Browse > Article
http://dx.doi.org/10.14400/JDC.2021.19.11.351

IoT data trust techniques based on auto-encoder through IoT-linked processing  

Yon, Yong-Ho (Department of Software Liberal Art, Mokwon University)
Jeong, Yoon-Su (Division of Information and Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of Digital Convergence / v.19, no.11, 2021 , pp. 351-357 More about this Journal
Abstract
IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.
Keywords
Internet of Things; Autocoder; Integrity; Data Link; Blockchain;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo & Y. Elovici. (2017). Detection of unauthorized iot devices using machine learning techniques. preprint arXiv:1709.04647.
2 A. Shahnaz, U. Qamar & A. Khalid, (2019). Using Blockchain for Electronic Health Records. IEEE Access, 7, pp. 147782-147795.   DOI
3 S. Son, J. Y. Lee, M. H. Kim, S. J. Yu, A. K. Das & Y. H. Park, (2020). Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain. IEEE Access, 8, 192177-192191.   DOI
4 X. Yang, X. Pei, M. Wang, T. Li & C. Wang, (2020). Multi-Replica and Multi-Cloud Data Public Audit Scheme Based on Blockchain. IEEE Access, 8, 144809-144822.   DOI
5 M. K. Choi, C. Y. Yeun & P. H. Seong, (2020). A Novel Monitoring System for the Data Integrity of Reactor Protection System Using Blockchain Technology. IEEE Access, 8, 118732-118740.   DOI
6 A. Majumdar & G. Mohan, (2020). Distributed Fractionalized Data Networks For Data Integrity. Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-3.
7 U. Imtiaz & H. M. Qusay. (2019). A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks. Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference(CCNC), 1-6.
8 Machine Learning Repository. (2021). https://archive.ics.uci.edu/ml/index.php
9 K. Igor, S. Igor & B. Alexander. (2018). Framework for Mobiel Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning. IEEE ACCESS, 6, 72714-72723.   DOI
10 T. Mahbod, B. Ebrahim, L. Wei & A. G. Ali. (2009). A Detailed Analysis of the KDD CUP 99 Data Set. Proceedings of the 2009 IEEE symposium on computational Intelligence in security and defence application, 1-6.
11 NSL, http://www.nsl.cs.unb.ca/NSL-KDD.
12 H. Chae & S. H. Choi. (2014). Feature Selection for efficient Intrusion Detection using Attribute Ratio. International Journal of Computers and Communications, 8, 134-139.
13 P. Huang, K. Fan, H. Yang, K. Zhang, H. Li & Y. Yang, (2020). A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System. IEEE Access, 8, 94780-94794.   DOI
14 Machine Learning Repository. (2021). https://archive.ics.uci.edu/ml/datasets.php?format=&task=&att=&area=&numAtt=greater100&numIns=&type=seq&sort=nameDown&view=list.
15 B. Ravishankar, P. Kulkarni & M. V. Vishnudas, (2020). Blockchain-based Database to Ensure Data Integrity in Cloud Computing Environments. Proceedings of the 2020 International conference on Mainstreaming Block chain Implementation (ICOMBI), 1-4.