  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>International Journal of Wireless and Ad Hoc Communication</full_title>
  <abbrev_title>IJWAC</abbrev_title>
  <issn media_type="print">2692-4056</issn>
  <doi_data>
   <doi>10.54216/IJWAC</doi>
   <resource>https://www.americaspg.com/journals/show/2375</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Adapting to Evolving Cyber Threat Landscapes with Dynamic Security Protocol Management in Large-Scale IoT Sensor Networks</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Siatik Premier Google Cloud Platform Partner Johannesburg South Africa, University of the Witwatersrand Johannesburg-South Africa Computer Science, Head of Data Science &amp; Machine Learning, Adjunct Professor</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Anil  Audumbar</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor, Department of AI and Big data, woosong University, Daejeon South Korea</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Saurabh</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Professor, School of Business, Woxsen University, Hyderabad, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Hemachandran. </given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Engineer, TSYS Global Payments, Pune, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Shraddhesh</given_name>
    <surname>Gadilkar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Senior Lecturer, Federal Polytechnic Bauchi, Nigeria</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Zakka Benisemeni </given_name>
    <surname>Esther</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant Professor in Pune Institute of Computer Technology Pune</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ganesh Shivaji</given_name>
    <surname>Pise</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University of  Prince Edward Island</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jude</given_name>
    <surname>Imuede</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>The Adaptive Security Protocol Framework (ASPF) is introduced as a sophisticated algorithm designed for dynamic security protocol adaptation in large-scale IoT sensor networks. Comprising five integral algorithms, namely ASPF, MLTD, DKMS, BAP, and CTIS, the framework ensures a comprehensive and adaptive defense mechanism against evolving cyber threats. ASPF initiates with data collection, preprocessing, and feature extraction, employing supervised learning for model training. Anomaly detection triggers alerts and responses, guiding continuous learning and security protocol adaptation. MLTD enhances real-time threat detection through dynamic model training and threat intelligence integration. DKMS focuses on secure key management for data transmissions, calculating device thresholds and ensuring adaptive key exchanges. BAP leverages historical data for behavioral profiling, enabling real-time anomaly detection and adaptive profile updates. CTIS assesses and aggregates threat levels, fostering continuous collaboration and collective defense. The ablation study emphasizes the indispensable role of each algorithm, showcasing their synergistic contributions to the overall system's adaptability and robustness. Evaluation through comprehensive tables and visual representations highlights the proposed method's superiority over existing security protocols. The ablation study underscores the holistic nature of ASPF, solidifying its efficacy in addressing the dynamic challenges of cybersecurity in large-scale IoT sensor networks.&#13;
 </jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2023</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2023</year>
  </publication_date>
  <pages>
   <first_page>25</first_page>
   <last_page>40</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/IJWAC.070202</doi>
   <resource>https://www.americaspg.com/articleinfo/20/show/2375</resource>
  </doi_data>
 </journal_article>
</journal>
