International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
Conferences Published ↓
DePaul-2026
IC-AIRCM-T3-2026
SPHERE-2025
AIMAR-2025
SVGASCA-2025
ICCE-2025
Chinai-2023
PIPRDA-2023
ICMRS'23
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 8 Issue 3
May-June 2026
Indexing Partners
IDS based Trust Computation Algorithm in Industrial IoT using Machine Learning Techniques
| Author(s) | Mr. Vaibhav Prakash Repe, Dr. Sarika Jadhav |
|---|---|
| Country | India |
| Abstract | The rapid evolution of Industrial Internet of Things (IIoT) systems has added tremendous improvements to automation, process observables, and smart decision making in fields like medicine, manufacturing and smart infrastructure. With this increased automation, the IIoT systems become more vulnerable. Specially, maintaining trust and shielding IIoT systems from new, advanced, and growing cyber-attacks has proven to be a challenge. Typical Intrusion Detection Systems (IDS) detect intrusions to a network from attacks, but are insufficient to new advanced threats and attacks. Furthermore, such IDS fail to assess trust and dynamically adjust to a more sophisticated level in real time. This study outlines the details of such a challenge, and addresses these challenges with a hybrid trust-based intrusion detection framework that combines machine learning for efficient computation of trust in IIoT adaption environments. The model proposed in this study provides an assessment of validity of nodes in the network from an IIoT adaption framework, and such assessment is based on and integrated from several dimensions of control including communication, collaboration, and level of control exercised. Adaptive machine learning and control is based on a combination of both unsupervised and supervised control. More specifically, the supervision of control employs support vector machines (SVM), Naive Bayes (NB), and hybrid machine learning (HML) model based on random forest with AdaBoost. The evaluation methodology included both simulated datasets and datasets from real-world IoT applications. The results showed that Naïve Bayes scored 96.13% in accuracy, 96.4% in precision, 96.13% in recall, and 96.26% in F1 score; and SVM scored 93.2% in accuracy, 96.52% in precision, and 94.81% in F1 score. The results indicated that the proposed model, the HML, achieved a competing 98.2% in accuracy, 96.43% in precision, 98.2% in recall, and 97.31% in the F1 score, thus outperforming all other models in testing and demonstrating superior performance, robustness, and adaptability. In summary, combining the trust-based evaluation model and hybrid machine learning approaches provides a significant improvement in the detection and protection of IIoT systems; thus, it becomes applicable for real-time deployment in mission-critical systems. |
| Keywords | IIoT, Intrusion Detection System, Machine Learning, Trust Management, Support Vector Machine, Naïve Bayes |
| Field | Engineering |
| Published In | Volume 8, Issue 3, May-June 2026 |
| Published On | 2026-05-12 |
Share this

E-ISSN 2582-2160
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
Powered by Sky Research Publication and Journals