Smart City Gnosys

Smart city article details

Title Enhancing A Fog-Oriented Iot Authentication And Encryption Platform Through Deep Learning-Based Attack Detection
ID_Doc 23732
Authors dos Santos F.C.; Duarte-Figueiredo F.; De Grande R.E.; dos Santos A.L.
Year 2024
Published Internet of Things (Netherlands), 27
DOI http://dx.doi.org/10.1016/j.iot.2024.101310
Abstract The term Internet of Things (IoT) refers to a network that connects smart things with sensors. Healthcare, transportation, and smart cities are some IoT applications. IoT technologies integrate objects in the cloud-based Internet. The massive scale of IoT exposes some systems to attacks. There is an urgent need for solutions that efficiently handle IoT authentication, encryption, and attack detection. This work proposes a Fog-based IoT security platform named IoTSafe. It contains mechanisms for authentication and encryption and a deep learning-based attack detection module. The IoTSafe attack detection module uses the Message Queue Telemetry Transport (MQTT). Tests were performed to evaluate the IoTSafe platform in three different environments. A case study demonstrated that the platform is efficient with all proposed mechanisms and modules. The results for the attack detection module show the proposal's effectiveness with an accuracy of 99.57% and a precision of 99.66%. The IoTSafe time response was less than one second, guaranteeing the quality of service. © 2024 Elsevier B.V.
Author Keywords Deep learning; Fog computing; Intrusion detection; IoT; Security


Similar Articles


Id Similarity Authors Title Published
2939 View0.885Mosaiyebzadeh F.; Araujo Rodriguez L.G.; Macedo Batista D.; Hirata R.A Network Intrusion Detection System Using Deep Learning Against Mqtt Attacks In IotProceedings - 2021 IEEE Latin-American Conference on Communications, LATINCOM 2021 (2021)
35266 View0.863Sun Y.; Lo F.P.-W.; Lo B.Lightweight Internet Of Things Device Authentication, Encryption, And Key Distribution Using End-To-End Neural CryptosystemsIEEE Internet of Things Journal, 9, 16 (2022)
34139 View0.862Selvam R.; Velliangiri S.Iotsdl: Internet Of Things Security For Deep Learning Techniques-A Research Perspectives2023 International Conference on Computer Communication and Informatics, ICCCI 2023 (2023)
47748 View0.86Ghaffari A.; Jelodari N.; pouralish S.; derakhshanfard N.; Arasteh B.Securing Internet Of Things Using Machine And Deep Learning Methods: A SurveyCluster Computing, 27, 7 (2024)
9648 View0.858Alsoufi M.A.; Razak S.; Siraj M.M.; Nafea I.; Ghaleb F.A.; Saeed F.; Nasser M.Anomaly-Based Intrusion Detection Systems In Iot Using Deep Learning: A Systematic Literature ReviewApplied Sciences (Switzerland), 11, 18 (2021)
30732 View0.858Amine M.S.; Nada F.A.; Hosny K.M.Improved Model For Intrusion Detection In The Internet Of ThingsScientific Reports, 15, 1 (2025)
23579 View0.856Prazeres N.; Costa R.L.D.C.; Santos L.; Rabadão C.Engineering The Application Of Machine Learning In An Ids Based On Iot Traffic FlowIntelligent Systems with Applications, 17 (2023)
33032 View0.856Dawoud A.; Sianaki O.A.; Shahristani S.; Raun C.Internet Of Things Intrusion Detection: A Deep Learning Approach2020 IEEE Symposium Series on Computational Intelligence, SSCI 2020 (2020)
32899 View0.855Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
9608 View0.855Pacheco J.; Benitez V.H.; Tunc C.; Grijalva C.Anomaly Behavior Analysis For Fog Nodes Availability Assurance In Iot ApplicationsProceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2019-November (2019)