers and machine learning techniques are used to validate relationships encryption and machine learning stand as indispensable tools in the endeavor to secure sensitive information within the realm of the SIoT. The suggested model outperformed the results of the current model, as evidenced by its average accuracy of 85.67%, precision of 90.37%, recall of 92.06%, and F1-score of 91.03% when compared to the existing model. [ABSTRACT FROM AUTHOR]
- Published
- 2024