Ijraset Journal For Research in Applied Science and Engineering Technology
Authors: S. Mounasri, D Tejaswani, A Mounika, S Bhuvaneshwari
DOI Link: https://doi.org/10.22214/ijraset.2022.45132
Certificate: View Certificate
The Internet of Things (IoT) is a group of millions of devices having sensors and actuators linked over wired or wireless channel for data transmission. The volume of data released from these devices will increase many-fold in the years to come. In such an environment, machine learning algorithms can play an important role in ensuring security and authorization based on biotechnology, anomalous detection to improve the usability and security of IoT systems. On the other hand, attackers often view learning algorithms to exploit the vulnerabilities in smart IoT-based systems. Motivated from these, in this project, we propose the security of the IoT devices by detecting spam using machine learning. In this framework, five machine learning models are evaluated using various metrics with a large collection of inputs features sets. Each model computes a spam score by considering the refined input features. This score depicts the trustworthiness of IoT device under various parameters. The results obtained proves the effectiveness of the proposed scheme in comparison to the other existing schemes.
I. INTRODUCTION
A. Purpose
The main purpose of this project is to present a thorough and complete assessment of current research on detecting review spam using various machine learning approaches, as well as to develop methodology for further exploration.
Internet of Things (IoT) enables convergence and implementations between the real-world objects irrespective of their geographical locations. IoT applications need to protect data privacy to fix security issues such as intrusions, spoofing attacks, DoS attacks, DoS attacks, jamming, eavesdropping, spam, and malware.
B. Scope
The main purpose of this project is to present a thorough and complete assessment of current research on detecting review spam using various machine learning approaches, as well as to develop methodology for further exploration. Internet of Things (IoT) enables convergence and implementations between the real-world objects irrespective of their geographical locations. Implementation of such network management and control make privacy and protection strategies utmost important and challenging in such an environment. IoT applications need to protect data privacy to fix security issues such as intrusions, spoofing attacks, DoS attacks, DoS attacks, jamming, eavesdropping, spam, and malware. For example, wearable devices collect and send user’s health data to a connected smartphone should prevent leakage of information to ensure privacy. It has been found in the market that 25-30% of working employees connect their personal IoT devices with the organizational network
C. Model Diagram/Overview
The above model diagram depicts the information how the remote user and server is connected and how can we see the reviews of the posts.
II. SYSTEM ANALYSIS
A. Existing System
B. Problem Statement
C. Proposed System
The target is to resolve the issues in the IoT devices deployed within home. But, the proposed methodology considers all the parameters of data engineering before validating it with machine learning models.
III. SYSTEM REQUIREMENT SPECIFICATION
A. Functional Requirements
B. Non Functional Requirements
C. Hardware Requirements
Minimum hardware requirements are very dependent on the particular software being developed by a given Enthought Python / Canopy / VS Code user.
Applications that need to store large arrays/objects in memory will require more RAM, whereas applications that need to perform numerous calculations or tasks more quickly will require a faster processor.
D. Software Requirements
The functional requirements or the overall description documents include the product perspective and features, operating system and operating environment, graphics requirements, design constraints and user documentation.
The appropriation of requirements and implementation constraints gives the general overview of the project in regards to what the areas of strength and deficit are and how to tackle them.
IV. SYSTEM DESIGN
A. System Architecture
System architecture refers to the placement of these software components on physical machines. Two closely related components can be co-located or placed on different machines. The location of components will also impact performance and reliability. The resulting architectural style ultimately determines how components are connected, data is exchanged, and how they all work together as a coherent system.
.
2. Supervised Learning
An algorithm uses training data and feedback from humans to learn the relationship of given inputs to a given output. For instance, a practitioner can use marketing expense and weather forecast as input data to predict the sales of cans. You can use supervised learning when the output data is known. The algorithm will predict new data.
3. Unsupervised Learning
In unsupervised learning, an algorithm explores input data without being given an explicit output variable (e.g., explores customer demographic data to identify patterns)
You can use it when you do not know how to classify the data, and you want the algorithm to find patterns and classify the data for you.
B. System Components (Modules)
Modules used in resume categorization are:
3. Remote User: In this module, there are n numbers of users are present. User should register before doing any operations. Once user registers, their details will be stored to the database. After registration successful, he has to login by using authorized user name and password. Once Login is successful user will do some operations like search and view all posts, view all post reviews, view trending posts, view your profile, view all posts recommended. Extension Offload task time required to execute and plots a bar graph
The following conclusion can be presented: The proposed framework, detects the spam parameters of IoT devices using machine learning models. The IoT dataset used for experiments, is pre-processed by using feature engineering procedure. By experimenting the framework with machine learning models, each IoT appliance is awarded with a spam score. The spamicity score is used in this research to determine the reliability of IoT devices in the smart home organisation. Different ML models were utilised to assess the time-arrangement information produced by keen metres through extensive tests and analysis. This refines the conditions to be taken for successful working of IoT devices in a smart home. In future, we are planning to consider the climatic and surrounding features of IoT device to make them more secure and trustworthy.
[1] Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, “Iot security: ongoing challenges and research opportunities,” in 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, 2014, pp. 230–234. [2] A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smart home,” in 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, 2017, pp. 618–623. [3] E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, no. 2, pp. 76–79, 2017. [4] C. Zhang and R. Green, “Communication security in internet of thing: preventive measure and avoid ddos attack over iot network,” in Proceedings of the 18th Symposium on Communications & Networking. Society for Computer Simulation International, 2015, pp. 8–15. [5] W. Kim, O.-R. Jeong, C. Kim, and J. So, “The dark side of the internet: Attacks, costs and responses,” Information systems, vol. 36, no. 3, pp. 675–705, 2011. [6] H. Eun, H. Lee, and H. Oh, “Conditional privacy preserving security protocol for nfc applications,” IEEE Transactions on Consumer Electronics, vol. 59, no. 1, pp. 153–160, 2013 [7] R. V. Kulkarni and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in 2009 International Joint Conference on Neural Networks. IEEE, 2009, pp. 1680–1687. [8] M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,” IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996– 2018, 2014.
Copyright © 2022 S. Mounasri, D Tejaswani, A Mounika, S Bhuvaneshwari. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Paper Id : IJRASET45132
Publish Date : 2022-06-30
ISSN : 2321-9653
Publisher Name : IJRASET
DOI Link : Click Here