Authors :
Mohammad Sayduzzaman; Jarin Tasnim Tamanna; Muaz Rahman; Sadia Sazzad; Tawhidur Rahman
Volume/Issue :
Volume 9 - 2024, Issue 3 - March
Google Scholar :
https://tinyurl.com/25mn4wv6
Scribd :
https://tinyurl.com/5x5ra46f
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAR2149
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Nowadays, the Internet has become one of the
basic human needs of professionals. With the massive
number of devices, reliability, and security will be crucial
in the coming ages. Routers are common to provide us
with the internet. These routers can be operated in
different modes. Some routers use the Wifi Security
Protocol (WPA) or WPA2, and the Wifi Alliance
introduced WPA3 on 25 June 2018. There are a lot of
papers regarding Smart Contract (SC)–based IDS as well
as Machine Learning-based IDS. Very few discuss
combining SC and ML-based IDS for different
authentication processes. In this paper, we will discuss
how combining SC and ML plays a vital role in
authentication. Also, we play the role of embedded IDS
system so that existing vulnerabilities of the WPA2 and
WPA3 can be reduced to 99.62%.
Keywords :
Machine Learning, Smart Contract, WPA3 Protocol, Router, Cybersecurity, Data Analysis.
Nowadays, the Internet has become one of the
basic human needs of professionals. With the massive
number of devices, reliability, and security will be crucial
in the coming ages. Routers are common to provide us
with the internet. These routers can be operated in
different modes. Some routers use the Wifi Security
Protocol (WPA) or WPA2, and the Wifi Alliance
introduced WPA3 on 25 June 2018. There are a lot of
papers regarding Smart Contract (SC)–based IDS as well
as Machine Learning-based IDS. Very few discuss
combining SC and ML-based IDS for different
authentication processes. In this paper, we will discuss
how combining SC and ML plays a vital role in
authentication. Also, we play the role of embedded IDS
system so that existing vulnerabilities of the WPA2 and
WPA3 can be reduced to 99.62%.
Keywords :
Machine Learning, Smart Contract, WPA3 Protocol, Router, Cybersecurity, Data Analysis.