With the growth of the internet of things (IoT) smart objects, managing these objects becomes a very important challenge, to know the total number of interconnected objects on a heterogeneous network, and if they are functioning correctly; the use of IoT objects can have advantages in terms of comfort, efficiency, and cost. In this context, the identification of IoT objects is the first step to help owners manage them and ensure the security of their IoT environments such as smart homes, smart buildings, or smart cities. In this paper, to meet the need for IoT object identification, we have deployed an intelligent environment to collect all network traffic traces based on a diverse list of IoT in real-time conditions. In the exploratory phase of this traffic, we have developed learning models capable of identifying and classifying connected IoT objects in our environment. We have applied the six supervised machine learning algorithms: support vector machine, decision tree (DT), random forest (RF), k-nearest neighbors, naive Bayes, and stochastic gradient descent classifier. Finally, the experimental results indicate that the DT and RF models proved to be the most effective and demonstrate an accuracy of 97.72% on the analysis of network traffic data and more particularly information contained in network protocols. Most IoT objects are identified and classified with an accuracy of 99.21%.
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
This document presents a study on identifying and classifying Internet of Things (IoT) devices based on their network traffic characteristics using machine learning algorithms. The study involved collecting network traffic data from 28 different IoT devices over a period of 6 months. Statistical attributes like port numbers, domain names, and cipher suites were extracted from the traffic to analyze characteristics. A support vector machine (SVM) classifier was developed and shown to identify specific IoT devices with over 99% accuracy based on their network activity attributes. The study aims to help network operators monitor and manage IoT devices on their networks.
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
Internet of things (IoT) has led to several security threats and challenges within society. Regardless of the benefits that it has brought with it to the society, IoT could compromise the security and privacy of individuals and companies at various levels. Denial of Service (DoS) and Distributed DoS (DDoS) attacks, among others, are the most common attack types that face the IoT networks. To counter such attacks, companies should implement an efficient classification/detection model, which is not an easy task. This paper proposes a classification model to examine the effectiveness of several machine-learning algorithms, namely, Random Forest (RF), k-Nearest Neighbors (KNN), and Naïve Bayes. The machine learning algorithms are used to detect attacks on the UNSW-NB15 benchmark dataset. The UNSW-NB15 contains normal network traffic and malicious traffic instants. The experimental results reveal that RF and KNN classifiers give the best performance with an accuracy of 100% (without noise injection) and 99% (with 10% noise filtering), while the Naïve Bayes classifier gives the worst performance with an accuracy of 95.35% and 82.77 without noise and with 10% noise, respectively. Other evaluation matrices, such as precision and recall, also show the effectiveness of RF and KNN classifiers over Naïve Bayes.
IJWMN -Malware Detection in IoT Systems using Machine Learning Techniquesijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5% accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model construction, and the LSTM classifier exhibited heightened accuracy in classification. Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed model, highlighting its potential for enhancing IoT security. The study advocates for future exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and underscores the importance of predictive analyses for a more powerful IOT security. This research serves as a platform for developing more resilient security measures in IoT ecosystems.
MALWARE DETECTION IN IOT SYSTEMS USING MACHINE LEARNING TECHNIQUESijwmn
Malware detection in IoT environments necessitates robust methodologies. This study introduces
a CNN-LSTM hybrid model for IoT malware identification and evaluates its performance against
established methods. Leveraging K-fold cross-validation, the proposed approach achieved 95.5%
accuracy, surpassing existing methods. The CNN algorithm enabled superior learning model
construction, and the LSTM classifier exhibited heightened accuracy in classification.
Comparative analysis against prevalent techniques demonstrated the efficacy of the proposed
model, highlighting its potential for enhancing IoT security. The study advocates for future
exploration of SVMs as alternatives, emphasizes the need for distributed detection strategies, and
underscores the importance of predictive analyses for a more powerful IOT security. This
research serves as a platform for developing more resilient security measures in IoT ecosystems.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Device identification using optimized digital footprintsIAESIJAI
The rapidly increasing number of internet of things (IoT) and non-IoT
devices has imposed new security challenges to network administrators.
Accurate device identification in the increasingly complex network
structures is necessary. In this paper, a device fingerprinting (DFP) method
has been proposed for device identification, based on digital footprints,
which devices use for communication over a network. A subset of nine
features have been selected from the network and transport layers of a single
transmission control protocol/internet protocol packet based on attribute
evaluators in Weka, to generate device-specific signatures. The method has
been evaluated on two online datasets, and an experimental dataset, using
different supervised machine learning (ML) algorithms. Results have shown
that the method is able to distinguish device type with up to 100% precision
using the random forest (RF) classifier, and classify individual devices with
up to 95.7% precision. These results demonstrate the applicability of the
proposed DFP method for device identification, in order to provide a more
secure and robust network.
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
https://jst.org.in/index.html
Our journal has digital transformation, effective management strategies are crucial. Our pages unfold discussions on navigating the complexities of modern business landscapes, strategic decision-making, and adaptive leadership—essential elements for success in the 21st century.
The document discusses using machine learning for efficient attack detection in IoT devices without feature engineering. It proposes a feature-engineering-less machine learning (FEL-ML) process that uses raw packet byte streams as input instead of engineered features. This approach is lighter weight and faster than traditional methods. The FEL-ML model is trained directly on unprocessed packet data to perform malware detection on resource-constrained IoT devices. Prior research that used engineered features or complex deep learning models are not suitable for IoT due to limitations of memory and processing power. The proposed FEL-ML approach aims to enable effective network traffic security for IoT using minimal resources.
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
Through the generalization of deep learning, the research community has addressed critical challenges in
the network security domain, like malware identification and anomaly detection. However, they have yet to
discuss deploying them on Internet of Things (IoT) devices for day-to-day operations. IoT devices are often
limited in memory and processing power, rendering the compute-intensive deep learning environment
unusable. This research proposes a way to overcome this barrier by bypassing feature engineering in the
deep learning pipeline and using raw packet data as input. We introduce a feature- engineering-less
machine learning (ML) process to perform malware detection on IoT devices. Our proposed model,”
Feature engineering-less ML (FEL-ML),” is a lighter-weight detection algorithm that expends no extra
computations on “engineered” features. It effectively accelerates the low-powered IoT edge. It is trained
on unprocessed byte-streams of packets. Aside from providing better results, it is quicker than traditional
feature-based methods. FEL-ML facilitates resource-sensitive network traffic security with the added
benefit of eliminating the significant investment by subject matter experts in feature engineering.
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
This document discusses several studies on using machine learning techniques to optimize routing in Internet of Things (IoT) networks. It first provides background on IoT and challenges with routing in IoT networks due to factors like device mobility and limited resources. It then summarizes several papers that propose different machine learning approaches for IoT routing, including using reinforcement learning to balance node loads and extend network lifetime, integrating deep reinforcement learning into existing routing protocols to improve performance, and using Q-learning at each node to learn optimal parent selection policies based on network conditions. Finally, it discusses a study that developed an energy-efficient routing algorithm for wireless sensor networks based on dynamic programming to maximize network lifetime.
THE DYNAMICS OF THE UBIQUITOUS INTERNET OF THINGS (IOT) AND TRAILBLAZING DATA...ijwmn
The document discusses the dynamics between the Internet of Things (IoT) and data mining (DM). It finds that IoT continues to evolve significantly, with DM and access to cloud computing accelerating technological innovations. Various themes related to IoT, such as sports, supply chain, and agriculture, saw positive growth between 2016-2019 based on app searches. The emerging Internet of Nano-Things and Wireless Sensor Networks were also found to provide more accurate information gathering and data processing. In conclusion, IoT growth will continue to affect how people interact with devices, though privacy and standardization concerns remain.
The Dynamics of the Ubiquitous Internet of Things (IoT) and Trailblazing Data...ijwmn
The research study intends to understand the thematic dynamics of the internet of things (IoT), thereby aiming to address the general objective i.e. “To explore and streamline the IoT thematic dynamics with a focus on cross-cutting data mining, and IoT apps evidence-based publication trends”. To meet this objective, secondary research has been compiled as part of the analytic process. It was found from the research that IoT continues to evolve with significant degrees of proliferation. Complementary and
trailblazing data mining (DM) with more access to cloud computing platforms has catalyzed accelerating the achievement of planned technological innovations. The outcome has been myriads of apps currently used in different thematic landscapes. Based on available data on app searches by users, and between 2016 and 2019, themes like sports, supply chain, and agriculture maintained positive trends over the four years. The emerging Internet of Nano-Things was found to be beneficial in many sectors
This document provides an overview of using data science techniques for analyzing Internet of Things (IoT) network traffic, using a smart home network as an example. It first discusses IoT systems, including components, communication protocols, and challenges. It then discusses how machine learning approaches like pattern detection, feature selection, and classification can be used to analyze IoT network traffic and behaviors. Specifically, it presents how these techniques could be applied in R and RStudio to a practical smart home network case study to better understand device interactions and identify anomalies.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionIJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
The document lists 57 references related to the Internet of Things (IoT). It covers topics such as the evolution of wireless sensor networks towards IoT, future directions for IoT, clustering techniques in wireless sensor networks, applications of wireless sensors, deployment algorithms for sensor networks, energy efficient routing protocols, performance of sensor network motes, adding value to sensor network simulations, overviews and definitions of IoT, enabling technologies and protocols for IoT, applications of IoT such as smart cities and healthcare, security and privacy issues in IoT, IoT testbeds and experimental platforms, middleware for IoT, and data analytics and management for large-scale IoT systems.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
This document discusses Internet of Things (IoT) and how it relates to big data. It begins with an overview of IoT, describing how physical objects can be connected to the internet through sensors and actuators. It then discusses IoT architecture, which involves edge analytics and cloud analytics. Next, it defines big data and its four V's (volume, velocity, variety, and veracity). It explains how IoT generates large amounts of data and describes how this data is stored, analyzed, and used. The document concludes that IoT data analytics is essential for managing complex IoT systems like smart cities.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
This document provides a list of 57 references related to the Internet of Things (IoT). The references cover topics such as the evolution of wireless sensor networks towards IoT, future Internet and IoT, clustering techniques in wireless sensor networks for IoT scenarios, civil applications of wireless sensors, deployment algorithms for coverage and connectivity in wireless sensor networks, energy efficient routing techniques for wireless sensor networks, performance analysis of sensor motes used in wireless sensor networks, adding value to wireless sensor network simulations using experimental IoT platforms, overviews of IoT, data fusion and IoT for smart environments, challenges of waste management in IoT-enabled smart cities, enabling IoT technologies and protocols, IoT gateways, semantics for IoT,
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Machine learning for internet of things classification using network traffic parameters (20)
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
Cyber intrusion attacks increasingly target the Internet of Things (IoT) ecosystem, exploiting vulnerable devices and networks. Malicious activities must be identified early to minimize damage and mitigate threats. Using actual benign and attack traffic from the CICIoT2023 dataset, this WORK aims to evaluate and benchmark machine-learning techniques for IoT intrusion detection. There are four main phases to the system. First, the CICIoT2023 dataset is refined to remove irrelevant features and clean up missing and duplicate data. The second phase employs statistical models and artificial intelligence to discover novel features. The most significant features are then selected in the third phase based on cooperative game theory. Using the original CICIoT2023 dataset and a dataset containing only novel features, we train and evaluate a variety of machine learning classifiers. On the original dataset, Random Forest achieved the highest accuracy of 99%. Still, with novel features, Random Forest's performance dropped only slightly (96%) while other models achieved significantly lower accuracy. As a whole, the work contributes substantial contributions to tailored feature engineering, feature selection, and rigorous benchmarking of IoT intrusion detection techniques. IoT networks and devices face continuously evolving threats, making it necessary to develop robust intrusion detection systems.
https://jst.org.in/index.html
Our journal has digital transformation, effective management strategies are crucial. Our pages unfold discussions on navigating the complexities of modern business landscapes, strategic decision-making, and adaptive leadership—essential elements for success in the 21st century.
The document discusses using machine learning for efficient attack detection in IoT devices without feature engineering. It proposes a feature-engineering-less machine learning (FEL-ML) process that uses raw packet byte streams as input instead of engineered features. This approach is lighter weight and faster than traditional methods. The FEL-ML model is trained directly on unprocessed packet data to perform malware detection on resource-constrained IoT devices. Prior research that used engineered features or complex deep learning models are not suitable for IoT due to limitations of memory and processing power. The proposed FEL-ML approach aims to enable effective network traffic security for IoT using minimal resources.
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
Through the generalization of deep learning, the research community has addressed critical challenges in
the network security domain, like malware identification and anomaly detection. However, they have yet to
discuss deploying them on Internet of Things (IoT) devices for day-to-day operations. IoT devices are often
limited in memory and processing power, rendering the compute-intensive deep learning environment
unusable. This research proposes a way to overcome this barrier by bypassing feature engineering in the
deep learning pipeline and using raw packet data as input. We introduce a feature- engineering-less
machine learning (ML) process to perform malware detection on IoT devices. Our proposed model,”
Feature engineering-less ML (FEL-ML),” is a lighter-weight detection algorithm that expends no extra
computations on “engineered” features. It effectively accelerates the low-powered IoT edge. It is trained
on unprocessed byte-streams of packets. Aside from providing better results, it is quicker than traditional
feature-based methods. FEL-ML facilitates resource-sensitive network traffic security with the added
benefit of eliminating the significant investment by subject matter experts in feature engineering.
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
This document discusses several studies on using machine learning techniques to optimize routing in Internet of Things (IoT) networks. It first provides background on IoT and challenges with routing in IoT networks due to factors like device mobility and limited resources. It then summarizes several papers that propose different machine learning approaches for IoT routing, including using reinforcement learning to balance node loads and extend network lifetime, integrating deep reinforcement learning into existing routing protocols to improve performance, and using Q-learning at each node to learn optimal parent selection policies based on network conditions. Finally, it discusses a study that developed an energy-efficient routing algorithm for wireless sensor networks based on dynamic programming to maximize network lifetime.
THE DYNAMICS OF THE UBIQUITOUS INTERNET OF THINGS (IOT) AND TRAILBLAZING DATA...ijwmn
The document discusses the dynamics between the Internet of Things (IoT) and data mining (DM). It finds that IoT continues to evolve significantly, with DM and access to cloud computing accelerating technological innovations. Various themes related to IoT, such as sports, supply chain, and agriculture, saw positive growth between 2016-2019 based on app searches. The emerging Internet of Nano-Things and Wireless Sensor Networks were also found to provide more accurate information gathering and data processing. In conclusion, IoT growth will continue to affect how people interact with devices, though privacy and standardization concerns remain.
The Dynamics of the Ubiquitous Internet of Things (IoT) and Trailblazing Data...ijwmn
The research study intends to understand the thematic dynamics of the internet of things (IoT), thereby aiming to address the general objective i.e. “To explore and streamline the IoT thematic dynamics with a focus on cross-cutting data mining, and IoT apps evidence-based publication trends”. To meet this objective, secondary research has been compiled as part of the analytic process. It was found from the research that IoT continues to evolve with significant degrees of proliferation. Complementary and
trailblazing data mining (DM) with more access to cloud computing platforms has catalyzed accelerating the achievement of planned technological innovations. The outcome has been myriads of apps currently used in different thematic landscapes. Based on available data on app searches by users, and between 2016 and 2019, themes like sports, supply chain, and agriculture maintained positive trends over the four years. The emerging Internet of Nano-Things was found to be beneficial in many sectors
This document provides an overview of using data science techniques for analyzing Internet of Things (IoT) network traffic, using a smart home network as an example. It first discusses IoT systems, including components, communication protocols, and challenges. It then discusses how machine learning approaches like pattern detection, feature selection, and classification can be used to analyze IoT network traffic and behaviors. Specifically, it presents how these techniques could be applied in R and RStudio to a practical smart home network case study to better understand device interactions and identify anomalies.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
A review on machine learning based intrusion detection system for internet of...IJECEIAES
Within an internet of things (IoT) environment, the fundamental purpose of various devices is to gather the abundant amount of data that is being generated and then transmit this data to the predetermined server over the internet. IoT connects billions of objects and the internet to communicate without human intervention. But network security and privacy issues are increasing very fast, in today's world. Because of the prevalence of technological advancement in regular activities, internet security has evolved into a necessary requirement. Because technology is integrated into every aspect of contemporary life, cyberattacks on the internet of things represent a bigger danger than attacks against traditional networks. Researchers have found that combining machine learning techniques into an intrusion detection system (IDS) is an efficient way to get beyond the limitations of conventional IDSs in an IoT context. This research presents a comprehensive literature assessment and develops an intrusion detection system that makes use of machine learning techniques to address security problems in an IoT environment. Along with a comprehensive look at the state of the art in terms of intrusion detection systems for IoT-enabled environments, this study also examines the attributes of approaches, common datasets, and existing methods utilized to construct such systems.
This document discusses the Internet of Things (IoT) and provides an overview of what IoT is, its architecture and applications. The key points are:
1) IoT connects physical objects through the internet and allows them to collect and transfer data without human assistance. It transitions communication from human-to-human to human-to-device and device-to-device.
2) IoT has six layers in its architecture - perception, network, middleware, application, and business layers. It connects objects through sensors and networks and processes the data through middleware before powering applications.
3) IoT will have over 50 billion connected devices by 2020 and has applications in traffic monitoring, healthcare, security,
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion DetectionIJCNCJournal
This paper proposes an intelligent and compact machine learning model for IoT intrusion detection using an ensemble of semi-parametric models with Ada boost. The proposed model provides an adequate realtime intrusion detection at an affordable computational complexity suitable for the IoT edge networks. The proposed model is evaluated against other comparable models using the benchmark data on IoT-IDS and shows comparable performance with reduced computations as required.
The document lists 57 references related to the Internet of Things (IoT). It covers topics such as the evolution of wireless sensor networks towards IoT, future directions for IoT, clustering techniques in wireless sensor networks, applications of wireless sensors, deployment algorithms for sensor networks, energy efficient routing protocols, performance of sensor network motes, adding value to sensor network simulations, overviews and definitions of IoT, enabling technologies and protocols for IoT, applications of IoT such as smart cities and healthcare, security and privacy issues in IoT, IoT testbeds and experimental platforms, middleware for IoT, and data analytics and management for large-scale IoT systems.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
This document discusses Internet of Things (IoT) and how it relates to big data. It begins with an overview of IoT, describing how physical objects can be connected to the internet through sensors and actuators. It then discusses IoT architecture, which involves edge analytics and cloud analytics. Next, it defines big data and its four V's (volume, velocity, variety, and veracity). It explains how IoT generates large amounts of data and describes how this data is stored, analyzed, and used. The document concludes that IoT data analytics is essential for managing complex IoT systems like smart cities.
CONTEXT INFORMATION AGGREGATION MECHANISM BASED ON BLOOM FILTERS (CIA-BF) FOR...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such
as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge
routers, and Base Stations (BS) which communicate with each other and send millions of data packets that
need to be delivered to their destination nodes successfully to ensure the High-performance communication
networks. IoT devices connect to the Internet using wired or wireless communication channels where most
of the devices are wearable, which means people slowly move from one point to another or fast-moving
using vehicles. How to ensure high performance of IoT data networks is an important research challenge
while considering the limitation of some IoT devices that may have limited power resources or limited
coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for
IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT
it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their
resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different
characteristics, a multicasting mechanism to send one message to various groups of devices will not be
efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful
to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices.
In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters
to increase the performance of IoT communication networks. A routing architecture is built based on
bloom filters which store routing information. In our works, we reduce the size of routing information
using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an
edge router which is hierarchically connected to an upper router after operating its bloom filter. Our
simulation results show a significant improvement in the IoT performance metrics such as packets
transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in
comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector
routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for...IJCNCJournal
Internet of Things (IoT) has become a popular technology in recent years. Different IoT applications such as traffic control, environment monitoring, etc. contain many sensor devices, routers, actuators, edge routers, and Base Stations (BS) which communicate with each other and send millions of data packets that need to be delivered to their destination nodes successfully to ensure the High-performance communication networks. IoT devices connect to the Internet using wired or wireless communication channels where most of the devices are wearable, which means people slowly move from one point to another or fast-moving using vehicles. How to ensure high performance of IoT data networks is an important research challenge while considering the limitation of some IoT devices that may have limited power resources or limited coverage areas. Many Kinds of research focus on how to customize routing protocols to be efficient for IoT devices. The traditional routing mechanisms utilized specific IP addresses to identify users while in IoT it is more beneficial to identify a group of users (things) based on any contexts, status, or values of their resources such as the level of their batteries (e.g., low, medium or high). While IoT devices have different characteristics, a multicasting mechanism to send one message to various groups of devices will not be efficient in IoT communication networks since the aggregation of packets is very difficult. Thus, it is useful to propose a mechanism that able to filter data packets that need to be sent to a specific group of devices. In this paper, we propose efficient context-aware addressing mechanism, which is based on bloom filters to increase the performance of IoT communication networks. A routing architecture is built based on bloom filters which store routing information. In our works, we reduce the size of routing information using a proposed aggregation mechanism which is based on connecting each group of IoT devices with an edge router which is hierarchically connected to an upper router after operating its bloom filter. Our simulation results show a significant improvement in the IoT performance metrics such as packets transmission delay, jitter the throughput, packets dropping ratio, and the energy consumption in comparison with well-known routing protocols of IoT such as Destination Sequenced Distance Vector routing protocol (DSDV), and Ad hoc On-demand Distance Vector routing protocol (AODV).
This document provides a list of 57 references related to the Internet of Things (IoT). The references cover topics such as the evolution of wireless sensor networks towards IoT, future Internet and IoT, clustering techniques in wireless sensor networks for IoT scenarios, civil applications of wireless sensors, deployment algorithms for coverage and connectivity in wireless sensor networks, energy efficient routing techniques for wireless sensor networks, performance analysis of sensor motes used in wireless sensor networks, adding value to wireless sensor network simulations using experimental IoT platforms, overviews of IoT, data fusion and IoT for smart environments, challenges of waste management in IoT-enabled smart cities, enabling IoT technologies and protocols, IoT gateways, semantics for IoT,
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
Expansive soils (ES) have a long history of being difficult to work with in geotechnical engineering. Numerous studies have examined how bagasse ash (BA) and lime affect the unconfined compressive strength (UCS) of ES. Due to the complexities of this composite material, determining the UCS of stabilized ES using traditional methods such as empirical approaches and experimental methods is challenging. The use of artificial neural networks (ANN) for forecasting the UCS of stabilized soil has, however, been the subject of a few studies. This paper presents the results of using rigorous modelling techniques like ANN and multi-variable regression model (MVR) to examine the UCS of BA and a blend of BA-lime (BA + lime) stabilized ES. Laboratory tests were conducted for all dosages of BA and BA-lime admixed ES. 79 samples of data were gathered with various combinations of the experimental variables prepared and used in the construction of ANN and MVR models. The input variables for two models are seven parameters: BA percentage, lime percentage, liquid limit (LL), plastic limit (PL), shrinkage limit (SL), maximum dry density (MDD), and optimum moisture content (OMC), with the output variable being 28-day UCS. The ANN model prediction performance was compared to that of the MVR model. The models were evaluated and contrasted on the training dataset (70% data) and the testing dataset (30% residual data) using the coefficient of determination (R2), Mean Absolute Error (MAE), and Root Mean Square Error (RMSE) criteria. The findings indicate that the ANN model can predict the UCS of stabilized ES with high accuracy. The relevance of various input factors was estimated via sensitivity analysis utilizing various methodologies. For both the training and testing data sets, the proposed model has an elevated R2 of 0.9999. It has a minimal MAE and RMSE value of 0.0042 and 0.0217 for training data and 0.0038 and 0.0104 for testing data. As a result, the generated model excels the MVR model in terms of UCS prediction.
DIY Gesture Control ESP32 LiteWing Drone using PythonCircuitDigest
Build a gesture-controlled LiteWing drone using ESP32 and MPU6050. This presentation explains components, circuit diagram, assembly steps, and working process.
Read more : https://circuitdigest.com/microcontroller-projects/diy-gesture-controlled-drone-using-esp32-and-python-with-litewing
Ideal for DIY drone projects, robotics enthusiasts, and embedded systems learners. Explore how to create a low-cost, ESP32 drone with real-time wireless gesture control.
"The Enigmas of the Riemann Hypothesis" by Julio ChaiJulio Chai
In the vast tapestry of the history of mathematics, where the brightest minds have woven with threads of logical reasoning and flash-es of intuition, the Riemann Hypothesis emerges as a mystery that chal-lenges the limits of human understanding. To grasp its origin and signif-icance, it is necessary to return to the dawn of a discipline that, like an incomplete map, sought to decipher the hidden patterns in numbers. This journey, comparable to an exploration into the unknown, takes us to a time when mathematicians were just beginning to glimpse order in the apparent chaos of prime numbers.
Centuries ago, when the ancient Greeks contemplated the stars and sought answers to the deepest questions in the sky, they also turned their attention to the mysteries of numbers. Pythagoras and his followers revered numbers as if they were divine entities, bearers of a universal harmony. Among them, prime numbers stood out as the cornerstones of an infinite cathedral—indivisible and enigmatic—hiding their ar-rangement beneath a veil of apparent randomness. Yet, their importance in building the edifice of number theory was already evident.
The Middle Ages, a period in which the light of knowledge flick-ered in rhythm with the storms of history, did not significantly advance this quest. It was the Renaissance that restored lost splendor to mathe-matical thought. In this context, great thinkers like Pierre de Fermat and Leonhard Euler took up the torch, illuminating the path toward a deeper understanding of prime numbers. Fermat, with his sharp intuition and ability to find patterns where others saw disorder, and Euler, whose overflowing genius connected number theory with other branches of mathematics, were the architects of a new era of exploration. Like build-ers designing a bridge over an unknown abyss, their contributions laid the groundwork for later discoveries.
Module4: Ventilation
Definition, necessity of ventilation, functional requirements, various system & selection criteria.
Air conditioning: Purpose, classification, principles, various systems
Thermal Insulation: General concept, Principles, Materials, Methods, Computation of Heat loss & heat gain in Buildings
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
Tesia Dobrydnia brings her many talents to her career as a chemical engineer in the oil and gas industry. With the same enthusiasm she puts into her work, she engages in hobbies and activities including watching movies and television shows, reading, backpacking, and snowboarding. She is a Relief Senior Engineer for Chevron and has been employed by the company since 2007. Tesia is considered a leader in her industry and is known to for her grasp of relief design standards.
Structural Health and Factors affecting.pptxgunjalsachin
Structural Health- Factors affecting Health of Structures,
Causes of deterioration in RC structures-Permeability of concrete, capillary porosity, air voids, Micro cracks and macro cracks, corrosion of reinforcing bars, sulphate attack, alkali silica reaction
Causes of deterioration in Steel Structures: corrosion, Uniform deterioration, pitting, crevice, galvanic, laminar, Erosion, cavitations, fretting, Exfoliation, Stress, causes of defects in connection
Maintenance and inspection of structures.
Better Builder Magazine brings together premium product manufactures and leading builders to create better differentiated homes and buildings that use less energy, save water and reduce our impact on the environment. The magazine is published four times a year.
This presentation provides a comprehensive overview of a specialized test rig designed in accordance with ISO 4548-7, the international standard for evaluating the vibration fatigue resistance of full-flow lubricating oil filters used in internal combustion engines.
Key features include:
Machine learning for internet of things classification using network traffic parameters
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 3, June 2023, pp. 3449~3463
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i3.pp3449-3463 3449
Journal homepage: http://ijece.iaescore.com
Machine learning for internet of things classification using
network traffic parameters
Loubna Elhaloui1
, Sanaa El Filali1
, El Habib Benlahmer1
, Mohamed Tabaa2
, Youness Tace1,2
,
Nouha Rida3
1
Laboratory of Information Technologies and Modelling, Faculty of Sciences Ben M’sik, Hassan II University, Casablanca, Morocco
2
Pluridisciplinary Laboratory of Research and Innovation (LPRI), EMSI Casablanca, Casablanca, Morocco
3
Department of Computer Science Engineering, Mohammadia School of Engineers (EMI), Rabat, Morocco
Article Info ABSTRACT
Article history:
Received May 24, 2022
Revised Jul 26, 2022
Accepted Aug 18, 2022
With the growth of the internet of things (IoT) smart objects, managing these
objects becomes a very important challenge, to know the total number of
interconnected objects on a heterogeneous network, and if they are
functioning correctly; the use of IoT objects can have advantages in terms of
comfort, efficiency, and cost. In this context, the identification of IoT objects
is the first step to help owners manage them and ensure the security of their
IoT environments such as smart homes, smart buildings, or smart cities. In
this paper, to meet the need for IoT object identification, we have deployed an
intelligent environment to collect all network traffic traces based on a diverse
list of IoT in real-time conditions. In the exploratory phase of this traffic, we
have developed learning models capable of identifying and classifying
connected IoT objects in our environment. We have applied the six supervised
machine learning algorithms: support vector machine, decision tree (DT),
random forest (RF), k-nearest neighbors, naive Bayes, and stochastic gradient
descent classifier. Finally, the experimental results indicate that the DT and
RF models proved to be the most effective and demonstrate an accuracy of
97.72% on the analysis of network traffic data and more particularly
information contained in network protocols. Most IoT objects are identified
and classified with an accuracy of 99.21%.
Keywords:
Internet of things
Machine learning
Network traffic
This is an open access article under the CC BY-SA license.
Corresponding Author:
Loubna Elhaloui
Laboratory of Information Technology and Modeling, Faculty of Sciences Ben M’sik, Hassan II University
of Casablanca
BP 7955 Sidi Othman Casablanca, Morocco
Email: [email protected]
1. INTRODUCTION
Nowadays, the telecommunications market is experiencing a significant boom in the use of smart
connected objects. This object is a hardware component equipped with a sensor that allows data to be generated,
exchanged, and consumed with minimal human intervention [1]. They have an increasingly important presence
in our daily life, whether in our ways of consuming or in our ways of producing. In particular, these smart
objects make it possible to create a mass of available data, thanks to the collection and processing of the traffic
sent and received by each connected object on an IoT network, to make our environment smarter, in particular,
smart homes, smart buildings, smart traffic, and smart cities [2].
In our previous work [3], we presented the IoT system model of a smart building, to allow users to
control, identify and access smart devices, thanks to the shared and exchanged data by different network
protocols. It, therefore, becomes necessary to be able to secure these various objects. The identification of the
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3450
intelligent objects which evolves in a network constitutes is an essential component of the network management
tools because it provides important information allowing, in particular, to ensure the legitimacy of the traffic
exchanged.
Unfortunately, this modeling has demonstrated limitations related to the detection of physical objects
connected in a heterogeneous network. The main limitation is that all objects cannot be detected through a
single gateway due to a variety of IoT protocols. Recently, some researchers have presented techniques for
identifying IoT objects that rely on learning methods to characterize the attributes of various objects.
Sivanathan et al. [4] developed an algorithm for classifying IoT devices based on machine learning, which is
based on various network traffic characteristics to identify and classify the behavior of IoT objects on a
network. Ammar et al. [5] used supervised learning techniques based on flow attributes of traffic sent and
received by connected objects as well as textual data. Meidan et al. [6] are the first to demonstrate the feasibility
of identifying IoT objects based on network traces using machine learning. In the first step, a system that
analyzes TCP sessions is presented to differentiate network traffic generated by non-IoT and IoT objects, and
in the second step, their identification is proceed. Snehi and Bhandari [7] proposed a new framework for IoT
traffic classification based on Stack-Ensemble, by exploiting the behavioral attributes of real-time high-volume
IoT device traffic. Bezawada et al. [8] proposed a complementary identification system that leads to the
behavioral identification of IoT objects based on their activity within the network. In addition, Miettinen et al.
[9] presented a system for automatically identifying IoT objects and enforcing security that executes an
appropriate action plan to restrict or authorize their communications within a network. Sneh and Bhandari [10]
provided the taxonomy of the techno functional application domains of the IoT classification, by inferences on
the attributes of IoT traffic and the exploitation of an Australian dataset collected from 28 IoT objects.
In this paper, we present an implementation of a model for classifying connected objects by an
identification system through network protocols and traffic flow statistics, using the packet analysis tools
executed in the gateway (to see all incoming and outgoing traffic from connected objects). The discipline of
traffic flow analysis provides a means of collecting and exporting data that infer attributes of packets.
This article is organized as follows. Section 2 describes the problem of the work citing relevant
previous work. Presenting the literature concerning machine learning algorithms with the state of the art in
section 3. IoT traffic parameters in section 4, and in section 5 develop classification models to identify IoT
objects. The paper is concluded in section 6.
2. BACKGROUND
The growing number of devices connected to the internet capable of communicating with each other
continues to increase at a steady pace [2]. This trend tends to increase with the proliferation of actors, both
manufacturers and suppliers. The IoT based on traditional networks to which so-called “intelligent” objects are
connected, raises new issues around the detection of connected objects on heterogeneous networks involved in
intelligent environments, and also around the security [11] of these networks and the information passing
through them.
The identification of connected objects poses a great challenge given a large number of heterogeneous
protocols [12], the networks used and few consensual standards. Recent approaches to object identification
based on behavioral analysis of computing devices have emerged [13]. The basic idea is to scrutinize the traffic
crossing the network, using either active or passive measurement techniques, and to extract unique patterns
that are sufficiently discriminating in order to individually identify the objects present within our network.
There are a wide variety of methods for analyzing device traffic flow, that can be broadly classified into two
categories depending on the type of network surveillance considered: active surveillance or passive
surveillance.
The principle of active surveillance is to generate traffic in the network and observe any reactions to
the stimulus. As such, it creates additional traffic in the network. Conversely, in the case of passive surveillance,
it is an approach considered less intrusive, consisting in capturing the traffic crossing the network and studying
its properties at one or more points of the network. Usually, this approach requires software tools for traffic
capture or analysis like Wireshark [14], tcpdump, NetworkMiner, and WinDump.
Sivanathan et al. [15] have conducted tests to determine the feasibility of identifying the type of an
IoT device by probing its open ports. Nmap [16] is used to scan the ports of 19 IoT devices from their
test bench, in order to build a knowledge base of IoT device port number combinations thus forming their
signature. Snehi and Bhandari [7] have proposed a new Stack-Ensemble framework for IoT traffic
classification that characterizes traffic ingress based on statistical and functional attributes of IoT devices. This
proposed framework is capable of managing network traffic in real time. The authors have performed
a comparative analysis between the stack-Ensemble model and other classification models such as XGBoost
stacks, distributed random forest, gradient boosting machine, and general linear machine algorithms.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3451
Through this analysis, their framework demonstrated the highest values of accuracy compared to other
classification models.
Miettinen et al. [9] proposed a system called IoT sentinel which identifies types of IoT devices and
executes an appropriate course of action to restrict or allow their communications within a network. So that
any device, or attack vectors, are not used to compromise the entire network. The system relies on the random
forest classification model to identify the type of object. According to the authors, two devices are said to be
of the same type if they share the same model and the same software version. When a new device is introduced
into the network for the first time, when a new MAC address is discovered, and then the latter begins its
installation and configuration phase (first moments of communication with the gateway). In this case, the
system initiates a packet capture process using tcpdump with filtering by the MAC address of the new device.
Bezawada et al. [8] propose a complementary system called IoTSense which performs behavioral identification
of IoT devices based on their activity within the network by analyzing ethernet, IP, and transport headers. Each
device is assigned a behavioral profile, so as to detect possible deviations from the initial behavior of the device,
due to malicious activities for example. The abbreviations used in the literature are defined in Table 1.
Table 1. Abbreviations used in the literature
Abbreviation Description
ARP Address resolution protocol
DNS Domain name system
DRF Distributed random forest
DT Decision tree
EMSI Moroccan School of Engineering Sciences
GBM Gradient boost machine
GLM Generalized linear model
HTTP Hypertext transfer protocol
HTTPS Hypertext transfer protocol secure
ICMP Internet control message protocol
IoT Internet of things
IP Internet protocol
KNN K-nearest neighbors
LPRI Multidisciplinary Research and Innovation Laboratory
MAC Media access control
MDNS Multicast domain name system
ML Machine learning
NB Naive Bayes
NTP Network time protocol
RF Random forest
SGDC Stochastic gradient descent classifier
SSDP Simple service discovery protocol
SSL Secure socket layer
SVM Support vector machine
TCP Transmission control protocol
TLS Transport layer security
UDP User datagram protocol
3. MACHINE LEARNING: STATE-OF-ART
Machine learning is part of one of the approaches to artificial intelligence [17], which consists of
creating algorithms capable of improving automatically with experience. It is increasingly integrated into
most of the technologies we use on a daily basis. The machine “learns” prior data and adapts its responses.
Utilizing machine learning involves using datasets of different sizes to identify correlations, similarities, and
differences [18].
Furthermore, ML makes extensive use of tools and concepts from statistics and is part of a larger
discipline called “data science”. There are three main types of ML, Supervised learning aims to establish rules
of behavior from a dataset containing examples of already labeled cases [19]. Unsupervised learning, unlike
supervised learning; unsupervised learning deals with the case where we only have the inputs, without first
having the outputs. The goal of unsupervised learning is to find hidden shapes in an unlabeled dataset [19].
Reinforcement learning is a type of ML in which a model has no training data at the start. The objective is for
an agent to evolve in an environment and learn from its own experience. For a reinforcement learning algorithm
to work, the environment in which it operates must be computable and have a function that evaluates the quality
of an agent [19].
The identification of IoT objects presented in this work is based on supervised learning. More
precisely, it is treated as a supervised classification problem. To this end, we focus on six classification
algorithms, their finer details on each model are given as follows.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3452
3.1. Support vector machine
SVM are algorithms that separate data based on classes or separators [20]. The SVM algorithm is
ideal for identifying simple classes which are separated by vectors called hyperplanes, and which distinguish
data based on training class labels. It is also possible to program the algorithm for nonlinear data, which cannot
be clearly separated by vectors. Principally, an SVM is all about finding the hyperplanes that best separate data
classes. The predicted classes in model SVM are made based on the side of the hyperplane where the data point
falls. SVM is a kind of supervised learning algorithm based on structural risk minimization [21]. As a popular
machine learning algorithm, SVM is widely used in many fields, such as finance and information retrieval, it
provides high accuracy on current and future data. The functional part of the solution to the SVM problem is
written as a linear combination of the kernel functions taken at the support points:
𝑓(𝑥) = ∑ 𝛼𝑖𝑦𝑖𝑘(𝑥, 𝑥𝑖)
𝑖∈𝐴
where A denotes the set of active constraints and the αi the solutions of the following quadratic program:
{
𝑚𝑖𝑛
𝛼∈ℝ𝑛
1
2
𝛼𝑇
𝐺𝛼 − ⅇ𝑇
𝛼
𝑎𝑣ⅇ𝑐 𝑦𝑇
𝛼 = 0
0 ≤ 𝛼𝑖 ≤ 𝐶
where G is the matrix 𝑛 × 𝑛 with general term 𝐺𝑖𝑗 = 𝑦𝑖𝑦𝑗𝑘(𝑥𝑖, 𝑥𝑗). The bias b to the value of the Lagrange
multiplier of the equality constraint at the optimum [22].
3.2. Decision tree
A DT is a supervised learning algorithm primarily used to graph data in branches to show possible
outcomes of various actions. Classification and prediction use response variables based on past decisions [23].
DT forms a flowchart like a tree, where each node represents the test on the attribute, and each branch denotes
the result of the test. The leaf node owns the class label. However, decision trees become difficult to read when
associated with large volumes of data and complex variables. A DT is a type of learning algorithm that can be
applied to many contexts: finance, pharmaceuticals, and agriculture.
In the case of classification, the classification and regression trees (CART) algorithm uses the Gini
diversity index to measure the classification error [24]. Practically, if we suppose that the class takes a value
in the set 1, 2, …, m, and if 𝑓𝑖 denotes the fraction of the elements of the set with label 𝑖 in the set, we have:
𝐼𝐺(𝑓) = ∑ 𝑓𝑖(1 − 𝑓𝑖)
𝑚
𝑖=1
= ∑(𝑓𝑖 − 𝑓𝑖
2)
𝑚
𝑖=1
= ∑ 𝑓𝑖 −
𝑚
𝑖=1
∑ 𝑓𝑖
2
𝑚
𝑖=1
= 1 − ∑ 𝑓𝑖
2
𝑚
𝑖=1
𝑣
3.3. Random forest
RF is a supervised learning technique that uses ensemble learning algorithms that combines an
aggregation technique, “Bagging”, and a particular decision tree induction technique. It creates a strong
classifier based on weak classifiers [25]. As the name suggests, RFs are formed by simply assembling multiple
decision trees, usually ranging from a few tens to thousands of trees. This bagging method forms patterns,
which are responsible for increased performance [21]. In addition, the random process in the construction of
the trees makes it possible to ensure a low correlation between them. RF is also known for its accuracy and
ability to process datasets composed of few observations and many features. It is used in crop classification
and prediction of crop yield corresponding to current climatic and biophysical changes [26].
Let ℎ
̂(. , 𝜃1), … , ℎ
̂(. , 𝜃𝑞) be a collection of tree predictors, with 𝜃1, … , 𝜃𝑞 q random variables i.i.d.
independent of 𝐿𝑛 [27]. The RF predictor ℎ
̂𝑅𝐹 is obtained by aggregating this collection of random trees as
follows.
ℎ
̂𝑅𝐹(𝑥) =
1
𝑞
∑ ℎ
̂(𝑥1, 𝜃𝑙)
𝑞
𝑙=1
ℎ
̂𝑅𝐹(𝑥) = 𝑎𝑟𝑔 𝑚𝑎𝑥 ∑ 𝕝ℎ
̂(𝑥1,𝜃𝑙)
𝑞
𝑙=1
= 𝑘 𝑎𝑣ⅇ𝑐 1 ≤ 𝑘 ≤ 𝐾
5. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3453
3.4. K-nearest neighbor
KNN is a supervised learning method [28]. It is used for regression and classification. To make a
prediction, the KNN will be based on the datasets. The datasets are trained according to their class. The KNN
algorithm needs a distance calculation function between observations, it must be predicted to calculate the
distance with the nearest “K" points [21]. Using the formulas, there are several distance calculation methods
including, Minkowski distance, Manhattan distance, Euclidean distance, and Hamming distance. We choose
the distance method according to the types of data we are handling. The choice of the highest number of K to
make a prediction with the KNN algorithm, varies depending on the dataset. In agriculture, the KNN is very
effective for the classification of different cereals-cultivars of cereals [21]. There are different distance
calculations used in the comparison step of the KNN algorithm such as:
a. Euclidean distance, which has been used in several identification systems based on the KNN algorithm
[29]. The Euclidean distance ⅆ𝐸(𝑋, 𝑌) between the two vectors 𝑋 and 𝑌 is given by
ⅆ𝐸(𝑋, 𝑌) = √∑(𝑥𝑖 − 𝑦𝑖)2
𝑚
𝑖=1
b. Distance from city block, which is defined as follows.
ⅆ𝐸(𝑋, 𝑌) = ∑|𝑥𝑖 − 𝑦𝑖|
𝑚
𝑖=1
c. Cosine distance, which is also called angular distance and is derived from cosine similarity which measures
the angle between two vectors. This distance is defined as follows.
ⅆ𝑐𝑜𝑠(𝑋, 𝑌) = 1 −
∑ 𝑋𝑖𝑌𝑖
𝑚
𝑖=1
√∑ 𝑋𝑖
2
𝑚
𝑖=1
1
√∑ 𝑌𝑖
2
𝑚
𝑖=1
d. Correlation distance, which is given by the following formula.
ⅆ𝑐𝑜𝑟(𝑋, 𝑌) = 1 −
∑ (𝑥𝑖 − 𝑦
̅𝑖)
𝑚
𝑖=1
√∑ (𝑥𝑖 − 𝑦
̅𝑖)2
𝑚
𝑖=1
(𝑥𝑖 − 𝑦
̅𝑖)
√∑ (𝑥𝑖 − 𝑦
̅𝑖)2
𝑚
𝑖=1
3.5. Naive Bayes classifier
NB classifier is a supervised machine learning algorithm [30], it is a classification method that is
mainly based on Bayes' theorem. The latter is particularly useful for text classification issues. Bayes' theorem
is based on conditional probability theory [31]. The NB algorithm defines rules that allow it to classify a set of
observations, thus defining its classification rules from a dataset in order to apply them to the classification of
predictive data. Its main function is that it makes a strong priori hypothesis of the independence of the
characteristics considered, thus ignoring the correlations that may exist between them. NB algorithms are
widely used in the creation of Anti-Spam filters, recommendation systems, and digital marketing. The
probabilistic model for a classifier is the conditional model [32].
𝑝(𝐶|𝐹1, … , 𝐹𝑛)
where C is a dependent class variable whose instances or classes are few, conditioned by serval characteristic
variables 𝐹1, … , 𝐹𝑛. Using Bayes’ theorem, we write:
𝑝(𝐶|𝐹1, … , 𝐹𝑛) =
𝑝(𝐶)𝑝(𝐹1, … , 𝐹𝑛|𝐶)
𝑝(𝐹1, … , 𝐹𝑛)
3.6. Stochastic gradient descent classifier
Stochastic gradient descent classifier (SGDC) is a supervised predictive learning algorithm [33],
which will allow to minimize the objective function which is written as a sum of differentiable functions. The
process is then performed iteratively on randomly drawn datasets. Each objective function minimized in this
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3454
way is an approximation of the global objective function. The SGDC is widely used for training many families
of models in machine learning, including support vector machines, logistic regression and graphical models
[34]. In the SGD algorithm, the true value of the gradient of 𝑄(𝑤) is approximated by the gradient of a single
component of the sum.
𝑄(𝑤) =
1
𝑛
∑ 𝑄𝑖(𝑤)
𝑛
𝑖=1
In pseudo-code, the SGD method can be represented.
a. Choose an initial parameter vector w and a learning rate η.
b. Repeat until an approximate minimum is obtained: i) randomly shuffle the samples from the training set,
and ii) for 𝑖 = 1, 2, …, 𝑛 , do:
𝑤 ≔ 𝑤 − 𝜂∇𝑄(𝑤) = 𝑤 −
𝜂
𝑛
∑ ∇𝑄𝑖(𝑤)
𝑛
𝑖=1
4. INTERNET OF THINGS TRAFFIC PARAMETERS
Understanding the nature and characteristics of the traffic generated by IoT objects is a crucial
step for implementing effective network policy and resource management in an IoT infrastructure.
However, studies focusing exclusively on characterizing IoT traffic are still in their infancy. A challenge that
Sivanathan et al. [35] attempted to address by empirically analyzing network traffic under conditions
simulating a smart city and smart campus environment in order to uncover the characteristics and behavioral
patterns of IoT devices.
To do this, they collected network traffic from a heterogeneous range of 30 devices, both 28 IoT
devices and 2 non-IoT devices, over a continuous period spanning several months. IoT traffic includes both
traffic generated by devices autonomously and traffic generated as a result of user interactions with devices.
The raw data collected consists of the TCP packet data header and payload information.
The authors are primarily interested in the distribution of 4 traffic flow characteristics: duration,
ratio, throughput, and the duration of inactivity of traffic flows. It is explained that for each of the
characteristics there are disparities that exhibit a distinct pattern. Sivanathan et al. [35] explained that each
of the IoT devices uses less than 10 distinct ports to communicate and that some devices use non-standard
port numbers. Moreover, some of them from the same manufacturer share some port numbers. Similarly, in
terms of DNS queries, certain domain names are invoked by devices from the same manufacturer. The
authors have also pointed out that with respect to the NTP protocol, some devices exhibit an identifiable
pattern at the NTP request sending interval. Finally, they noticed that 17 of the 28 IoT devices in the test
bed use TLS/SSL to communicate. Also, at the list of cipher suites [36] issued when establishing a TLS
connection.
In our object identification process based on machine learning techniques, we have conducted tests to
determine the feasibility of detecting smart objects by probing their network traffic. We have used Wireshark
[14] to scan our network traffic of 75 devices, in order to build a knowledge base of combinations of IP
addresses, MAC addresses, port numbers, and packet sizes. Firstly, we have analyzed the protocol sessions to
distinguish the network traffic generated by the IoT objects, and secondly, to proceed to their identification.
Our work describes an experimental environment in which network traffic data was collected from 75 objects
of 13 different types of devices. Over a period of several months, traffic capture was recorded as packets in
PCAP files. This collected data is then transformed into protocol sessions (ARP, SSDP, mDNS, DNS, NTP,
HTTP, HTTPS, TCP, and UDP), each session is identified by a unique triplet (source address, destination
address, type of protocol).
In this study, using supervised learning, classification models such as the RF model, DT, and KNN
model were used. to train a classifier that predicts the probability that a given session originates from an object
belonging to the set of known IoT objects. Initially, the results show an average rate of 89% of sessions
correctly classified as being part of our list of objects. Then to improve these results, we have put an additional
step in the classification process using the balancing on the network traffic coming from each connected object
in our environment. The result shows an improvement of around 8%. In this regard, we have chosen the
classification models of supervised machine learning, to proceed with the identification of IoT objects. Due to
the heterogeneity of the protocols and devices of the latter, the classification model which presents a rate of
97.72% is the decision tree.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3455
5. DISCUSSION
A smart building uses technology to share information between different systems [37], it is happening
in the building in order to optimize the performance of the latter. This information is then used to automate
various processes, from heating to ventilation, or air conditioning for security. When we talk about smart
buildings, the general public thinks first of all, of a building that intelligently monitors its energy consumption
and is able to control this consumption, because it relies above all on connectivity. It is made up of connected
objects and applications with which the user interacts in real time. But the concept is much broader than that.
A smart building also has advantages in the areas of living comfort, health and safety, among others [38].
The most fundamental characteristics of the smart building are its systems that are connected to each
other. This system consists of smart objects, such as fire alarms, lighting, motion detectors, cameras; they are
all connected. The use of smart objects is an integral part of a smart building, and they play a very important
role in collecting data for collection and analysis by automated systems that can identify and control throughout
the building. In the present work, the IoT environment is discussed through the prism of connected objects
evolving in a similar intelligent building has been set up within the framework of the LPRI as shown in
Figure 1 at EMSI, one involving IoT devices in Table 2, gas sensors, cameras, smart speakers, temperature
sensors, IP phones, smart TVs, smartphones are connected to the internet.
Figure 1. Architecture of the IoT environment of the LPRI lab
Table 2. List of devices used in our lab
Devices Number of devices Number of flows generated
Smart TV (Samsung) 4 36793
Printer (Tokyo Electric CO., LTD) 3 37154
Smart Speaker (JBL) 4 36473
WebCam (Hangzhou Hikvision) 9 37429
Hotspot WIFI (Ubiquiti Access Point) 6 37940
Gas Sensor 4 36396
Temperature Sensor 3 33150
Smart Phone 6 32454
Laptop 6 36328
Personal Computer 10 37944
IP Phone (Aastra) 10 34048
Modulator DVB-C 4 37333
Tablet (Samsung) 6 34412
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3456
On the other hand, studies focusing exclusively on characterizing IoT traffic are still in their infancy.
To do our job, we collected network traffic from a diverse range of devices, over a continuous period of time
spanning multiple times. IoT traffic includes both traffic generated by devices autonomously and traffic
generated as a result of user interactions with devices.
Figure 2 represents the operating principle of our system for identifying IoT objects in our
environment, starting from the capture of network traffic to the development of classification and prediction
models. Firstly, this system collects the network traffic from the start of the object to be identified. Then, a step
of extracting parameters characterizing the different classes is carried out from the traces of IoT traffic. The
next step is to classify all the extracted parameters to obtain the identity of the considered object using one or
more classifiers such as SVM, KNN, RF, and DT. This classification takes into account the models of the
different classes, previously trained in a phase called the learning phase.
Figure 2. General view of the operation of an identification system
The raw data collected consists of the TCP packet data header and payload information. We are first
interested in the distribution of traffic flow characteristics such as throughput, duration, and idle time of traffic
flows. We will explain that for each of the characteristics where we find disparities that exhibit a distinct pattern.
Capturing network traffic is a relatively easy process that can be accomplished by placing a tool such
as Wireshark or t-shark on a host through which network traffic is routed. In our case, all network traffic
entering and leaving the local network was observed and collected manually using the Wireshark tool as in
Figure 3. During this observation phase, all traces were collected several times from a computer (Microsoft
Windows 10) connected to the same network. The distribution of packet volume per IoT object generally shows
variations in magnitude when there are no interactions with third parties. Figure 4 illustrates the distribution of
packets of IoT objects in our lab. In particular, we can notice the absence of network activity with regard to the
gas sensor and the temperature sensor. However, if one interacts with these latter sensors, then their network
activity is multiplied by a variable factor.
We have described the data collection process. Once we have all the traces, we need to convert them
into a format usable by the machine learning algorithms. To do this, a python script has been implemented to
allow the extraction of the characteristics from the network flow. A network stream can be defined as one or
more packets traveling between two computer addresses using a particular protocol (TCP, UDP, ICMP, ...).
Most IoT objects regularly exchange traffic with servers that are often identifiable by their domain
names corresponding to their manufacturers/suppliers. In addition, these exchanges can occur periodically,
such as the use of the NTP protocol for time-stamping services, or DNS requests at the initiative of IoT objects.
Most IoT objects exhibit a recognizable pattern in the use of certain TCP/IP protocols [35].
After the stage of feature extraction based on PCAP files and their transformation into a dataset, this
was processed using the Scikit-learn library to develop models capable of predicting/identifying the type of
9. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3457
IoT objects using the machine learning technique. There are multiple different classification algorithms suitable
for a problem like this. Many of them inherently support multiclass data (e.g., NB, decision trees, nearest-K),
and for others like the SVM which only supports two classes by definition, there are still several methods for
adapting SVMs to multiclass problems [39].
Figure 3. Wireshark capture
Figure 4. Packet distribution of IoT objects in 1-minute intervals
Packets/1
min
Packets/1
min
Temps (s)
Temps (s)
15
12.5
10
7.5
5
2.5
0
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3458
Scikit-learn includes a wide range of supervised and unsupervised machine learning algorithms. In
this work, six different classification algorithms were used: RF, SVM, KNN, SGDC, DT, and NB as in
Figure 5. To do this, the algorithms were executed in a web application called Jupyter Notebook [40] chosen
for its intelligible interface. As mentioned above, the approach proposed in this paper is based on multiclass
supervised learning in the sense that we treat the identification of IoT objects as a supervised classification
problem. Our dataset contains a set of values where each value is associated with a feature and an observation.
Figure 5. Performance of classification models
Our dataset includes 467,854 observations. It was divided into two subsets (training and test set)
during the supervised learning phase. Once the models were trained on the training set, we checked their
performance on the test set using metrics from the Scikit-learn library.
Just like on our own dataset, we trained the algorithms on the first subset of data and then evaluated
their performance on the second. As a result, the DT and RF models proved to be the most efficient in view of
the metric results shown in Figure 4. In addition, their learning time is quite fast compared to others.
To evaluate the performance of the classification of IoT objects, Figures 6 and 7 show the resulting
confusion matrices of the two learning algorithms, respectively the decision tree model and the Random Forest
model, of this classification. Each given cell of the confusion matrix indicates the precision that receives a
positive output from the model in the corresponding row. From the raw outputs of Figures 6 and 7, it can be
seen that these two matrices have almost the same values, and all models of the objects correctly detect most
instances of their own class, with the exception of objects like hotspot Wi-Fi which have a true positive rate of
less than 94%. On the other hand, the other objects show more than 95% up to 100% of correct detection,
which is to say true positives, for example, the models of smart TV (Samsung), tablet, and laptop objects have
the greatest confidence. At the same time, one can also see the other models incorrectly detecting instances of
objects from other classes, i.e., false positives, as shown by the non-diagonal elements in the confusion matrices.
The hotspot Wi-Fi object is more impacted compared to other objects by experiencing a drop in its
true positive rate. Focusing on the models of the objects like gas sensor and temperature sensor, we found that
their clusters overlapped with each other and with other IoT objects by a certain number of clusters, and
therefore they resulted in false positives. We do not forget that these overlaps in the models of IoT objects are
expected, especially when we want to classify a large number of different objects. IoT traffic overlaps can be
due to various reasons such as actions triggered by events, or the use of common services, such as objects from
the same manufacturer.
The final discussion of model performance concerns the details of the critical performance metric
(accuracy). Table 3 shows the comparative analysis of the accuracy of IoT objects for the following models
DT, RF, and KNN, the higher values of accuracy complement the overall accuracy of each model. Table 4
presents the comparison of the proposed work with state-of-art in the field of IoT classification.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3459
Figure 6. Decision tree model confusion matrix
Figure 7. Random forest model confusion matrix
12. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3460
Table 3. Comparison of learning model performance metrics
Devices Decision Tree Random Forest K-Nearest Neighbors
Smart TV (Samsung) 1 1 0.988317757
Smart Speaker (JBL) 0.990300317 0.982652490 0.996662340
Temperature Sensor 0.970267592 0.982652490 0.996662340
Smart Phone 0.979044933 0.979044933 0.953516820
Laptop 1 1 1
IP Phone (Aastra) 0.995714007 0.994350282 1
Modulator DVB-C 0.996612587 0.996612587 1
Tablet (Samsung) 0.994969040 0.995743034 1
Table 4. Comparison of the state of the art in the field of IoT classification
References Objective Methods Testbed Configuration Performance
[4] Classifying IoT
devices
NB, RF Smart Lab
environment
(28 devices)
Port Numbers: Accuracy: 92.13%
Domain Names: Accuracy: 79.48%
Cipher Suite: Accuracy: 36.15%
The final accuracy: 99.88%
[5] Classification of
Connected objects
DT, SVM, NB, RF,
KNN
33 connected objects Traffic flow attributes: accuracy
72%
Text attributes: accuracy 93%
The accuracy of the DT: 99%
The accuracy of the SVM: 88%
The accuracy of the NB: 98%
The accuracy of the KNN: 94%
The accuracy of the RF: 94%
[6] Classify IoT devices GBM, eXtreme
Gradient Boosting
(XGB), RF
9 IoT devices The total accuracy of the
different models used: 99.281%
[7] IoT/Non-IoT
Classification in real-
time
Stack-Ensemble,
DRF, XGB, GBM,
GLM
Packet captures from
[4]
The Stack-Ensemble model
outperformed with an accuracy
of 99.94%
[8] Fingerprint
Classification
KNN, DT, GBM 14 IoT devices Not specified
[9] Fingerprint
Classification
RF 27 devices Accuracy: 95%
[41] IoT Classification DT Smart Home setup
(5 IoT devices)
Accuracy: 97%
Our
proposed
work
IoT Classification in
real-time
DT, RF, NB, KNN 75 IoT devices from
Smart environment
(living Lab LPRI in
EMSI)
The accuracy of the DT: 97.72%
The accuracy of the RF: 97.65%
The accuracy of the KNN: 95.15%
The accuracy of the NB: 85.09
The final accuracy: 99.21% (80% in
all IoT objects)
6. CONCLUSION AND PERSPECTIVES
The main objective of this work was to propose a method for identifying IoT objects by analyzing
network traffic data. These were collected and analyzed manually using the Wireshark tool to extract the
characteristics of the network flow, which allows us to build our base of exploitable characteristics by learning
algorithms. To this end, an infrastructure of connected objects simulating an intelligent environment has been
deployed to collect network traffic in real conditions of use.
During the exploratory phase of network traffic, we have developed learning models capable of
classifying and identifying connected IoT objects in our work environment. Regarding supervised learning, we
subjected our dataset to six different classification algorithms (SVM, KNN, DT, RF, NB, and SGDC). As a
result, the DT and RF models proved to be the most efficient in view of the metric results, they achieved
97.72% accuracy in identifying and classifying each IoT object from the IoT dataset (most IoT objects are
identified and classified with an accuracy of 99.21%).
Although this approach makes it easier for us to identify and detect smart objects in our environment,
it lacks the security of these objects that are connected and interconnected to the internet with its high
cybersecurity risk in IoT networks. Currently, the smart environment has increasingly become a target for
emerging cyberattacks that will impact user privacy and potential security. In future work, we will study the
securing chapter of the IoT, which is a major and important challenge in our daily life, to define the main
security problems caused by IoT objects.
13. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3461
REFERENCES
[1] T. Sapkta, “A general survey on internet of things (IoT),” Indian Journal of Natural Sciences, vol. 12, no. 66, pp. 32077–32081,
2021.
[2] M. Lombardi, F. Pascale, and D. Santaniello, “Internet of things: A general overview between architectures, protocols and
applications,” Information, vol. 12, no. 2, Feb. 2021, doi: 10.3390/info12020087.
[3] L. Elhaloui, S. Elfilali, M. Tabaa, and E. H. Benlahmer, “Toward a monitoring system based on IoT devices for smart buildings,”
in Advances on Smart and Soft Computing, 2021, pp. 285–293. doi: 10.1007/978-981-15-6048-4_25.
[4] A. Sivanathan et al., “Classifying IoT devices in smart environments using network traffic characteristics,” IEEE Transactions on
Mobile Computing, vol. 18, no. 8, pp. 1745–1759, Aug. 2019, doi: 10.1109/TMC.2018.2866249.
[5] N. Ammar, L. Noirie, and S. Tixeuil, “ Improved identification of the type of connected objects by supervised classification,” (In
French), CORES2019-Rencontres Francophones sur la Conception de Protocoles, l’Évaluation de Performance et
l’Expérimentation des Réseaux de Communication., pp. 1–5, 2019.
[6] Y. Meidan et al., “ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis,” in
Proceedings of the Symposium on Applied Computing, Apr. 2017, pp. 506–509. doi: 10.1145/3019612.3019878.
[7] M. Snehi and A. Bhandari, “A novel distributed stack ensembled meta-learning-based optimized classification framework for real-
time prolific IoT traffic streams,” Arabian Journal for Science and Engineering, vol. 47, no. 8, pp. 9907–9930, Aug. 2022, doi:
10.1007/s13369-021-06472-z.
[8] B. Bezawada, M. Bachani, J. Peterson, H. Shirazi, I. Ray, and I. Ray, “Behavioral fingerprinting of IoT devices,” in Proceedings of
the 2018 Workshop on Attacks and Solutions in Hardware Security, Jan. 2018, pp. 41–50. doi: 10.1145/3266444.3266452.
[9] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and S. Tarkoma, “IoT SENTINEL: Automated device-type
identification for security enforcement in IoT,” in 2017 IEEE 37th International Conference on Distributed Computing Systems
(ICDCS), Jun. 2017, pp. 2177–2184. doi: 10.1109/ICDCS.2017.283.
[10] M. Sneh and A. Bhandari, “Empirical investigation of IoT traffic in smart environments: characteristics, research gaps and
recommendations,” in 2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART), Dec.
2021, pp. 176–181. doi: 10.1109/SMART52563.2021.9676298.
[11] S. Naik and V. Maral, “Cyber security — IoT,” in 2017 2nd IEEE International Conference on Recent Trends in Electronics,
Information & Communication Technology (RTEICT), May 2017, pp. 764–767. doi: 10.1109/RTEICT.2017.8256700.
[12] L. Atzori, A. Iera, and G. Morabito, “Understanding the internet of things: definition, potentials, and societal role of a fast evolving
paradigm,” Ad Hoc Networks, vol. 56, pp. 122–140, Mar. 2017, doi: 10.1016/j.adhoc.2016.12.004.
[13] P. Krishnan, K. Jain, K. Achuthan, and R. Buyya, “Software-defined security-by-contract for blockchain-enabled MUD-aware
industrial IoT edge networks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7068–7076, Oct. 2022, doi:
10.1109/TII.2021.3084341.
[14] “Wireshark.” https://www.wireshark.org (accessed May 17, 2021).
[15] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Can we classify an IoT device using TCP port scan?,” in 2018 IEEE
International Conference on Information and Automation for Sustainability (ICIAfS), Dec. 2018, pp. 1–4. doi:
10.1109/ICIAFS.2018.8913346.
[16] “Nmap.” https://nmap.org/ (accessed May 17, 2021).
[17] E. Blasch et al., “Machine learning/artificial intelligence for sensor data fusion–opportunities and challenges,” IEEE Aerospace and
Electronic Systems Magazine, vol. 36, no. 7, pp. 80–93, Jul. 2021, doi: 10.1109/MAES.2020.3049030.
[18] M. Aria, C. Cuccurullo, and A. Gnasso, “A comparison among interpretative proposals for Random Forests,” Machine Learning
with Applications, vol. 6, Dec. 2021, doi: 10.1016/j.mlwa.2021.100094.
[19] B. Mahesh, “Machine learning algorithms -A review,” International Journal of Science and Research (IJSR), vol. 9, no. 1,
pp. 381–386, 2020, doi: 10.21275/ART20203995.
[20] U. Barman and R. D. Choudhury, “Soil texture classification using multi class support vector machine,” Information Processing in
Agriculture, vol. 7, no. 2, pp. 318–332, Jun. 2020, doi: 10.1016/j.inpa.2019.08.001.
[21] M. Waleed, T.-W. Um, T. Kamal, and S. M. Usman, “Classification of agriculture farm machinery using machine learning and
internet of things,” Symmetry, vol. 13, no. 3, Mar. 2021, doi: 10.3390/sym13030403.
[22] G. Lebrun, C. Charrier, O. Lezoray, and H. Cardot, “Construction of efficient and low-complexity decision functions with SVMs,”
(In French), in RJCIA, 2005, pp. 1–14.
[23] Q. Dai, C. Zhang, and H. Wu, “Research of decision tree classification algorithm in data mining,” International Journal of Database
Theory and Application, vol. 9, no. 5, pp. 1–8, May 2016, doi: 10.14257/ijdta.2016.9.5.01.
[24] N. Ben Amor, S. Benferhat, and Z. Elouedi, “Naive Bayesian networks and decision trees in intrusion detection systems,”(In
French), TSI-Technique et Science Informatiques, vol. 25, no. 2, pp. 167–196, 2006.
[25] J. Ali, R. Khan, N. Ahmad, and I. Maqsood, “Random forests and decision trees,” IJCSI International Journal of Computer Science
Issues, vol. 9, no. 5, pp. 272–278, 2012.
[26] A. O. Ok, O. Akar, and O. Gungor, “Evaluation of random forest method for agricultural crop classification,” European Journal of
Remote Sensing, vol. 45, no. 1, pp. 421–432, Jan. 2012, doi: 10.5721/EuJRS20124535.
[27] D. Zhao et al., “Using random forest for the risk assessment of coal-floor water inrush in Panjiayao Coal Mine, northern China,”
Hydrogeology Journal, vol. 26, no. 7, pp. 2327–2340, Nov. 2018, doi: 10.1007/s10040-018-1767-5.
[28] G. Guo, H. Wang, D. Bell, Y. Bi, and K. Greer, “KNN model-based approach in classification,” in OTM 2003: On The Move to
Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE, 2003, pp. 986–996. doi: 10.1007/978-3-540-39964-3_62.
[29] H. A. Abu Alfeilat et al., “Effects of distance measure choice on K-nearest neighbor classifier performance: A review,” Big Data,
vol. 7, no. 4, pp. 221–248, Dec. 2019, doi: 10.1089/big.2018.0175.
[30] R. Mirtorabi, “Automating water capital activities using Naïve Bayes classifier with supervised learning algorithm,” University of
Waterloo, 2021.
[31] G. Gültekin and O. Bayat, “A Naïve Bayes prediction model on location-based recommendation by integrating multi-dimensional
contextual information,” Multimedia Tools and Applications, vol. 81, no. 5, pp. 6957–6978, Feb. 2022, doi: 10.1007/s11042-021-
11676-4.
[32] A. Salvail-Berard, “Les arbres de décision hybrides,” Cahier de Mathématique de l’Université de Sherbrooke, vol. 2, pp. 34–58,
2012.
[33] T. Zhang, “Solving large scale linear prediction problems using stochastic gradient descent algorithms,” in Proceedings of the
twenty-first international conference on Machine learning, 2004, pp. 116–123.
[34] B. Gaye, D. Zhang, and A. Wulamu, “Sentiment classification for employees reviews using regression vector- stochastic gradient
descent classifier (RV-SGDC),” PeerJ Computer Science, vol. 7, Sep. 2021, doi: 10.7717/peerj-cs.712.
14. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 3, June 2023: 3449-3463
3462
[35] A. Sivanathan et al., “Characterizing and classifying IoT traffic in smart cities and campuses,” in 2017 IEEE Conference on
Computer Communications Workshops (INFOCOM WKSHPS), May 2017, pp. 559–564. doi: 10.1109/INFCOMW.2017.8116438.
[36] O. Cheikhrouhou, M. B. Jemaa, and M. Laurent-Maknavicius, “New authentication method EAP-EHash,” (In French), CFIP
2006/Francophone Conference on Protocol Engineering. Hermes, 2006.
[37] A. Latifah, S. H. Supangkat, and A. Ramelan, “Smart building: A literature review,” in 2020 International Conference on ICT for
Smart Society (ICISS), Nov. 2020, pp. 1–6. doi: 10.1109/ICISS50791.2020.9307552.
[38] S. J. Rashid, A. M. Alkababji, and A. M. Khidhir, “Communication and network technologies of IoT in smart building: A survey,”
NTU Journal of Engineering and Technology, vol. 1, no. 1, pp. 1–18, 2021.
[39] R. Sangeetha and B. Kalpana, “Identifying efficient kernel function in multiclass support vector machines,” International Journal
of Computer Applications, vol. 28, no. 8, pp. 18–23, 2011.
[40] “Jupyter notebook.” https://jupyter.org/ (accessed Oct. 20, 2021).
[41] N. Ammar, L. Noirie, and S. Tixeuil, “Autonomous identification of IoT device types based on a supervised classification,” in ICC
2020 - 2020 IEEE International Conference on Communications (ICC), Jun. 2020, pp. 1–6. doi: 10.1109/ICC40277.2020.9148821.
BIOGRAPHIES OF AUTHORS
Loubna Elhaloui received a specialized master's degree in computer networks
and systems from the Faculty of Sciences Ben M’sik, Hassan II University of Casablanca,
Morocco. She is a teacher and researcher in computer networks at the EMSI Rabat, Morocco.
she is a member of the laboratory of information technologies and modeling. She can be
contacted at [email protected].
Sanaa El Filali is currently a full professor of computer science in the Department
of Mathematics and Computer Science at Faculty of Science Ben M’Sik, Hassan II University
of Casablanca. She received her Ph.D. in computer science from the Faculty of Science Ben
M’sik in 2006. Her research interests include computer training, the Internet of things, and
information processing. She can be contacted at [email protected].
El Habib Benlahmer is currently a full professor of computer science in the
Department of Mathematics and Computer Science at Faculty of Science Ben M’Sik, Hassan
II University of Casablanca since 2008. He received his Ph.D. in computer science from
ENSIAS in 2007. His research interests span both web semantic, NLP, mobile platforms, and
data science. He can be contacted at [email protected].
Mohamed Tabaa received a degree of engineer in telecommunication and
networking from the Moroccan school of engineering science of Casablanca, Morocco in
2011. He received a master's in radiocommunication, and embedded electronic systems
from University of Paul Verlaine of Metz, France. He received his Ph.D. and H.D.R.
diploma in electronics systems from University of Lorraine Metz, France in 2014 and 2020
respectively. Since 2015, he has been the Director of the LPRI private Laboratory attached to
the EMSI. His research interests include an array of digital signal processing for wireless
communications, IoT, digitalization, renewable energy, and embedded systems. He has served
on the organizing committees and technical program committees of several international
conferences, including IEEE International Conference on Microelectronics ICM, Innovation
and New Trends in Information Systems INTIS, IEEE Renewable Energies, Power Systems
and Green Inclusive Economy REPS & GIE, IEEE International Conference on Control and
Fault-Tolerant Systems SysToL. He can be contacted at [email protected].
15. Int J Elec & Comp Eng ISSN: 2088-8708
Machine learning for Internet of things classification using network traffic parameters (Loubna Elhaloui)
3463
Youness Tace holds a bachelor’s degree in mathematics and computer science, a
master’s in big data & data science (DSBD). He is a doctoral student in science and technology
and has acquired several certificates and professional skills. He currently teaches at the
Moroccan School of Engineering Sciences (EMSI) and did a few visits to Ben M'Sik Faculty
of Sciences to supervise and teach master’s students. He is a member of the Center for
Innovation and Technology Transfer (CITT). He has a penchant for the fields of the Internet
of things, artificial intelligence, and web development. He can be contacted at email:
[email protected].
Nouha Rida got her Ph.D. degree in computer science from the University
Mohamed V of Rabat- Morocco. She is a full professor in Computer Science at the EMSI
Rabat, Morocco. She is a member of the smartiLab, and she is a member of a Network and
Intelligent Systems Group and has many research contributions. She can be contacted at email:
[email protected].