Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing

With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2024-07, Vol.17 (4), p.1885-1897
Hauptverfasser: Sangeethapriya, J., Arock, Michael, Reddy, U. Srinivasulu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1897
container_issue 4
container_start_page 1885
container_title Peer-to-peer networking and applications
container_volume 17
creator Sangeethapriya, J.
Arock, Michael
Reddy, U. Srinivasulu
description With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.
doi_str_mv 10.1007/s12083-024-01667-1
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3069348993</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3069348993</sourcerecordid><originalsourceid>FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EEqXwApwscQ74J7GTIypQKlXiQIGj5dhO65LaxXYOfXsMQXDjNCvtfLPaAeASo2uMEL-JmKCaFoiUBcKM8QIfgQluKCtYWaHj37kkp-Asxi1CDNOKTMDm2aghGA0fgnTv8M33nYG9kcFZt4bSaXhng1Wb3iQ4l0OMVjr4apV1Nh1gK2NG5ZA2xiWrZLLewc4HuPAraPTaQOV3-yHlrHNw0sk-mosfnYKXh_vV7LFYPs0Xs9tloQhHqai4MlwpiUiNW13zShHd1jLviKqUys9wSnHdZa0Uk51mtNKorTnFDBOj6RRcjbn74D8GE5PY-iG4fFJQxBpa1k1Ds4uMLhV8jMF0Yh_sToaDwEh8NSrGRkVuVHw3KnCG6AjFbHZrE_6i_6E-AbdQeWU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3069348993</pqid></control><display><type>article</type><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><source>Springer Nature - Complete Springer Journals</source><creator>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</creator><creatorcontrib>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</creatorcontrib><description>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-024-01667-1</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Algorithms ; Authentication ; Communications Engineering ; Computational efficiency ; Computer Communication Networks ; Computing costs ; Dirichlet problem ; Edge computing ; Engineering ; Error detection ; Information Systems and Communication Service ; Internet of Things ; Location based services ; Machine learning ; Networks ; Regression models ; Security aspects ; Sensors ; Servers ; Signal strength ; Signal,Image and Speech Processing ; Supervised learning</subject><ispartof>Peer-to-peer networking and applications, 2024-07, Vol.17 (4), p.1885-1897</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-024-01667-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-024-01667-1$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Sangeethapriya, J.</creatorcontrib><creatorcontrib>Arock, Michael</creatorcontrib><creatorcontrib>Reddy, U. Srinivasulu</creatorcontrib><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Communications Engineering</subject><subject>Computational efficiency</subject><subject>Computer Communication Networks</subject><subject>Computing costs</subject><subject>Dirichlet problem</subject><subject>Edge computing</subject><subject>Engineering</subject><subject>Error detection</subject><subject>Information Systems and Communication Service</subject><subject>Internet of Things</subject><subject>Location based services</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Regression models</subject><subject>Security aspects</subject><subject>Sensors</subject><subject>Servers</subject><subject>Signal strength</subject><subject>Signal,Image and Speech Processing</subject><subject>Supervised learning</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kM1OwzAQhC0EEqXwApwscQ74J7GTIypQKlXiQIGj5dhO65LaxXYOfXsMQXDjNCvtfLPaAeASo2uMEL-JmKCaFoiUBcKM8QIfgQluKCtYWaHj37kkp-Asxi1CDNOKTMDm2aghGA0fgnTv8M33nYG9kcFZt4bSaXhng1Wb3iQ4l0OMVjr4apV1Nh1gK2NG5ZA2xiWrZLLewc4HuPAraPTaQOV3-yHlrHNw0sk-mosfnYKXh_vV7LFYPs0Xs9tloQhHqai4MlwpiUiNW13zShHd1jLviKqUys9wSnHdZa0Uk51mtNKorTnFDBOj6RRcjbn74D8GE5PY-iG4fFJQxBpa1k1Ds4uMLhV8jMF0Yh_sToaDwEh8NSrGRkVuVHw3KnCG6AjFbHZrE_6i_6E-AbdQeWU</recordid><startdate>20240701</startdate><enddate>20240701</enddate><creator>Sangeethapriya, J.</creator><creator>Arock, Michael</creator><creator>Reddy, U. Srinivasulu</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240701</creationdate><title>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</title><author>Sangeethapriya, J. ; Arock, Michael ; Reddy, U. Srinivasulu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c270t-57ce7cca0281bd875c2db8a2702c5cc45073318f5075c6afd635d0b8731612ed3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Communications Engineering</topic><topic>Computational efficiency</topic><topic>Computer Communication Networks</topic><topic>Computing costs</topic><topic>Dirichlet problem</topic><topic>Edge computing</topic><topic>Engineering</topic><topic>Error detection</topic><topic>Information Systems and Communication Service</topic><topic>Internet of Things</topic><topic>Location based services</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Regression models</topic><topic>Security aspects</topic><topic>Sensors</topic><topic>Servers</topic><topic>Signal strength</topic><topic>Signal,Image and Speech Processing</topic><topic>Supervised learning</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sangeethapriya, J.</creatorcontrib><creatorcontrib>Arock, Michael</creatorcontrib><creatorcontrib>Reddy, U. Srinivasulu</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sangeethapriya, J.</au><au>Arock, Michael</au><au>Reddy, U. Srinivasulu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2024-07-01</date><risdate>2024</risdate><volume>17</volume><issue>4</issue><spage>1885</spage><epage>1897</epage><pages>1885-1897</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>With the evolution of the Internet of Things (IoT) several users take part in different applications via sensors. The foremost confront here remains in selecting the most confidential users or sensors in the edge computing system of the IoT. Here, both the end-users and the edge servers are likely to be malicious or compromised sensors. Several works have been contributed to identifying and isolating the malicious end-users or edge servers. Our work concentrates on the security aspects of edge servers of IoT. The Frank-Wolfe Optimal Service Requests (FWOSR) algorithm is utilized to evaluate the boundaries or limits of the logistic regression model, in which the convex problem under a linear approximation is solved for weight sparsity (i.e. several user requests competing for closest edge server) to avoid over-fitting in the supervised machine learning process. We design a Frank Wolfe Supervised Machine Learning (FWSL) technique to choose an optimal edge server and further minimize the computational and communication costs between the user requests and the edge server. Next, Dirichlet Gaussian Blocked Gibbs Vicinity-based Authentication model for location-based services in Cloud networks is proposed. Here, the vicinity-based authentication is implemented based on Received Signal Strength Indicators (RSSI), MAC address and packet arrival time. With this, the authentication accuracy is improved by introducing the Gaussian function in the vicinity test and provides flexible vicinity range control by taking into account multiple locations. Simulation and experiment are also conducted to validate the computational cost, communication cost, time complexity and detection error rate.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-024-01667-1</doi><tpages>13</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2024-07, Vol.17 (4), p.1885-1897
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_journals_3069348993
source Springer Nature - Complete Springer Journals
subjects Algorithms
Authentication
Communications Engineering
Computational efficiency
Computer Communication Networks
Computing costs
Dirichlet problem
Edge computing
Engineering
Error detection
Information Systems and Communication Service
Internet of Things
Location based services
Machine learning
Networks
Regression models
Security aspects
Sensors
Servers
Signal strength
Signal,Image and Speech Processing
Supervised learning
title Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T23%3A15%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secured%20Frank%20Wolfe%20learning%20and%20Dirichlet%20Gaussian%20Vicinity%20based%20authentication%20for%20IoT%20edge%20computing&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Sangeethapriya,%20J.&rft.date=2024-07-01&rft.volume=17&rft.issue=4&rft.spage=1885&rft.epage=1897&rft.pages=1885-1897&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-024-01667-1&rft_dat=%3Cproquest_cross%3E3069348993%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3069348993&rft_id=info:pmid/&rfr_iscdi=true