Secure convergence of artificial intelligence and internet of things for cryptographic cipher- a decision support system

The communication industry is rapidly growing with the passage of time and the number of communication devices is increasing. This increase of communication devices put the devices and their communication into a high risk and security challenges. Intruders tries for capturing important information from such communication devices and are using for their own benefits. To build an effective and accurate decision support system (DSS) for the convergence of Artificial Intelligence (AI) and Internet of Things (IoT) can secure the systems for secure and smooth point-to-point communication. Multi-criteria decision support systems play an important role in decision making for a particular situation based on several security criteria. Decision making based on multi-criteria is one of the exciting issues faced by practitioners and researchers for the convergence of AI and IoT. Numerous DSS are available for making decisions which have the possibility to adopt activities of the decision making. The planned study presented a DSS for the secure convergence of AI and IoT for devices. The experimental work of the proposed study was carried out in the SuperDecisions tool for plotting the hierarchy of security situations based on goal, security criteria, and alternatives.

[1]  Mbarek Marwan,et al.  Security Enhancement in Healthcare Cloud using Machine Learning , 2018 .

[2]  Shah Nazir,et al.  Evaluating Security of Software Components Using Analytic Network Process , 2013, 2013 11th International Conference on Frontiers of Information Technology.

[3]  Wendy Ivins,et al.  A multifaceted evaluation of the reference model of information assurance & security , 2016, Comput. Secur..

[4]  Talita D. C. Frazão,et al.  Multicriteria decision analysis (MCDA) in health care: a systematic review of the main characteristics and methodological steps , 2018, BMC Medical Informatics and Decision Making.

[5]  Iván García-Magariño,et al.  Internet of Things for Healthcare Using Effects of Mobile Computing: A Systematic Literature Review , 2019, Wirel. Commun. Mob. Comput..

[6]  Christof Paar,et al.  A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.

[7]  Cheng Hong,et al.  Convolution Neural Network-Based Higher Accurate Intrusion Identification System for the Network Security and Communication , 2020, Secur. Commun. Networks.

[8]  Tran Duc Chung,et al.  Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review , 2020 .

[9]  Nalin Asanka Gamagedara Arachchilage,et al.  Using cognitive dimensions to evaluate the usability of security APIs: An empirical investigation , 2019, Inf. Softw. Technol..

[10]  Dimitris Kardaras,et al.  Multicriteria Evaluation of the Internet of Things Potential in Health Care: The Case of Dementia Care , 2017, 2017 IEEE 19th Conference on Business Informatics (CBI).

[11]  Mojtaba Alizadeh,et al.  Implementation and evaluation of lightweight encryption algorithms suitable for RFID , 2013 .

[12]  P. Subsorn,et al.  A COMPARATIVE ANALYSIS OF INTERNET BANKING SECURITY IN THAILAND: A CUSTOMER PERSPECTIVE , 2012 .

[13]  Srikanta Patnaik,et al.  Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology , 2020, Internet Things.

[14]  Muhammad Imran,et al.  Deep learning and big data technologies for IoT security , 2020, Comput. Commun..

[15]  Deepak Gupta,et al.  Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers , 2019, Multimedia Tools and Applications.

[16]  Vineet Sahula,et al.  Energy Efficient Lightweight Cryptography Algorithms for IoT Devices , 2019 .

[17]  Hao Hao Song,et al.  Testing and Evaluation System for Cloud Computing Information Security Products , 2020 .

[18]  Shah Nazir,et al.  Fuzzy logic based decision support system for component security evaluation , 2018, Int. Arab J. Inf. Technol..

[19]  Habib Ullah Khan,et al.  Modelling Features-Based Birthmarks for Security of End-to-End Communication System , 2020, Secur. Commun. Networks.

[20]  Yang Xiao,et al.  Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks , 2018, EURASIP J. Wirel. Commun. Netw..

[21]  Shah Nazir,et al.  Multicriteria Decision and Machine Learning Algorithms for Component Security Evaluation: Library-Based Overview , 2020, Secur. Commun. Networks.

[22]  Yi An,et al.  Ecological security evaluation based on entropy matter-element model: A case study of Kunming city, southwest China , 2019, Ecological Indicators.

[23]  Priyadarshini Patil,et al.  A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .

[24]  Shah Nazir,et al.  ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods , 2020, IEEE Access.

[25]  Talal Halabi,et al.  Towards quantification and evaluation of security of Cloud Service Providers , 2017, J. Inf. Secur. Appl..

[26]  Zarul Fitri Zaaba,et al.  A Review of Usability and Security Evaluation Model of Ecommerce Website , 2019, Procedia Computer Science.

[27]  Alastair R. Ruddle,et al.  Towards a systematic security evaluation of the automotive Bluetooth interface , 2017, Veh. Commun..

[28]  Ahmed Oloduowo Ameen,et al.  Evaluation of four encryption algorithms for viability, reliability and performance estimation , 2017 .

[29]  Donald F. Towsley,et al.  Security importance assessment for system objects and malware detection , 2017, Comput. Secur..

[30]  Shah Nazir,et al.  Evaluating Security of Internet of Medical Things Using the Analytic Network Process Method , 2020, Secur. Commun. Networks.

[31]  Zahid Ullah,et al.  KNN and ANN-based Recognition of Handwritten Pashto Letters using Zoning Features , 2018 .

[32]  Julia I. Drake,et al.  Utilization of multiple-criteria decision analysis (MCDA) to support healthcare decision-making FIFARMA, 2016 , 2017, Journal of market access & health policy.

[33]  Jin Li,et al.  The security of machine learning in an adversarial setting: A survey , 2019, J. Parallel Distributed Comput..

[34]  Zhiyong Zhang,et al.  A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory , 2017, J. Comput. Sci..

[35]  Varghese Paul,et al.  A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices , 2019, Symmetry.

[36]  Latifa Ben Arfa Rabai,et al.  A Multidimensional Approach towards a Quantitative Assessment of Security Threats , 2015, ANT/SEIT.

[37]  B Chaitra,et al.  A Survey on Various Lightweight Cryptographic Algorithms on FPGA , 2017 .

[38]  Iván García-Magariño,et al.  A Collocation Method for Numerical Solution of Nonlinear Delay Integro-Differential Equations for Wireless Sensor Network and Internet of Things , 2020, Sensors.

[39]  M. A. Kashem,et al.  An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices , 2018 .

[40]  Brahmjit Singh,et al.  Lightweight Cryptography: A Solution to Secure IoT , 2020, Wirel. Pers. Commun..

[41]  Jiahang Yuan,et al.  Regional energy security performance evaluation in China using MTGS and SPA-TOPSIS. , 2019, The Science of the total environment.

[42]  KumarSandeep,et al.  A Survey of Lightweight-Cryptography Implementations , 2007 .

[43]  Murthy V. Jonnalagedda,et al.  Clustering based on correlation fractal dimension over an evolving data stream , 2018, Int. Arab J. Inf. Technol..

[44]  Mohamed Abdel-Basset,et al.  Neutrosophic Multi-Criteria Decision Making Approach for IoT-Based Enterprises , 2019, IEEE Access.

[45]  David Bol,et al.  Towards Green Cryptography: A Comparison of Lightweight Ciphers from the Energy Viewpoint , 2012, CHES.