2023
DOI: 10.56578/ida020104
|View full text |Cite
|
Sign up to set email alerts
|

Routing Attack Detection Using Ensemble Deep Learning Model for IIoT

Abstract: Smart cities, ITS, supply chains, and smart industries may all be developed with minimal human interaction thanks to the increasing prevalence of automation enabled by machine-type communication (MTC). Yet, MTC has substantial security difficulties because of diverse data, public network access, and an insufficient security mechanism. In this study, we develop a novel IIOT attack detection basis by joining the following four main steps: (a) data collection, (b) pre-processing, (c) attack detection, and (d) opt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The trust aware routing protocol presented by Vatambeti and Mamidisetti [25] provides a safe routing method for WSNs. Based on response portability and energy limitations, the routing protocol is robust in the presence of hostile nodes nursing activity on the routing tiers.…”
Section: Related Workmentioning
confidence: 99%
“…The trust aware routing protocol presented by Vatambeti and Mamidisetti [25] provides a safe routing method for WSNs. Based on response portability and energy limitations, the routing protocol is robust in the presence of hostile nodes nursing activity on the routing tiers.…”
Section: Related Workmentioning
confidence: 99%
“…, 𝐿 . Here, k represents the various clusters, and l represents the various patches that form those clusters [21].…”
Section: The Denoising Processmentioning
confidence: 99%