Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Machine Learning Approaches to Impro...
~
Kayode, Olumide.
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
Author:
Kayode, Olumide.
Published:
Ann Arbor : ProQuest Dissertations & Theses, 2020
Description:
123 p.
Notes:
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Notes:
Advisor: Tosun, Ali Saman.
Contained By:
Dissertations Abstracts International82-04B.
Subject:
Computer science.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
ISBN:
9798672137339
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
Kayode, Olumide.
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 123 p.
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Thesis (Ph.D.)--The University of Texas at San Antonio, 2020.
This item must not be sold to any third party vendors.
In this current era of Internet of Things (IoT), data privacy and security of Internet enabled devices has become a major concern of many users and device manufacturers. Massive amount of data is being generated by these IoT devices and there might be possibilities of user’s information being exposed without any privacy protection. The rate of data transfer, size, kind of information transmitted and secure channels used by these IoT devices are of utmost importance and demand more exploratory research. Moreover, the "always on" and "always connected" attributes of IoT devices necessitate working condition as well as performance monitoring. Unexpected downtime and sudden breakdown of IoT devices can be extremely destructive especially for safety-critical systems. Condition monitoring and health state estimation are vital techniques for maintaining high reliability.Effective approach to investigate security and privacy of wide range of IoT devices needs to be developed. Using a proxy server, we investigate the data being transmitted by six representative IoT devices, analyze the data and propose an intelligent approach for proxy connection monitoring. Our results show that user’s information and devices’ identities were being leaked in our experiments. The applied neural network classifier uses network connection information to effectively detect proxy connections and performs better than Support Vector Machine as well as logistic regression models that were developed. We further propose a robust proxy detection mechanism suit-able for stochastic and deterministic malicious alteration of connection information. The approach is based on Deep Q-Network and Generative Adversarial Network. For condition monitoring, we propose a lightweight model operable on edge device for Remaining Useful Life (RUL) estimation. The model aptly utilizes the time series sensor data and successfully predicts the remaining useful life. Towards a distributed estimator in smart home environment, we also developed a model based on Long Short Term Memory (LSTM) neural network for estimating energy utilization.These research works demonstrate excellent results and contribution to knowledge. Our work addressed two major challenges in IoT, namely security and performance monitoring. The various data driven approaches and methods that we developed can be applied to enhance data security and performance monitoring in IoT. Security mechanisms to detect unsolicited proxy connection, anomalies or cyber attacks have been proposed. Furthermore, our techniques for estimating remaining useful life and energy utilization in smart home environment are effective. Efficient method for distributed learning and use case are also proposed to illustrate its feasibility. These are approaches that can improve reliability, performance monitoring and time-critical data driven computation.
ISBN: 9798672137339Subjects--Topical Terms:
199325
Computer science.
Subjects--Index Terms:
Data security
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
LDR
:04130nmm a2200385 4500
001
594597
005
20210521101704.5
008
210917s2020 ||||||||||||||||| ||eng d
020
$a
9798672137339
035
$a
(MiAaPQ)AAI28029941
035
$a
AAI28029941
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Kayode, Olumide.
$3
886631
245
1 0
$a
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
123 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
500
$a
Advisor: Tosun, Ali Saman.
502
$a
Thesis (Ph.D.)--The University of Texas at San Antonio, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
In this current era of Internet of Things (IoT), data privacy and security of Internet enabled devices has become a major concern of many users and device manufacturers. Massive amount of data is being generated by these IoT devices and there might be possibilities of user’s information being exposed without any privacy protection. The rate of data transfer, size, kind of information transmitted and secure channels used by these IoT devices are of utmost importance and demand more exploratory research. Moreover, the "always on" and "always connected" attributes of IoT devices necessitate working condition as well as performance monitoring. Unexpected downtime and sudden breakdown of IoT devices can be extremely destructive especially for safety-critical systems. Condition monitoring and health state estimation are vital techniques for maintaining high reliability.Effective approach to investigate security and privacy of wide range of IoT devices needs to be developed. Using a proxy server, we investigate the data being transmitted by six representative IoT devices, analyze the data and propose an intelligent approach for proxy connection monitoring. Our results show that user’s information and devices’ identities were being leaked in our experiments. The applied neural network classifier uses network connection information to effectively detect proxy connections and performs better than Support Vector Machine as well as logistic regression models that were developed. We further propose a robust proxy detection mechanism suit-able for stochastic and deterministic malicious alteration of connection information. The approach is based on Deep Q-Network and Generative Adversarial Network. For condition monitoring, we propose a lightweight model operable on edge device for Remaining Useful Life (RUL) estimation. The model aptly utilizes the time series sensor data and successfully predicts the remaining useful life. Towards a distributed estimator in smart home environment, we also developed a model based on Long Short Term Memory (LSTM) neural network for estimating energy utilization.These research works demonstrate excellent results and contribution to knowledge. Our work addressed two major challenges in IoT, namely security and performance monitoring. The various data driven approaches and methods that we developed can be applied to enhance data security and performance monitoring in IoT. Security mechanisms to detect unsolicited proxy connection, anomalies or cyber attacks have been proposed. Furthermore, our techniques for estimating remaining useful life and energy utilization in smart home environment are effective. Efficient method for distributed learning and use case are also proposed to illustrate its feasibility. These are approaches that can improve reliability, performance monitoring and time-critical data driven computation.
590
$a
School code: 1283.
650
4
$a
Computer science.
$3
199325
650
4
$a
Information technology.
$3
184390
650
4
$a
Artificial intelligence.
$3
194058
653
$a
Data security
653
$a
Deep reinforcement learning
653
$a
Internet of Things
653
$a
Machine learning
653
$a
Performance monitoring
653
$a
Smart home
690
$a
0984
690
$a
0489
690
$a
0800
710
2
$a
The University of Texas at San Antonio.
$b
Computer Science.
$3
886632
773
0
$t
Dissertations Abstracts International
$g
82-04B.
790
$a
1283
791
$a
Ph.D.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000193557
電子館藏
1圖書
電子書
EB 2020
一般使用(Normal)
in cat dept.
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login