2022
DOI: 10.3390/s23010321
|View full text |Cite
|
Sign up to set email alerts
|

Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID

Abstract: Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (RPL), which is applied in various heterogeneous IoT applications. Hence, the increase in reliance on the IoT requires focus on the security of the RPL protocol. The top defence layer is an intrusion detection system (IDS), and the heterogeneous characteristics of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 35 publications
(37 reference statements)
0
6
0
Order By: Relevance
“…In 22 , the authors proposed a novel approach called Federated-Transfer-Learning-Based Customized Distributed system (FTLCD) for identifying routing protocol intrusions in a heterogeneous IoT environment. The FTLCD approach involved a central server that initiated the process by using a predefined learning approach to construct a local model and detected unique features of several routing protocol-based IoT devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 22 , the authors proposed a novel approach called Federated-Transfer-Learning-Based Customized Distributed system (FTLCD) for identifying routing protocol intrusions in a heterogeneous IoT environment. The FTLCD approach involved a central server that initiated the process by using a predefined learning approach to construct a local model and detected unique features of several routing protocol-based IoT devices.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The FT-CID design process is decomposed into three steps: dataset collection and preprocessing, FTL-assisted edge-enabled IDS learning, and final intrusion detection. In [21], a federated learning architecture was introduced to detect intruders. Similarly, FLbased learning for detecting zero-day botnet attacks [21] was proposed to enhance the data privacy concept in IoT edge devices.…”
Section: Federated Learning-based Iot Attack Detection Approachesmentioning
confidence: 99%
“…In [21], a federated learning architecture was introduced to detect intruders. Similarly, FLbased learning for detecting zero-day botnet attacks [21] was proposed to enhance the data privacy concept in IoT edge devices. It did not investigate advanced FL algorithms' potential to enhance attack detection.…”
Section: Federated Learning-based Iot Attack Detection Approachesmentioning
confidence: 99%
“…Federated-transfer-learning assisted customized distributed (FT-CID) IDS model is proposed in [71] to identify RPL intrusion in IoT environments. The design process of FT-CID includes three steps: dataset collection, FTL-assisted edge IDS learning, and intrusion detection.…”
Section: Dos Attacks Countermeasuresmentioning
confidence: 99%