2020
DOI: 10.1002/ett.4069
|View full text |Cite
|
Sign up to set email alerts
|

Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks

Abstract: Attack detection is a significant problem to be resolved to attain security in industrial sensor network. Few research works have been designed for performing attack discovery process with the help of different classification algorithms. However, classification performance was lowered to accurately find attack nodes and thereby getting higher security level (SL). In order to overcome such limitations, bipolar fully recurrent deep structured neural learning based attack detection (BFRDSNL‐AD) technique is propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…The method is limited to a low-level security model and is not applicable to a high-level security model. 19 introduced an ontology framework for enhancing privacy and 20,21 detected the intrusion in the fog computation network that provided improved robustness and prevented the loss of information. The classifiers used for the detection were optimized using the weed optimization described in Movassagh et al, 22 and these provided optimized results but there is a need for further enhancement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The method is limited to a low-level security model and is not applicable to a high-level security model. 19 introduced an ontology framework for enhancing privacy and 20,21 detected the intrusion in the fog computation network that provided improved robustness and prevented the loss of information. The classifiers used for the detection were optimized using the weed optimization described in Movassagh et al, 22 and these provided optimized results but there is a need for further enhancement.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, some investigations have been concentrated on either disease investigation can attain persons medicinal data that fulfill their needs, that is data availability challenges with reliable demand and supply. 24,25…”
Section: Related Workmentioning
confidence: 99%
“…However, it could not be neglected the privacy preserving of medicinal information among persons and disease investigation have yet remained difficult, particularly wide‐ranging privacy consideration when data shared between numerous entities including smart contract. Moreover, some investigations have been concentrated on either disease investigation can attain persons medicinal data that fulfill their needs, that is data availability challenges with reliable demand and supply 24,25 …”
Section: Related Workmentioning
confidence: 99%
“…Therefore, dutycon proposes a method to dynamically adjust the sleep time C in the node cycle to ensure that the end-to-end delay expecta-tion of the node meets a certain limit [22]. Some researchers began to introduce the routing protocol mentioned in wireless mesh networks into wireless sensor networks [23]. On the whole, the research of network sensors is relatively diverse, but the focus is on transmission.…”
Section: Related Workmentioning
confidence: 99%