Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing
With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely t...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2024-07, Vol.17 (4), p.1885-1897 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1897 |
---|---|
container_issue | 4 |
container_start_page | 1885 |
container_title | Peer-to-peer networking and applications |
container_volume | 17 |
creator | Sangeethapriya, J. Arock, Michael Reddy, U. Srinivasulu |
description | With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate. |
doi_str_mv | 10.1007/s12083-024-01667-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3069348993</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3069348993</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwApwscQ74J7GTIypQKlXiQIGj5dhO65LaxXYOfXsMQXDjNCvtfLPaAeASo2uMEL-JmKCaFoiUBcKM8QIfgQluKCtYWaHj37kkp-Asxi1CDNOKTMDm2aghGA0fgnTv8M33nYG9kcFZt4bSaXhng1Wb3iQ4l0OMVjr4apV1Nh1gK2NG5ZA2xiWrZLLewc4HuPAraPTaQOV3-yHlrHNw0sk-mosfnYKXh_vV7LFYPs0Xs9tloQhHqai4MlwpiUiNW13zShHd1jLviKqUys9wSnHdZa0Uk51mtNKorTnFDBOj6RRcjbn74D8GE5PY-iG4fFJQxBpa1k1Ds4uMLhV8jMF0Yh_sToaDwEh8NSrGRkVuVHw3KnCG6AjFbHZrE_6i_6E-AbdQeWU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3069348993</pqid></control><display><type>article</type><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><source>Springer Nature - Complete Springer Journals</source><creator>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</creator><creatorcontrib>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</creatorcontrib><description>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-024-01667-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Authentication ; Communications Engineering ; Computational efficiency ; Computer Communication Networks ; Computing costs ; Dirichlet problem ; Edge computing ; Engineering ; Error detection ; Information Systems and Communication Service ; Internet of Things ; Location based services ; Machine learning ; Networks ; Regression models ; Security aspects ; Sensors ; Servers ; Signal strength ; Signal,Image and Speech Processing ; Supervised learning</subject><ispartof>Peer-to-peer networking and applications, 2024-07, Vol.17 (4), p.1885-1897</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-024-01667-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-024-01667-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Sangeethapriya, J.</creatorcontrib><creatorcontrib>Arock, Michael</creatorcontrib><creatorcontrib>Reddy, U. Srinivasulu</creatorcontrib><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Communications Engineering</subject><subject>Computational efficiency</subject><subject>Computer Communication Networks</subject><subject>Computing costs</subject><subject>Dirichlet problem</subject><subject>Edge computing</subject><subject>Engineering</subject><subject>Error detection</subject><subject>Information Systems and Communication Service</subject><subject>Internet of Things</subject><subject>Location based services</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Regression models</subject><subject>Security aspects</subject><subject>Sensors</subject><subject>Servers</subject><subject>Signal strength</subject><subject>Signal,Image and Speech Processing</subject><subject>Supervised learning</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwApwscQ74J7GTIypQKlXiQIGj5dhO65LaxXYOfXsMQXDjNCvtfLPaAeASo2uMEL-JmKCaFoiUBcKM8QIfgQluKCtYWaHj37kkp-Asxi1CDNOKTMDm2aghGA0fgnTv8M33nYG9kcFZt4bSaXhng1Wb3iQ4l0OMVjr4apV1Nh1gK2NG5ZA2xiWrZLLewc4HuPAraPTaQOV3-yHlrHNw0sk-mosfnYKXh_vV7LFYPs0Xs9tloQhHqai4MlwpiUiNW13zShHd1jLviKqUys9wSnHdZa0Uk51mtNKorTnFDBOj6RRcjbn74D8GE5PY-iG4fFJQxBpa1k1Ds4uMLhV8jMF0Yh_sToaDwEh8NSrGRkVuVHw3KnCG6AjFbHZrE_6i_6E-AbdQeWU</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Sangeethapriya, J.</creator><creator>Arock, Michael</creator><creator>Reddy, U. Srinivasulu</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240701</creationdate><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><author>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Communications Engineering</topic><topic>Computational efficiency</topic><topic>Computer Communication Networks</topic><topic>Computing costs</topic><topic>Dirichlet problem</topic><topic>Edge computing</topic><topic>Engineering</topic><topic>Error detection</topic><topic>Information Systems and Communication Service</topic><topic>Internet of Things</topic><topic>Location based services</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Regression models</topic><topic>Security aspects</topic><topic>Sensors</topic><topic>Servers</topic><topic>Signal strength</topic><topic>Signal,Image and Speech Processing</topic><topic>Supervised learning</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sangeethapriya, J.</creatorcontrib><creatorcontrib>Arock, Michael</creatorcontrib><creatorcontrib>Reddy, U. Srinivasulu</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sangeethapriya, J.</au><au>Arock, Michael</au><au>Reddy, U. Srinivasulu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>17</volume><issue>4</issue><spage>1885</spage><epage>1897</epage><pages>1885-1897</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-024-01667-1</doi><tpages>13</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2024-07, Vol.17 (4), p.1885-1897 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_3069348993 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Authentication Communications Engineering Computational efficiency Computer Communication Networks Computing costs Dirichlet problem Edge computing Engineering Error detection Information Systems and Communication Service Internet of Things Location based services Machine learning Networks Regression models Security aspects Sensors Servers Signal strength Signal,Image and Speech Processing Supervised learning |
title | Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T23%3A15%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secured%20Frank%20Wolfe%20learning%20and%20Dirichlet%20Gaussian%20Vicinity%20based%20authentication%20for%20IoT%20edge%20computing&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Sangeethapriya,%20J.&rft.date=2024-07-01&rft.volume=17&rft.issue=4&rft.spage=1885&rft.epage=1897&rft.pages=1885-1897&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-024-01667-1&rft_dat=%3Cproquest_cross%3E3069348993%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3069348993&rft_id=info:pmid/&rfr_iscdi=true |