Feature entropy estimation (FEE) for malicious IoT traffic and detection using machine learning

TD Diwan, S Choubey, HS Hota… - Mobile Information …, 2021 - Wiley Online Library
Identification of anomaly and malicious traffic in the Internet of things (IoT) network is
essential for IoT security. Tracking and blocking unwanted traffic flows in the IoT network is …

Multiuser physical-layer authentication based on latent perturbed neural networks for industrial internet of things

R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, learning (DL)-based physical-layer authentication (PLA) has attracted much
attention since artificial neural networks (ANNs) can be built to extract useful features from …

Privacy preservation using machine learning in the internet of things

S El-Gendy, MS Elsayed, A Jurcut, MA Azer - Mathematics, 2023 - mdpi.com
The internet of things (IoT) has prepared the way for a highly linked world, in which
everything is interconnected, and information exchange has become more easily accessible …

[HTML][HTML] A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges

T Sasi, AH Lashkari, R Lu, P Xiong, S Iqbal - Journal of Information and …, 2023 - Elsevier
Abstract The Internet of Things (IoT) has set the way for the continuing digitalization of
society in various manners during the past decade. The IoT is a vast network of intelligent …

A survey on XAI for beyond 5G security: technical aspects, use cases, challenges and research directions

T Senevirathna, VH La, S Marchal, B Siniarski… - arXiv preprint arXiv …, 2022 - arxiv.org
With the advent of 5G commercialization, the need for more reliable, faster, and intelligent
telecommunication systems are envisaged for the next generation beyond 5G (B5G) radio …

Physical‐Layer Channel Authentication for 5G via Machine Learning Algorithm

S Chen, H Wen, J Wu, J Chen, W Liu… - Wireless …, 2018 - Wiley Online Library
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY‐layer) enhanced authentication can be exploited in light‐weight securing 5G …

Learning-based PHY-layer authentication for underwater sensor networks

L Xiao, G Sheng, X Wan, W Su… - IEEE communications …, 2018 - ieeexplore.ieee.org
In this letter, we propose a physical (PHY)-layer authentication framework to detect spoofing
attacks in underwater sensor networks. This scheme exploits the power delay profile of the …

Automated detection-in-depth in industrial control systems

Z Jadidi, E Foo, M Hussain, C Fidge - The International Journal of …, 2022 - Springer
Legacy industrial control systems (ICSs) are not designed to be exposed to the Internet and
linking them to corporate networks has introduced a large number of cyber security …

A comprehensive study of cyber security attacks, classification, and countermeasures in the internet of things

MA Haque, S Haque, K Kumar… - Handbook of research on …, 2021 - igi-global.com
The role of the internet of things (IoT) and cyberspace in a digital society is well recognized,
and they have become tremendously popular due to certain features like the ability to ease …

Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards

L Xu, C Jiang, Y Qian, Y Zhao, J Li… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recently, the conflict between exploiting the value of personal data and protecting
individuals' privacy has attracted much attention. Personal data market provides a promising …