Claim Missing Document
Check
Articles

Found 9 Documents
Search

Evaluating Security Mechanisms for Wireless Sensor Networks in IoT and IIoT Zhukabayeva, Tamara; Buja, Atdhe; Pacolli, Melinda
Journal of Robotics and Control (JRC) Vol 5, No 4 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i4.21683

Abstract

In the era of interconnected digital ecosystems, the security of Wireless Sensor Networks (WSN) emerges as a pivotal concern, especially within the domains of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT). However, the very nature of WSNs—being distributed, resource-constrained, and often deployed in unattended environments—poses unique cybersecurity challenges.  A main issue and challenge remains their Cybersecurity in communication. In this paper, we provide a systematic review focused on three themes including 1) techniques for secure communication in WSN; 2) algorithms and methods for intrusion detection in WSN; and 3) IoT and IIoT security concerning WSN. It has provided the results of its own for the publications made in the data analysis of three themes. The paper also has a simulation experiment to investigate the behavior of WSNs under sinkhole attacks—one of the prevalent threats to network integrity. Utilizing the Contiki OS Cooja simulator, the experiment carefully evaluates the performance of existing detection algorithms and introduces a novel method for identifying and neutralizing malicious nodes. Our simulation discloses unconventional communication patterns during sinkhole attacks running RPL protocol, emphasizing the effectiveness of our detection mechanisms against cyber threats. Particularly, the introduction of a malicious node (Node 13) significantly disrupted network communication, with traditional security mechanisms failing to immediately detect and isolate the threat. The scope of future research work will include the broader spectrum of cyber threats beyond sinkhole attacks, exploring advanced detection mechanisms, and machine learning-based security protocols for enhanced trust and transparency in WSN communications.
Towards robust security in WSN: a comprehensive analytical review and future research directions Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Mardenov, Yerik; Adamova, Aigul; Karabayev, Nurdaulet; Abdildayeva, Assel; Baumuratova, Dilaram
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 1: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i1.pp318-337

Abstract

One of the most important aspects of the effective functioning of wireless sensor network (WSN) is their security. Despite significant progress in WSN security, there are still several unresolved issues. Many review studies have been published on the problems of possible attacks on WSN and their identification. However, due to the lack of their systematic analysis, it is not possible to fully substantiate practical recommendations for the effective application of the proposed solutions in the field of WSN security. In particular, the creation of methods that provide a high degree of security while minimizing computational effort and costs, and the development of effective methods for detecting and preventing attacks on WSN. The purpose of this document is to fill this gap. The article presents the results of the study in the form of a systematic analysis of the literature with a targeted selection of sources to identify the most effective methods for detecting and preventing attacks on WSN. By identifying the security of WSN, which has not yet been addressed in research works, the review aims to reduce its impact. As a result, our extended taxonomy is presented, including attack types, datasets, effective WSN attack detection methods, countermeasures, and intrusion detection systems (IDS).
Enhancing internet of things security against structured query language injection and brute force attacks through federated learning Adamova, Aigul; Zhukabayeva, Tamara; Mukanova, Zhanna; Oralbekova, Zhanar
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i1.pp1187-1199

Abstract

The internet of things (IoT) encompasses various devices for monitoring, data collection, tracking people and assets, and interacting with other gadgets without human intervention. Implementing a system for predicting the development and assessing the criticality of detected attacks is essential for ensuring security in IoT interactions. This work analyses existing methods for detecting attacks, including machine learning, deep learning, and ensemble methods, and explores the federated learning (FL) method. The aim is to study FL to enhance security, develop a methodology for predicting the development of attacks, and assess their criticality in real-time. FL enables devices and the aggregation server to jointly train a common global model while keeping the original data locally on each client. We demonstrate the performance of the proposed methodology against structured query language (SQL) injection and brute force attacks using the CICIOT2023 dataset. We used accuracy and F1 score metrics to evaluate the effectiveness of our proposed methodology. As a result, the accuracy in predicting SQL injection reached 100%, and for brute force attacks, it reached 98.25%. The high rates of experimental results clearly show that the proposed FL-based attack prediction methodology can be used to ensure security in IoT interactions.
Comprehensive Study on Detecting Multi-Class Classification of IoT Attack Using Machine Learning Methods Zhukabayeva, Tamara; Zholshiyeva, Lazzat; Ven-Tsen, Khu; Adamova, Aigul; Karabayev, Nurdaulet; Mardenov, Erik
Journal of Robotics and Control (JRC) Vol. 5 No. 6 (2024)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v5i6.22819

Abstract

The proliferation of IoT devices has heightened their susceptibility to cyberattacks, particularly botnets. Conventional security methods frequently prove inadequate because of the restricted processing capabilities of IoT devices. This paper suggests utilizing machine learning methods to enhance the detection of attacks in Internet of Things (IoT) environments. The paper presents a novel approach to detect different botnet assaults on IoT devices by utilizing ML methods such as XGBoost, Random Forest, LightGBM, and Decision Tree. These algorithms were examined using the N-BaIoT dataset to classify multi-class botnet attacks and were specifically designed to accommodate the limitations of IoT devices. The technique comprises the steps of data preparation, preprocessing, classifier training, and decision-making. The algorithms achieved high detection accuracy rates: XGBoost (99.18%), Random Forest (99.20%), LGBM (99.85%), and Decision Tree (99.17%). The LGBM model demonstrated exceptional performance. The incorporation of the attack evaluation model greatly enhanced the identification of botnets in IoT networks. The paper displays the efficacy of machine learning techniques in identifying botnet assaults in IoT networks. The models generated exhibit exceptional accuracy and can be seamlessly integrated into existing cybersecurity systems.
Design of QazSL Sign Language Recognition System for Physically Impaired Individuals Zholshiyeva, Lazzat; Zhukabayeva, Tamara; Baumuratova, Dilaram; Serek, Azamat
Journal of Robotics and Control (JRC) Vol. 6 No. 1 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i1.23879

Abstract

Automating real-time sign language translation through deep learning and machine learning techniques can greatly enhance communication between the deaf community and the wider public. This research investigates how these technologies can change the way individuals with speech impairments communicate. Despite advancements, developing accurate models for recognizing both static and dynamic gestures remains challenging due to variations in gesture speed and length, which affect the effectiveness of the models. We introduce a hybrid approach that merges machine learning and deep learning methods for sign language recognition. We provide new model for the recognition of Kazakh Sign Language (QazSL), employing five algorithms: Support Vector Machine (SVM), Long Short Term Memory (LSTM), Gated Recurrent Unit (GRU), Convolutional Neural Networks (CNN) with VGG19, ResNet-50, and YOLOv5. The models were trained on a QazSL dataset of more than 4,400 photos. Among the assessed models, the GRU attained the highest accuracy of 100%, followed closely by SVM and YOLOv5 at 99.98%, VGG19 at 98.87% for dynamic dactyls, LSTM at 85%, and ResNet-50 at 78.61%. These findings illustrate the comparative efficacy of each method in real-time gesture recognition. The results yield significant insights for enhancing sign language recognition systems, presenting possible advancements in accessibility and communication for those with hearing impairments.
Tackling the anomaly detection challenge in large-scale wireless sensor networks Zhukabayeva, Tamara; Adamova, Aigul; Zholshiyeva, Lazzat; Mardenov, Yerik; Karabayev, Nurdaulet; Baumuratova, Dilaram
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp2479-2490

Abstract

One of the areas of ensuring the security of a wireless sensor network (WSN) is anomaly detection, which identifies deviations from normal behavior. In our paper, we investigate the optimal anomaly detection algorithms in a WSN. We highlight the problems in anomaly detection, and we also propose a new methodology using machine learning. The effectiveness of the k-nearest neighbor (kNN) and Z Score methods is evaluated on the data obtained from WSN devices in real time. According to the experimental study, the Z Score methodology showed a 98.9% level of accuracy, which was much superior to the kNN 43.7% method. In order to ensure accurate anomaly detection, it is crucial to have access to high-quality data when conducting a study. Our research enhances the field of WSN security by offering a novel approach for detecting anomalies. We compare the performance of two methods and provide evidence of the superior effectiveness of the Z Score method. Our future research will focus on exploring and comparing several approaches to identify the most effective anomaly detection method, with the ultimate goal of enhancing the security of WSN.
Development of Method to Predict Career Choice of IT Students in Kazakhstan by Applying Machine Learning Methods Berlikozha, Bauyrzhan; Serek, Azamat; Zhukabayeva, Tamara; Zhamanov, Azamat; Dias, Oliver
Journal of Robotics and Control (JRC) Vol. 6 No. 1 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i1.25558

Abstract

The growing intricacy of IT education requires resources to aid students in choosing specialized pathways. This study investigates the prediction of specialization preferences among IT students at SDU University in Kazakhstan through the application of machine learning techniques. The research contribution is the development of a predictive model that enhances academic advising by incorporating multiple factors, including academic performance, personality traits, qualifications, and extracurricular involvement. The research examined 692 anonymized student profiles and evaluated the efficacy of five machine learning algorithms: Random Forest, K-Nearest Neighbors, Support Vector Machine, Gradient Boosting, and Naive Bayes. Stratified 10-fold cross-validation was utilized to reduce the risk of overfitting. Gradient Boosting attained a peak accuracy of 99.10% in validation; however, its performance decreased to 92.16% on an independent test set, suggesting overfitting. Naive Bayes exhibited the lowest accuracy, recorded at 35.26%. Logistic regression analysis indicated a statistically significant correlation (p < 0.05) among academic performance, extracurricular involvement, and specialization selection. Personality traits and certifications significantly influenced the prediction process. The findings suggest that although Gradient Boosting demonstrates high effectiveness, the associated risk of overfitting requires additional refinement for practical application. The notable impact of academic performance and extracurricular activities indicates that educational institutions ought to prioritize these elements in student guidance. The incorporation of machine learning-based recommendations into advising frameworks enhances the precision of specialization predictions, thereby improving student decision-making and career alignment.
Assessing the knowledge and practices of internet of things security and privacy among higher education students Adamova, Aigul; Zhukabayeva, Tamara; Zhartybayeva, Makpal; Zhumabayeva, Laula
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 4: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i4.pp4074-4086

Abstract

When multiple internet of things (IoT) devices interact, there are risks of privacy breaches, personal data leaks, various attacks, and device manipulation. Security is one of the most important technological research problems that currently exist for the IoT. The main purpose of the present paper is to determine the level of awareness of university students about existing security issues when using IoT devices. The paper presented the methodology of the survey. A questionnaire was developed covering four areas, such as fact-finding about general concepts of the IoT, security measures when using IoT devices, security threats and the presence of vulnerabilities of IoT devices, general policies, practices and shared responsibilities. A methodology for calculating the Awareness Level Index is proposed. This study has potential limitations. The effect estimates in the model are based on a survey of undergraduate and master’s degree students in “Computer Science” and “Software Engineering” within several universities. A total of 370 undergraduate and master’s students participated in the survey. The data processing resulted in the development of recommendations and suggested measures. This study will be useful for both stakeholders and researchers to develop effective strategies and make informed decisions.
Network Attack Detection Using NeuroEvolution of Augmenting Topologies (NEAT) Algorithm Zhukabayeva, Tamara; Adamova, Aigul; Ven-Tsen, Khu; Nurlan, Zhanserik; Mardenov, Yerik; Karabayev, Nurdaulet
JOIV : International Journal on Informatics Visualization Vol 8, No 1 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.1.2220

Abstract

The imperfection of existing intrusion detection methods and the changing nature of malicious actions on the attacker's part led to the Internet of Things (IoT) network interaction in an unsafe state. The actual problem of improving the technology of the IOT is counteracting malicious network impacts. In this regard, research and development aimed at creating effective tools for solving applied problems within the framework of this problem are becoming increasingly important.  This study seeks to develop tools for detecting anomalous network conditions resulting from malicious attacks. In particular, the accuracy of the identification of DoS and DDoS attacks is sufficient for operational use. This study analyzes various multi-level architectures, relevant communication protocols, and different types of network attacks. The presented research was conducted on open datasets TON_IOT DATASETS, which include multiple data sources collected from IoT sensors. The modified HyperNEAT algorithm was used as the basis for the development. The NEAT methodology used in the study allows you to combine various network nodes. Results of the study: a neuro-evolutionary algorithm for identifying DoS and DDoS attacks was implemented, integrated, and real-tested based on a multi-level analysis of network traffic combined with various adaptive modules. The accuracy of identifying DoS and DDoS attacks is 0.9242 in the Accuracy metric. The study implies that the proposed approach can be recommended for network intrusion detection, ensuring security when interacting with the IoT.