2023
DOI: 10.33899/rengj.2022.134932.1191
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Security Model for Industrial Internet of Things (IIoT) System Based on Machine Learning Principles

Abstract: This paper presents a security paradigm for edge devices to defend against various internal and external threats. The first section of the manuscript proposes employing machine learning models to identify MQTT-based (Message Queue Telemetry Transport) attacks using the Intrusion Detection and Prevention System (IDPS) for edge nodes. Because the Machine Learning (ML) model cannot be trained directly on lowperformance platforms (such as edge devices),a new methodology for updating ML models is proposed to prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Brute-Force Attack: The impact of this type of attack on IoT networks has become increasingly prevalent and results in significant harmful consequences [ 31 ]. During the authentication process, a brute-force attack aims to decipher the authentication credentials of users’ information, such as usernames and passwords [ 32 ].…”
Section: Background Of Mqtt Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Brute-Force Attack: The impact of this type of attack on IoT networks has become increasingly prevalent and results in significant harmful consequences [ 31 ]. During the authentication process, a brute-force attack aims to decipher the authentication credentials of users’ information, such as usernames and passwords [ 32 ].…”
Section: Background Of Mqtt Protocolmentioning
confidence: 99%
“…Malformed Attack: The MQTT protocol is vulnerable to exploitation and targeting of specific categories of single-packet attacks known as malformed attacks. This type of attack aims to produce and send many inaccurate, malformed packets to the broker to trigger exceptions within the determined service [ 32 ].…”
Section: Background Of Mqtt Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…These findings underscore the effectiveness of the proposed power management scheme in extending the lifespan of solar energy-harvested battery-based roadside units, enhancing their reliability and availability, which positively impacts the construction of a dependable DRN infrastructure. Next, we will assess the performance of the proposed power management technique in comparison to traditional duty cycling methods, namely Fixed Duty Cycling (FDC) [18] and Artificial Neural Networkbased Adaptive Duty Cycling (ANN-ADC) [17] . The evaluation of these methods is based on the following metrics:…”
Section: Spbc =mentioning
confidence: 99%
“…Meanwhile, contemporary m-health telemedicine research delves into diverse topics, including Medical Video Modality-Aware (m-aware) systems, which adapt encoding, transmission, and evaluation based on individual video modality properties [5][6][7][8][9]. Multilayer and cross-layer optimization systems aim for optimal performance [10][11][12][13], alongside studies focusing on clinical quality assessment protocols and recommendations [14][15][16][17][18][19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%