2020
DOI: 10.1109/access.2020.2994079
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network

Abstract: The Industrial Internet of Things (IIoT) brings together many sensors, machines, industrial applications, databases, services, and people at work. The IIoT is improving our lives in several ways including smarter cities, agriculture, and e-healthcare, etc. Although the IIoT shares several characteristics with the consumer IoT, different cybersecurity mechanisms are adopted for both networks. Unlike consumer IoT solutions that are used by an individual user for a single purpose, IIoT solutions tend to be integr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 143 publications
(74 citation statements)
references
References 40 publications
0
54
0
1
Order By: Relevance
“…Third, the feasibility of the proposed schemes for resource-constrained devices is not deeply considered. To address the aforementioned challenges, we propose a lightweight HDRaNN-based attack detection scheme for IIoT networks, which is an extension of our previous work [23]. We use two latest IIoT securityrelated datasets and define several performance parameters for the performance evaluation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Third, the feasibility of the proposed schemes for resource-constrained devices is not deeply considered. To address the aforementioned challenges, we propose a lightweight HDRaNN-based attack detection scheme for IIoT networks, which is an extension of our previous work [23]. We use two latest IIoT securityrelated datasets and define several performance parameters for the performance evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…It contains 13 features and seven different types of attacks such as denial of service, malicious operation, malicious control, wrong setup, spying, scan, and data type probing attacks. All the classes of this dataset are shortly described in the following [23].…”
Section: ) Ds2os Datasetmentioning
confidence: 99%
“…Finally, it is noteworthy to mention that, since the proposed AIDS is designed to be deployed in resource-constrained devices, deep learning techniques, which are complex, heavyweight, and are characterized by a high computational overhead, have not been considered. However, deep learning techniques, such as those mentioned in [39,40], could be considered, as future work, in the extension of the autonomous and lightweight proposed AIDS to a cloud-based AIDS for IoMT edge networks.…”
Section: Challenges and Future Workmentioning
confidence: 99%
“…The proposed model learned effectively in the training phase. Shahid et al [69] proposed a new IDS based on a random neural network (RaNN) approach. The proposed prediction based on the RaNN achieved a higher performance than other machine learning algorithms such as ANN, SVM, and DT.…”
Section: Machine Learning Techniquesmentioning
confidence: 99%