Decision tree based user-centric security solution for critical IoT infrastructure

Deepak Puthal, Stanly Wilson, Ashish Nanda, Ming Liu, Srinibas Swain, Biswa P.S. Sahoo, Kumar Yelamarthi, Prashant Pillai, Hesham El-Sayed, Mukesh Prasad

Research output: Contribution to journalArticlepeer-review

Abstract

Data processing in real-time brings better business modeling and an intuitive plan of action. Internet of things (IoT), being a source of sensitive data collected and communicated through either public or private networks, requires better security from end to end to uphold integrity, quality, and acceptability of data. Designing an adaptive solution plays a vital role where IoT is deployed for the sensing-as-a-services in the critical infrastructure and near real-time decision making by deploying data analysis in the edge datacenters. Again, securing the system with user's demand and device specifications is a challenging and open research problem. This paper proposed a decision tree based user-centric security approach named DecisionTSec that provides a secure channel for communication in IoT networks, combining edge datacenters in the network edges. Further, the proposed DecisionTSec is validated by experimenting with the real-time testbed for the system performance along with the theoretical security validation.

Original languageEnglish
Article number107754
JournalComputers and Electrical Engineering
Volume99
DOIs
StatePublished - Apr 2022
Externally publishedYes

Keywords

  • Cryptography
  • Decision tree
  • Internet of things
  • Security
  • Software defined perimeter

Fingerprint

Dive into the research topics of 'Decision tree based user-centric security solution for critical IoT infrastructure'. Together they form a unique fingerprint.

Cite this