2021
DOI: 10.1002/ett.4228
|View full text |Cite
|
Sign up to set email alerts
|

SecureDeepNet‐IoT: A deep learning application for invasion detection in industrial Internet of Things sensing systems

Abstract: Deep learning (DL) is a special field of artificial intelligence that has increased its use in various fields and has proved its effectiveness in classification. The feasibility of using many hidden layers and many neurons for each layer in the DL architectures enables a detailed analyzing capability for classification and segmentation issues. Advancing the learning performance and generalization capability of the models for big data is one of the major advantages of DL that makes it a mandatory requirement fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…Simulation results show the better performance of ERCMS against DFCR, 58 MDFCR and TEO‐MCRP 35 in terms of (a) consumed energy, (b) delivery ratio, (c) delay, (d) routing overhead, (e) throughput, and (f) the first and the last node's death times performance metrics. It is worth to mention that, by decreasing energy consumption and increasing network lifetime more advanced security schemes (like References 73,74) can be utilized. In the future studies we will explore a way to learn coefficient θ$$ \theta $$ (sectoring angle) and Bt0.25em$$ {B}_t $$(number of mobile sinks considered by the network designer to support the received help requests in each time interval t ) of our algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…Simulation results show the better performance of ERCMS against DFCR, 58 MDFCR and TEO‐MCRP 35 in terms of (a) consumed energy, (b) delivery ratio, (c) delay, (d) routing overhead, (e) throughput, and (f) the first and the last node's death times performance metrics. It is worth to mention that, by decreasing energy consumption and increasing network lifetime more advanced security schemes (like References 73,74) can be utilized. In the future studies we will explore a way to learn coefficient θ$$ \theta $$ (sectoring angle) and Bt0.25em$$ {B}_t $$(number of mobile sinks considered by the network designer to support the received help requests in each time interval t ) of our algorithm.…”
Section: Discussionmentioning
confidence: 99%
“…Cyber and physical attacks are two kinds of attacks involved in smart cities 5‐10 . Sleep Denial Attack, Side Channel Attack, Permanent Denial of Service, Fake Node Injection, Radio Frequency Jamming, and Malicious Code Injection are examples of these assaults 11 .…”
Section: Introductionmentioning
confidence: 99%
“…4 Cyber and physical attacks are two kinds of attacks involved in smart cities. [5][6][7][8][9][10] Sleep Denial Attack, Side Channel Attack, Permanent Denial of Service, Fake Node Injection, Radio Frequency Jamming, and Malicious Code Injection are examples of these assaults. 11 In a cyber-attack, the attacker attempts to inject malicious or malware software into network components in order to gain unauthorized access to them.…”
Section: Introductionmentioning
confidence: 99%
“…Spyware can be used to obtain GPS locations, correspondence, and bank information of individuals, as well as to obtain consumer habits for customized advertisements [2]. Moreover, advanced artificial intelligence algorithms are adapted to sensing systems in IIoT networks for detecting malicious applications and various cyber-attack from network traffic [17].…”
Section: Introductionmentioning
confidence: 99%