Downloads: 2 | Views: 221 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Analysis Study Research Paper | Information Security | India | Volume 12 Issue 4, April 2023 | Popularity: 4.9 / 10
High Security Machine Learning Algorithm for Industrial IoT
Harshita Dubey
Abstract: Many leading sectors like agriculture, logistics, healthcare, technology etc. are using Industrial Internet of Things (IIoT) which acts as the major factor of Industry 4.0 as well. The latter used Machine Learning (ML) and Deep Learning (DL) majorly these days. Both machine learning and deep learning technologies have been explored for potential applications in several areas. This combination, when applied to federated learning, is the secret to successful application to create evidence-based medicine as rapidly as possible. In this research, RSA approach is meant to increase the delay-time for the encryption inside a privacy-preserving-blockchain system for the identification of numbers. This paper introduces PriModChain, a framework that combines differential privacy, federated ML, Ethereum blockchain, and smart contracts to guarantee privacy and trustworthiness on IIoT data. Using simulations created in Python with socket programming on a general-purpose computer, the viability of PriModChain was assessed in terms of privacy, security, dependability, safety, and resilience. For the local studies, we used the Ganache v2.0.1 local test network, and for the public blockchain testing, we used the Kovan test network. With the help of the protocol verifier Scyther v1.1.3, we examined the suggested security protocol.
Keywords: IIoT, privacy-preserving, IIoT trustworthiness, blockchain, PriModChin, machine learning, deep learning, security, Industry 4.0, Python
Edition: Volume 12 Issue 4, April 2023
Pages: 1794 - 1799
DOI: https://www.doi.org/10.21275/SR23428074556
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Information Security, Saudi Arabia, Volume 10 Issue 12, December 2021
Pages: 624 - 630Secure Two Factor Authentication Framework based on Deep Learning
Talal Eid Alanzi, Dr. Mohammed Naif Alatawi
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Security, India, Volume 13 Issue 8, August 2024
Pages: 1073 - 1078An Algorithm based on Deep Learning for Intrusion Detection in IoT
Zoya Firdouse, K. Jayasree