Smart City Gnosys

Smart city article details

Title How Can The Adversary Effectively Identify Cellular Iot Devices Using Lstm Networks?
ID_Doc 29330
Authors Luo Z.J.; Pitera W.A.; Zhao S.; Lu Z.; Sagduyu Y.E.
Year 2023
Published WiseML 2023 - Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning
DOI http://dx.doi.org/10.1145/3586209.3591394
Abstract The Internet of Things (IoT) has become a key enabler for connecting edge devices with each other and the internet. Massive IoT services provided by cellular networks offer various applications such as smart metering and smart cities. Security of the massive IoT devices working alongside traditional devices such as smartphones and laptops has become a major concern. Protecting these IoT devices from being identified by malicious attackers is often the first line of defense for cellular IoT devices. In this paper, we provide an effective attacking method for identifying cellular IoT devices from cellular networks. Inspired by the characteristics of Long Short-Term Memory (LSTM) networks, we have developed a method that can not only capture context information but also adapt to the dynamic changes of the environment over time. Experimental validation shows a high detection rate with less than 10 epochs of training on public datasets. © 2023 ACM.
Author Keywords attacks; cellular iot devices; defenses; internet of things; lstm networks; recurrent neural networks; security


Similar Articles


Id Similarity Authors Title Published
1610 View0.885Alghofaili Y.; Rassam M.A.A Dynamic Trust-Related Attack Detection Model For Iot Devices And Services Based On The Deep Long Short-Term Memory TechniqueSensors, 23, 8 (2023)
33508 View0.857Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
2510 View0.854Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R.A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And OptimizationCommunications on Applied Nonlinear Analysis, 32, 2 (2025)
41565 View0.852Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D.Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless NetworksIEEE Access, 13 (2025)
36064 View0.85Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
19221 View0.85Krari A.; Hajami A.; Jarmouni E.Detecting The Rpl Version Number Attack In Iot Networks Using Deep Learning ModelsInternational Journal of Advanced Computer Science and Applications, 14, 10 (2023)