Filters








289 Hits in 9.7 sec

Editorial: deep learning for 5G IoT systems

Xiaochun Cheng, Chengqi Zhang, Yi Qian, Moayad Aloqaily, Yang Xiao
2021 International Journal of Machine Learning and Cybernetics  
The paper "A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks" proposes an intrusion detection method based on multi-core cluster (MKC) algorithm.  ...  The paper "DDoS Detection in 5G-Enabled IoT Network Using Deep Kalman Backpropagation Neural Network" presents a DDoS intrusion detection model that can be implemented in IoT dynamic environments.  ... 
doi:10.1007/s13042-021-01382-w pmid:34306244 pmcid:PMC8287284 fatcat:ialozvaokvcljp4mxd2j6dp6ty

IEEE Access Special Section Editorial: Survivability Strategies for Emerging Wireless Networks

Muhammad Imran, Joel J. P. C. Rodrigues, Ahmed E. Kamal, Ejaz Ahmed, Feng Xia, Irfan Awan
2020 IEEE Access  
The performance results suggest that multiple kernel learning and spectral residual-based saliency algorithms perform best for different genres and motion-type videos in terms of F-measure and execution  ...  random forest, and extreme learning machine for intrusion detection.  ... 
doi:10.1109/access.2020.3042585 fatcat:wjd7kkdtszcj3lwnotjxgdae5m

Intrusion Detection Protocols in Wireless Sensor Networks integrated to Internet of Things Deployment: Survey and Future Challenges

Sumit Pundir, Mohammad Wazid, D. P. Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park
2019 IEEE Access  
We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis.  ...  INDEX TERMS Wireless sensor network (WSN), Internet of Things (IoT), intrusion detection, cloud computing, fog computing, edge computing, security.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the associate editor for their valuable feedback on the paper which helped us to improve its quality and presentation.  ... 
doi:10.1109/access.2019.2962829 fatcat:mgodkcpnkrh7vliwaseufob7iq

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Mohamed Amine Ferrag, Othmane Friha, Leandros Maglaras, Helge Janicke, Lei Shu
2021 IEEE Access  
FEDERATED LEARNING-BASED CYBER SECURITY INTRUSION DETECTION Tab. 4 presents the federated learning-based systems for intrusion and malware detection in IoT applications. A.  ...  Malicious Normal Detecting and identifying phase UAV node Network Model Detailed View Base station Access Point 6G 5G TABLE 4 : 4 Federated Learning-based systems for Intrusion and  ...  His research interests include wireless network security, network coding security, and applied cryptography.  ... 
doi:10.1109/access.2021.3118642 fatcat:222fgsvt3nh6zcgm5qt4kxe7c4

In-Vehicle Networking/Autonomous Vehicle Security for Internet of Things/Vehicles

Taeshik Shon
2021 Electronics  
In recent years, vehicles have become one of the most common examples in the area of ICT convergence applications and services [...]  ...  We are also grateful to the Electronics Editorial Office staff who worked thoroughly to maintain the rigorous peer-review schedule and timely publication.  ...  We are also grateful to all the reviewers who helped in the evaluation of the manuscripts and made very valuable suggestions to improve the quality of contributions.  ... 
doi:10.3390/electronics10060637 fatcat:ppqhgjypwveldaqamqenz3wfqa

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments

Xiaochun Cheng, Zheli Liu, Xiaojiang Du, Shui Yu, Leonardo Mostarda
2021 IEEE Access  
Many IoT systems and cloud systems are decentralized, and new security and privacy protection solutions are emerging in decentralized networks.  ...  The article "A lightweight privacy-preserving protocol for VANETs based on secure outsourcing computing," by Wei et al., proposes an identity-based signature that achieves unforgeability against chosen-message  ...  In the article ''Wireless network intrusion detection based on improved convolutional neural network,'' by Yang and Wang, the authors propose a wireless network intrusion detection method based on an improved  ... 
doi:10.1109/access.2021.3075818 fatcat:7t3tgqarsndc5dq2gulr7hapzi

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
A survey on SDN based network intrusion detection system using machine learning approaches is presented in [309] .  ...  An efficient deep learning model for intrusion classification and prediction for 5G and IoT networks was proposed in [310] .  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Internet of Things 2.0: Concepts, Applications, and Future Directions

Ian Zhou, Imran Makhdoom, Negin Shariati, Muhammad Ahmad Raza, Rasool Keshavarz, Justin Lipman, Mehran Abolhasan, Abbas Jamalipour
2021 IEEE Access  
The authors of [158] presented a queuing theory based detection and delay performance analysis of a PLA protocol for single-input multiple output (SIMO) MC-MTC networks.  ...  The authors of [166] presented a software-based framework for 5G systems and its hardware implementation MC-MTC networks.  ... 
doi:10.1109/access.2021.3078549 fatcat:g5jkc5p6tngpfonbhtsbcjipai

Contents

2018 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)  
1570416074 IOT based drone for improvement of crop quality in agricultural field 612-615 11.8 1570416184 A Conceptual Framework for an IoT-Based Health Assistant and Its Authorization Model  ...  Customer-Based Information 110-116 2.8 1570415857 A Framework for Urdu Topic Modeling Using Latent Dirichlet Allocation (LDA) 117-123 2.9 1570416111 A Novel Host Intrusion Detection System  ... 
doi:10.1109/ccwc.2018.8301783 fatcat:qmdq273aojbarcn2gszmz6yyx4

5G support for Industrial IoT Applications – Challenges, Solutions, and Research gaps

Pal Varga, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz, Laszlo Toka
2020 Sensors  
support for 5G, and private campus networks.  ...  These are instinctively provided by the 5G mobile technology, making it a successful candidate for supporting Industrial IoT (IIoT) scenarios.  ...  Acknowledgments: The authors would like to thank the PhD course entitled "5G Networks, Services and their Synergies with Industrial IoT" that has conceived many ideas and collaboration related to this  ... 
doi:10.3390/s20030828 pmid:32033076 pmcid:PMC7038716 fatcat:cbsr2pao5bffxooaod3l3rlbfe

Machine Learning in Beyond 5G/6G Networks—State-of-the-Art and Future Trends

Vasileios P. Rekkas, Sotirios Sotiroudis, Panagiotis Sarigiannidis, Shaohua Wan, George K. Karagiannidis, Sotirios K. Goudos
2021 Electronics  
Artificial Intelligence (AI) and especially Machine Learning (ML) can play a very important role in realizing and optimizing 6G network applications.  ...  Additionally, we discuss open issues in the field of ML for 6G networks and wireless communications in general, as well as some potential future trends to motivate further research into this area.  ...  The authors in [59] used a supervised-based LSTM algorithm for intrusion detection model.  ... 
doi:10.3390/electronics10222786 fatcat:6umid7qnabdttkjyhglpxjpwpm

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

Akashah Arshad, Zurina Mohd Hanapi, Shamala Subramaniam, Rohaya Latip
2021 PeerJ Computer Science  
IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate.  ...  A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol.  ...  sensor network. Vol. 557.  ... 
doi:10.7717/peerj-cs.673 pmid:34712787 pmcid:PMC8507477 fatcat:ec6rcbkdbvbqdl6u6ano2sypdq

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
For IoT devices, hash-based and session-key based encryption schemes could be employed for ensuring integrity at the PHY level [57] .  ...  Mobile Communication GT Game Theory ICN Information Centric Networking IDS Intrusion Detection Scheme IIoT Industrial Internet of Things IoT Internet of Things ISG Industry Specification Group  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats [article]

Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic
2022 arXiv   pre-print
Meanwhile, signature-based, anomaly-based, and hybrid intrusion detection systems are summarized for IoT networks.  ...  Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.  ...  ACKNOWLEDGMENTS This work is supported in part by the Ontario Centre for Innovation under ENCQOR 5G Project #31993.  ... 
arXiv:2204.03433v1 fatcat:kjuwgifuqbbazm6lfrqsfynliy

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic
2022 ACM Computing Surveys  
Meanwhile, signature-based, anomaly-based, and hybrid IDSs are summarized for IoT networks.  ...  Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.  ...  ACKNOWLEDGMENTS This work is supported in part by the Ontario Centre for Innovation under ENCQOR 5G Project #31993.  ... 
doi:10.1145/3530812 fatcat:msuclulqu5bddaalyeluabhkpy
« Previous Showing results 1 — 15 out of 289 results