Machine Learning Techniques to Combat Security Threats in Social Internet of Things

Authors

  • R. Sunitha Associate Professor, Department of Artificial Intelligence and Machine Learning, B. N. M. Institute of Technology, Bangalore, India
  • J. Chandrika Professor and Head, Department of Information Science and Engineering, Malnad College of Engineering, Hassan, India
  • H. C. Pavithra Assistant Professor, Department of Artificial Intelligence and Machine Learning, B. N. M. Institute of Technology, Bangalore, India

Keywords:

Social Internet of Things, Machine Learning, Threats, Vulnerabilities, Artificial Neural Network

Abstract

A new IoT archetype in which items can create social relationships with one another based on user preferences, resulting in a social platform is known as the Social Internet of Things (SIoT). Machines and gadgets in almost any commercial enterprise may be linked and programmed to offer facts to cloud apps and return end the usage of mobile networks. The act of securing net gadgets and the networks to which they're linked from threats and breaches is referred to as protection inside the Social Internet of Things. Identifying, protecting, and tracking threats, in addition to supporting the restoration of vulnerabilities from some of the technology which could constitute protection hazards, are all methods to offer protection. The blessings of SIoT are apparent, however high-profile assaults, blended with uncertainties regarding approximately protecting good practices and their associated costs, are deterring many companies from imposing it. Here, we are surveying a few machine-learning solutions that address the problem of social internet of things security. Any enterprise trying to secure SIoT devices on a more scalable and efficient basis with automation and aberrant behavior detection can benefit from machine learning. The performance of various machine learning algorithms and tools like Decision Tree (DT), Naive Bayes (NB), K-Nearest Neighbors (KNN), and Artificial Neural Networks (ANN), etc., in discovering the vulnerabilities and threats in SIoT is discussed here.

Downloads

Download data is not yet available.

Downloads

Published

13-03-2023

Issue

Section

Articles

How to Cite

[1]
R. Sunitha, J. Chandrika, and H. C. Pavithra, “Machine Learning Techniques to Combat Security Threats in Social Internet of Things”, IJRESM, vol. 6, no. 3, pp. 81–93, Mar. 2023, Accessed: Dec. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2591