2022
DOI: 10.3390/electronics11182813
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Anomaly Detection System on the Internet of Railways Using Extended Neural Networks

Abstract: The Internet of Railways (IoR) network is made up of a variety of sensors, actuators, network layers, and communication systems that work together to build a railway system. The IoR’s success depends on effective communication. A network of railways uses a variety of protocols to share and transmit information amongst each other. Because of the widespread usage of wireless technology on trains, the entire system is susceptible to hacks. These hacks could lead to harmful behavior on the Internet of Railways if … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…The papers most similar to our approach are those included in Table 1 in the cybersecurity section [ 18 , 19 , 20 , 21 ]. In these works, the authors used data from network communication protocols as data sources.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…The papers most similar to our approach are those included in Table 1 in the cybersecurity section [ 18 , 19 , 20 , 21 ]. In these works, the authors used data from network communication protocols as data sources.…”
Section: Discussionmentioning
confidence: 99%
“…As a test environment, we had a physical test environment simulating axle counting. In papers [ 18 , 20 , 21 ], the authors, such as us, dealt with supervised learning ML methods. However, neither paper focuses on the kNN algorithm, which in our case came out best of the classical machine learning algorithms.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, such complexity renders RWS susceptible to broader threats (e.g., anomalies [2] and software faults [40]). In particular, anomalies are one of the most severe threats that might lead to system failures or even catastrophic consequences [19].…”
Section: Introductionmentioning
confidence: 99%