4.7 Article

Deep-Learning-Based Weak Electromagnetic Intrusion Detection Method for Zero Touch Networks on Industrial IoT

期刊

IEEE NETWORK
卷 36, 期 6, 页码 236-242

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.001.2100754

关键词

-

资金

  1. Science and Technology Development Fund, Macao SAR [0047/2021/A]
  2. National Natural Science Foundation of China [61876168]
  3. Quzhou Science and Technology Projects [2020K19, 2021K19]

向作者/读者索取更多资源

This study employs a deep learning-based method for WEMI intrusion detection, extracting sensor fingerprints using Kalman and moving average filters, and extracting frequency and time domain features. Experimental results show that this method performs well in WEMI intrusion detection.
The Industrial Internet of Things (IIoT), consisting of a large number of self-organized sensors, is one of the prominent representatives of zero touch networks, which will be widely used for information interconnection. With the advancement in intelligent manufacturing, the security of zero touch IIoT becomes a critical issue in various applications. One of the main factors that endanger the normal operation of zero touch IIoT is the weak electromagnetic interference (WEMI) attack, making special precautions necessary for zero touch IIoT. In real-life applications, sensors will be injected with a specific type of noise due to the unique manufacturing process and environment. This noise can be considered as the finger-print of the sensor, which is stable under normal conditions unless the sensor experiences a WEMI attack. Hence, a deep-learning-based WEMI intrusion detection method is employed in this study. First, we introduce the application of Kalman and moving average filters in the fingerprint extraction stage. Second, the frequency and time domain features were extracted from the fingerprint. Third, deep learning models are applied to intrusion detection, and a cloud-edge-end computing framework is proposed. Finally, the experiment analyzes the performance of the WEMI intrusion detection method.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据