Abstract Proceedings of ICIRESM – 2019
Full conference PDF is available to the subscribed user. Use your subscription login to access,
PROTECTION AND SECURITY INTELLIGENCE IN CONTEMPORARY RPL USING IOT TECHNIQUES FOR PRIVACY PROTECTION AND INTRUSION DETECTION
In the past few years, the Internet has grown swiftly, bringing with it various applications in numerous sectors, like transportation, education, entertainment, etc. Numerous items were created during this time, including businesses, television programs, and the still significant Internet. The best-in-class era of this general association is the Internet of Things (IoT), in which a sizable number of "Things" are necessary for the Internet to provide new opportunities and issues. Data uplink and downlink using RPMA (Random Phase Multiple Access) ensure that the information is perceived. It integrates the hyper-accessibility correspondence to the common by using LTE 5G (Long Term Evolution in 5G), which is used to assemble the usefulness and performance that seemed differently about the present. It helps to make things more secure. Due to MUX/DEMUX. The invasion is discovered using DT (Decision Trees), KNN (K-Means Nearest Neighborhood), and EMANN (Ensemble Methods of Artificial Neural Networks). These three methods are utilized to halt the intrusion and improve LTE-5 IoT processing efficiency. By enhancing the constituent methods' predictive capacities with EMANN, RPL (Routing Protocol with Low-Power) reduction helps to improve IPV6's detection and prediction processing.
LTE 5G (Long Term Evolution in 5G), RPMA (Random Phase Multiple Access), DT (Decision Trees), KNN (K-Means nearest Neighborhood), EMANN (Ensemble Methods of Artificial Neural Networks)
30/08/2019
211
19202
IMPORTANT DAYS
Paper Submission Last Date
September 27th, 2025
Notification of Acceptance
October 25th, 2025
Camera Ready Paper Submission & Author's Registration
November 11th, 2025
Date of Conference
November 28th, 2025