2021
DOI: 10.3390/app11157050
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Using Deep Neural Network for IoT Architecture

Abstract: The revolutionary idea of the internet of things (IoT) architecture has gained enormous popularity over the last decade, resulting in an exponential growth in the IoT networks, connected devices, and the data processed therein. Since IoT devices generate and exchange sensitive data over the traditional internet, security has become a prime concern due to the generation of zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide the much-needed efficient security solution to the IoT … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

4
6

Authors

Journals

citations
Cited by 71 publications
(33 citation statements)
references
References 56 publications
0
33
0
Order By: Relevance
“…By taking few assumptions like identity can be shared publicly, communication channels are always secure, and some of the credentials can be sent without encryption, the timestamp cannot be modified, single hashing can resolve the integrity problem and cryptosystem is free of quantum brute force and password guessing attacks [12]- [15]. However, several researchers believed that if the above-mentioned assumptions are not carefully addressed, they can lead towards common MAC layer attacks [6], [16]- [18] For instance, an identity reveals attack can lead to theft of identity, which leads towards impersonation attack or man in the middle attack.…”
Section: A Motivationmentioning
confidence: 99%
“…By taking few assumptions like identity can be shared publicly, communication channels are always secure, and some of the credentials can be sent without encryption, the timestamp cannot be modified, single hashing can resolve the integrity problem and cryptosystem is free of quantum brute force and password guessing attacks [12]- [15]. However, several researchers believed that if the above-mentioned assumptions are not carefully addressed, they can lead towards common MAC layer attacks [6], [16]- [18] For instance, an identity reveals attack can lead to theft of identity, which leads towards impersonation attack or man in the middle attack.…”
Section: A Motivationmentioning
confidence: 99%
“…A comparison of various deep learning algorithms such as Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNNs) such as Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU) network is instead proposed by Ahmad et al [12] and used to find zero-day anomalies within an IoT network with a False Acceptance Rate (FAR) ranging from 0.23% to 7.98%.…”
Section: Related Workmentioning
confidence: 99%
“…Other aspects of IoT security can utilize deep learning, including those we already mentioned in this section. This includes intrusion detection [126][127][128][129] and other types of anomaly detection [130]. A full coverage of these areas would require a separate article.…”
Section: Evolutionary Techniques For Securitymentioning
confidence: 99%