2022
DOI: 10.4108/eai.11-1-2022.172814
|View full text |Cite
|
Sign up to set email alerts
|

IOTA Based Anomaly Detection Machine learning in Mobile Sensing

Abstract: In this proposed method, iMCS can detect and prevent fake sensing activities of mobile users using machine learning techniques. Our iMCS solution uses behavioral analysis based on participants' reliability scores to detect variation in behavior of users and introduces a new role in a distributed system of MCS architecture to validate the collected data. To evaluate the incentive based on the participant's sensory data and data quality, to properly distribute profit among the participants, we employ the Shapley… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 14 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…wipers, scareware, and so on. vicious software, by description, is any piece of law that's run without the stoner's knowledge or concurrence [2]. In particular, this study demonstrated that detecting dangerous business on computer systems, and thereby perfecting the security of computer networks, was possible employing the findings of malware analysis and discovery with machine literacy algorithms ( Naive Byes, SVM, RF, and with the proposed approach) integrals.…”
mentioning
confidence: 81%
“…wipers, scareware, and so on. vicious software, by description, is any piece of law that's run without the stoner's knowledge or concurrence [2]. In particular, this study demonstrated that detecting dangerous business on computer systems, and thereby perfecting the security of computer networks, was possible employing the findings of malware analysis and discovery with machine literacy algorithms ( Naive Byes, SVM, RF, and with the proposed approach) integrals.…”
mentioning
confidence: 81%
“…The experimental findings suggest that our method surpasses other methods in estimation accuracy (precision: 0.875, recall: 0.872). In another study, Akhtar and Feng [25] used the Shapley value technique along with deep learning models for crowd fake sensing detection and model which achieves good accuracy in quality assessment and anomaly detection. Table 1 shows the comparative anal-ysis of some of the state of art researches based on machine learning, blockchain, IoT, and boosting algorithms for mobile crowd sensing: Furthermore, machine learning-based IDS research is still in its infancy on the IOTA network.…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Preprocessing. The raw data was acquired from the IOTA Bottle Neck Dataset as it was previ-ously used in [25]. As a result, the data has been cleaned using various strategies, such as removing duplicates and removing null values.…”
Section: Data Collection Andmentioning
confidence: 99%
“…It also looks at the future development and research difficulties still present. Cloud-based data provenance utilizing Blockchain is presented in this paper [30], which tracks and generates provenance data for each record, begin by creating a drop box-like application utilizing AWS S3 storage. This application creates a cloud storage application for students and teachers of the institution; hence, work and resources can be easily stored and shared.…”
Section: Consensusmentioning
confidence: 99%