A neutrosophic WPM-based machine learning model for device trust in industrial internet of things

被引:0
|
作者
Mohammad Ayoub Khan
Norah Saleh Alghamdi
机构
[1] University of Bisha,Department of Computer Science, College of Computing and Information Technology
[2] Princess Nourah Bint Abdulrahman University,Department of Computer Science, College of Computer and Information Sciences
来源
Journal of Ambient Intelligence and Humanized Computing | 2023年 / 14卷
关键词
IIoT; Machine learning; Neutrosophic K-NN clustering; Neutrosophic support vector machines;
D O I
暂无
中图分类号
学科分类号
摘要
The manufacturing industry is one of the most suitable sectors that can significantly benefit from implementing the Industrial Internet of Things (IIoT) concepts and technologies. The extensive automation in the manufacturing industries leads to many heterogeneous applications based on IIoT, requiring effective integration of many heterogeneous systems and seamless operations across the machines. The problem of integration and seamless operation introduces IIoT as a separate field of study in smart manufacturing that brings many challenges, including security, traceability, trust, and reliability. In IIoT, many devices will be connected using wireless and internet infrastructure to communicate with each other. In such a scenario, the IIoT devices' trustworthiness becomes an essential factor in avoiding injection by malicious machines. Therefore, an intelligent computational model is needed to cluster and classify the IIoT devices' trustworthiness accurately. In this paper, we present a trust model based on the neutrosophic weighted product method (WPM) used by IIoT applications to assess IIoT devices' trust score. The developed model assesses devices' trustworthiness based on the spatial knowledge, temporal experience, and behavioural pattern retrieved from the IIoT devices. Furthermore, the model proposes neutrosophic K-NN clustering and neutrosophic support vector machines (SVM) for classifying the extracted characteristics. The proposed neutrosophic SVM method is able to correctly identify the trust boundaries and produces the final trust score. The simulation results show that the proposed trust model detects the misbehaviour of IIoT devices more accurately than other aggregation methods.
引用
收藏
页码:3003 / 3017
页数:14
相关论文
共 50 条
  • [1] A neutrosophic WPM-based machine learning model for device trust in industrial internet of things
    Khan, Mohammad Ayoub
    Alghamdi, Norah Saleh
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (4) : 3003 - 3017
  • [2] Intelligent device recognition of internet of things based on machine learning
    Huang, Sheng
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2024, 22
  • [3] Security, Trust, and Privacy in Machine Learning-Based Internet of Things
    Meng, Weizhi
    Li, Wenjuan
    Han, Jinguang
    Su, Chunhua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [4] Security, Trust, and Privacy in Machine Learning-Based Internet of Things
    Meng, Weizhi
    Li, Wenjuan
    Han, Jinguang
    Su, Chunhua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] An efficient Trust Related Attack Detection Model based on Machine Learning for Social Internet of Things
    Magdich, Rim
    Jemal, Hanen
    Nakti, Chaima
    Ben Ayed, Mounir
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 1465 - 1470
  • [6] MACHINE LEARNING FOR MASSIVE INDUSTRIAL INTERNET OF THINGS
    Zhou, Hui
    She, Changyang
    Deng, Yansha
    Dohler, Mischa
    Nallanathan, Arumugam
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (04) : 81 - 87
  • [7] Trust-Based Communication for the Industrial Internet of Things
    Zhu, Chunsheng
    Rodrigues, Joel J. P. C.
    Leung, Victor C. M.
    Shu, Lei
    Yang, Laurence T.
    IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (02) : 16 - 22
  • [8] Machine learning for resource management in industrial Internet of Things
    Musaddiq, Arslan
    Azam, Irfan
    Olsson, Tobias
    Ahlgren, Fredrik
    FRONTIERS IN COMPUTER SCIENCE, 2025, 7
  • [9] Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things
    Lazar A.J.P.
    Soundararaj S.
    Sonthi V.K.
    Palanisamy V.R.
    Subramaniyan V.
    Sengan S.
    SN Computer Science, 4 (5)
  • [10] An efficient machine learning model for malicious activities recognition in water-based industrial internet of things
    Selim, Gamal E., I
    Hemdan, Ezz El-Din
    Shehata, Ahmed M.
    El-Fishawy, Nawal A.
    SECURITY AND PRIVACY, 2021, 4 (03)