This work is supported by the Academy of Finland: (a) ee-IoT n.319009, (b) EnergyNet n.321265/n.328869 and (c) FIREMAN n.326270/CHIST-ERA-17-BDSI-003, and the Brazilian National Council for Scientific and Technological Development (CNPq). We would like to thank Hanna Niemelä for helping to proofread this paper.ABSTRACT Currently, with the increasing number of devices connected to the Internet, search for network vulnerabilities to attackers has increased, and protection systems have become indispensable. There are prevalent security attacks, such as the Distributed Denial of Service (DDoS), which have been causing significant damage to companies. However, through security attacks, it is possible to extract characteristics that identify the type of attack. Thus, it is essential to have fast and effective security identification models. In this work, a novel Intrusion Detection System (IDS) based on the Tree-CNN hierarchical algorithm with the Soft-Root-Sign (SRS) activation function is proposed. The model reduces the training time of the generated model for detecting DDoS, Infiltration, Brute Force, and Web attacks. For performance assessment, the model is implemented in a medium-sized company, analyzing the level of complexity of the proposed solution. Experimental results demonstrate that the proposed hierarchical model achieves a significant reduction in execution time, around 36%, and an average detection accuracy of 0.98 considering all the analyzed attacks. Therefore, the results of performance evaluation show that the proposed classifier based on Tree-CNN is of low complexity and requires less processing time and computational resources, outperforming other current IDS based on machine learning algorithms.
With the substantial industrial growth, the industrial internet of things (IIoT) and many IoT avenues have emerged. However, the existing industrial architectures are still inefficient to deal with advanced security issues due to the distributed and distensible nature of the network IIoT communication networks. Therefore, solutions for improving intelligent decision-making actions to the IIoT are sorely necessary. Thus, in this paper, the main cybersecurity attacks are predicted by applying a deep learning model. The various security and integrity features such as the DoS, malevolent operation, data type probing, spying, scanning, intrusion detection, brute force, web attacks, and wrong setup is analysed and detected by a novel sparse evolutionary training (SET) based prediction model. To scrutinize the conduct of the proposed SET-based prediction model, evaluation parameters, such as, precision, accuracy, recall, and F1 score are measured and compared to other state-of-the-art algorithms, in which the proposed SET-based model achieved an average accuracy of 0.99% for an average testing time of 2.29 ms. Results reveal that the proposed model improved the attack detection accuracy by an average of 6.25% when compared with the other state-of-the-art machine learning models in a real scenario of IoT security in Industry 4.0.
Demand for bandwidth hungry applications and mobile services is pushing an unquenchable need for wireless capacity. Existing radio frequency networks are characterized by shared medium, inadequate spectrum, and restricted user capacity. Solid state lighting is modernizing indoor as well as outdoor illumination. The capability of quick switching of light emitting diode makes them superior to other lighting sources enabling simultaneous use as a communication and illumination device. Visible light communication (VLC) using light emitting diodes is an attractive approach for many networking scenarios and is considered as a complementary technology for future heterogeneous wireless networks.
This article presents an architectural perspective on the applications and data rate improvement strategies. A wide range of VLC applications have been investigated, comparison has been drawn with radio frequency, and generalized network architecture is also proposed. Numerous applications of VLC are data rate intensive, so data rate improvement approaches have also been studied. At the end, a lucid conclusion is drawn about the applicability, acceptability, and utilization of VLC and co‐VLC–based systems.
Autonomous vehicles are regarded as future transport mechanisms that drive the vehicles without the need of drivers. The photonic-based radar technology is a promising candidate for delivering attractive applications to autonomous vehicles such as self-parking assistance, navigation, recognition of traffic environment, etc. Alternatively, microwave radars are not able to meet the demand of next-generation autonomous vehicles due to its limited bandwidth availability. Moreover, the performance of microwave radars is limited by atmospheric fluctuation which causes severe attenuation at higher frequencies. In this work, we have developed coherent-based frequency-modulated photonic radar to detect target locations with longer distance. Furthermore, the performance of the proposed photonic radar is investigated under the impact of various atmospheric weather conditions, particularly fog and rain. The reported results show the achievement of significant signal to noise ratio (SNR) and received power of reflected echoes from the target for the proposed photonic radar under the influence of bad weather conditions. Moreover, a conventional radar is designed to establish the effectiveness of the proposed photonic radar by considering similar parameters such as frequency and sweep time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.