2022
DOI: 10.3390/s22239416
|View full text |Cite
|
Sign up to set email alerts
|

Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries

Abstract: The Internet of Things (IoT) is a prominent and advanced network communication technology that has familiarized the world with smart industries. The conveniently acquirable nature of IoT makes it susceptible to a diversified range of potential security threats. The literature has brought forth a plethora of solutions for ensuring secure communications in IoT-based smart industries. However, resource-constrained sectors still demand significant attention. We have proposed a fog-assisted deep learning (DL)-empow… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 57 publications
0
3
0
Order By: Relevance
“…We compared the DL-BiLSTM model with recent studies ( Shieh et al, 2021 ; Wang et al, 2021 ; Bhardwaj, Mangat & Vig, 2020 ; Qazi, Almorjan & Zia, 2022 ; Qureshi et al, 2021 ; Alharbi et al, 2021 ; Attique, Hao & Ping, 2022 ; Om Kumar et al, 2022 ) on two datasets, CIC IDS2017 and N-BaIoT, in order to further illustrate the superiority of the detection performance of the model provided in this article. The experimental results can be seen in Tables 7 and 8 , and the performance test results not given in the paper are indicated with “-” in the table.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…We compared the DL-BiLSTM model with recent studies ( Shieh et al, 2021 ; Wang et al, 2021 ; Bhardwaj, Mangat & Vig, 2020 ; Qazi, Almorjan & Zia, 2022 ; Qureshi et al, 2021 ; Alharbi et al, 2021 ; Attique, Hao & Ping, 2022 ; Om Kumar et al, 2022 ) on two datasets, CIC IDS2017 and N-BaIoT, in order to further illustrate the superiority of the detection performance of the model provided in this article. The experimental results can be seen in Tables 7 and 8 , and the performance test results not given in the paper are indicated with “-” in the table.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Attique et al 111 address intrusion detection challenges in resource‐constrained smart industries operating on the routing protocol for low power and lossy networks. They introduce a fog‐assisted DL framework called Cu‐DNNGRU, designed to tackle various security threats within these settings.…”
Section: Discussionmentioning
confidence: 99%
“…However, the above models are less effective in detecting rare-class attack data. Methods [57][58][59][60] were tested on the N-BaIoT dataset, and all of them achieved high detection rates, but the above methods did not validate the detection effect on unknown attacks. Comparing the best performance of the proposed KGMS-IDS with the above state-of-the-art intrusion detection methods, KGMS-IDS achieves the highest accuracy rate on both datasets.…”
mentioning
confidence: 99%