Attack Detection in Fog Layer for IIoT Based on Machine Learning Approach
- Continuing introduction
- Find more related works regarding intrusion detection in IIoT
- Find possible scenario and algorithm based on related topics
- Prepare seminar by building the framework of the ppt, then record and update it in NSL website
- Finalized introduction
- Research more related works for IIoT,attack detecttion in fog layer
- Find the comparison between each algorithms
- Find the weakness from previous works that can implement for current research
Capstone Design: IoT Application for Smart Home
- Review more papers related to Smart Home Projects implementation
- Gathering the hardware parts to start the testbed
- Research more to implement smart energy metering scenario through MQTT protocol
- Attend online capstone design class
- set up the environment
- assemble the components, raspberry pi and other sensors
- prepare the testbed
- make sure adafruit connectivity
- present weekly report in capstone design online class
- Continue paper progress: 70%
- Getting used with research tools and environment
- More research references
- Publish 1 short-paper/journal
- Participate in local/international conference