• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。

Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.

机构信息

School of Aerospace, Transport and Manufacturing, Cranfield University, Cranfield MK43 0AL, UK.

出版信息

Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.

DOI:10.3390/s23010321
PMID:36616920
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9824493/
Abstract

Technological breakthroughs in the Internet of Things (IoT) easily promote smart lives for humans by connecting everything through the Internet. The de facto standardised IoT routing strategy is the routing protocol for low-power and lossy networks (RPL), which is applied in various heterogeneous IoT applications. Hence, the increase in reliance on the IoT requires focus on the security of the RPL protocol. The top defence layer is an intrusion detection system (IDS), and the heterogeneous characteristics of the IoT and variety of novel intrusions make the design of the RPL IDS significantly complex. Most existing IDS solutions are unified models and cannot detect novel RPL intrusions. Therefore, the RPL requires a customised global attack knowledge-based IDS model to identify both existing and novel intrusions in order to enhance its security. Federated transfer learning (FTL) is a trending topic that paves the way to designing a customised RPL-IoT IDS security model in a heterogeneous IoT environment. In this paper, we propose a federated-transfer-learning-assisted customised distributed IDS (FT-CID) model to detect RPL intrusion in a heterogeneous IoT. The design process of FT-CID includes three steps: dataset collection, FTL-assisted edge IDS learning, and intrusion detection. Initially, the central server initialises the FT-CID with a predefined learning model and observes the unique features of different RPL-IoTs to construct a local model. The experimental model generates an RPL-IIoT dataset with normal and abnormal traffic through simulation on the Contiki-NG OS. Secondly, the edge IDSs are trained using the local parameters and the globally shared parameters generated by the central server through federation and aggregation of different local parameters of various edges. Hence, transfer learning is exploited to update the server's and edges' local and global parameters based on relational knowledge. It also builds and customised IDS model with partial retraining through local learning based on globally shared server knowledge. Finally, the customised IDS in the FT-CID model enforces the detection of intrusions in heterogeneous IoT networks. Moreover, the FT-CID model accomplishes high RPL security by implicitly utilising the local and global parameters of different IoTs with the assistance of FTL. The FT-CID detects RPL intrusions with an accuracy of 85.52% in tests on a heterogeneous IoT network.

摘要

物联网 (IoT) 中的技术突破通过互联网将所有事物连接起来,轻松地为人类创造智能生活。事实上,物联网的标准化路由策略是低功耗有损网络 (RPL) 的路由协议,它应用于各种异构的物联网应用中。因此,对物联网的依赖程度的增加需要关注 RPL 协议的安全性。顶级防御层是入侵检测系统 (IDS),而物联网的异构性和各种新颖的入侵方式使得 RPL IDS 的设计变得非常复杂。大多数现有的 IDS 解决方案都是统一的模型,无法检测到新颖的 RPL 入侵。因此,RPL 需要一个定制的基于全局攻击知识的 IDS 模型来识别现有和新颖的入侵,以增强其安全性。联邦迁移学习 (FTL) 是一个热门话题,为在异构物联网环境中设计定制的 RPL-IoT IDS 安全模型铺平了道路。在本文中,我们提出了一种基于联邦迁移学习辅助的定制分布式 IDS (FT-CID) 模型,用于检测异构物联网中的 RPL 入侵。FT-CID 的设计过程包括三个步骤:数据集收集、FTL 辅助边缘 IDS 学习和入侵检测。首先,中央服务器使用预定义的学习模型初始化 FT-CID,并观察不同 RPL-IoT 的独特特征,以构建本地模型。实验模型通过在 Contiki-NG OS 上进行模拟生成具有正常和异常流量的 RPL-IIoT 数据集。其次,边缘 IDS 使用本地参数和中央服务器生成的全局共享参数通过联邦和聚合不同边缘的各个本地参数进行训练。因此,通过基于关系的知识,迁移学习被用来更新服务器和边缘的本地和全局参数。它还通过基于全局共享服务器知识的本地学习构建和定制具有部分重新训练的 IDS 模型。最后,FT-CID 模型中的定制 IDS 执行异构物联网网络中的入侵检测。此外,FT-CID 模型通过 FTL 的辅助,利用不同 IoT 的本地和全局参数,实现了高度的 RPL 安全性。FT-CID 在异构物联网网络上的测试中实现了 85.52%的 RPL 入侵检测精度。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/34b356f0af40/sensors-23-00321-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/d50e11a6e7a3/sensors-23-00321-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/4b7319d29058/sensors-23-00321-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/926369eedc00/sensors-23-00321-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/21f7a16cb9a1/sensors-23-00321-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/694f63621d91/sensors-23-00321-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/67fb314169b4/sensors-23-00321-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/3f49415b3f3c/sensors-23-00321-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/34b356f0af40/sensors-23-00321-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/d50e11a6e7a3/sensors-23-00321-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/4b7319d29058/sensors-23-00321-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/926369eedc00/sensors-23-00321-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/21f7a16cb9a1/sensors-23-00321-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/694f63621d91/sensors-23-00321-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/67fb314169b4/sensors-23-00321-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/3f49415b3f3c/sensors-23-00321-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/f9b2/9824493/34b356f0af40/sensors-23-00321-g008.jpg

相似文献

1
Customised Intrusion Detection for an Industrial IoT Heterogeneous Network Based on Machine Learning Algorithms Called FTL-CID.基于机器学习算法的工业物联网异构网络的定制入侵检测,称为 FTL-CID。
Sensors (Basel). 2022 Dec 28;23(1):321. doi: 10.3390/s23010321.
2
Rank and Wormhole Attack Detection Model for RPL-Based Internet of Things Using Machine Learning.基于机器学习的物联网 RPL 中等级和虫洞攻击检测模型。
Sensors (Basel). 2022 Sep 7;22(18):6765. doi: 10.3390/s22186765.
3
THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack.THC-RPL:一种基于 RPL 的物联网网络中的轻量级信任启用路由,用于防范 Sybil 攻击。
PLoS One. 2022 Jul 28;17(7):e0271277. doi: 10.1371/journal.pone.0271277. eCollection 2022.
4
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things.一种基于信任的物联网中抵御RPL攻击的安全路由模型
Sensors (Basel). 2022 Sep 17;22(18):7052. doi: 10.3390/s22187052.
5
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks.ROAST-IoT:一种用于物联网网络入侵检测的新型距离优化注意力卷积散射技术。
Sensors (Basel). 2023 Sep 23;23(19):8044. doi: 10.3390/s23198044.
6
A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT.一种用于检测物联网 RPL 协议上克隆 ID 攻击的密集神经网络方法。
Sensors (Basel). 2021 May 3;21(9):3173. doi: 10.3390/s21093173.
7
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security.多移动代理信任框架,用于减轻内部攻击并增强 RPL 安全性。
Sensors (Basel). 2022 Jun 16;22(12):4539. doi: 10.3390/s22124539.
8
Using Embedded Feature Selection and CNN for Classification on CCD-INID-V1-A New IoT Dataset.利用嵌入式特征选择和卷积神经网络对 CCD-INID-V1-新物联网数据集进行分类。
Sensors (Basel). 2021 Jul 15;21(14):4834. doi: 10.3390/s21144834.
9
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning.FL-DSFA:使用联邦学习保护基于RPL的物联网网络免受选择性转发攻击
Sensors (Basel). 2024 Sep 8;24(17):5834. doi: 10.3390/s24175834.
10
An Ensemble-Based Multiclass Classifier for Intrusion Detection Using Internet of Things.基于集成的物联网入侵检测多类分类器
Comput Intell Neurosci. 2022 May 20;2022:1668676. doi: 10.1155/2022/1668676. eCollection 2022.

引用本文的文献

1
A Heterogeneity-Aware Semi-Decentralized Model for a Lightweight Intrusion Detection System for IoT Networks Based on Federated Learning and BiLSTM.基于联邦学习和双向长短期记忆网络的物联网网络轻量级入侵检测系统的异构感知半分散模型
Sensors (Basel). 2025 Feb 9;25(4):1039. doi: 10.3390/s25041039.
2
Enhancing the Internet of Medical Things (IoMT) Security with Meta-Learning: A Performance-Driven Approach for Ensemble Intrusion Detection Systems.用元学习增强医疗物联网(IoMT)安全:一种用于集成入侵检测系统的性能驱动方法。
Sensors (Basel). 2024 May 30;24(11):3519. doi: 10.3390/s24113519.
3
Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection.

本文引用的文献

1
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT.基于新型支持性对偶延迟确定性策略梯度(S-TD3)算法的工业物联网认证和隐私保护联邦迁移学习。
Sensors (Basel). 2021 Nov 23;21(23):7793. doi: 10.3390/s21237793.
2
Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future.物联网(IoT):迈向智能与可持续未来的机遇、问题与挑战。
J Clean Prod. 2020 Nov 20;274:122877. doi: 10.1016/j.jclepro.2020.122877. Epub 2020 Jul 19.
3
Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge based Framework.
基于萤火虫算法并结合机器学习用于入侵检测的无线传感器网络-物联网安全增强
Sci Rep. 2024 Jan 2;14(1):231. doi: 10.1038/s41598-023-50554-x.
4
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks.基于机器学习的二进制黑猩猩优化算法入侵检测用于安全的物联网辅助无线传感器网络。
Sensors (Basel). 2023 Apr 18;23(8):4073. doi: 10.3390/s23084073.
用于智能物联网应用的个性化联邦学习:一种基于云边缘的框架。
IEEE Comput Graph Appl. 2020 May 8. doi: 10.1109/OJCS.2020.2993259.
4
5G support for Industrial IoT Applications - Challenges, Solutions, and Research gaps.5G对工业物联网应用的支持——挑战、解决方案及研究差距
Sensors (Basel). 2020 Feb 4;20(3):828. doi: 10.3390/s20030828.