Simulating and Modeling a Secure Content Caching System in IoT Networks Using Deep Learning Tools
Keywords:
Secure content caching system, IoT networks, Deep learning tools, Simulating, Modeling, Content caching, Security in IoTAbstract
By keeping frequently accessed content closer to the end users, content caching is essential to maximizing the performance of Internet of Things (IoT) networks. Nonetheless, because the data being transferred is sensitive, security in IoT situations is critical. The goal of this project is to use deep learning methods, namely decision trees and neural networks, to simulate and build a secure content caching system in Internet of Things networks.The suggested method makes use of decision trees to identify the best material to cache according to a number of variables, including network conditions, security needs, and content popularity. Because decision trees recursively divide data according to qualities, they are useful for managing complex scenarios and allow for precise caching decisions.Moreover, neural networks are used to improve the caching system's security feature. The system is able to make security-aware decisions on content caching by using a neural network model that has been trained on a large dataset that includes different network settings and content attributes. By identifying patterns and connections between various input parameters, the neural network model is able to recognize possible security threats and modify the caching approach accordingly.The caching hit ratio, latency reduction, and security enhancement can be used to assess the efficacy and performance of the secure content caching system through modeling and simulation. The study's findings will shed important light on the possible advantages of utilizing deep learning techniques to secure content caching systems for Internet of Things networks.The overarching goal of this research is to improve the user experience and protect sensitive IoT data by aiding in the development of dependable and secure content caching technologies that increase the effectiveness and security of IoT networks.
References
2. Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of network and computer applications, vol. 42, pp. 120-134, 2014.
3. Shanthamallu, U. S., Spanias, A., Tepedelenlioglu, C., & Stanley, M. (2017, August). A brief survey of machine learning methods and their sensor and IoT applications. In 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA) (pp. 1-8). IEEE.
4. Goyal, S., Sharma, N., Bhushan, B., Shankar, A., & Sagayam, M. (2021). Iot enabled technology in secured healthcare: Applications, challenges and future directions. Cognitive Internet of Medical Things for Smart Healthcare: Services and Applications, 25-48
5. Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for internet of things (IoT) security. IEEE Communications Surveys & Tutorials, 22(3), 1646-1685
6. Zantalis, F., Koulouras, G., Karabetsos, S., & Kandris, D. (2019). A review of machine learning and IoT in smart transportation. Future Internet, 11(4), 94.
7. M. Abomhara, "Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks," Journal of Cyber Security and Mobility, vol. 4, no. 1, pp. 65-88, 2015.
8. D. Serpanos, "The Cyber-Physical Systems Revolution," Computer, vol. 51, no. 3, pp. 70-73, 2018.
9. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and other botnets," Computer, vol. 50, no. 7, pp. 80-84, 2017.
10. Y. Xin et al., "Machine Learning and Deep Learning Methods for Cybersecurity," IEEE Access, 2018.
11. X.-W. Chen and X. Lin, "Big data deep learning: challenges and perspectives," IEEE access, vol. 2, pp. 514-525, 2014.
12. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, "A roadmap for security challenges in the Internet of Things," Digital Communications and Networks, 2017.
13. F. A. Alaba, M. Othman, I. A. T. Hashem, and F. Alotaibi, "Internet of Things security: A survey," Journal of Network and Computer Applications, vol. 88, pp. 10-28, 2017.
14. E. Kouicem, A. Bouabdallah, and H. Lakhlef, "Internet of Things Security: a top-down survey," Computer Networks, 2018.
15. J. Granjal, E. Monteiro, and J. S. Silva, "Security for the internet of things: a survey of existing protocols and open research issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294-1312, 2015.
16. B. B. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, "A survey of intrusion detection in Internet of Things," Journal of Network and Computer Applications, vol. 84, pp. 25-37, 2017.

