ISSN : 2349-6657

PROTECTION AND SECURITY INTELLIGENCE IN CONTEMPORARY RPL USING IOT TECHNIQUES FOR PRIVACY PROTECTION AND INTRUSION DETECTION

V.MEENA, K.AMBIKA, B.S.SANGEETHA, .M.RADHA



In the past few years, the Internet has grown swiftly, bringing with it various applications in numerous sectors, like transportation, education, entertainment, etc. Numerous items were created during this time, including businesses, television programs, and the still significant Internet. The best-in-class era of this general association is the Internet of Things (IoT), in which a sizable number of "Things" are necessary for the Internet to provide new opportunities and issues. Data uplink and downlink using RPMA (Random Phase Multiple Access) ensure that the information is perceived. It integrates the hyper-accessibility correspondence to the common by using LTE 5G (Long Term Evolution in 5G), which is used to assemble the usefulness and performance that seemed differently about the present. It helps to make things more secure. Due to MUX/DEMUX. The invasion is discovered using DT (Decision Trees), KNN (K-Means Nearest Neighborhood), and EMANN (Ensemble Methods of Artificial Neural Networks). These three methods are utilized to halt the intrusion and improve LTE-5 IoT processing efficiency. By enhancing the constituent methods' predictive capacities with EMANN, RPL (Routing Protocol with Low-Power) reduction helps to improve IPV6's detection and prediction processing.

LTE 5G (Long Term Evolution in 5G), RPMA (Random Phase Multiple Access), DT (Decision Trees), KNN (K-Means nearest Neighborhood), EMANN (Ensemble Methods of Artificial Neural Networks)

30/08/2019

211

19202

IMPORTANT DAYS

Paper Submission Last Date

Notification of Acceptance

Camera Ready Paper Submission & Author's Registration

Date of Conference

Publication