Related references
Note: Only part of the references are listed.
Article
Computer Science, Theory & Methods
Anichur Rahman et al.
Summary: The individual and integrated use of IoT, ICN, and FL in network-related scenarios has gained significant attention in the research community. FL addresses privacy and security issues in a decentralized manner, while ICN retrieves and stores content based on content names rather than addresses. The upcoming 6G networks are expected to support massive IoT devices, and this research highlights the potential of ICN for IoT applications. This study provides a comprehensive survey of FL, IoT, and ICN, and discusses their integration and future directions.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Automation & Control Systems
Pedro Ruzafa-Alcazar et al.
Summary: Federated learning (FL) has gained significant attention for its advantages and applicability, but sharing updated gradients/weights in the training process raises privacy concerns, especially in the context of IoT. Our work comprehensively evaluates differential privacy techniques applied to an FL-enabled intrusion detection system (IDS) for industrial IoT, considering nonindependent and identically distributed data. We compare the accuracy achieved with different privacy requirements and aggregation functions (FedAvg and Fed+), and find that using Fed+ yields similar results even with noise in the federated training process.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2023)
Article
Engineering, Electrical & Electronic
Faisal Naeem et al.
Summary: The exponential growth of novel radical applications and services in sixth-generation (6G) networks is expected to increase the complexity of managing existing network infrastructures. The zero touch network and service management (ZSM) paradigm, which leverages AI, SDN, and NFV techniques, is seen as a promising solution to automatically manage and orchestrate network resources. However, the ZSM architecture, along with its potential benefits, is exposed to various security threats in a distributed 6G network.
IEEE COMMUNICATIONS MAGAZINE
(2023)
Article
Chemistry, Analytical
Euclides Carlos Pinto Neto et al.
Article
Computer Science, Information Systems
Qasem Abu Al-Haija et al.
Summary: This paper develops, investigates, and evaluates machine-learning-based Darknet traffic detection systems in IoT networks. The study finds that bagging ensemble techniques offer better accuracy and lower error rates than other supervised learning techniques, and outperform the state-of-the-art models by (1.9~27%).
Article
Automation & Control Systems
Jueun Jeon et al.
Summary: This article proposes a hybrid malware detection scheme called HyMalD, which uses bidirectional long short-term memory and spatial pyramid pooling network to protect IoT devices. By conducting static and dynamic analyses simultaneously, HyMalD can detect and classify IoT malware more accurately.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Theory & Methods
Othmane Friha et al.
Summary: This paper proposes a federated learning-based intrusion detection system, FELIDS, for securing agricultural-IoT infrastructures. The system protects data privacy through local learning and employs deep learning classifiers to achieve high accuracy in detecting attacks.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Information Systems
Faris Alasmary et al.
Summary: This paper presents a solution to protect IoT devices from DDoS attacks, consisting of an IoT node detector and a server detector. By utilizing ShieldRNN for training and prediction, an accurate server detector is developed and its superiority is demonstrated on the dataset.
Article
Computer Science, Information Systems
Lingzhi Yi et al.
Summary: This article addresses the problem of effectively prolonging the network lifetime of IoT-based bridge structural health monitoring systems while ensuring the desired coverage, proposing an energy-efficient sensor scheduling strategy and utilizing the LA model for adaptive learning of optimal scheduling strategy. The proposed scheme demonstrates significant improvements in network lifetime and energy efficiency through simulations using real data sets collected by a practical BSHM system.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Green & Sustainable Science & Technology
Jie Zhang
Summary: This paper argues that energy Internet is the future development direction of power system, focusing on solving the issues of clean energy compatibility and efficient control. The research mainly concentrates on the information security protection measures and system architecture analysis of distributed energy stations in the environment of energy Internet.
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
(2021)
Article
Computer Science, Information Systems
Anson Pinhero et al.
Summary: With the rapid growth of malware, automatic classification faces challenges, this study explores a new approach combining malware visualization and deep learning classification, successfully improving classification accuracy and efficiency.
COMPUTERS & SECURITY
(2021)
Article
Computer Science, Information Systems
Mohammed Ali Al-Garadi et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2020)
Article
Computer Science, Information Systems
Francisco Sales de Lima Filho et al.
SECURITY AND COMMUNICATION NETWORKS
(2019)
Article
Computer Science, Information Systems
Nadia Chaabouni et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2019)
Article
Automation & Control Systems
James J. Q. Yu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2018)
Article
Computer Science, Artificial Intelligence
Alberto Fernandez et al.
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH
(2018)