Cargando…

A novel deep learning-based approach for detecting attacks in social IoT

In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and thei...

Descripción completa

Detalles Bibliográficos
Autores principales: Mohan Das, R., Arun Kumar, U., Gopinath, S., Gomathy, V., Natraj, N. A., Anushkannan, N. K., Balashanmugham, Adhavan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10170446/
https://www.ncbi.nlm.nih.gov/pubmed/37362260
http://dx.doi.org/10.1007/s00500-023-08389-1
Descripción
Sumario:In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies.