top of page
MJB_2350 Farm drones 2x_edited.jpg

Research / Programming 
Experiences 

In my pioneering research, "Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol," I developed a novel trust evaluation framework that significantly enhances IoT security and reliability. Leveraging game theory and Bayesian inference, the framework introduces a "Second Chance Protocol" to accurately identify and reintegrate temporarily malfunctioning devices, thereby optimizing network resource utilization and trustworthiness. My work not only demonstrates a detection rate of 97.99% for low noise levels but also sets new benchmarks in IoT security research, showcasing my deep analytical abilities, innovative problem-solving skills, and my commitment to advancing cybersecurity in smart environments.

My Role and Contributions:

As a lead researcher, I spearheaded the development of a hierarchical trust evaluation framework for IoT devices, incorporating innovative strategies such as the "Second Chance Protocol." This protocol uniquely identifies and rehabilitates temporarily malfunctioning nodes, optimizing resource utilization and trustworthiness across the network. Through meticulous experimentation and synthetic data analysis, my team and I demonstrated significant improvements in trust evaluation accuracy and device utilization, setting new benchmarks in IoT security research.

final_res_model.png

Model Detection accuracy of different approaches and the average trust with noise. 

model_basic1.png

Proposed Platform for the IoT Network

bottom of page