The file includes data collected through two online surveys linked to the article "User and Professional Aspects for Sustainable Computing Based on the nternet of Things in Europe" published by journal Sensors in January 2023: Survey on factors that inlfuence IoT Adoption by non technical users Survey on recommended profile focused on IoT implementation for two professional roles in the context of Smart Cities (SC) projects: SC engineer and SC technician.
The Development of an Internet of Things (IoT) Network Traffic Dataset with Simulated Attack Data.
Abstract— This research focuses on the requirements for and the creation of an intrusion detection system (IDS) dataset for an Internet of Things (IoT) network domain.
A minimal requirements Internet of Things (IoT) network system was built to produce a dataset according to IDS testing needs for IoT security. Testing was performed with 12 scenarios and resulted in 24 datasets which consisted of normal, attack and combined normal-attack traffic data. Testing focused on three denial of service (DoS) and distributed denial of service (DDoS) attacks—“finish” (FIN) flood, User Datagram Protocol (UDP) flood, and Zbassocflood/association flood—using two communication protocols, IEEE 802.11 (WiFi) and IEEE 802.15.4 (ZigBee). A preprocessing test result obtained 95 attributes for the WiFi datasets and 64 attributes for the Xbee datasets .
TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis
Abstract-Focus of this research is TCP FIN flood attack pattern recognition in Internet of Things (IoT) network using rule based signature analysis method. Dataset is taken based on three scenarios normal, attack and normal-attack. The process of identification and recognition of TCP FIN flood attack pattern is done based on observation and analysis of packet attribute from raw data (pcap) using a feature extraction and feature selection method. Further testing was conducted using snort as an IDS. The results of the confusion matrix detection rate evaluation against the snort as IDS show the average percentage of the precision level.
Citing
Citation data : "TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis" - https://online-journals.org/index.php/i-joe/article/view/9848
@article{article,
author = {Stiawan, Deris and Wahyudi, Dimas and Heryanto, Ahmad and Sahmin, Samsuryadi and Idris, Yazid and Muchtar, Farkhana and Alzahrani, Mohammed and Budiarto, Rahmat},
year = {2019},
month = {04},
pages = {124},
title = {TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis},
volume = {15},
journal = {International Journal of Online and Biomedical Engineering (iJOE)},
doi = {10.3991/ijoe.v15i07.9848}
}
Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to attack detection was examined. Experiments on a network traffic dataset created from an Internet of Thing (IoT) testbed network topology were conducted and the results show that the accuracy of the detection reaches 100 percent.
Citing
Citation data : "Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)" - https://ieeexplore.ieee.org/document/9251292
@inproceedings{inproceedings,
author = {Sharipuddin, and Purnama, Benni and Kurniabudi, Kurniabudi and Winanto, Eko and Stiawan, Deris and Hanapi, Darmawiiovo and Idris, Mohd and Budiarto, Rahmat},
year = {2020},
month = {10},
pages = {114-118},
title = {Features Extraction on IoT Intrusion Detection System Using Principal Components Analysis (PCA)},
doi = {10.23919/EECSI50503.2020.9251292}
}
ABSTRACT A lot amounts of data i.e information that related to make wonders with work is called as 'BIG DATA' Last two decades big data treated as a special interest and had a lot potentiality because of hidden features in it. To generate, store, and analyze big data with an aim to improve the services they provide in multiple no of small & large scale industries. As we are considering the health care industry for this big data is providing multiple opportunities like records of patients, inflow & outflow of the hospitals. It also generates a significant portion of big data relevant to public healthcare in biomedical research. In order to derive meaningful information analysis & proper management of data is required. In the haystack seeking solution in big data will be quickly analyzable just like finding a needle. in big data analysis various challenges associated with each step of handling big data surpassed by using high-end computing solutions. for improving public health healthcare providers provide relevant solutions & to systematically generate and analyze big data requirements to be fully loaded with efficient infrastructure. in big data can change the game by opening new avenues for modern healthcare with an efficient management, analysis, and interpretation. vigorous instructions are given by the various industries like public sectors followed by healthcare for the betterment of services and as well as financial upgrades. by taking the revolution in healthcare industry we can accommodate personnel medicine included by therapies in strong integration manner. Keywords: Healthcare, Biomedical Research, Big Data Analytics, Internet of Things, Personalized Medicine, Quantum Computing Cite this Article: Krishnachaitanya.Katkam and Harsh Lohiya, Patient Centric Management Analysis and Future Prospects in Big Data Healthcare, International Journal of Computer Engineering and Technology (IJCET), 13(3), 2022, pp. 76-86.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
In the field of Internet of Things (IoT), terminal security has always been an extremely important independent research topic. In the terminal security research, in addition to the security enhancement of terminal entities, the security status evaluation of terminal security has also become an independent subset of the security research in the IoT field. However, it should also be noted that the security attributes of IoT terminals can include many aspects, so judging the security of IoT terminals based on the overall security form is not enough for the security of terminal entities. This paper introduces the concept of volatility from the overall situation assessment to the meta attributes that constitute the overall security situation, and preliminarily realizes the construction of a concise model based on historical data to judge the meta attributes that may affect the overall security in the future. At the same time, a concise verification system is built based on the application scenario of the power IoT terminals currently under research to preliminarily realize trend prediction, further expand the trust evaluation of IoT terminals, and clarify the direction of further research.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
The Internet of Things (IoT) has become one of the most popular technologies in recent years. Advances in computing capabilities, hardware accessibility, and wireless connectivity make possible communication between people, processes, and devices for all kinds of applications and industries. However, the deployment of this technology is confined almost entirely to tech companies, leaving end users with only access to specific functionalities. This paper presents a framework that allows users with no technical knowledge to build their own IoT applications according to their needs. To this end, a framework consisting of two building blocks is presented. A friendly interface block lets users tell the system what to do using simple operating rules such as “if the temperature is cold, turn on the heater.” On the other hand, a fuzzy logic reasoner block built by experts translates the ambiguity of human language to specific actions to the actuators, such as “call the police.” The proposed system can also detect and inform the user if the inserted rules have inconsistencies in real time. Moreover, a formal model is introduced, based on fuzzy description logic, for the consistency of IoT systems. Finally, this paper presents various experiments using a fuzzy logic reasoner to show the viability of the proposed framework using a smart-home IoT security system as an example.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
Various deep learning techniques, including blockchain-based approaches, have been explored to unlock the potential of edge data processing and resultant intelligence. However, existing studies often overlook the resource requirements of blockchain consensus processing in typical Internet of Things (IoT) edge network settings. This paper presents our FLCoin approach. Specifically, we propose a novel committee-based method for consensus processing in which committee members are elected via the FL process. Additionally, we employed a two-layer blockchain architecture for federated learning (FL) processing to facilitate the seamless integration of blockchain and FL techniques. Our analysis reveals that the communication overhead remains stable as the network size increases, ensuring the scalability of our blockchain-based FL system. To assess the performance of the proposed method, experiments were conducted using the MNIST dataset to train a standard five-layer CNN model. Our evaluation demonstrated the efficiency of FLCoin. With an increasing number of nodes participating in the model training, the consensus latency remained below 3 s, resulting in a low total training time. Notably, compared with a blockchain-based FL system utilizing PBFT as the consensus protocol, our approach achieved a 90% improvement in communication overhead and a 35% reduction in training time cost. Our approach ensures an efficient and scalable solution, enabling the integration of blockchain and FL into IoT edge networks. The proposed architecture provides a solid foundation for building intelligent IoT services.
Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
License information was derived automatically
IoT adoption barriers in Bangladeshi manufacturing industry.
Not seeing a result you expected?
Learn how you can add new datasets to our index.
The file includes data collected through two online surveys linked to the article "User and Professional Aspects for Sustainable Computing Based on the nternet of Things in Europe" published by journal Sensors in January 2023: Survey on factors that inlfuence IoT Adoption by non technical users Survey on recommended profile focused on IoT implementation for two professional roles in the context of Smart Cities (SC) projects: SC engineer and SC technician.