Role of machine learning and deep learning in securing 5G-driven industrial IoT applications
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Role of machine learning and deep learning in securing 5G-driven industrial IoT applications
Authors
Keywords
Industrial internet of things, Security, Machine learning, Deep learning, Artificial intelligence, Block chain, Smart city
Journal
Ad Hoc Networks
Volume 123, Issue -, Pages 102685
Publisher
Elsevier BV
Online
2021-09-20
DOI
10.1016/j.adhoc.2021.102685
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography
- (2021) Vinay Chamola et al. COMPUTER COMMUNICATIONS
- Artificial Intelligence (AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles
- (2021) Tejasvi Alladi et al. IEEE WIRELESS COMMUNICATIONS
- A Security Management Framework for Big Data in Smart Healthcare
- (2021) Parsa Sarosh et al. Big Data Research
- Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey
- (2021) Shivani Singh et al. IEEE Internet of Things Journal
- Consumer IoT: Security Vulnerability Case Studies and Solutions
- (2020) Tejasvi Alladi et al. IEEE Consumer Electronics Magazine
- Industrial Control Systems: Cyberattack trends and countermeasures
- (2020) Tejasvi Alladi et al. COMPUTER COMMUNICATIONS
- Remaining useful life prediction based on state assessment using edge computing on deep learning
- (2020) Hsin-Yao Hsu et al. COMPUTER COMMUNICATIONS
- Mobility Enabled Security for Optimizing IoT based Intelligent Applications
- (2020) Sandeep Pirbhulal et al. IEEE NETWORK
- Deep learning for pedestrian collective behavior analysis in smart cities: A model of group trajectory outlier detection
- (2020) Asma Belhadi et al. Information Fusion
- Machine learning based solutions for security of Internet of Things (IoT): A survey
- (2020) Syeda Manjia Tahsien et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
- (2020) Ankit Thakkar et al. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING
- Security in product lifecycle of IoT devices: A survey
- (2020) Narges Yousefnezhad et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- DCNN-GA: A Deep Neural Net Architecture for Navigation of UAV in Indoor Environment
- (2020) Prateek Chhikara et al. IEEE Internet of Things Journal
- Trust models of internet of smart things: A survey, open issues and future directions
- (2019) Ayesha Altaf et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Designing collaborative blockchained signature-based intrusion detection in IoT environments
- (2019) Wenjuan Li et al. Future Generation Computer Systems-The International Journal of eScience
- LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT
- (2019) Seyed Farhad Aghili et al. Future Generation Computer Systems-The International Journal of eScience
- A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
- (2019) Noshina Tariq et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment
- (2019) Girraj Kumar Verma et al. IEEE Internet of Things Journal
- Semi-supervised learning based distributed attack detection framework for IoT
- (2018) Shailendra Rathore et al. APPLIED SOFT COMPUTING
- Mobile network intrusion detection for IoT system based on transfer learning algorithm
- (2018) Lianbing Deng et al. Cluster Computing-The Journal of Networks Software Tools and Applications
- AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS
- (2018) Wei Feng et al. Computer Networks
- Internet of things security: A top-down survey
- (2018) Djamel Eddine Kouicem et al. Computer Networks
- Deep learning algorithms for human activity recognition using mobile and wearable sensor networks: State of the art and research challenges
- (2018) Henry Friday Nweke et al. EXPERT SYSTEMS WITH APPLICATIONS
- Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
- (2018) Aakanksha Tewari et al. Future Generation Computer Systems-The International Journal of eScience
- On blockchain and its integration with IoT. Challenges and opportunities
- (2018) Ana Reyna et al. Future Generation Computer Systems-The International Journal of eScience
- On security challenges and open issues in Internet of Things
- (2018) Kewei Sha et al. Future Generation Computer Systems-The International Journal of eScience
- Distributed attack detection scheme using deep learning approach for Internet of Things
- (2018) Abebe Abeshu Diro et al. Future Generation Computer Systems-The International Journal of eScience
- A novel statistical technique for intrusion detection systems
- (2018) Enamul Kabir et al. Future Generation Computer Systems-The International Journal of eScience
- An intelligent, uncertainty driven management scheme for software updates in pervasive IoT applications
- (2018) Kostas Kolomvatsos Future Generation Computer Systems-The International Journal of eScience
- A security authorization scheme for smart home Internet of Things devices
- (2018) Bogdan-Cosmin Chifor et al. Future Generation Computer Systems-The International Journal of eScience
- A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
- (2018) Ruhul Amin et al. Future Generation Computer Systems-The International Journal of eScience
- Deep Learning: The Frontier for Distributed Attack Detection in Fog-to-Things Computing
- (2018) Abebe Abeshu et al. IEEE COMMUNICATIONS MAGAZINE
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing
- (2018) He Li et al. IEEE NETWORK
- After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange
- (2018) Ou Ruan et al. IEEE Systems Journal
- AccessAuth: Capacity-aware security access authentication in federated-IoT-enabled V2G networks
- (2018) Ming Tao et al. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
- A Homomorphic Network Coding Signature Scheme for Multiple Sources and its Application in IoT
- (2018) Tong Li et al. Security and Communication Networks
- Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
- (2018) Bako Ali et al. SENSORS
- A Lightweight Defense Approach to Mitigate Version Number and Rank Attacks in Low-Power and Lossy Networks
- (2018) Mohammad Nikravan et al. WIRELESS PERSONAL COMMUNICATIONS
- SEGB: Security Enhanced Group Based AKA Protocol for M2M Communication in an IoT Enabled LTE/LTE-A Network
- (2018) Balu L. Parne et al. IEEE Access
- Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
- (2018) Mohammad Wazid et al. IEEE Internet of Things Journal
- The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
- (2018) Wei Zhou et al. IEEE Internet of Things Journal
- Security in vehicles with IoT by prioritization rules, vehicle certificates and trust management
- (2018) Ivan Garcia-Magarino et al. IEEE Internet of Things Journal
- Current research on Internet of Things (IoT) security: A survey
- (2018) Mardiana binti Mohamad Noor et al. Computer Networks
- A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)
- (2018) Mohammad Dahman Alshehri et al. COMPUTING
- APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
- (2018) Zhitao Guan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Physical-Layer Authentication Based on Extreme Learning Machine
- (2017) Ning Wang et al. IEEE COMMUNICATIONS LETTERS
- Cloud-Based Malware Detection Game for Mobile Devices with Offloading
- (2017) Liang Xiao et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- A survey of intrusion detection in Internet of Things
- (2017) Bruno Bogaz Zarpelão et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
- (2017) Fan Wu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Internet of Things security: A survey
- (2017) Fadele Ayotunde Alaba et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Passive secret disclosure attack on an ultralightweight authentication protocol for Internet of Things
- (2017) Masoumeh Safkhani et al. JOURNAL OF SUPERCOMPUTING
- An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks
- (2017) Ki-Wook Kim et al. SENSORS
- An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
- (2017) Chun-Ta Li et al. SENSORS
- A secure end-to-end IoT solution
- (2017) Avijit Mathur et al. SENSORS AND ACTUATORS A-PHYSICAL
- Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
- (2017) Lo-Yao Yeh et al. ACM Transactions on Intelligent Systems and Technology
- Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT
- (2017) Zahid Mahmood et al. Applied Sciences-Basel
- Achievable Multi-Security Levels for Lightweight IoT-Enabled Devices in Infrastructureless Peer-Aware Communications
- (2017) Nhu-Ngoc Dao et al. IEEE Access
- Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
- (2017) Sravani Challa et al. IEEE Access
- A Secure Time Synchronization Protocol Against Fake Timestamps for Large-Scale Internet of Things
- (2017) Tie Qiu et al. IEEE Internet of Things Journal
- A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
- (2017) Jie Lin et al. IEEE Internet of Things Journal
- Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment
- (2017) Mohammad Wazid et al. IEEE Internet of Things Journal
- A Survey on Security and Privacy Issues in Internet-of-Things
- (2017) Yuchen Yang et al. IEEE Internet of Things Journal
- CAR Approach for the Internet of Things
- (2016) Fadi Al-Turjman et al. CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- A lightweight message authentication scheme for Smart Grid communications in power sector
- (2016) Khalid Mahmood et al. COMPUTERS & ELECTRICAL ENGINEERING
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- On Secure Wireless Communications for IoT Under Eavesdropper Collusion
- (2016) Yuanyu Zhang et al. IEEE Transactions on Automation Science and Engineering
- A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks
- (2016) Yue Qiu et al. IEEE Transactions on Industrial Informatics
- PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
- (2016) Liang Xiao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Secure and dependable software defined networks
- (2016) Adnan Akhunzada et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- An effective intrusion detection framework based on MCLP/SVM optimized by time-varying chaos particle swarm optimization
- (2016) Seyed Mojtaba Hosseini Bamakan et al. NEUROCOMPUTING
- Detection of known and unknown DDoS attacks using Artificial Neural Networks
- (2016) Alan Saied et al. NEUROCOMPUTING
- Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
- (2016) Francisco Martín-Fernández et al. SENSORS
- Machine Learning Methods for Attack Detection in the Smart Grid
- (2016) Mete Ozay et al. IEEE Transactions on Neural Networks and Learning Systems
- A Mobile Offloading Game Against Smart Attacks
- (2016) Liang Xiao et al. IEEE Access
- A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks
- (2016) Hamed Haddad Pajouh et al. IEEE Transactions on Emerging Topics in Computing
- SecKit: A Model-based Security Toolkit for the Internet of Things
- (2015) Ricardo Neisse et al. COMPUTERS & SECURITY
- A secure and scalable storage system for aggregate data in IoT
- (2015) Hai Jiang et al. Future Generation Computer Systems-The International Journal of eScience
- A lightweight attribute-based encryption scheme for the Internet of Things
- (2015) Xuanxia Yao et al. Future Generation Computer Systems-The International Journal of eScience
- The importance of a standard securit y archit ecture for SOA-based iot middleware
- (2015) Ramão Tiago Tiburski et al. IEEE COMMUNICATIONS MAGAZINE
- Human-level control through deep reinforcement learning
- (2015) Volodymyr Mnih et al. NATURE
- Green Internet of Things for Smart World
- (2015) Chunsheng Zhu et al. IEEE Access
- Data Mining for Internet of Things: A Survey
- (2014) Chun-Wei Tsai et al. IEEE Communications Surveys and Tutorials
- Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
- (2014) Bruce Ndibanje et al. SENSORS
- SVELTE: Real-time intrusion detection in the Internet of Things
- (2013) Shahid Raza et al. Ad Hoc Networks
- Internet of Things (IoT): A vision, architectural elements, and future directions
- (2013) Jayavardhana Gubbi et al. Future Generation Computer Systems-The International Journal of eScience
- Context Aware Computing for The Internet of Things: A Survey
- (2013) Charith Perera et al. IEEE Communications Surveys and Tutorials
- Network anomaly detection with the restricted Boltzmann machine
- (2013) Ugo Fiore et al. NEUROCOMPUTING
- In-network outlier detection in wireless sensor networks
- (2012) Joel W. Branch et al. KNOWLEDGE AND INFORMATION SYSTEMS
- Decision trees: a recent overview
- (2011) S. B. Kotsiantis ARTIFICIAL INTELLIGENCE REVIEW
- The Internet of Things: A survey
- (2010) Luigi Atzori et al. Computer Networks
- Identities in the Future Internet of Things
- (2009) Amardeo C. Sarma et al. WIRELESS PERSONAL COMMUNICATIONS
- Intrusion detection using fuzzy association rules
- (2008) Arman Tajbakhsh et al. APPLIED SOFT COMPUTING
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now