University of Bahrain
Scientific Journals

An Intelligent Encrypt/Decrypt Algorithm in IOT regarding home data Privacy and Security

Show simple item record

dc.contributor.author Nourildean, Shayma W.
dc.contributor.author Mohammed, Yousra A.
dc.date.accessioned 2023-05-07T05:26:39Z
dc.date.available 2023-05-07T05:26:39Z
dc.date.issued 2023-05-07
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4939
dc.description.abstract Citizens and urban settings have benefited significantly from major advances in the quality of life and services provided by smart homes. Among other things, they are fully capable of controlling physical objects in real time and delivering intelligent information to citizens in the areas of transportation and healthcare as well as smart buildings, public safety, smart parking, and traffic systems, as well as smart agriculture, among other things. Smart home apps have the capability of collecting very sensitive information. The architecture, on the other hand, may encounter a variety of security and privacy challenges at multiple levels.It is in the applied experimental session testing the performance of various machine learning models for threat detection that one may get a thorough grasp of where and how Data Science can offer value to IoT network security. The findings serve as a foundation for illustrating the advantages of integrating new technology for the purpose of forecasting risks and concerns. Implementing machine learning into intelligent security systems, in addition, increases the requirement for a multi-disciplinary strategy and data infrastructure to manage the whole lifespan of a security product (Software Engineering end-to-end, including ML and Data DevOps). In this paper, we give an intelligent security algorithm for home data privacy and security in IoT. Experiments using the publicly available IoT-23 dataset, which contains labeled information on malicious and benign IoT network traffic, are used to complete the case study. The benign situations were received directly from the actual hardware and were not faked in any way or form. This enabled real-time network activity to be observed and evaluated. Therefore, models provide accurate outputs that may be used to forecast and identify vulnerabilities on Internet of Things-based systems. Furthermore, the lab might be expanded to accommodate the development of commercial and industry demos to demonstrate the benefits of building intrusion detection systems that use machine learning algorithms. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Intelligent; security; algorithm; IoT; encryption; decryption en_US
dc.title An Intelligent Encrypt/Decrypt Algorithm in IOT regarding home data Privacy and Security en_US
dc.identifier.doi http://dx.doi.org/10.12785/ijcds/1301110 en
dc.volume 13 en_US
dc.issue 1 en_US
dc.pagestart 1 en_US
dc.pageend 1 en_US
dc.contributor.authorcountry Iraq en_US
dc.contributor.authoraffiliation University of Technology en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account