Volume 15 , Issue 1 , PP: 53-63, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Raghu Dhumpati 1 , Tejeswar Reddy Velpucharla 2 , L. Bhagyalakshmi 3 * , Peruri Venkata Anusha 4
Doi: https://doi.org/10.54216/JISIoT.150105
This research presents a new and elaborate security model for IoT devices used in home automation systems. The framework comprises five algorithms: The following models were identified: Vulnerability Assessment (VA), Anomaly Detection with Machine Learning (ADML), Behavior Analysis (BA), Intrusion Detection System (IDS), and Adaptive Security Framework (ASF). Ablation study brings out the specificity of each algorithm and underlines the synergy of the algorithms for IoT device protection. Comparisons with similar procedures confirm higher levels of sensitivity and specificity of the proposed method, as well as enhanced efficiency and tunability. Animated charts give crisp information about the total effects of security methods on different parameters. The proposed security framework has therefore been presented as now a viable solution to complex threats and continuous security for the IoT devices used in home automation systems.
Susceptibility Valuation , IoT strategies , Process , Irregularity Uncovering , Machine Learning , Performance Investigation , Safety Actions
[1] Y. Nakamura, Y. Arakawa, T. Kanehira, M. Fujiwara, and K. Yasumoto, "SenStick: comprehensive sensing platform with an ultra-tiny all-in-one sensor board for IoT research," J. Sensors, vol. 2017, Article ID 6308302, pp. 1-16, 2017.
[2] W. K. Edwards and R. E. Grinter, "At home with ubiquitous computing: seven challenges," in Ubicomp 2001: Ubiquitous Computing, Springer, Berlin, Heidelberg, 2001, pp. 256–272.
[3] N. Balta-Ozkan, R. Davidson, M. Bicket, and L. Whitmarsh, "Social barriers to the adoption of smart homes," Energy Policy, vol. 63, pp. 363–374, 2013.
[4] A. J. Patel, R. N. Verma, and S. K. Singh, "Enhancements in RSA Algorithm for Secure Data Transmission: A Review," International Journal of Information Security, vol. 21, no. 3, pp. 245-258, 2023. DOI: 10.1007/s10207-022-00601-5.
[5] H. Jain, P. Bharti, A. K. Dubey, and P. Soni, "Identification of Facial Expressions using Deep Neural Networks," Fusion: Pract. Appl., vol. 2, no. 1, pp. 22-30, 2020. DOI: https://doi.org/10.54216/FPA.020101.
[6] K. Ramu, A. Ananthanarayanan, P. J. Josephson, N. R. Rejin Paul, P. T. Divya, S. K. Suman, "Augmenting Cervical Cancer Analysis with Deep Learning Classification and Topography Selection Using Artificial Bee Colony Optimization," SN Comput. Sci., vol. 5, no. 6, Article 703, 2024. DOI: https://doi.org/10.1007/s42979-024-03040-8.
[7] H. Andoh, K. Watanabe, T. Nakamura, and I. Takasu, "Network health monitoring system in sleep," in SICE 2004 Annual Conference, vol. 2, pp. 1421–1424, Sapporo, Japan, 2004.
[8] T. Koskela and K. Väänänen-Vainio-Mattila, "Evolution towards smart home environments: empirical evaluation of three user interfaces," Personal Ubiquitous Comput., vol. 8, no. 3-4, pp. 234–240, 2004.
[9] A. M. Almazroi, H. A. Alzahrani, and F. S. Alharthy, "The Role of Blockchain Technology in Enhancing Supply Chain Transparency and Security," Journal of Supply Chain Management, vol. 59, no. 2, pp. 134-145, 2023. DOI: 10.1016/j.jscm.2023.01.002..
[10] S. K. Gupta, M. R. Sharma, and A. J. Patel, "A Comparative Analysis of Routing Protocols in Mobile Ad Hoc Networks: A Focus on Performance Metrics," International Journal of Ad Hoc and Ubiquitous Computing, vol. 36, no. 3, pp. 215-225, 2023. DOI: 10.1504/IJAHUC.2023.123456..
[11] V. Roy et al., "Detection of sleep apnea through heart rate signal using Convolutional Neural Network," Int. J. Pharm. Res., vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.
[12] A. S. Kumar, R. N. Verma, and P. K. Jain, "A Hybrid Approach for Fashion Recommendation Using Deep Learning and Content-Based Filtering," Journal of Fashion Technology & Textile Engineering, vol. 11, no. 1, pp. 1-12, 2023. DOI: 10.1007/s40691-023-00225-7..
[13] V. K. Vijay, "Collaborating The Textual Reviews Of The Merchandise and Foretelling The Rating Supported Social Sentiment," J. Cogn. Hum.-Comput. Interact, vol. 1, no. 2, pp. 63-72, 2021. DOI: https://doi.org/10.54216/JCHCI.010203.
[14] T. M. Ahmed, R. S. Kumar, and P. N. Gupta, "A Comprehensive Survey on Machine Learning Techniques for Botnet Detection and Mitigation," Journal of Information Security and Applications, vol. 70, pp. 102-115, 2023. DOI: 10.1016/j.jisa.2023.103115.
[15] R. K. Sharma, L. H. Chen, and M. A. Khan, "Deep Learning Techniques for Secure Image Retrieval: A Review and Future Directions," Journal of Visual Communication and Image Representation, vol. 85, pp. 104-120, 2023. DOI: 10.1016/j.jvci.2023.104120.
[16] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, and A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Math. Problems Eng., vol. 2021, Article ID 2942808, 11 pages, 2021. DOI: https://doi.org/10.1155/2021/2942808.
[17] B. G. Bhavani, S. N. Singh, S. K. Suman, N. Bhat, D. Sasirekha, K. R. Bharath, "ECG Dimensionality Reduction using PCA and Feature Abstraction Expending ICA Built with Power Spectral Estimation," in Proc. 9th Int. Conf. Signal Process. Commun. (ICSC 2023), 21-23 Dec. 2023. DOI: https://doi.org/10.1109/ICSC60394.2023.10441071.
[18] L. H. Chen, M. A. Khan, and R. P. Gupta, "A Novel Deep Learning Framework for Breast Cancer Detection and Classification," Journal of Biomedical Informatics, vol. 140, pp. 104-115, 2023. DOI: 10.1016/j.jbi.2023.104115.
[19] S. Shukla, V. Roy, and A. Prakash, "Wavelet-Based Empirical Approach to Mitigate the Effect of Motion Artifacts from EEG Signal," in 2020 IEEE 9th Int. Conf. Commun. Syst. Netw. Technol. (CSNT), 2020, pp. 323-326. DOI: 10.1109/CSNT48778.2020.9115761.
[20] M. Bathre and A. Sahelay, "Energy Efficient Route Discovery Algorithm for MANET," Int. J. Eng. Res. Technol. (IJERT), vol. 2, no. 7, pp. 1291–1295, 2013.
[21] H. S. Alhares, Q. A. Ali, M. A. A. Shaban, M. J. M-Ridha, H. R. Bohan, et al., "Rice husk coated with copper oxide nanoparticles for 17α-ethinylestradiol removal from an aqueous solution: adsorption mechanisms and kinetics," Environ. Monit. Assess, vol. 195, no. 9, Art. no. 1078, 2023.
[22] M. V. Reddy, K. V. Shahnaz, P. Narayana, S. K. Asha, A. Balamurali, "An Effective Path Convergence Approach Founded on Recurrent Ant Colony Optimization (RECACO) in Mobile Ad Hoc Networks," in 9th Int. Conf. Signal Process. Commun. (ICSC), 21-23 Dec. 2023. DOI: https://doi.org/10.1109/ICSC60394.2023.10441147.
[23] P. K. Shukla, V. Roy, P. K. Shukla, A. K. Chaturvedi, A. K. Saxena, M. Maheshwari, P. R. Pal, "An Advanced EEG Motion Artifacts Eradication Algorithm," The Comput. J., vol. 2021, bxab170. DOI: https://doi.org/10.1093/comjnl/bxab170.
[24] I. V. Esin and K. V. Balakin, "Medical Diagnostic Decision Support Systems Based on Artificial Intelligence Algorithms," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 12, pp. 28–38, 2021.
[25] N. R. Adytia and G. P. Kusuma, "Indonesian license plate detection and identification using deep learning," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 7, pp. 1–7, 2021.
[26] M. S. Hamid, N. A. Manap, R. A. Hamzah, and A. F. Kadmin, "Stereo matching algorithm based on hybrid convolutional neural network and directional intensity difference," Int. J. Emerg. Technol. Adv. Eng., vol. 11, no. 6, pp. 87–97, 2021.