Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach
- Revised Topic, change the attack detection layer from cloud to fog layer
- Rewrite abstract and introduction
- Research more about related topics
- Build up the idea to implement machine learning in fog layer
- Prepare seminar by reading throughfully "Passban IDS: An Intelligent Anomaly Based Intrusion Detection Sytsem for IoT Edege Devices"
- Continuing introduction
- Find more related works regarding intrusion detection in IIoT
- Find possible scenario and algorithm based on related topics
- Prepare seminar by building the framework of the ppt, then record and update it in NSL website
Capstone Design: IoT Application for Smart Home
- Decided to focused on Smart Energy Metering after breakdown all the objectives of Smart Home Projects
- Review more papers related to Smart Home Projects
- Start list down hardware parts based on resource papers
- Attend online capstone design class
- Review more papers related to Smart Home Projects implementation
- Gathering the hardware parts to start the testbed
- Research more to implement smart energy metering scenario through MQTT protocol
- Attend online capstone design class
- Continue paper progress: 70%
- Getting used with research tools and environment
- More research references
- Publish 1 short-paper/journal
- Participate in local/international conference