2022
DOI: 10.1155/2022/6274114
|View full text |Cite
|
Sign up to set email alerts
|

IOTA-Based Mobile Crowd Sensing: Detection of Fake Sensing Using Logit-Boosted Machine Learning Algorithms

Abstract: In the Internet of Things (IoT) era, the mobile crowd sensing system (MCS) has become increasingly important. The Internet of Things Auto (IOTA) has evolved rapidly in practically every technology field over the last decade. IOTA-based mobile crowd sensing technology is being developed in this study using machine learning to detect and prevent mobile users from engaging in fake sensing activities. It has been determined through testing and evaluation that our method is effective for both quality estimation and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 40 publications
0
8
0
Order By: Relevance
“…Hameed et al [4] formulated an IOTA-based methodology using machine learning algorithms to detect and prevent fake sensing activities in mobile crowd sensing. The methodology involves two platforms: IOTA and Logit-boosted models.…”
Section: Anomaly Detection In Mobile Crowd Sensingmentioning
confidence: 99%
See 1 more Smart Citation
“…Hameed et al [4] formulated an IOTA-based methodology using machine learning algorithms to detect and prevent fake sensing activities in mobile crowd sensing. The methodology involves two platforms: IOTA and Logit-boosted models.…”
Section: Anomaly Detection In Mobile Crowd Sensingmentioning
confidence: 99%
“…Mobile crowd sensing has emerged as a prominent paradigm for collecting data from many mobile devices, enabling a wide range of applications, such as environmental monitoring [4], urban planning [5], and healthcare [6]. MCS empowers citizens to participate in data collection efforts by rewarding them for their contributions, leading to smart and sustainable spaces [7].…”
Section: Introductionmentioning
confidence: 99%
“…On the UNSW-NBI5 and KDD datasets, the accuracy of this work is 99.99% and 89.13%, respectively. To identify cyber threats, Shone et al [15] presented a deep learning technique based on IDS. Yin et al [16] proposed IDS based on RNN.…”
Section: Literature Surveymentioning
confidence: 99%
“…To demonstrate the numerous attack methods used by cyber thieves against chosen Indian banks. In the research [30,31] has attempted to demonstrate how spoofing, brute force attacks, buffer overflow and cross-side scripting are all linked to Indian public and private sector banks. Cyber-attacks such as online identity theft [31], hacking [32] and harmful code [31,32]; DOS attack and credit card/ATM frauds [33] are also linked to Intruder Detection, as is System Monitoring.…”
Section: Related Workmentioning
confidence: 99%