By design, Named Data Networking (NDN) supports pull-based traffic, where content is retrieved only upon consumer request. However, some of the use cases (i.e., emergency situations) in the Internet of Things (IoT) requires push-based traffic, where a producer broadcasts the data based on the emergency situation without any consumer request. Therefore, it is necessary to modify the existing NDN forwarding engine when designing for an IoT scenario. Although solutions are provided to enable push-based traffic in IoT, the main solutions in the current literature lack data broadcast control design. Moreover, the existing solutions use an additional interest messages exchange, which creates extra overheads in the network, thereby resulting in higher delay and lower throughput. In this paper, therefore, we propose a name-based push-data broadcast control scheme for IoT systems, and consider two scenarios, i.e., smart buildings and vehicular networks. The proposed scheme consists of a robust content namespace design, device namespace design, and minor amendments to the data packet format and unsolicited data policy of the forwarding engine as well. The evaluation is carried out for both scenarios. Simulation experiments show that the proposed scheme outperforms the recent proposed schemes in terms of total number of data packets processed in the network, total energy consumption, and average delay in the network by varying the number of data packets per 2 s and varying vehicle speed.
In recent years, there has been a massive increase in the amount of Internet of Things (IoT) devices as well as the data generated by such devices. The participating devices in IoT networks can be problematic due to their resource-constrained nature, and integrating security on these devices is often overlooked. This has resulted in attackers having an increased incentive to target IoT devices. As the number of attacks possible on a network increases, it becomes more difficult for traditional intrusion detection systems (IDS) to cope with these attacks efficiently. In this paper, we highlight several machine learning (ML) methods such as k-nearest neighbour (KNN), support vector machine (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), artificial neural network (ANN), and logistic regression (LR) that can be used in IDS. In this work, ML algorithms are compared for both binary and multi-class classification on Bot-IoT dataset. Based on several parameters such as accuracy, precision, recall, F1 score, and log loss, we experimentally compared the aforementioned ML algorithms. In the case of HTTP distributed denial-of-service (DDoS) attack, the accuracy of RF is 99%. Furthermore, other simulation results-based precision, recall, F1 score, and log loss metric reveal that RF outperforms on all types of attacks in binary classification. However, in multi-class classification, KNN outperforms other ML algorithms with an accuracy of 99%, which is 4% higher than RF.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.