Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology

The Internet of Things (IoT) is susceptible to several identities, primarily based on attacks. However, these attacks are controlling for IoT due to extraordinary growth in consumers’ density and slight analysis with low power access nodes. In this work, we explore the possible flaws associated with security for IoT environment insensitively meant for transfer conditions. We proposed a novel design aimed at detecting a spoofing attack that inspects the probability distributions of received power founded for the regions designed for mobile (moving) users. Additionally, we examine the influence on the Confidentiality Scope of targeted consumers in the absence and presence of observer. Our approaches were done through simulation results used for three diverse regions. Grounded on outcomes, we suggest an algorithm called MTFLA, which will guarantee detection and protection techniques intended to protect vastly sensitive areas, i.e., wherever the chance of an attack is maximized. We provide a comparison among various security algorithms prepared for the energy consumption of different patterns. Simulation results revealed that the proposed algorithm for protection (MTFL) is verified to be energy-proficient (secure garnering). It decreases the energy prerequisite for encrypting the data. We evaluated our techniques over simulation results for sensitive region information built on fuzzy logic.

[1]  Martin Mauve,et al.  Geographic routing in city scenarios , 2005, MOCO.

[2]  Othman Omran Khalifa,et al.  Design and Evaluation of a Multihoming-Based Mobility Management Scheme to Support Inter Technology Handoff in PNEMO , 2020, Wireless Personal Communications.

[3]  Jaime Lloret,et al.  Smart system for children's chronic illness monitoring , 2018, Inf. Fusion.

[4]  Jie Li,et al.  Distributed cooperative communication nodes control and optimization reliability for resource-constrained WSNs , 2017, Neurocomputing.

[5]  Rosilah Hassan,et al.  The Implementation of Internet of Things Using Test Bed in The UKMnet Environment , 2019 .

[6]  Florian Michahelles,et al.  An Architectural Approach Towards the Future Internet of Things , 2011, Architecting the Internet of Things.

[7]  Jonghun Park,et al.  Next Place Prediction Based on Spatiotemporal Pattern Mining of Mobile Device Logs , 2016, Sensors.

[8]  Liren Zhang,et al.  Architecture of Hybrid Mobile Social Networks for Efficient Content Delivery , 2014, Wireless Personal Communications.

[9]  D. Habibi,et al.  Performance evaluation of IEEE 802.15.4 for mobile sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[10]  Rosilah Hassan,et al.  Improving security for IPv6 neighbor discovery , 2015, 2015 International Conference on Electrical Engineering and Informatics (ICEEI).

[11]  B. Tulasi,et al.  Introduction to TRIMET along with its properties and scope , 2016 .

[12]  Ramjee Prasad,et al.  A cooperative Internet of Things (IoT) for rural healthcare monitoring and control , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[13]  Imran Memon,et al.  Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks , 2018, Int. J. Commun. Syst..

[14]  Tayeb Lemlouma,et al.  Adaptive monitoring system for e-health smart homes , 2018, Pervasive Mob. Comput..

[15]  Azah Mohamed,et al.  Hardware implementation of fuzzy logic based maximum power point tracking controller for PV systems , 2010, 2010 4th International Power Engineering and Optimization Conference (PEOCO).

[16]  Dusit Niyato,et al.  A hybrid model using fuzzy logic and an extreme learning machine with vector particle swarm optimization for wireless sensor network localization , 2018, Applied Soft Computing.

[17]  Andreas Geiger,et al.  Object scene flow for autonomous vehicles , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[18]  Mukhtiar Ali Unar,et al.  Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks , 2017, Wirel. Pers. Commun..

[19]  Pranesh Sthapit,et al.  Coordinator assisted passive discovery for mobile end devices in IEEE 802.15.4 , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).

[20]  Deepti Mehrotra,et al.  An IOT by information retrieval approach: Smart lights controlled using WiFi , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[21]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[22]  Aisha Hassan Abdalla Hashim,et al.  A Novel Artificial Intelligence Based Timing Synchronization Scheme for Smart Grid Applications , 2020, Wireless Personal Communications.

[23]  Sandeep K. Sood,et al.  Fog Assisted-IoT Enabled Patient Health Monitoring in Smart Homes , 2018, IEEE Internet of Things Journal.

[24]  Ian F. Akyildiz,et al.  A cross-layer communication module for the Internet of Things , 2013, Comput. Networks.

[25]  Martin Iffert,et al.  Reduction of HF Emissions from the TRIMET Aluminum Smelter (Optimizing Dry Scrubber Operations and Its Impact on Process Operations) , 2013 .

[26]  Farhad Ramezani,et al.  Fuzzy logic-based algorithm resource scheduling for improving the reliability of cloud computing , 2016 .

[27]  Xiongwen Zhao,et al.  MU-MIMO Downlink Capacity Analysis and Optimum Code Weight Vector Design for 5G Big Data Massive Antenna Millimeter Wave Communication , 2018, Wirel. Commun. Mob. Comput..

[28]  Ali Ghaffari,et al.  Fuzzy Logic Based Reliable and Real-Time Routing Protocol for Mobile Ad hoc Networks , 2018, Wirel. Pers. Commun..

[29]  Wenbo Dai,et al.  A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT) , 2012, Comput. Math. Appl..

[30]  Christophe Laot,et al.  An Efficient Blind Estimation of Carrier Frequency Offset in OFDM Systems , 2014, IEEE Transactions on Vehicular Technology.