Adaptive encryption scheme for IoT sensors network
dc.contributor.advisor | Li, Shancang | |
dc.contributor.author | Almalki, Ohud | |
dc.date.accessioned | 2025-01-07T07:32:07Z | |
dc.date.issued | 2024-09-05 | |
dc.description | The core focus of this research is a dual-layer encryption schema that helps to protect sensitive data in IoT sensor networks by classifying the data as low and high-critical. This method uses the Logistic Regression algorithm in a machine learning model to classify data into low and high-critical information. Then, based on the classification results the model utilises a light XOR for less sensitive information and a form of homomorphic encryption-like for more critical information. This classification minimises the computational overhead, making it suitable for limited IoT requirements. It ensures that only the necessary level of security is implemented based on data sensitivity. This study was conducted on the N-BaIoT dataset and achieved a training accuracy of 99.97%, which is impressive. These results demonstrate success in balancing data security and system efficiency, making the method robust and realistic for privacy protection in AI and IoT applications. | |
dc.description.abstract | Artificial Intelligence (AI) and the Internet of Things (IoT) have revolutionised the way we live and work, bringing unpredictable levels of automation and decision-making. As a result, industries such as healthcare, finance, and smart cities have experienced significant changes. These technologies have transformed our lives to be more efficient, convenient, and connected. However, the rapid advancement of AI and IoT has also raised some concerns. Data privacy and security have become a major challenge with these systems processing massive amounts of sensitive personal and organisational information data. Highlighting the importance of implementing robust protection methods. This dissertation focuses on the different techniques used to maintain data privacy in AI and IoT ecosystems using privacy-preserving technologies (PETs), such as differential privacy (DP), federated learning (FL), and secure computation. These technologies are essential for compliance with data protection regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Moreover, it is important to educate users about the associated risks of using AI and IoT and to encourage responsible behaviours. The core focus of this research is a dual-layer encryption schema that helps to protect sensitive data in IoT sensor networks by classifying the data as low and high-critical. | |
dc.format.extent | 85 | |
dc.identifier.citation | the privacy of AI and IoT | |
dc.identifier.issn | PFMSCYBA | |
dc.identifier.uri | https://hdl.handle.net/20.500.14154/74569 | |
dc.language.iso | en | |
dc.publisher | Cardiff University | |
dc.subject | Adaptive Encryption | |
dc.subject | IoT Security | |
dc.subject | Machine Learning | |
dc.subject | XOR Encryption | |
dc.subject | Cybersecurity. | |
dc.title | Adaptive encryption scheme for IoT sensors network | |
dc.type | Thesis | |
sdl.degree.department | Computer Science and Informatics | |
sdl.degree.discipline | the privacy of AI and IoT | |
sdl.degree.grantor | Cardiff University | |
sdl.degree.name | Master of Science in Cyber Security |