Cargando…
A novel deep learning-based approach for detecting attacks in social IoT
In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and thei...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10170446/ https://www.ncbi.nlm.nih.gov/pubmed/37362260 http://dx.doi.org/10.1007/s00500-023-08389-1 |
_version_ | 1785039228657205248 |
---|---|
author | Mohan Das, R. Arun Kumar, U. Gopinath, S. Gomathy, V. Natraj, N. A. Anushkannan, N. K. Balashanmugham, Adhavan |
author_facet | Mohan Das, R. Arun Kumar, U. Gopinath, S. Gomathy, V. Natraj, N. A. Anushkannan, N. K. Balashanmugham, Adhavan |
author_sort | Mohan Das, R. |
collection | PubMed |
description | In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies. |
format | Online Article Text |
id | pubmed-10170446 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-101704462023-05-11 A novel deep learning-based approach for detecting attacks in social IoT Mohan Das, R. Arun Kumar, U. Gopinath, S. Gomathy, V. Natraj, N. A. Anushkannan, N. K. Balashanmugham, Adhavan Soft comput Focus In the innovative concept of the “Social Internet of Things” (IoT), the IoT is combined with social platforms so that inanimate devices can form their interactions with one another. Still, customers have a wary attitude toward this new standard. They worry that their privacy will be invaded and their information will be made public. IoT won't become a frontrunner technology until we have tried true techniques to improve trustworthy connections between nodes. As a result, data privacy becomes extremely difficult, further increasing the difficulty of providing high-quality services and absolute safety. Several articles have attempted to analyze this issue. To categorize safe nodes in the IoT network, they suggested many models based on various attributes and aggregation techniques. In contrast, prior works failed to provide a means of identifying fraudulent nodes or distinguishing between different forms of assaults. To identify attacks carried out by hostile nodes and separate them from the network, we propose a novel Multi-hop Convolutional Neural Network with an attention mechanism (MH-CNN-AM). To achieve the best performance in the suggested research, performance measures including accuracy, precision, recall, F1-score, and MAE are studied and compared with the of existing methodologies. Springer Berlin Heidelberg 2023-05-10 /pmc/articles/PMC10170446/ /pubmed/37362260 http://dx.doi.org/10.1007/s00500-023-08389-1 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2023, Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Focus Mohan Das, R. Arun Kumar, U. Gopinath, S. Gomathy, V. Natraj, N. A. Anushkannan, N. K. Balashanmugham, Adhavan A novel deep learning-based approach for detecting attacks in social IoT |
title | A novel deep learning-based approach for detecting attacks in social IoT |
title_full | A novel deep learning-based approach for detecting attacks in social IoT |
title_fullStr | A novel deep learning-based approach for detecting attacks in social IoT |
title_full_unstemmed | A novel deep learning-based approach for detecting attacks in social IoT |
title_short | A novel deep learning-based approach for detecting attacks in social IoT |
title_sort | novel deep learning-based approach for detecting attacks in social iot |
topic | Focus |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10170446/ https://www.ncbi.nlm.nih.gov/pubmed/37362260 http://dx.doi.org/10.1007/s00500-023-08389-1 |
work_keys_str_mv | AT mohandasr anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT arunkumaru anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT gopinaths anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT gomathyv anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT natrajna anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT anushkannannk anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT balashanmughamadhavan anoveldeeplearningbasedapproachfordetectingattacksinsocialiot AT mohandasr noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT arunkumaru noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT gopinaths noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT gomathyv noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT natrajna noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT anushkannannk noveldeeplearningbasedapproachfordetectingattacksinsocialiot AT balashanmughamadhavan noveldeeplearningbasedapproachfordetectingattacksinsocialiot |