Professional Documents
Culture Documents
Iot Security
Iot Security
Presented by
Pradnya Patil
Guided by
Prof. Kamini Patil
Departmrnt of Computer Engineering
LGNSCOE, Nashik
• Introduction
• Literature Survey
• Problem Definition
• System Architecture
• Algorithm
• Conclusion
• References.
2
J. L. Massey 3-25, 1986 "Cryptography—A selective
survey," Digital
Communications,
4
S. B. Sadkhan Damascus, 2004 "Cryptography : current
status and future trends,"
in International
Conference on
Information and
Communication
Technologies: From
Theory to Applications,
5
N. Jirwan, A. Singh 1-6, 2013 "Review and Analysis of
and S. Vijay Cryptography
Techniques," International
Journal of Scientific &
Engineering Research,
vol. 3
SUMMERY LITERATURE SURVEY
• Susan et al. [4] pointed out that network and computer security is a new and
fast-moving technology within the computer science field, with computer
security teaching to be a target that never stops moving. Algorithmic and
mathematic aspects, such as hashing techniques and encryption, are the
main focus of security courses. As crackers find ways to hack network
systems, new courses are created that cover the latest type of attacks, but
each of these attacks become outdated daily due to the responses from new
security software. With the continuous maturity of security terminology,
security techniques and skills continue to emerge in the practice of business,
network optimization, security architecture, and legal foundation.
Input :- G,T, λ , σ.
Output:- O,P,C
Auxiliary :- L, cst,p,Pmin,Pmax
1)
2)
For q in N do
density p(q) using Equation 1;
o(q) nil,p(q) + ∞
membership Fθ(q) using Equation 2;
For q in T do
p(q) O,C(q) = λ(q),L q
While L ≠ Ø do
Remove from L a sample q such
that p(q) is minimum;
for u in N do
if q ≠ u and p(u)>p(q) then
cst F θ(u)*max{p(q),d(q,u)};
if cst < p(u) and p(u) ≠ +∞ then
Remove u form L
C(u) C(q) ,O(u) q,P(u) cst;
Lu;
Return[O,P,C]
• Fuzzy OPF hyperparameter optimization considering Austin exas-
Scenario1 images over
• Find better alternatives for scenarios that have a greater degree of
complexity.
• To propose a supervised model to classify IoT network traffic into
intrusion and no intrusion packets.
• Improve sample selection and classifier output performance, also
contributing to alleviate some problems, such as: noise, unbalanced
classes and outliers.
12
15
16