Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing during Attack Threats

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Internet of things is buzzing everywhere due to its applications in defense, military, schools, hospitals, homes, end users. Due to this its vast applications and services, a huge addition using context aware devices has been seen in development of some sectors of applications and services. This set of devices generate huge amount of data that needs quick and technically precise security mechanism to protect all the generated data along with associated services. Complex event processing is an evolving trend that analyses contiguous streams of data using real time analysis. In this research article, a system to detect distributed intrusion attacks is developed and the quality of fulfilment is evaluated using Raspberry Pi. The experimental study shows that the proposed mechanism can be used in IoT devices with least computation process and the used CEP is technically feasible resolution to enhance the performance of intrusion detection systems in detecting distributed intrusion attacks IoT environment.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Smart Systems and Inventive Technology, ICSSIT 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages293-297
Number of pages5
ISBN (Electronic)9781728121192
DOIs
StatePublished - Nov 2019
Event2nd International Conference on Smart Systems and Inventive Technology, ICSSIT 2019 - Tirunelveli, India
Duration: 27 Nov 201929 Nov 2019

Publication series

NameProceedings of the 2nd International Conference on Smart Systems and Inventive Technology, ICSSIT 2019

Conference

Conference2nd International Conference on Smart Systems and Inventive Technology, ICSSIT 2019
Country/TerritoryIndia
CityTirunelveli
Period27/11/1929/11/19

Keywords

  • CAD
  • CEP
  • Cybersecurity
  • DDoS
  • IDS
  • IoT

Fingerprint

Dive into the research topics of 'Real-Time Methodology for Improving Cyber Security in Internet of Things Using Edge Computing during Attack Threats'. Together they form a unique fingerprint.

Cite this