2019
DOI: 10.1109/lnet.2019.2901792
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of Deep Learning in Sensor Network Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
117
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 235 publications
(117 citation statements)
references
References 15 publications
0
117
0
Order By: Relevance
“…However, since the proposed algorithm mainly considers mitigation of latency and load congestion, further studies on trust, security, privacy, forensic, etc. [52][53][54][55] are needed, such as intrusion awareness [56][57][58][59] and secure data aggregation [60]. We expect that applying those would provide more secure data caching.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, since the proposed algorithm mainly considers mitigation of latency and load congestion, further studies on trust, security, privacy, forensic, etc. [52][53][54][55] are needed, such as intrusion awareness [56][57][58][59] and secure data aggregation [60]. We expect that applying those would provide more secure data caching.…”
Section: Discussionmentioning
confidence: 99%
“…We expect that applying those would provide more secure data caching. Meanwhile, since AI-based data caching [61][62][63] and AI-based edge management [59,64] are computationally intensive, this paper assumes that it is not appropriate for edge nodes. However, it can be effective for data caching when multiple factors are considered.…”
Section: Discussionmentioning
confidence: 99%
“…Another important challenge is privacy issues that can have a fatal impact on the user. Some interesting approaches to solving such issues are adopting deep learning and machine learning techniques [39,40]. Such techniques can be used to secure user data and detect intruders that violate the user's privacy.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…The authors in [21] introduced a deep-learning-based methodology for monitoring critical infrastructures using restricted boltzmann machine-based clustered intrusion detection system (RBC-IDS). The RBC-IDS technique classifies intruders from sensory data collected from wireless sensor networks (WSNs).…”
Section: Related Workmentioning
confidence: 99%