Main
Main
BELAGAVI-590018
Project Report On
Edge based enabled anamoly detection for Insider attack
prevention using Machine Learning in Internet of Things
Submitted in partial fulfillment of the requirements for the
award of the Degree of
Bachelor of Engineering in
in
Computer Science (IoT,CyberSecurity with Blockchain
Technology).
Submitted by
1BI22IC001 A P SAROON
1BI22IC038 MEDHA BHAT
1BI22IC049 RAHUL S KAMATH
1BI22IC057 SUFAILA T S
2024-2025
BANGALORE INSTITUTE OF TECHNOLOGY
Department of CSE-ICB
K R Road, V V Pura, Bengaluru-560004.
CERTIFICATE
This is to certify that the Project entitled ”Edge based enabled anamoly
detection for Insider attack prevention using Machine Learning in
Internet of Things” is carried out by A P SAROON (1BI22IC001),
MEDHA BHAT (1BI22IC038), RAHUL S KAMATH (1BI22IC049),
SUFAILA T S (1BI22IC057), bonafide students of Bangalore Institute of
Technology, Bengaluru, in partial fulfilment of the requirements for the award of
Bachelor of Engineering in Computer Science (IoT,CyberSecurity with Blockchain
Technology). This fulfils all the requirements of the regulations for the award of the
degree. The contents of this report have not been submitted to any other institute
or university for the award of any degree or diploma and are not a repetition of the
work carried out by others.
Dr. Aswath M U
Principal
BIT, Bengaluru
Project Final Viva Voce Examination
Examiner 2
i
BANGALORE INSTITUTE OF TECHNOLOGY
Department of CSE-ICB
K R Road, V V Pura, Bengaluru-560004.
DECLARATION
We hereby declare that the work embodied in this project report titled ”Edge
based enabled anamoly detection for Insider attack prevention using
Machine Learning in Internet of Things” is the result of original work carried
out by A P SAROON (1BI22IC001), MEDHA BHAT (1BI22IC038),
RAHUL S KAMATH (1BI22IC049) and SUFAILA T S (1BI22IC057) at
Bangalore Institute of Technology, Computer Science (Iot,CyberSecurity with
Blockchain Technology), Bengaluru-560004, under the guidance of SHWETHA G
S.This report has not been submitted in part or full for the award of any diploma or
degree of this or any other university.
ii
ACKNOWLEDGEMENT
First and foremost, We would like to extend our deepest gratitude to my project
guide, Shwetha G S, Assistant Professor, Department of CSE-ICB, BIT,
Bengaluru. Her unwavering technical expertise, insightful guidance, and moral
encouragement have been pivotal in navigating the challenges and achieving the
objectives of this project. Her mentorship has left an indelible mark on our
academic and personal growth.
We are profoundly grateful to Dr. Aswath M.U, Principal of BIT, for fostering an
environment of academic excellence and innovation. We also extend our sincere
appreciation to Dr. Shivakumar B R, Associate Professor and HOD of the
Department of CSE-ICB, for his leadership and constant encouragement throughout
the course of this work. Our heartfelt thanks go to the faculty and staff of the
Department of CSE-ICB, whose support and resources have played a crucial role in
facilitating this project.
Special acknowledgment to our Project Coordinator Shwetha G S, Assistant
Professor, Department of CSE-ICB, Bengaluru for her invaluable advice and
consistent support that helped shape this project at various stages.
On a personal note, We owe our heartfelt gratitude to our parents for their
unconditional love, sacrifices, and unwavering belief in our capabilities. Their
encouragement has been the cornerstone for our perseverance and success.
Lastly, We extend our sincere thanks to our friends, peers, and all those who
contributed directly or indirectly to the successful completion of this project. Your
camaraderie, insights, and encouragement have been a source of motivation
throughout this journey.
1BI22IC001 A P SAROON
1BI22IC038 MEDHA BHAT
1BI22IC049 RAHUL S KAMATH
1BI22IC057 SUFAILA T S
iii
Abstract
The rapid growth of the Internet of Things (IoT) has introduced significant security
challenges, particularly insider attacks that exploit authorized access to compromise
network integrity. Traditional methods for detecting such threats are often cloud-
dependent, leading to latency issues, reduced efficiency, and potential data breaches
during transmission. This project proposes an edge-based anomaly detection system
leveraging machine learning techniques to address these challenges.
The proposed system focuses on real-time detection of insider threats by
processing data locally on edge devices. Machine learning models are trained to
identify anomalous behavior patterns in IoT devices, enabling early detection and
prevention of potential attacks. By deploying the detection mechanism at the edge,
the system minimizes reliance on centralized cloud systems, thereby reducing
latency and enhancing data privacy.
The project involves designing a robust framework that includes data
preprocessing, feature extraction, and implementation of supervised machine
learning algorithms. Results from experimental evaluations demonstrate that the
proposed approach achieves high accuracy in anomaly detection with low latency,
making it suitable for real-world IoT environments. This work contributes to
enhancing IoT security by providing a scalable and efficient solution for insider
attack prevention.
iv
Contents
Certificate i
Declaration ii
Acknowledgements iii
Abstract iv
1 Introduction 1
1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1.1 Importance and Role of the Topic . . . . . . . . . . . . . . . . 1
1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Aim and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3.1 Aims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3.2 Research Motivation . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Objectives of the Study . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6 Research Publications Related to Thesis . . . . . . . . . . . . . . . . 3
1.7 Report Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Literature Review 5
2.1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Emerging Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.1 Advanced Systems . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2.2 Literature Review Summary . . . . . . . . . . . . . . . . . . . 7
3 Proposed Work 9
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2 Methadology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.3 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.1 Frontend User Interface . . . . . . . . . . . . . . . . . . . . . 11
3.3.2 SMTP Email Server . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.3 Alert and Response . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.4 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.3.5 Backend Detection System . . . . . . . . . . . . . . . . . . . . 12
3.3.6 Network Monitor . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3.7 Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
v
4 REQUIREMENTS 13
4.1 Hardware and Software Requirements . . . . . . . . . . . . . . . . . . 13
4.1.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . 13
4.1.2 Software Requirements . . . . . . . . . . . . . . . . . . . . . . 13
5 Design Methodology 15
5.1 UML Diagram Design Methodology . . . . . . . . . . . . . . . . . . . 15
5.1.1 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . 15
5.1.2 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.1.3 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . 18
5.2 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6 Implementation 21
6.1 Boto Module . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
6.2 CloudWatch Handler . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
6.3 Blocking IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
6.4 Sending Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
8 Application 30
8.1 Real Life Applications . . . . . . . . . . . . . . . . . . . . . . . . . . 30
vi
List of Figures
vii
Anamoly detection for Insider Attack 2024-2025
Chapter 1
Introduction
1.1 Background
The background outlines the context in which the project is conducted. It provides
information about the broader field (e.g., IoT security, anomaly detection, or insider
attacks) and its significance in today’s world.
Example for your project:
With the proliferation of IoT devices in critical sectors like healthcare, smart homes,
and industries, ensuring their security is paramount. Insider threats, often caused by
malicious or accidental actions from trusted individuals, pose a significant challenge
to IoT networks. Existing security systems are insufficient due to IoT’s resource-
constrained nature and the complexity of insider attacks. The use of machine learning
to detect anomalies can address these issues effectively.
This subsection highlights why this specific topic (anomaly detection for insider
attack prevention in IoT) is critical. It explains its practical implications and role in
improving cybersecurity.
IoT devices often lack robust security, making them vulnerable to both external and
internal attacks. Insider threats are harder to detect since they come from trusted
sources within the network. Early detection of anomalies can minimize damage,
ensuring uninterrupted services and user trust. Developing a lightweight, efficient
detection system can fill a critical gap in IoT security infrastructure.
Department of CSE-ICB 1
Anamoly detection for Insider Attack 2024-2025
1.2 Challenges
Resource Constraints: IoT devices have limited computational power and storage,
making it difficult to implement resource-intensive algorithms. Data Complexity:
Large-scale, heterogeneous, and noisy IoT data make it challenging to detect
meaningful patterns. Insider Threats: Unlike external attacks, insider threats are
subtle and harder to identify. Scalability: The solution must work effectively across
diverse IoT environments with varying scales and configurations. Real-Time
Detection: Timely identification of threats is essential to prevent damage, adding to
the complexity.
1.3.1 Aims
Department of CSE-ICB 2
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 3
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 4
Anamoly detection for Insider Attack 2024-2025
Chapter 2
Literature Review
Department of CSE-ICB 5
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 6
Anamoly detection for Insider Attack 2024-2025
Gupta et al, 2021, & Li et al, 2020: The rapid proliferation of Internet
of Things (IoT) devices has led to an immense increase in data generation,
necessitating effective management architecture. Recent studies emphasize the
shift from traditional cloud-based solutions to edge computing architectures that
enhance data processing efficiency and reduce latency. By processing data closer
to the source, edge computing not only alleviates bandwidth issues but also
improves response times, making it a vital component of modern IoT ecosystems.
Mishra et al, 2022 & Khan et.al, 2021: IoT devices face significant
resource constraints that limit their computational and communicative
capabilities. Research highlights the challenges posed by limited memory,
processing power, and bandwidth in these devices, which hinder efficient data
transmission to centralized systems. This has led to the exploration of
lightweight algorithms and frameworks that can operate effectively within
these constraints while ensuring reliable data management and processing.
Department of CSE-ICB 7
Anamoly detection for Insider Attack 2024-2025
Sadeghi et al, 2020 & Ranjan et al, 2021: Data Security and Insider
Threats Data security remains a critical concern in IoT environments, especially
given the increasing reliance on cloud platforms. Recent literature identifies
insider threats as a prominent risk to data integrity, where individuals with
legitimate access can exploit their privileges to manipulate sensitive information.
Studies advocate for the implementation of advanced security protocols and
anomaly detection systems to identify such threats before they compromise data
integrity.
Choudhary et al, 2023 & Wang et al, 2022 & Bai et al, 2023:Machine
learning techniques have become essential for anomaly detection in IoT
systems. Recent works demonstrate the effectiveness of various machine
learning algorithms in identifying abnormal patterns in real-time data streams.
Methods such as recurrent neural networks (RNNs) and long short-term
memory (LSTM) networks are increasingly utilized for their ability to process
time-series data, allowing for the detection of deviations from established
behavioral norms . The integration of machine learning with edge computing
significantly enhances the capability of IoT systems to respond dynamically to
emerging threats.
Zhang et al, 2021 & Rehman et al, 2022 & Garcı́a et al,
2022:Blockchain technology has gained traction to enhance data integrity and
security in IoT applications. Its decentralized nature ensures that data records
are tamper-proof and verifiable. Recent studies explore the synergistic
integration of blockchain with IoT, focusing on how smart contracts can
automate the detection and remediation of anomalies in sensor data. This
combination not only fosters trust in data integrity but also facilitates secure
transactions among IoT devices, promoting a more resilient ecosystem
Department of CSE-ICB 8
Anamoly detection for Insider Attack 2024-2025
Chapter 3
Proposed Work
3.1 Introduction
The proposed work aims at:
Department of CSE-ICB 9
Anamoly detection for Insider Attack 2024-2025
3.2 Methadology
1. Edge Computing Architecture: Design an architecture that facilitates
the deployment of edge computing nodes, enabling localized data processing
and reducing dependency on centralized cloud platforms. This architecture will
include a distributed network of edge devices capable of processing data streams
from various IoT sensors in real-time.
Department of CSE-ICB 10
Anamoly detection for Insider Attack 2024-2025
This is the user-facing part of the system where users (admins or general users) interact
with the CNIDS. Through this interface, users can view alerts, manage settings, and
track the status of their accounts. The UI could display real-time information about
network traffic, attack status, and IP blocking activities. It helps in visualizing alerts
and triggering responses.
The Simple Mail Transfer Protocol (SMTP) Email Server is used to send email
notifications to users and administrators. When suspicious activities such as brute
force attempts or DDoS attacks are detected, the CNIDS sends automatic alerts to
designated recipients via email, providing them with timely information about the
attack. This ensures that the concerned parties are informed immediately for quick
action.
The Alert and Response module manages how the system responds to detected
security events. Upon identifying an intrusion attempt (like multiple failed logins or
unusual traffic patterns), this module triggers alerts, sends notifications, and starts
an automated response. The response could include blocking the attacker’s IP or
taking further action based on predefined rules.
3.3.4 Database
The Database is responsible for storing information related to network traffic, alerts,
blocked IP addresses, and user actions. It helps keep track of all activities within the
system, enabling further analysis, reporting, and auditing. The database also stores
logs of attacks and the actions taken to mitigate them, which is useful for future
reference and troubleshooting.
Department of CSE-ICB 11
Anamoly detection for Insider Attack 2024-2025
The Backend Detection System continuously monitors network traffic and analyzes
it for abnormal patterns. It uses algorithms to detect potential threats such as brute
force, DDoS attacks, and other malicious behavior. This system plays a crucial role
in identifying whether there is any suspicious activity occurring on the network,
triggering alerts, and taking appropriate actions like blocking attackers’ IPs.
The Network Monitor is responsible for overseeing the entire network’s traffic in real-
time. It collects data about the volume of traffic, the sources of traffic, and other
network characteristics. This data is analyzed to detect signs of a network intrusion
or attack. The monitor helps in identifying unusual patterns, such as a sudden spike
in requests, which might indicate a DDoS attack or brute force attempt.
3.3.7 Network
The network refers to the actual infrastructure where the system operates. It
encompasses the servers, routers, firewalls, and other devices that manage
communication between computers. In the context of CNIDS, the network is the
environment that is being protected from potential cyber-attacks by monitoring
traffic and applying responses to threats.
Department of CSE-ICB 12
Anamoly detection for Insider Attack 2024-2025
Chapter 4
REQUIREMENTS
RAM: 2–4 GB, depending on the size and complexity of your scripts.
Operating System
Python Environment
Department of CSE-ICB 13
Anamoly detection for Insider Attack 2024-2025
OS: For interacting with the operating system and file handling.
Text Editor/IDE
Additional Requirements
Email Account: For sending notifications (e.g., a Gmail account with SMTP
settings configured).
Department of CSE-ICB 14
Anamoly detection for Insider Attack 2024-2025
Chapter 5
Design Methodology
This system is designed to identify and mitigate risks posed by malicious insiders,
who may be employees, contractors, or other individuals with authorized access.
Key Components and Roles:
Security Analyst: Responsible for monitoring user activity, reviewing logs, and
creating incident reports.
System Administrator: Authorizes actions within the system, such as blocking user
Department of CSE-ICB 15
Anamoly detection for Insider Attack 2024-2025
access.
Insider: The individual whose behavior is being monitored.
Working:
Monitoring: The system continuously monitors user activity and system logs.
Detection: It analyzes this data to identify any anomalous behavior or suspicious
activity.
Alerting: If a potential threat is detected, the system triggers alerts to the Security
Analyst.
Response: The Security Analyst can then take appropriate actions, such as
investigating the incident, blocking user access, or reporting the incident to higher
authorities.
By proactively identifying and responding to insider threats, this system helps
organizations protect their sensitive information and assets.
The diagram depicts a system designed to monitor user behavior, detect anomalies,
and trigger appropriate responses. It consists of five main classes:
User: Represents a user with attributes like ID, username, role, access level, and
methods for login and logout. BehaviorMonitor: Monitors a user’s activities, logs
Department of CSE-ICB 16
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 17
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 18
Anamoly detection for Insider Attack 2024-2025
Response: If the threat is confirmed, the Security Team can take actions like
restricting or revoking the employee’s access.
This system helps organizations identify and respond to potential threats from
malicious insiders, protecting their sensitive information and assets.
Department of CSE-ICB 19
Anamoly detection for Insider Attack 2024-2025
Flexibility: They can model both simple and complex workflows, including
sequential, concurrent, and conditional flows..
Department of CSE-ICB 20
Anamoly detection for Insider Attack 2024-2025
Chapter 6
Implementation
The boto3 library is the Amazon Web Services (AWS) Software Development Kit
(SDK) for Python, which allows you to interact with AWS services
programmatically. It includes various modules to manage resources such as S3, EC2,
DynamoDB, CloudWatch, and many others. The
botocore.exceptions.NoCredentialsError is an exception raised when AWS
credentials are not found or cannot be retrieved. This typically happens when the
application is trying to access AWS services without valid credentials configured in
the environment.
Here’s a brief explanation of the two imports:
import boto3
from botocore.exceptions.NoCredentialsError
Department of CSE-ICB 21
Anamoly detection for Insider Attack 2024-2025
– It is raised when boto3 cannot find any credentials for authenticating AWS
requests.
This handler is set to write logs to the specified CloudWatch Log Group.
Log Stream: app-logs-stream. Logs are categorized under the specified Log
Stream within the Log Group.
Department of CSE-ICB 22
Anamoly detection for Insider Attack 2024-2025
Initialization: The handler initializes with a log group and log stream and sets
a None sequence token for the first log.
Error Handling: If log submission fails, the handler captures the error and
prints a message for debugging.
Department of CSE-ICB 23
Anamoly detection for Insider Attack 2024-2025
conn.close()
except Exception as e:
logger.error(f"Failed to add blocked IP {ip_address} to database: {e}")
This function attempts to add or update a record in a blocked ips table within a
SQLite database. It records the IP address, the current time as the block time, an
OTP, the OTP’s sent time, and the number of failed attempts.
The send alert email function is designed to send an alert email using SMTP over
SSL. Here’s a brief analysis of the function:
Email Composition:
– Constructs the email using MIMEText with the given subject and body.
SMTP Server:
Department of CSE-ICB 24
Anamoly detection for Insider Attack 2024-2025
Error Handling:
– Catches general exceptions and logs them, ensuring potential issues are
recorded.
Department of CSE-ICB 25
Anamoly detection for Insider Attack 2024-2025
Chapter 7
When a user attempts to log in, they enter their credentials; if the login fails, an OTP
is sent via Gmail. If the OTP is incorrect, the user’s IP is blocked.
Department of CSE-ICB 26
Anamoly detection for Insider Attack 2024-2025
Department of CSE-ICB 27
Anamoly detection for Insider Attack 2024-2025
A Gmail notification informs the user about their IP being blocked due to multiple
failed login attempts. The email contains a one-time password (OTP) for verification.
Department of CSE-ICB 28
Anamoly detection for Insider Attack 2024-2025
The system displays a list of blocked IP addresses, their blocking time, and the number
of failed login attempts from each IP.
Department of CSE-ICB 29
Anamoly detection for Insider Attack 2024-2025
Chapter 8
Application
Department of CSE-ICB 30
Anamoly detection for Insider Attack 2024-2025
Retail and Supply Chain Management: IoT devices in retail (e.g., smart
shelves) and supply chains (e.g., RFID tags) can be exploited by insiders for
fraud or inventory manipulation. The system identifies suspicious transactions
or anomalies, reducing risks of fraud and enhancing security.
Energy and Utilities Sector: IoT devices in energy distribution and smart
grids are vulnerable to insider threats. The system monitors for suspicious
activities, reducing risks of disruptions and ensuring stable energy supply
through real-time anomaly detection.
Department of CSE-ICB 31
Anamoly detection for Insider Attack 2024-2025
Chapter 9
9.1 Advantages
1. Real-Time Threat Detection: Performs anomaly detection at the edge (on
IoT devices), allowing quick detection and mitigation of insider attacks in real-
time, reducing the risk of damage.
3. Reduced Latency: Edge computing lowers the need to send data to a central
server, reducing latency in detecting suspicious activities. This allows for quicker
responses and minimizes potential damage from insider threats.
4. Scalability: As the IoT environment expands, the edge-based system can easily
scale to handle more devices without overloading centralized systems.
Department of CSE-ICB 32
Anamoly detection for Insider Attack 2024-2025
9.2 Limitations
1. Resource Constraints at the Edge: IoT devices, especially in low-cost
deployments, have limited computational resources (CPU, memory, storage),
which can impact the performance and complexity of machine learning models.
Balancing model accuracy with resource consumption is challenging, as
advanced models require more processing power.
Department of CSE-ICB 33
Anamoly detection for Insider Attack 2024-2025
labeled data for insider threat detection can be difficult. Without adequate
training, the system may struggle to detect new or previously unseen threats.
8. Security of Edge Devices: Edge devices are potential targets for attackers.
If compromised, the entire system may be at risk. Ensuring security patches,
physical protection, and remote management of edge devices can be challenging
in distributed networks.
Department of CSE-ICB 34
Anamoly detection for Insider Attack 2024-2025
Chapter 10
Future Enhancements:
Department of CSE-ICB 35
Anamoly detection for Insider Attack 2024-2025
Cloud Integration:
Cross-Platform Compatibility:
Ecosystem Expansion:
Department of CSE-ICB 36
Anamoly detection for Insider Attack 2024-2025
Bibliography
[1] Bai. Z., et al., ”Real-time anomaly detection in IoT networks using edge
computing and deep learning techniques,” IEEE Transactions on Network and
Service Management, 2023.
[2] Choudhary. A., et al., ”Machine learning for anomaly detection in IoT: A review,”
IEEE Access, 2023.
[3] Garcı́a. M., et al., ”Blockchain technology in IoT: A systematic review,” Future
Generation Computer Systems, 2022.
[4] Gupta. S., et al., ”Edge computing for IoT: A survey on challenges and
opportunities,” IEEE Internet of Things Journal, 2021.
[5] Khan. M. A., et al., ”Lightweight algorithms for resource-constrained IoT devices:
A review,” Sensors, 2021.
[6] Li .Y., et al., ”Edge computing in IoT: A review of challenges and solutions,”
IEEE Internet of Things Journal, 2020.
[7] Mishra. A., et al., ”Addressing resource constraints in IoT: Strategies and
techniques,” Journal of Systems Architecture, 2022.
[8] Ranjan. R., et al., ”Anomaly detection in IoT systems: A survey of techniques
and applications,” ACM Computing Surveys (CSUR), 2021.
[9] Rehman. M., et al., ”Smart contracts for anomaly detection in IoT: A blockchain-
based approach,” Journal of Information Security and Applications, 2022.
[10] Sadeghi. A., et al., ”Security and privacy challenges in IoT: A review of recent
developments,” IEEE Internet of Things Journal, 2020.
[11] Wang. S., et al., ”Deep learning for anomaly detection in IoT: Techniques and
applications,” IEEE Transactions on Neural Networks and Learning Systems,
2022.
[12] Zhang. Y., et al., ”Blockchain-based secure data sharing in IoT: A survey,” ACM
Computing Surveys (CSUR), 2021.
Department of CSE-ICB 37