Adaptive encryption scheme for IoT sensors network

dc.contributor.advisorLi, Shancang
dc.contributor.authorAlmalki, Ohud
dc.date.accessioned2025-01-07T07:32:07Z
dc.date.issued2024-09-05
dc.descriptionThe core focus of this research is a dual-layer encryption schema that helps to protect sensitive data in IoT sensor networks by classifying the data as low and high-critical. This method uses the Logistic Regression algorithm in a machine learning model to classify data into low and high-critical information. Then, based on the classification results the model utilises a light XOR for less sensitive information and a form of homomorphic encryption-like for more critical information. This classification minimises the computational overhead, making it suitable for limited IoT requirements. It ensures that only the necessary level of security is implemented based on data sensitivity. This study was conducted on the N-BaIoT dataset and achieved a training accuracy of 99.97%, which is impressive. These results demonstrate success in balancing data security and system efficiency, making the method robust and realistic for privacy protection in AI and IoT applications.
dc.description.abstractArtificial Intelligence (AI) and the Internet of Things (IoT) have revolutionised the way we live and work, bringing unpredictable levels of automation and decision-making. As a result, industries such as healthcare, finance, and smart cities have experienced significant changes. These technologies have transformed our lives to be more efficient, convenient, and connected. However, the rapid advancement of AI and IoT has also raised some concerns. Data privacy and security have become a major challenge with these systems processing massive amounts of sensitive personal and organisational information data. Highlighting the importance of implementing robust protection methods. This dissertation focuses on the different techniques used to maintain data privacy in AI and IoT ecosystems using privacy-preserving technologies (PETs), such as differential privacy (DP), federated learning (FL), and secure computation. These technologies are essential for compliance with data protection regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Moreover, it is important to educate users about the associated risks of using AI and IoT and to encourage responsible behaviours. The core focus of this research is a dual-layer encryption schema that helps to protect sensitive data in IoT sensor networks by classifying the data as low and high-critical.
dc.format.extent85
dc.identifier.citationthe privacy of AI and IoT
dc.identifier.issnPFMSCYBA
dc.identifier.urihttps://hdl.handle.net/20.500.14154/74569
dc.language.isoen
dc.publisherCardiff University
dc.subjectAdaptive Encryption
dc.subjectIoT Security
dc.subjectMachine Learning
dc.subjectXOR Encryption
dc.subjectCybersecurity.
dc.titleAdaptive encryption scheme for IoT sensors network
dc.typeThesis
sdl.degree.departmentComputer Science and Informatics
sdl.degree.disciplinethe privacy of AI and IoT
sdl.degree.grantorCardiff University
sdl.degree.nameMaster of Science in Cyber Security

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
SACM-Dissertation.pdf
Size:
1.65 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.61 KB
Format:
Item-specific license agreed to upon submission
Description:

Copyright owned by the Saudi Digital Library (SDL) © 2025