Cargando…

A novel deep learning-based approach for detecting attacks in social IoT

In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and thei...

Descripción completa

Detalles Bibliográficos
Autores principales: Mohan Das, R., Arun Kumar, U., Gopinath, S., Gomathy, V., Natraj, N. A., Anushkannan, N. K., Balashanmugham, Adhavan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10170446/
https://www.ncbi.nlm.nih.gov/pubmed/37362260
http://dx.doi.org/10.1007/s00500-023-08389-1
_version_ 1785039228657205248
author Mohan Das, R.
Arun Kumar, U.
Gopinath, S.
Gomathy, V.
Natraj, N. A.
Anushkannan, N. K.
Balashanmugham, Adhavan
author_facet Mohan Das, R.
Arun Kumar, U.
Gopinath, S.
Gomathy, V.
Natraj, N. A.
Anushkannan, N. K.
Balashanmugham, Adhavan
author_sort Mohan Das, R.
collection PubMed
description In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies.
format Online
Article
Text
id pubmed-10170446
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-101704462023-05-11 A novel deep learning-based approach for detecting attacks in social IoT Mohan Das, R. Arun Kumar, U. Gopinath, S. Gomathy, V. Natraj, N. A. Anushkannan, N. K. Balashanmugham, Adhavan Soft comput Focus In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies. Springer Berlin Heidelberg 2023-05-10 /pmc/articles/PMC10170446/ /pubmed/37362260 http://dx.doi.org/10.1007/s00500-023-08389-1 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Focus
Mohan Das, R.
Arun Kumar, U.
Gopinath, S.
Gomathy, V.
Natraj, N. A.
Anushkannan, N. K.
Balashanmugham, Adhavan
A novel deep learning-based approach for detecting attacks in social IoT
title A novel deep learning-based approach for detecting attacks in social IoT
title_full A novel deep learning-based approach for detecting attacks in social IoT
title_fullStr A novel deep learning-based approach for detecting attacks in social IoT
title_full_unstemmed A novel deep learning-based approach for detecting attacks in social IoT
title_short A novel deep learning-based approach for detecting attacks in social IoT
title_sort novel deep learning-based approach for detecting attacks in social iot
topic Focus
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10170446/
https://www.ncbi.nlm.nih.gov/pubmed/37362260
http://dx.doi.org/10.1007/s00500-023-08389-1
work_keys_str_mv AT mohandasr anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT arunkumaru anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT gopinaths anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT gomathyv anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT natrajna anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT anushkannannk anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT balashanmughamadhavan anoveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT mohandasr noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT arunkumaru noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT gopinaths noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT gomathyv noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT natrajna noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT anushkannannk noveldeeplearningbasedapproachfordetectingattacksinsocialiot
AT balashanmughamadhavan noveldeeplearningbasedapproachfordetectingattacksinsocialiot