SVM-Based Traffic Data Classification for Secured IoT-Based Road Signaling System

Thetrafficcontrollingsystemsatpresentaremicrocontroller-based,whichissemi-automaticinnature wheretimeistheonlyparameterthatisconsidered.WiththeintroductionofIoTintrafficsignaling systems,researchisbeingdoneconsideringdensityasaparameterforautomatingthetrafficsignaling systemandregulatetrafficdynamically.Securityisaconcernwhensensitivedataofgreatvolume isbeingtransmittedwirelessly.SecurityprotocolsthathavebeenimplementedforIoTnetworkscan protectthesystemagainstattacksandarepurelybasedonstandardcryptosystem.Theycannothandle heterogeneousdatatype.Topreventtheissuesonsecurityprotocols,theauthorshaveimplemented SVMmachinelearningalgorithmforanalyzingthetrafficdatapatternanddetectanomalies.The SVMimplementationhasbeendonefortheUKtrafficdatasetbetween2011-2016forthreecities. TheimplementationbeencarriedoutinRaspberryPi3processorfunctioningasanedgerouterand SVMmachinelearningalgorithmusingPythonScikitLibraries. KeywoRDS IoT, Pi3, SciKit, SVM

[1]  Yixiang Chen,et al.  A Self-Adaptive Traffic Light Control System Based on Speed of Vehicles , 2016, 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C).

[2]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[3]  Hai-Sheng Wang,et al.  A New Network Security Model Based on Machine Learning , 2012, 2012 International Conference on Control Engineering and Communication Technology.

[4]  S J Ghule,et al.  Network Intrusion Detection System using Fuzzy Logic , 2014 .

[5]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[6]  Anthony Skjellum,et al.  Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[7]  Nikita Singh,et al.  Integrating Machine Learning Techniques to Constitute a Hybrid Security System , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[8]  Abid Khan,et al.  Automated Traffic Control Network Using Secure Wireless , 2013 .

[9]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[10]  Heena Rathore,et al.  Bio-inspired machine learning based Wireless Sensor Network security , 2013, 2013 World Congress on Nature and Biologically Inspired Computing.

[11]  Noppon Choosri IoT-RFID Testbed for Supporting Traffic Light Control , 2015 .

[12]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[13]  Hasan Omar Al-Sakran,et al.  Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology , 2015 .

[14]  Vladimir Simov Jotsov Machine self-learning applications in security systems , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[15]  Konrad Rieck Computer Security and Machine Learning: Worst Enemies or Best Friends? , 2011, 2011 First SysSec Workshop.

[16]  Bouhorma Mohammed,et al.  IoT for ITS: A Dynamic Traffic Lights Control based on the Kerner Three Phase Traffic Theory , 2016 .

[17]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[18]  Jin B. Hong,et al.  A framework for automating security analysis of the internet of things , 2017, J. Netw. Comput. Appl..

[19]  Shaik Akbar,et al.  Improving network security using machine learning techniques , 2012, 2012 IEEE International Conference on Computational Intelligence and Computing Research.

[20]  Hongliang Guo,et al.  A Unified Framework for Vehicle Rerouting and Traffic Light Control to Reduce Traffic Congestion , 2017, IEEE Transactions on Intelligent Transportation Systems.

[21]  Flauzac Olivier,et al.  New Security Architecture for IoT Network , 2015, ANT/SEIT.

[22]  Sheng Li,et al.  A Novel Cloud Intrusion Detection System Using Feature Selection and Classification , 2015, Int. J. Intell. Inf. Technol..

[23]  Gurpreet Singh Matharu,et al.  The Internet of Things: Challenges & security issues , 2014, 2014 International Conference on Emerging Technologies (ICET).