2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) 2019
DOI: 10.1109/fmec.2019.8795319
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection for IoT Devices based on RF Fingerprinting using Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 11 publications
0
22
0
Order By: Relevance
“…Their model had a high detection rate for specific attack categories but a low detection rate for others. Table I [43] Autoencoder, SVM UNSW-NB15 Binary Acc=97.00 [44] MLP, CNN, DNN UNSW-NB15 Binary Acc=99.24 [45] CNN UNSW-NB15 -------------Acc=89.02 [46] CNN UNSW-NB15 -------------Acc=96 [47] Stacked Autoencoders Personal Dataset -------------Acc=95.00 [48] LSTM, GRU Personal Dataset Multiclass Acc =96.08 [49] Feed Forward DNN Personal Dataset Binary Recall =97 [50] CNN Personal Dataset - ------------Acc=98.80 [51] MLP Personal Dataset - -----------…”
Section: Related Workmentioning
confidence: 99%
“…Their model had a high detection rate for specific attack categories but a low detection rate for others. Table I [43] Autoencoder, SVM UNSW-NB15 Binary Acc=97.00 [44] MLP, CNN, DNN UNSW-NB15 Binary Acc=99.24 [45] CNN UNSW-NB15 -------------Acc=89.02 [46] CNN UNSW-NB15 -------------Acc=96 [47] Stacked Autoencoders Personal Dataset -------------Acc=95.00 [48] LSTM, GRU Personal Dataset Multiclass Acc =96.08 [49] Feed Forward DNN Personal Dataset Binary Recall =97 [50] CNN Personal Dataset - ------------Acc=98.80 [51] MLP Personal Dataset - -----------…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning algorithms use many deeper hidden layers to surpass classical ANN methods. [46,47]. A convolutional neural network is one of the most popular deep neural network algorithms, and it is named convolution by using mathematical linear operation between matrices.…”
Section: Correlation Analysismentioning
confidence: 99%
“…Bassey et al [133] applied deep learning in an IDS model to nd unauthorized devices in IoT using radiofrequency ngerprinting(RF), which are hard to impersonate and are collected from six identical ZigBee devices. A CNN is used to nd appropriate features from the RF traces, and de-correlation is performed on these features.…”
Section: Cnn-based Schemesmentioning
confidence: 99%