• Title/Summary/Keyword: IoT Testing

Search Result 65, Processing Time 0.024 seconds

A Supervised Feature Selection Method for Malicious Intrusions Detection in IoT Based on Genetic Algorithm

  • Saman Iftikhar;Daniah Al-Madani;Saima Abdullah;Ammar Saeed;Kiran Fatima
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.49-56
    • /
    • 2023
  • Machine learning methods diversely applied to the Internet of Things (IoT) field have been successful due to the enhancement of computer processing power. They offer an effective way of detecting malicious intrusions in IoT because of their high-level feature extraction capabilities. In this paper, we proposed a novel feature selection method for malicious intrusion detection in IoT by using an evolutionary technique - Genetic Algorithm (GA) and Machine Learning (ML) algorithms. The proposed model is performing the classification of BoT-IoT dataset to evaluate its quality through the training and testing with classifiers. The data is reduced and several preprocessing steps are applied such as: unnecessary information removal, null value checking, label encoding, standard scaling and data balancing. GA has applied over the preprocessed data, to select the most relevant features and maintain model optimization. The selected features from GA are given to ML classifiers such as Logistic Regression (LR) and Support Vector Machine (SVM) and the results are evaluated using performance evaluation measures including recall, precision and f1-score. Two sets of experiments are conducted, and it is concluded that hyperparameter tuning has a significant consequence on the performance of both ML classifiers. Overall, SVM still remained the best model in both cases and overall results increased.

Smart Home System Using Internet of Things

  • Santoso, Leo Willyanto;Lim, Resmana;Trisnajaya, Kevin
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

A Method of Test Coverage Measurement Based on BitTorrent for Internet of Things Environment (사물 인터넷 환경을 위한 BitTorrent 알고리즘 기반의 테스트 커버리지 측정기법)

  • Ryu, Hodong;Lee, Woo Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.365-370
    • /
    • 2014
  • Although Internet of Things already became a new paradigm on service on network, we should pay more effort for studying about its testing method, since humans, things and environments in IoT are connected to each other without any restrictions. Earlier researches based on emulators showed that such virtual devices on emulators had unavoidable gap between them and real things. Furthermore, growth of connection complexity between the devices and loosing of restrictions make the gap wider. Accordingly, in this paper, we suppose a method of test coverage measurement based on BitTorrent for IoT environment. It has cooperation features among homogeneous devices with avoiding the overlapping on each part of whole test process.

A Study on a Method for Detecting Leak Holes in Respirators Using IoT Sensors

  • Woochang Shin
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.378-385
    • /
    • 2023
  • The importance of wearing respiratory protective equipment has been highlighted even more during the COVID-19 pandemic. Even if the suitability of respiratory protection has been confirmed through testing in a laboratory environment, there remains the potential for leakage points in the respirators due to improper application by the wearer, damage to the equipment, or sudden movements in real working conditions. In this paper, we propose a method to detect the occurrence of leak holes by measuring the pressure changes inside the mask according to the wearer's breathing activity by attaching an IoT sensor to a full-face respirator. We designed 9 experimental scenarios by adjusting the degree of leak holes of the respirator and the breathing cycle time, and acquired respiratory data for the wearer of the respirator accordingly. Additionally, we analyzed the respiratory data to identify the duration and pressure change range for each breath, utilizing this data to train a neural network model for detecting leak holes in the respirator. The experimental results applying the developed neural network model showed a sensitivity of 100%, specificity of 94.29%, and accuracy of 97.53%. We conclude that the effective detection of leak holes can be achieved by incorporating affordable, small-sized IoT sensors into respiratory protective equipment.

A Study of Research Trend about Internet of Things (사물인터넷(IoT)에 관한 국내 연구 동향 분석)

  • Joo, Chungmin;Na, Hyungjin
    • Informatization Policy
    • /
    • v.22 no.3
    • /
    • pp.3-15
    • /
    • 2015
  • This study aims to examine the recent trend of domestic researches on the Internet of Things(IoT) which has drawn a lot of attention in the field of ICT. This meta-analysis analyzes 101 studies published in academic journals from 2010, focusing on research topics, methods and the fields of study. The results show that the research topics of most used studies were related to the technological and industrial issues, and especially in the technical field, the major topic was suggesting new IoT technology. The most research method was testing research followed by the literature review. Even though engineers are holding the mainstream of the IoT technology, some experts in the field of social science release their articles nowadays. These results indicate that the IoT has a great ripple effect both technologically and socioculturally, and researches need to be vitalized in the fields of industry, service, policy and institution as well as technological fields. In addition, the research for the future should extend methodological diversity and take more convergence approaches in a variety of fields.

A Design of the Automation Tyre Tread State Check System based on IoT Service (IoT 서비스 기반 자동차 타이어 트레드 자동 점검 시스템 설계)

  • Kim, Minyoung;Choi, Donggyu;Jang, Jong-wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.825-831
    • /
    • 2020
  • In modern society, automobiles have become an essential means of transportation. It is the only consumable that is worn by contacting the ground among automobile parts. If the tyres are severely worn, the tyres may be break, presenting a risk of a serious accident to the driver. To avoid this risk, drivers should check tyre pressure and tread condition before driving a car. Tyre inflation pressure can be easily measured by TPMS, but in the case of tyre tread conditions, it can be cumbersome when the driver measures it directly using a coin or vernier caliper. This hassle can expose the driver to traffic accidents due to tyre breakage by neglecting to measure the condition of the tyre tread. In this paper, we introduce the contents of research to design an IoT service-based system that can automatically measure automobile tyres, and we verified the possibility of realizing the system by actually implementing and testing some components of the system.

Development of Log-Based Testing Framework for Unit Testing of Embedded Software (임베디드 소프트웨어의 단위 테스팅을 위한 로그 기반 테스팅 프레임워크 개발)

  • Ryu, Hodong;Jeong, Sooyong;Lee, Woo Jin;Kim, Hwangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.419-424
    • /
    • 2015
  • As Internet of Things (IoT) is recently serviced in several fields, the reliability and safety issues for IoT embedded systems are emerged. During the development of embedded systems, it is not easy to build the virtual execution environment and to test the developing version. Therefore, it is difficult to ensure its reliability due to lack of unit testing. In this paper, we propose a log-based unit testing framework for embedded software, which performs on real target board by extracting information of function execution. And, according to execution paths, duplicated logs are eliminated to keep a minimal log size. As a result, during system testing, testers can efficiently decide whether the executed paths of each function are correctly performed or not.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Architecture of Electrical Safety Management for High-Voltage Power Installations Based on IoT Platform (사물인터넷 기반의 자가용 전기설비 안전 관리 구조 연구)

  • Kang, Hyunjoo;An, Yoon-Young;Jeong, Sangjin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1077-1084
    • /
    • 2017
  • In this paper, we propose a electrical safety management architecture based on IoT (Internet of things) platform, especially IoTivity which is open source platform organized by OCF. With the advent of various ICT technologies, researches on convergence between power facilities and ICT technology are actively under way. The application of ICT technology to high voltage electrical equipment has been studied in terms of improving power efficiency and measuring accurate usage in real time. We focused on safety data and described the components of the electrical safety architecture, the requirement of reference interface, and available services. We defined the data profile for the electrical facilities subject to electrical safety management and examined feasibility through testing.