語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Machine Learning Approaches to Impro...
~
Kayode, Olumide.
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
作者:
Kayode, Olumide.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, 2020
面頁冊數:
123 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
附註:
Advisor: Tosun, Ali Saman.
Contained By:
Dissertations Abstracts International82-04B.
標題:
Computer science.
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
ISBN:
9798672137339
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
Kayode, Olumide.
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 123 p.
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
Thesis (Ph.D.)--The University of Texas at San Antonio, 2020.
This item must not be sold to any third party vendors.
In this current era of Internet of Things (IoT), data privacy and security of Internet enabled devices has become a major concern of many users and device manufacturers. Massive amount of data is being generated by these IoT devices and there might be possibilities of user’s information being exposed without any privacy protection. The rate of data transfer, size, kind of information transmitted and secure channels used by these IoT devices are of utmost importance and demand more exploratory research. Moreover, the "always on" and "always connected" attributes of IoT devices necessitate working condition as well as performance monitoring. Unexpected downtime and sudden breakdown of IoT devices can be extremely destructive especially for safety-critical systems. Condition monitoring and health state estimation are vital techniques for maintaining high reliability.Effective approach to investigate security and privacy of wide range of IoT devices needs to be developed. Using a proxy server, we investigate the data being transmitted by six representative IoT devices, analyze the data and propose an intelligent approach for proxy connection monitoring. Our results show that user’s information and devices’ identities were being leaked in our experiments. The applied neural network classifier uses network connection information to effectively detect proxy connections and performs better than Support Vector Machine as well as logistic regression models that were developed. We further propose a robust proxy detection mechanism suit-able for stochastic and deterministic malicious alteration of connection information. The approach is based on Deep Q-Network and Generative Adversarial Network. For condition monitoring, we propose a lightweight model operable on edge device for Remaining Useful Life (RUL) estimation. The model aptly utilizes the time series sensor data and successfully predicts the remaining useful life. Towards a distributed estimator in smart home environment, we also developed a model based on Long Short Term Memory (LSTM) neural network for estimating energy utilization.These research works demonstrate excellent results and contribution to knowledge. Our work addressed two major challenges in IoT, namely security and performance monitoring. The various data driven approaches and methods that we developed can be applied to enhance data security and performance monitoring in IoT. Security mechanisms to detect unsolicited proxy connection, anomalies or cyber attacks have been proposed. Furthermore, our techniques for estimating remaining useful life and energy utilization in smart home environment are effective. Efficient method for distributed learning and use case are also proposed to illustrate its feasibility. These are approaches that can improve reliability, performance monitoring and time-critical data driven computation.
ISBN: 9798672137339Subjects--Topical Terms:
199325
Computer science.
Subjects--Index Terms:
Data security
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
LDR
:04130nmm a2200385 4500
001
594597
005
20210521101704.5
008
210917s2020 ||||||||||||||||| ||eng d
020
$a
9798672137339
035
$a
(MiAaPQ)AAI28029941
035
$a
AAI28029941
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Kayode, Olumide.
$3
886631
245
1 0
$a
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
123 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-04, Section: B.
500
$a
Advisor: Tosun, Ali Saman.
502
$a
Thesis (Ph.D.)--The University of Texas at San Antonio, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
In this current era of Internet of Things (IoT), data privacy and security of Internet enabled devices has become a major concern of many users and device manufacturers. Massive amount of data is being generated by these IoT devices and there might be possibilities of user’s information being exposed without any privacy protection. The rate of data transfer, size, kind of information transmitted and secure channels used by these IoT devices are of utmost importance and demand more exploratory research. Moreover, the "always on" and "always connected" attributes of IoT devices necessitate working condition as well as performance monitoring. Unexpected downtime and sudden breakdown of IoT devices can be extremely destructive especially for safety-critical systems. Condition monitoring and health state estimation are vital techniques for maintaining high reliability.Effective approach to investigate security and privacy of wide range of IoT devices needs to be developed. Using a proxy server, we investigate the data being transmitted by six representative IoT devices, analyze the data and propose an intelligent approach for proxy connection monitoring. Our results show that user’s information and devices’ identities were being leaked in our experiments. The applied neural network classifier uses network connection information to effectively detect proxy connections and performs better than Support Vector Machine as well as logistic regression models that were developed. We further propose a robust proxy detection mechanism suit-able for stochastic and deterministic malicious alteration of connection information. The approach is based on Deep Q-Network and Generative Adversarial Network. For condition monitoring, we propose a lightweight model operable on edge device for Remaining Useful Life (RUL) estimation. The model aptly utilizes the time series sensor data and successfully predicts the remaining useful life. Towards a distributed estimator in smart home environment, we also developed a model based on Long Short Term Memory (LSTM) neural network for estimating energy utilization.These research works demonstrate excellent results and contribution to knowledge. Our work addressed two major challenges in IoT, namely security and performance monitoring. The various data driven approaches and methods that we developed can be applied to enhance data security and performance monitoring in IoT. Security mechanisms to detect unsolicited proxy connection, anomalies or cyber attacks have been proposed. Furthermore, our techniques for estimating remaining useful life and energy utilization in smart home environment are effective. Efficient method for distributed learning and use case are also proposed to illustrate its feasibility. These are approaches that can improve reliability, performance monitoring and time-critical data driven computation.
590
$a
School code: 1283.
650
4
$a
Computer science.
$3
199325
650
4
$a
Information technology.
$3
184390
650
4
$a
Artificial intelligence.
$3
194058
653
$a
Data security
653
$a
Deep reinforcement learning
653
$a
Internet of Things
653
$a
Machine learning
653
$a
Performance monitoring
653
$a
Smart home
690
$a
0984
690
$a
0489
690
$a
0800
710
2
$a
The University of Texas at San Antonio.
$b
Computer Science.
$3
886632
773
0
$t
Dissertations Abstracts International
$g
82-04B.
790
$a
1283
791
$a
Ph.D.
792
$a
2020
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000193557
電子館藏
1圖書
電子書
EB 2020
一般使用(Normal)
編目處理中
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28029941
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入