z-logo
open-access-imgOpen Access
Modeling of Smart Home Cyber System with Intuitionistic Fuzzy Estimation
Author(s) -
Tihomir Videv,
Boris Bozveliev,
Sotir Sotirov
Publication year - 2019
Publication title -
information and security an international journal
Language(s) - English
Resource type - Journals
eISSN - 1314-2119
pISSN - 0861-5160
DOI - 10.11610/isij.4304
Subject(s) - estimation , computer science , fuzzy logic , cyber physical system , artificial intelligence , engineering , systems engineering , operating system
A R T I C L E I N F O : RECEIVED: 10 JUN 2019 REVISED: 2 SEP 2019 ONLINE: 16 SEP2019 K E Y W O R D S : generalized nets, cyber systems, Intuitionistic fuzzy estimation, smart house Creative Commons BY-NC-SA 4.0 Introduction The current article examines Generalized net (GN) 1, 2 Smart House model which is being controlled remotely by different identifications, channels and automated external systems as well as cloud platform applications. We will view the possibilities of a break-in by a threat in the system, with the idea of taking over the Smart House by rating via intuitionistic fuzzy estimation. Generalized nets and index matrix are tools with which we can describe the processes running through the system to a great detail. 5, 7, 14 Here you can model processes that work in parallel. Videv, Bozveliev and Sotirov, ISIJ 42, no. 1 (2019): 45-53 46 With the help of the generalized nets many optimization algorithms were modelled, 3, 9, 10, 14, 13, 11, 21, 17 as well as processes taking place in health and education establishments. 18, 20 A part of the model is connected with intelligent systems as well as neuron nets, genetic and other algorithms. 14, 15, 19, 26, 27 We are examining the system of the Smart House realized by using control modules for remote management via phone, tablet, laptop, PC and more by a cloud platform. Customer applications as well as the automated communication channels are connected in the cloud platform, they are being verified and send requests to their systems. On its own side the cloud structure connects to the controller of the Smart House and via it controls the Smart devices. Possibilities of system penetration are via the customer applications, cloud platform and also through the controller of the Smart House by the different communication channels. 17, 23 When the user enters in a specific app for system control, he verifies himself by entering a password. After the complete verification the app connects to the cloud platform. The software in it connects to the controller that controls the Smart House by a similar verification method. Upon the analysis of the possibilities for invaders in the system, we will add a process achieved via the intuitionistic fuzzy estimation, 25 which will watch over the verification processes and will analyse the successful and unsuccessful attempts and will split the unsuccessful ones to intentional and unintentional. In this article we are observing a common model of the Smart House. 10 The GN model 1, 2 will help us to easily and clearly understand the basic operating mode of the communication systems in the Smart House and the possibilities of penetration in the system so that we can improve the security, to remove malfunctions, and analyse the whole process better. In this context we will grade the possibilities of a communicational penetration in the system of the Smart House. Here we will use fuzzy sets. The intuitionistic fuzzy sets (IFS) 15, 16, 18, 19 are an expansion of the concept of fuzzy sets. As Zadeh 17 has defined it showing the function μA (X) which determines the membership of an element x to the plurality of A rated in the range of 0; 1. The difference between the fuzzy sets and the intuitionistic fuzzy sets (IFS) is in the presence of a second function μA (x), which determines if it is not a member of the element x in the plurality of A, where μA (x) 0; 1 A (x) 0; 1 if μA (x) + A (x) 0; 1]. The IFS itself is formally denoted by: We need (IFS), in order to evaluate the possible intrusion of the communication. The estimations are presented by ordered pairs , of real numbers from set [0, 1], where: where: SAll verification attempts. S1 -All successful verification attempts when the token in place L6, L7, L9, L10, L14, L18. { , ( ), ( ) } A x A x A x x E =

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom