2023
DOI: 10.21203/rs.3.rs-2498495/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Intrusion Detection in Internet of Things Based Smart Farming Using Hybrid Deep Learning Framework

Abstract: Smart agriculture is a popular domain due to its intensified growth in recent times. This domain aggregates the advantages of several computing technologies, where the IoT is the most popular and beneficial. In this work, a novel and effective deep learning based framework is developed to detect intrusions in smart farming systems. The architecture is three-tier, with the first tier being the sensor layer, which involves the placement of sensors in agricultural areas. The second tier is the Fog Computing Layer… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…The feasibility of the solution accomplished by the proposed CAh algorithm is evaluated based on MSE defined in equation (33). Termination: The attainment of maximal iteration or the global best solution terminates the iteration of algorithm.…”
Section: Feasibility Of Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…The feasibility of the solution accomplished by the proposed CAh algorithm is evaluated based on MSE defined in equation (33). Termination: The attainment of maximal iteration or the global best solution terminates the iteration of algorithm.…”
Section: Feasibility Of Solutionmentioning
confidence: 99%
“…The dataset utilized for the assessment of proposed intrusion detection mechanism is KDD CUP 99 [30], CICIDS2017 [31], and UNSW-NB15 Existing methods for comparison: The existing federated learning based deep learning methods like CNN [25], Auto-Encoder [27], RNN [25], BiGRU [33], and GhostNet [34] are compared with proposed method to depict the superiority of the proposed model.…”
Section: Description Of Datasetmentioning
confidence: 99%
“…Some of system's low latency as well as limited resources were addressed in work [11]. The author [12] looked into a novel container role-based method to task scheduling method and suggested a novel fog computing-based visualization service for task scheduling. The proposed system can reduce task delay rates and enhance concurrent tasks on fog nodes.…”
Section: Security Enhancement Based Existing Techniquementioning
confidence: 99%