2022
DOI: 10.3390/s23010206
|View full text |Cite
|
Sign up to set email alerts
|

An Anomaly Intrusion Detection for High-Density Internet of Things Wireless Communication Network Based Deep Learning Algorithms

Abstract: Telecommunication networks are growing exponentially due to their significant role in civilization and industry. As a result of this very significant role, diverse applications have been appeared, which require secured links for data transmission. However, Internet-of-Things (IoT) devices are a substantial field that utilizes the wireless communication infrastructure. However, the IoT, besides the diversity of communications, are more vulnerable to attacks due to the physical distribution in real world. Attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…Proposed WCGAN-GP [36] WAE-DNN [37] EHHO + GRU [39] Custom CNN + LSTM [43] IG-CS-PSO + RF [45] ABC-BWO-CONV-LSTM [40] RF-RFE + ensemble [44] FOA + ensemble method [42] Bagging BGM [ As the reach of IoT networks grows, the need for efficient IDS like the one presented in this study becomes increasingly critical. Future research efforts will focus on balancing attack category distributions in datasets.…”
Section: Discussionmentioning
confidence: 99%
“…Proposed WCGAN-GP [36] WAE-DNN [37] EHHO + GRU [39] Custom CNN + LSTM [43] IG-CS-PSO + RF [45] ABC-BWO-CONV-LSTM [40] RF-RFE + ensemble [44] FOA + ensemble method [42] Bagging BGM [ As the reach of IoT networks grows, the need for efficient IDS like the one presented in this study becomes increasingly critical. Future research efforts will focus on balancing attack category distributions in datasets.…”
Section: Discussionmentioning
confidence: 99%
“…In 23 , two different approaches were introduced for intrusion detection in IoT systems. The first method combined a custom CNN with Long Short-Term Memory (LSTM) deep network layers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Let S be the state of the variable and be the state of n input features. To estimate the value of S based on X , the conditional probability of S needs to be calculated by X , and the expression is [ 41 ] where and are constants that are obtained from data. can be calculated as [ 41 ] …”
Section: Ai-based Discriminant Algorithmsmentioning
confidence: 99%