Your browser doesn't support javascript.
loading
A novel deep learning-based approach for detecting attacks in social IoT.
Mohan Das, R; Arun Kumar, U; Gopinath, S; Gomathy, V; Natraj, N A; Anushkannan, N K; Balashanmugham, Adhavan.
Afiliação
  • Mohan Das R; Department of EEE, New Horizon College of Engineering, Bengaluru, Karnataka 560103 India.
  • Arun Kumar U; Department of EEE, SRM Institute of Science and Technology, Ramapuram Campus, Chennai, Tamilnadu 600089 India.
  • Gopinath S; Department of ECE, Karpagam Institute of Technology, Coimbatore, Tamilnadu 641105 India.
  • Gomathy V; Department of EEE, Kathir College of Engineering, Coimbatore, Tamilnadu 641062 India.
  • Natraj NA; Symbiosis Institute of Digital and Telecom Management (SIDTM), Symbiosis International (Deemed University), Pune, India.
  • Anushkannan NK; Department of ECE, Kathir College of Engineering, Coimbatore, Tamilnadu 641062 India.
  • Balashanmugham A; Department of EEE, PSG Institute of Technology and Applied Research, Coimbatore, Tamilnadu 641062 India.
Soft comput ; : 1-11, 2023 May 10.
Article em En | MEDLINE | ID: mdl-37362260
ABSTRACT
In the innovative concept of the "Social Internet of Things" (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies.
Palavras-chave

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Prognostic_studies Idioma: En Revista: Soft comput Ano de publicação: 2023 Tipo de documento: Article

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Prognostic_studies Idioma: En Revista: Soft comput Ano de publicação: 2023 Tipo de documento: Article