Next Article in Journal
X-Band Radar System to Detect Bathymetric Changes at River Mouths during Storm Surges: A Case Study of the Arno River
Next Article in Special Issue
Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security
Previous Article in Journal
Low-Cost Portable System for Measurement and Representation of 3D Kinematic Parameters in Sport Monitoring: Discus Throwing as a Case Study
Previous Article in Special Issue
SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries

1
College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
2
Department of Automation, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(23), 9416; https://doi.org/10.3390/s22239416
Submission received: 22 September 2022 / Revised: 16 November 2022 / Accepted: 22 November 2022 / Published: 2 December 2022
(This article belongs to the Special Issue Security and Privacy for IoT and Metaverse)

Abstract

:
The Internet of Things (IoT) is a prominent and advanced network communication technology that has familiarized the world with smart industries. The conveniently acquirable nature of IoT makes it susceptible to a diversified range of potential security threats. The literature has brought forth a plethora of solutions for ensuring secure communications in IoT-based smart industries. However, resource-constrained sectors still demand significant attention. We have proposed a fog-assisted deep learning (DL)-empowered intrusion detection system (IDS) for resource-constrained smart industries. The proposed Cuda–deep neural network gated recurrent unit (Cu-DNNGRU) framework was trained on the N-BaIoT dataset and was evaluated on judicious performance metrics, including accuracy, precision, recall, and F1-score. Additionally, the Cu-DNNGRU was empirically investigated alongside state-of-the-art classifiers, including Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU. An extensive performance comparison was also undertaken among the proposed IDS and some outstanding solutions from the literature. The simulation results showed ample strength with respect to the validation of the proposed framework. The proposed Cu-DNNGRU achieved 99.39% accuracy, 99.09% precision, 98.89% recall, and an F1-score of 99.21%. In the performance comparison, the values were substantially higher than those of the benchmarked schemes, as well as competitive security solutions from the literature.

1. Introduction

The Internet of Things is a vigorously flourishing communication technology that introduces a new spectrum of smart communications [1]. It is extensively acknowledged for ensuring automated communication in a disseminated network of heterogeneous devices. A conventional IoT network incorporates various communicational nodes that are interlinked by tiny sensors [2]. Therefore, it makes up an integrated assortment of multitudinous devices that can mutually communicate regardless of any human interaction [3]. This phenomenal infrastructure of IoT endorses it as a substantial component of every smart communication environment. The miraculous performance of IoT can be witnessed in every sphere, such as in the educational sector, transportation sector, medical sector, agricultural sector, industrial sector, etc. [4,5]. In a traditional IoT network, the communication protocol plays a significant role, as it governs all of the communications among the participating nodes [6]. The Advanced Message Queuing Protocol (AMQP) [7], Message Queuing Telemetry Transport (MQTT) protocol [8], Long-Range Wide-Area Network (LoRAWAN) [9], and Sigfox [10] are some renowned communication protocols.
However, the Routing Protocol for Low-Power and Lossy Networks (RPL) is gaining significant attention. The Internet Engineering Task Force (IETF) designed an IPV6-based RPL protocol to expedite the routing mechanisms of resource-constrained networks [11]. This protocol operates at the physical standard of IEEE802.15.4 and is considered an optimal choice for ensuring reliable communication in low-power and lossy networks [12,13]. The application circle of RPL is expanding, and its applications can be observed in every IoT-based communication environment. The industrial sector is one of the highly privileged application areas of RPL, as the limited availability of resources and frequent communication breakages are crucial concerns in the industrial environment. RPL is a potential choice for coping with such emerging challenges in the industrial sector [14,15,16]. The expanding range of RPL applications in industrial sectors clearly shows its efficiency. However, these circumstances make RPL networks vulnerable to various potential risks [17]. Such challenging circumstances demand multiple security solutions in order to ensure durable and satisfactory communication in industrial networks [18]. Artificial intelligence (AI) [19], fog computing [20], software-defined networking (SDN) [21], machine learning (ML) [22], and deep learning (DL) [23,24,25] have been used to address this.
In the present era, combinations of deep-learning- and fog-computing-based schemes are considered fascinating solutions to overcome such challenges [26]. Fog computing provides a decentralized security approach by dividing the functional roles among various fog nodes. Hence, it prohibits the resource utilization of a particular node, making it an unusual approach to efficient resource management [27]. Secondly, it provides a two-layer-based surveillance architecture that is capable of conducting an investigation of malicious entities in a network [28]. Deep-learning-based approaches deliver an evolutionary mechanism for analyzing the traffic streams cascading over a network [29]. A DL-based system is first trained and tested on a dataset that contains existing impressions of an immense range of suspicious activities  [30]. There is a large catalog of training datasets, e.g., NSL-KDD [31], UNSW-NB15 [32], BOT-IoT [33], ADFA-LD [34], CICIDS2017 [35], and N-BaIoT [36], which can be employed to train the concerned systems. Further, such intrusion detection systems are used in virtual environments to investigate anonymous anomalies within networks [37]. These discernible advantages of both technologies motivated us to design a fog-assisted deep-learning-empowered intrusion detection system (IDS) for RPL-based resource-constrained smart industries.

1.1. Contribution

The significant contributions of this research work can be listed as follows:
  • We have designed a fog-assisted deep-learning-empowered IDS, which is called the Cu-DNNGRU, to examine suspicious events in RPL-based resource-constrained smart industries.
  • For the purpose of training, the proposed model was integrated with N-BaIoT, which significantly enhanced the detection capabilities of the designed framework.
  • The established framework contains a combined sequence of the Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU classifiers for comparison purposes, and they were trained and evaluated with the same dataset and performance metrics.
  • The performance of the designed framework was also evaluated in comparison with some well-known benchmarked schemes.
  • The authors also employed ten-fold cross-validation to show unbiased results.
  • The simulation results support the validation of the proposed framework in terms of threat detection efficiency, accuracy, precision, resource consumption, and computational complexity.

1.2. Organization

This research study is organized systematically. Section 2 presents a delineation of related work. Section 3 describes the proposed security framework’s methodology, the elaboration of the datasets, and the simulation setup. Section 4 focuses on the results obtained after the performance evaluation of the proposed model, and the study is finally concluded in Section 5.

2. Related Work

RPL-based resource-constrained smart industries are attaining significant attention where notable efforts are being made towards its security. Here, we addressed some meaningful research studies surrounding this domain.
Authors [38] have proposed an IDS by including the appropriate elements of Light GBM to enhance the proposed system’s threat detection capabilities. The system is aligned with a customized dataset published by Oakridge Lab, which comes with a comprehensive variety of threat detection features. The same model is designed in [39], where a Convolutional Neural Network (CNN) based threat detection scheme is developed. The model is trained on two commonly known datasets, UNSW-NB15 and CICIDS2017. Simulations are carried out to evaluate the model’s validity, and researchers aim to assess this on the testbed. Another attempt is made in [40], where researchers have focused on the combined strength of some well-known classifiers such as the Long Short-Term Memory (LSTM) and the Gated Recurrent Unit (GRU). They have proposed a hybrid model that is trained on the N-BaIoT dataset and is capable of interrogating malicious events in resource-constrained environments. Likewise, a hybrid intrusion detection framework is proposed by using LSTM classifier [41]. UNSW-NB15 and NSLKDD datasets are acquired to train the system, and the system’s efficiency is evaluated in a pervasive simulation environment. Researchers have obtained the generic features of the CNN classifier to design an anomaly detection mechanism in the healthcare environment. The framework is trained on the CICIDS2017 dataset and analyzed using rational performance metrics. The system has potentially identified a range of emerging cyber threats in the smart healthcare environment [42]. Another model is designed by using a Deep Neural Network (DNN) based classifier and is potentially trained on UNSW-NB15 and NSLKDD datasets. The obtained result validates the importance of the proposed model [43]. Authors have used Text-CNN classifiers and the KDD99 dataset to propose a threat detection model for smart industries [44].
Single-Hidden Layer Feed-forward Neural Network (SLFN) is one of the best classifiers for responsive intrusion detection in industrial environments. It, with the LSTM classifier, brings additional strength to the system.
Researchers have adopted these two classifiers to design a multifunctional threat classification mechanism. Furthermore, the IoT-ID20 dataset is used for training purposes [45]. Another effective threat classification scheme is presented [46], where authors mainly target the less frequently occurring suspicious events in industrial networks. They have observed the real-life scenario for a sustainable period and have organized a customized dataset. The N-BaIoT data set is also integrated into sequence with their customized dataset. Their model is facilitated with Principal Component Analysis (PCA) and deep learning classifiers that offer additional support to instantly identify these attacking circumstances. Researchers in [47] provide an alternative deep learning-based detection mechanism. Multiclass classifiers accompany the BOT-IoT dataset for a highly accurate investigation of suspicious entities. The system has achieved remarkable accuracy in distinguishing between normal and abnormal traffic. For RLL-based smart communication industries, a deep learning-inspired malicious packet filtering mechanism is provided [48]. Researchers have used an embedded DNN classifier that controls the entire processing infrastructure. The proposed approach is capable of handling Denial of Services DoS and port scan attacks. Researchers have designed a multidimensional system consisting mainly of a forest PS classifier to investigate crucial security threats in resource-efficient smart industrial environments. They have used a CICIDS2017 dataset containing details of potentially harmful events. The designed model obtained impressive accuracy with high precision and an F1 score [49].
The authors present a deep learning-based IDS developed on a custom dataset. The proposed scheme utilizes Multilayer Perceptron (MLP), Decision Tree (DT), and LSTM classifiers to enable efficient intrusion detection. While performing simulations, the proposed framework has projected splendid performance on analytical performance metrics [50]. Researchers have used the Classification and Regression Tree (CART) classifier and CNN to present a dynamic security framework that ensures instant recognition of suspicious events causing security breaches. The scheme has been trained on the NSL-KDD and the KDD-99 dataset, achieving sustainable performance to safeguard resource-constrained smart industrial environments [48]. The related work is summarized in Table 1.

3. Methodology

3.1. Proposed System Architecturem

The authors designed an IDS composed of two charismatic technologies, deep learning and fog computing, where both technologies are assigned specific roles. Deep learning participates in intrusion detection activity, whereas fog computing provides an ideal infrastructure to implement that deep learning-based intrusion detection system. Fog computing also offers a systematic architecture in which different tasks are divided among various communication nodes according to their resource occupancy. RPL-based communication networks are just an application area for which we have proposed this IDS. This way, a comprehensive mechanism is formulated where both these technologies, i.e., deep learning and fog computing, rub shoulders together to perform intrusion detection in RPL-based resource-constrained smart industries.
In the proposed detection framework, DNN participates with four layers of neurons bearing 400, 300, 200, and 50 layers of neurons, whereas GRU contributes with two layers carrying 200 and 100 neurons, respectively. As shown in Figure 1, the active function RELU is employed for both classifiers DNN and GRU; however, the dynamic function softmax is integrated at the output layer. The scheme is occupied with Adam optimizer to acquire the desired performance objectives. For a classified analysis of the system’s performance, the designed Cu-DNNGRU is tested, with Cu-LSTMDNN having two layers of neurons, BLSTM, and GRU with four layers of neurons for each classifier. The proposed framework is evaluated on an analytical performance scale where simulations are carried out to 15 epochs with a batch size of 32. The comprehensive elaboration of the proposed intrusion detection framework is further enlisted in Table 2.

3.2. Algorithm Description

In the proposed IDS, the deep learning-based algorithm purely focuses on the intrusion detection activity and effectively interrogates anomalous events in RPL-based resource-constrained smart industries. The proposed Cu-DNNGRU is an amalgamation of two prestigious classifiers, Deep Neural Networks (DNN) and Gated Recurring Unit (GRU). A deep Neural Network (DNN) is an enhanced version of an Artificial Neural Network (ANN) with extra layers. The layers of neurons are organized in a sequence of multiple layers, where neurons receive the neuron activations from the previous layer as input and perform a simple computation. Each neuron receives a set of x-values numbers from 1 to n as an input and computes the predicted y-hat value. Vector x contains the values of the features in one of the m examples from the training set. In each iteration, the neuron calculates a weighted average of the values of the vector x based on its current weight vector w and adds bias. Finally, the result of this calculation is passed through a non-linear activation function.
Z = B i a s + W 1 X 1 + W 2 X 2 + W 3 X 3 + + W n X n
The Gated Recurrent Unit (GRU) is an advanced version of the Recurrent Neural Network (RNN) and is quite similar to the LSTM. GRU also utilizes gates to regulate the information flow. They choose which information should be sent to the output and are referred to as the two vectors. Its specialty is storing old data rather than getting rid of it since it is not essential to the forecast. GRU consists of an update gate ( U t ) , current memory state ( h t ) , and reset gate ( r t ) .
U t = ( W z + X t + U z h t 1 + B z )
where X t is the input multiplied by the weight W z . Further, h t 1 holds the information of the previous state multiplied by its weight U z . For computing r t , Equation (3) is used.
r t = σ ( W ( r ) + X t + U ( r ) h t 1 )
where σ represents the sigmoid function, r t is the reset gate, W r is the weight, x t is input, and so on. It then uses Equation (4) to store all the relevant information from the past, where ⊙ is class-wise multiplication, h t is the information from the previous stages and h t 1 is the current memory content.
h t = tanh ( W X t + r t ( U ) h t 1 )
Finally, Equation (5) is used where the network calculates the h t .
h t = Z t h t 1 + ( 1 Z t ) h t
The complete workflow of the proposed detection scheme is depicted in Algorithm 1.
Algorithm 1 Proposed hybrid detection framework.
1:
Input: Dataset = D T S
2:
Output: B e n i g n 0 , A t t a c k 1 1 and so on.
3:
Split the D T S in to D T S T r a i n i n g D a t a and D T S T e s t i n g D a t a
4:
foreach layer of D N N G R U do
5:
    D T S T r a i n = Pre-proceessing of D T S T r a i n i n g D a t a
6:
    D N N G R U T r a i n i n g = Train the model using D T S T r a i n
7:
    Z = B i a s + W 1 X 1 + W 2 X 2 + W 3 X 3 + . . . . . . . . + W n X n
8:
    U t = ( W z + X t + U z h t 1 + B z )
9:
    r t = σ ( W ( r ) + X t + U ( r ) h t 1 )
10:
h t = tanh ( W X t + r t ( U ) h t 1 )
11:
h t = Z t h t 1 + ( 1 Z t ) h t
12:
end for
13:
D T S T e s t = Pre-processing of D T S T e s t i n g D a t a
14:
D N N G R U T e s t i n g = Test the model using D T S T e s t
15:
while True do
16:
P r e d i c t   A t t a c k D N N G R U T M o d e l ( D T S T e s t )
17:
if the value predicted = 0 then
18:
  Return Benign
19:
else
20:
  Return attack type
21:
end if
22:
end while

3.3. Proposed Network Model

The proposed threat detection mechanism is massively privileged by fog computing in terms of operational architecture. In resource-constrained smart industries, the operational role needs to be assigned according to the resource occupancies of the concerned nodes. Hence, fog computing provides an impressive infrastructure where communication nodes are categorized into various layers that are indulged in the cloud layer, the fog layer, and the edge layer, respectively. Starting from the bottom, the edge layer comprises a scattered dimension of RPL nodes identically tied up in organic clusters. The second layer is the fog layer, which administers the functionalities of the edge layer and offers substantial durability to the system by assisting with optimal routing streams within the network. The fog layer is then in coordination with the cloud layer which supervises the functionalities of the fog layer and performs superior functionalities such as data storage, extinguishable administration, etc. That phenomenon squarely tends to yield highly productive management of system resources. The deep learning-based threat investigation approach aggregately works in coordination with fogging. The threat detection model is originally trained on a comprehensive dataset to make it conceived with various generic impressions of security threats. Henceforth, the framework is implemented on the fog and cloud layer. The fog layer persuasively flags all the suspicious events from the edge layer. However, the fog nodes also possess a probabilistic risk of being compromised. Such uncongenial circumstances may question overall security, reliability, and efficiency of the whole communication network. That phenomenon stimulates the need of a backup plan to cater these unexpected misshaping. Hence, we have introduced two layers of security that leverage an extended security ecosystem. This fog layer serves underneath the cloud layer, so the unaddressed security concerns are then consequentially dismantled by the cloud layer. The overall proposed network model can be witnessed in Figure 2.

3.4. Dataset Description

The dataset is a substantial element of every DL-based intrusion detection scheme [52]. Selecting an effective and proportionate dataset significantly strengthens the IDS. The dataset selection depends on where the IDS will be implemented [53]. An extended range of datasets is available. A vast variety of auxiliary datasets may coordinate with intrusion detection approaches such as ADFA-LD, NSL-KDD [54], BOT-IoT [55], etc. The proposed IDS is designed for RPL-based communication networks. So, the dataset must be closely relevant to this application area. Hence, the proposed detection scheme is trained on the N-BaIoT dataset, which is a suitable choice for intrusion detection in industrial environments. The N-BaIoT dataset contains comprehensive impressions of security threats frequently happening in RPL networks. The N-BaIoT dataset is comprehended with 94,914 attack instances, among which 61,400 are regular attacks. In comparison, the other cases are tied up with crucial security threat categories such as Mirai Scan, Mirai UDP, Mirai Ack, Gafgyt junk, Gafgyt combo, Gafgyt TCP, etc. The dataset details are further elaborated in Table 3.

3.5. Dataset Pre-Processing & Normalization

Pre-processing involves the standard mechanism to organize the data in a usable form, such as gratuitous spaces and eliminating non-value entries. The N-BaIoT dataset is pre-processed to achieve great utility through the sklearn pre-processing label encoder. The deep learning algorithm solely reckoned on numeric values; the sklearn label encoder has converted all non-numeric values to numeric entities. Dataset normalization converts all numeric columns to the same scale without changing the range of values. It is only necessary to normalize datasets with a wide range of values. Minimax Scalar is used to normalize the N-BaIoT dataset, which is generally scaled to a predetermined range between zero and one. The suggested model performs better and yields more valuable results with a normalized dataset.

3.6. Experimental Setup

The proposed scheme’s empirical performance test is conducted on an 8th-generation computer machine furnished with a 3.33 GHz processor, 16 GB RAM, and a Windows 10 operating system. The Graphical Processing Unit (GPU) used for simulations is Geforce-1060, equipped with Python as a programming language and Numpy, Tensorflow, Pandas, Keras, and Scikitlearn libraries. The experimental setup can also be overviewed in Table 4.

3.7. Simulations Parameters

The proposed DNNGRU framework has been evaluated on a comprehensive performance matrix including accuracy, precision, recall, ad f-Score as simulation parameters. The accuracy of a system is calculated by the accumulative summation of the True Positives (TP), the True Negatives (TN), the False Positives (FP), and the False Negatives (FN). The recall is considered an essential element in ascertaining the system’s performance. It denotes the average number of correct analyses released by an algorithm. In some cases, the term precision swapped places with recall because it affirms the accumulative projected by a framework.

4. Results and Discussions

The performance of the proposed Cu-DNNGRU is evaluated concerning other competitive classifiers, i.e., Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU, under a reasonable performance matrix equipped with accuracy precision, recall, and f-Score. DNN-GRU was able to effectively learn from the dataset, as evidenced by the results produced in terms of accuracy vs. loss, as shown in Figure 3. The validation results for the model were 0.025% validation loss and 99.39% validation accuracy. Moreover, on a comparative performance scale, the proposed Cu-DNNGRU projects a phenomenal performance by achieving an overall accuracy of 99.39%, 99.09% precision, 98.89% recall, and 99.21% F1-score as witnessed in Figure 4. We have further provided the class-wise detection rate of the proposed model against the other models in Table 5.
The proposed Cu-DNNGRU is evaluated on a ten-fold cross-validation under an investigative variety of performance parameters such as accuracy, precision, recall, and F1-score. It can be seen in Table 6 that Cu-DNNGRU has achieved remarkable performance in comparison with Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU. Regarding the accuracy, the DNNGRU maintains the first-fold accuracy of 98.61%, 98.21% precision, 99.65% recall, and 98.99% F1-score. The progression continues in almost the same fashion until the 10th fold, where Cu-DNNGRU has a projected accuracy of 99.92%, 98.71% precision, 99.12% recall, and 99.81% F1-score.
Accommodating a broader variety of assessment metrics, comprising the True Positive Rate (TPR), True Negative Rate (TNR), and Matthews Correlation Coefficient (MCC), the proposed Cu-DNNGRU is evaluated in comparison with Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU. Figure 5 depicts that Cu-DNNGRU has shown a TPR of 99.12%, which is significantly exceptional compared to other competitive schemes. Moreover, in the case of TNR, Cu-DNNGRU again advertised an admirable performance with a TNR value of 98.86%. The relevant sequence exclusively goes on when the proposed CU-DNNGRU deliberates an exceptional MCC value of 98.15%.
We have further investigated the performance of the proposed Cu-DNNGRU on rational performance metrics, including False Positive Rate (FPR), False Negative Rate (FNR), False Detection Rate (FDR), and False Omission Rate (FOR). It can be seen in Figure 6 that the proposed Cu-DNNGRU has achieved the FPR of 0.00293%, and the number is considerably less as compared to other benchmarked technologies. The low value of FPR declares the superiority of the proposed framework. The next crucial performance parameter is FNR. Cu-DNNGRU projects an FNR of 0.00183%, which is less than the FNR that other benchmarked technologies achieve. On a comparison at FDR, Cu-DNNGRU exhibits substantial performance with a value of 0.00200%. Cu-DNNGRU again illustrates a dominance over other competitive technologies with a FOR discount of 0.00419%.
Furthermore, a confusion matrix summarizes the performance of a DL-based classification algorithm. Calculating a confusion matrix can provide a more accurate perspective of the categorization model’s accomplishments. The proposed Cu-DNNGRU is evaluated in terms of confusion metrics as well, where it illustrates distinguished strengths over Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU, as shown in Figure 7.
The operating performance of the DL classifiers can also be measured using the Receiver Operating Characteristics (ROC) Curve. An algorithm is used to determine the best possible threshold for a specific classification algorithm to increase the number of accurate results while minimizing false positives. TPR and FPR trade-offs can be determined by employing several measurements of probability thresholds, such as ROC Curves. The proposed Cu-DNNGRU is extensively evaluated along with Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU. Figure 8 provides pictorial evidence regarding the superiority of the proposed framework.
Moreover, the training time is a crucial metric for assessing a system’s overall performance since it measures how long it takes for a plan to acquire the intrinsic sustainability of its absolute features. Figure 8 shows that the proposed Cu-DNNGRU has a training time of 13.35 ms, which is significantly less than the training time of Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU, which consume the training times of 31.24 ms and 24.72 ms, and 17.6 ms, respectively, as pictorially elaborated in Figure 9.
The proposed Cu-DNNGRU is further compared with some state-of-the-art DL classifiers from the literature. The core objective of this extended performance evaluation is to obtain a comprehensive analytical idea regarding the performance of the proposed framework with its competitive algorithms. The performance comparison is conducted on the core performance parameters, i.e., accuracy, precision, recall, and F1-score. Table 7 summarizes this comparison where it can be transparently witnessed that the proposed Cu-DNNGRU has accomplished outstanding performance by outclassing some well-known benchmarked classifiers.

5. Conclusions

This research study is drafted about intrusion detection in RPL-based resource-constrained smart industries. We have proposed a Fog-assisted DL-enabled intrusion detection framework (Cu-DNNGRU) to interrogate a diversified array of potential security threats in smart industries. The under-contention model is trained on the N-BaIoT dataset, and its performance is evaluated on a reasonable spectrum of performance parameters equipped with accuracy, precision, recall, and F1-score. The proposed framework is then compared with several distinguished DL classifiers such as Cu-LSTMDNN, Cu-BLSTM, and Cu-GRU for comprehensive performance analysis. The performance is further investigated along with some benchmarked DL algorithms from the literature. The systematic simulation results validate the effectivity of the proposed model with 99.39% accuracy, 99.09% precision, 98.89% recall, and 99.21% F1-score. The designed framework has overwhelmed existing competitive schemes with dominant performance towards efficient intrusion detection against less consumption of system resources. Finally, we aim to train the proposed model on different datasets and enhance its detection strengths in the future.

Author Contributions

Conceptualization, D.A.; methodology, D.A.; validation, D.A.; formal analysis, D.A. and H.W.; writing—original draft preparation, D.A.; writing—review and editing, D.A. and P.W.; visualization, H.W. and P.W.; supervision, H.W. and P.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research work is funded by the National Key R&D Program, The advanced research on new emergence and configuration technologies of Industrial IoT under Grant number: 2021YFB3301000.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank Wei Min for his guidance and support in completing this research work.

Conflicts of Interest

The authors declare no conflict of interest associated with this research work.

References

  1. Alobaidy, H.A.; Singh, M.J.; Behjati, M.; Nordin, R.; Abdullah, N.F. Wireless Transmissions, Propagation and Channel Modelling for IoT Technologies: Applications and Challenges. IEEE Access 2022, 10, 24095–24131. [Google Scholar] [CrossRef]
  2. Wahab, F.; Zhao, Y.; Javeed, D.; Al-Adhaileh, M.H.; Almaaytah, S.A.; Khan, W.; Saeed, M.S.; Kumar, S.R. An AI-Driven Hybrid Framework for Intrusion Detection in IoT-Enabled E-Health. Comput. Intell. Neurosci. 2022, 2022, 6096289. [Google Scholar] [CrossRef] [PubMed]
  3. Reed, J.L.; Tosun, A.Ş. BULWARK: A Framework to Store IoT Data in User Accounts. IEEE Access 2022, 10, 15619–15634. [Google Scholar] [CrossRef]
  4. Abdelmaboud, A.; Ahmed, A.I.A.; Abaker, M.; Eisa, T.A.E.; Albasheer, H.; Ghorashi, S.A.; Karim, F.K. Blockchain for IoT Applications: Taxonomy, Platforms, Recent Advances, Challenges and Future Research Directions. Electronics 2022, 11, 630. [Google Scholar] [CrossRef]
  5. Raghuvanshi, A.; Singh, U.K.; Joshi, C. A review of various security and privacy innovations for IoT applications in healthcare. In Advanced Healthcare Systems: Empowering Physicians with IoT-Enabled Technologies; Wiley: Hoboken, NJ, USA, 2022; pp. 43–58. [Google Scholar]
  6. Javeed, D.; Badamasi, U.M.; Iqbal, T.; Umar, A.; Ndubuisi, C.O. Threat detection using machine/deep learning in IOT environments. Int. J. Comput. Networks Commun. Secur. 2020, 8, 59–65. [Google Scholar]
  7. Basavaraju, N.; Alexander, N.; Seitz, J. Performance Evaluation of Advanced Message Queuing Protocol (AMQP): An Empirical Analysis of AMQP Online Message Brokers. In Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC), Dubai, United Arab Emirates, 31 October–2 November 2021; pp. 1–8. [Google Scholar]
  8. Gupta, V.; Khera, S.; Turk, N. MQTT protocol employing IOT based home safety system with ABE encryption. Multimed. Tools Appl. 2021, 80, 2931–2949. [Google Scholar] [CrossRef]
  9. Mroue, H.; Parrein, B.; Hamrioui, S.; Bakowski, P.; Nasser, A.; Cruz, E.M.; Vince, W. LoRa+: An extension of LoRaWAN protocol to reduce infrastructure costs by improving the Quality of Service. Internet Things 2020, 9, 100176. [Google Scholar] [CrossRef]
  10. Boccadoro, P.; Daniele, V.; Di Gennaro, P.; Lofù, D.; Tedeschi, P. Water quality prediction on a Sigfox-compliant IoT device: The road ahead of WaterS. Ad Hoc Netw. 2022, 126, 102749. [Google Scholar] [CrossRef]
  11. Qureshi, K.N.; Rana, S.S.; Ahmed, A.; Jeon, G. A novel and secure attacks detection framework for smart cities industrial internet of things. Sustain. Cities Soc. 2020, 61, 102343. [Google Scholar] [CrossRef]
  12. Shirafkan, M.; Shahidienjad, A.; Ghobaei-Arani, M. An autonomous intrusion detection system for the RPL protocol. Peer-to-Peer Netw. Appl. 2022, 15, 484–502. [Google Scholar] [CrossRef]
  13. Almusaylim, Z.A.; Alhumam, A.; Jhanjhi, N.Z. Proposing a secure RPL based internet of things routing protocol: A review. Ad Hoc Netw. 2020, 101, 102096. [Google Scholar] [CrossRef]
  14. Zaatouri, I.; Alyaoui, N.; Guiloufi, A.B.; Sailhan, F.; Kachouri, A. Design and Performance Analysis of Objective Functions for RPL Routing Protocol. Wirel. Pers. Commun. 2022, 124, 2677–2697. [Google Scholar] [CrossRef]
  15. Al-Amiedy, T.A.; Anbar, M.; Belaton, B.; Kabla, A.H.H.; Hasbullah, I.H.; Alashhab, Z.R. A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things. Sensors 2022, 22, 3400. [Google Scholar] [CrossRef]
  16. Verma, A.; Ranga, V. Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review. IEEE Sensors J. 2020, 20, 5666–5690. [Google Scholar] [CrossRef]
  17. Peng, K.; Huang, H.; Bilal, M.; Xu, X. Distributed incentives for intelligent offloading and resource allocation in digital twin driven smart industry. IEEE Trans. Ind. Inform. 2022; online ahead of print. [Google Scholar] [CrossRef]
  18. Manogaran, G.; Alazab, M.; Shakeel, P.M.; Hsu, C.H. Blockchain assisted secure data sharing model for Internet of Things based smart industries. IEEE Trans. Reliab. 2021, 71, 348–358. [Google Scholar] [CrossRef]
  19. Bécue, A.; Praça, I.; Gama, J. Artificial intelligence, cyber-threats and Industry 4.0: Challenges and opportunities. Artif. Intell. Rev. 2021, 54, 3849–3886. [Google Scholar] [CrossRef]
  20. Rafiq, A.; Ping, W.; Min, W.; Muthanna, M.S.A. Fog assisted 6TiSCH tri-layer network architecture for adaptive scheduling and energy-efficient offloading using rank-based Q-learning in smart industries. IEEE Sens. J. 2021, 21, 25489–25507. [Google Scholar] [CrossRef]
  21. Al Razib, M.; Javeed, D.; Khan, M.T.; Alkanhel, R.; Muthanna, M.S.A. Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework. IEEE Access 2022, 10, 53015–53026. [Google Scholar] [CrossRef]
  22. Xue, M.; Yuan, C.; Wu, H.; Zhang, Y.; Liu, W. Machine learning security: Threats, countermeasures, and evaluations. IEEE Access 2020, 8, 74720–74742. [Google Scholar] [CrossRef]
  23. Khan, U.T. Internet of Things (IOT) systems and its security challenges. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 2019, 8, 12. [Google Scholar]
  24. Liu, W.; Gu, C.; O’Neill, M.; Qu, G.; Montuschi, P.; Lombardi, F. Security in approximate computing and approximate computing for security: Challenges and opportunities. Proc. IEEE 2020, 108, 2214–2231. [Google Scholar] [CrossRef]
  25. Badamasi, U.M.; Ndubuisi, C.O.; Soomro, F.; Asif, M. Man in the middle attacks: Analysis motivation and prevention. Int. J. Comput. Netw. Commun. Secur. 2020, 8, 52–58. [Google Scholar]
  26. Verma, P.; Tiwari, R.; Hong, W.C.; Upadhyay, S.; Yeh, Y.H. FETCH: A Deep Learning-Based Fog Computing and IoT Integrated Environment for Healthcare Monitoring and Diagnosis. IEEE Access 2022, 10, 12548–12563. [Google Scholar] [CrossRef]
  27. Kishor, A.; Chakarbarty, C. Task offloading in fog computing for using smart ant colony optimization. Wirel. Pers. Commun. 2021, 1–22. [Google Scholar] [CrossRef]
  28. Abdel-Basset, M.; Moustafa, N.; Mohamed, R.; Elkomy, O.M.; Abouhawwash, M. Multi-objective task scheduling approach for fog computing. IEEE Access 2021, 9, 126988–127009. [Google Scholar] [CrossRef]
  29. Javeed, D.; Gao, T.; Khan, M.T.; Ahmad, I. A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT). Sensors 2021, 21, 4884. [Google Scholar] [CrossRef] [PubMed]
  30. Niu, Z.; Zhong, G.; Yu, H. A review on the attention mechanism of deep learning. Neurocomputing 2021, 452, 48–62. [Google Scholar] [CrossRef]
  31. Gad, A.R.; Nashat, A.A.; Barkat, T.M. Intrusion detection system using machine learning for vehicular ad hoc networks based on ToN-IoT dataset. IEEE Access 2021, 9, 142206–142217. [Google Scholar] [CrossRef]
  32. Reddy, D.K.K.; Nayak, J.; Naik, B.; Pratyusha, G.S. Deep Neural Network–Based Security Model for IoT Device Network. In Deep Learning for Internet of Things Infrastructure; CRC Press: Boca Raton, FL, USA, 2021; pp. 223–243. [Google Scholar]
  33. Shafiq, M.; Tian, Z.; Bashir, A.K.; Du, X.; Guizani, M. CorrAUC: A malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J. 2020, 8, 3242–3254. [Google Scholar] [CrossRef]
  34. Shams, E.A.; Rizaner, A.; Ulusoy, A.H. A novel context-aware feature extraction method for convolutional neural network-based intrusion detection systems. Neural Comput. Appl. 2021, 33, 13647–13665. [Google Scholar] [CrossRef]
  35. Javeed, D.; Gao, T.; Khan, M.T. SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics 2021, 10, 918. [Google Scholar] [CrossRef]
  36. Zhang, H.; Zhao, Y. Vehicle Load Monitoring Method Based on NBIOT. In Proceedings of the 2022 5th International Symposium on Autonomous Systems (ISAS), Hangzhou, China, 8–10 April 2022; pp. 1–5. [Google Scholar]
  37. Chen, M.; Wang, T.; Zhang, S.; Liu, A. Deep reinforcement learning for computation offloading in mobile edge computing environment. Comput. Commun. 2021, 175, 1–12. [Google Scholar] [CrossRef]
  38. Tharewal, S.; Ashfaque, M.W.; Banu, S.S.; Uma, P.; Hassen, S.M.; Shabaz, M. Intrusion detection system for industrial Internet of Things based on deep reinforcement learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9023719. [Google Scholar] [CrossRef]
  39. Le, K.H.; Nguyen, M.H.; Tran, T.D.; Tran, N.D. IMIDS: An intelligent intrusion detection system against cyber threats in IoT. Electronics 2022, 11, 524. [Google Scholar] [CrossRef]
  40. Javeed, D.; Gao, T.; Khan, M.T.; Shoukat, D. A hybrid intelligent framework to combat sophisticated threats in secure industries. Sensors 2022, 22, 1582. [Google Scholar] [CrossRef] [PubMed]
  41. Alqahtani, A.S. FSO-LSTM IDS: Hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks. J. Supercomput. 2022, 78, 9438–9455. [Google Scholar] [CrossRef]
  42. Rehman, E.; Haseeb-ud-Din, M.; Malik, A.J.; Khan, T.K.; Abbasi, A.A.; Kadry, S.; Khan, M.A.; Rho, S. Intrusion detection based on machine learning in the internet of things, attacks and counter measures. J. Supercomput. 2022, 78, 8890–8924. [Google Scholar] [CrossRef]
  43. Awotunde, J.B.; Chakraborty, C.; Adeniyi, A.E. Intrusion detection in industrial internet of things network-based on deep learning model with rule-based feature selection. Wirel. Commun. Mob. Comput. 2021, 2021, 7154587. [Google Scholar] [CrossRef]
  44. Zhong, M.; Zhou, Y.; Chen, G. Sequential model based intrusion detection system for IoT servers using deep learning methods. Sensors 2021, 21, 1113. [Google Scholar] [CrossRef]
  45. Qaddoura, R.; Al-Zoubi, M.; Faris, H.; Almomani, I. A multi-layer classification approach for intrusion detection in iot networks based on deep learning. Sensors 2021, 21, 2987. [Google Scholar] [CrossRef] [PubMed]
  46. Rajadurai, H.; Gandhi, U.D. An empirical model in intrusion detection systems using principal component analysis and deep learning models. Comput. Intell. 2021, 37, 1111–1124. [Google Scholar] [CrossRef]
  47. Ge, M.; Syed, N.F.; Fu, X.; Baig, Z.; Robles-Kelly, A. Towards a deep learning-driven intrusion detection approach for Internet of Things. Comput. Netw. 2021, 186, 107784. [Google Scholar] [CrossRef]
  48. Qiu, H.; Dong, T.; Zhang, T.; Lu, J.; Memmi, G.; Qiu, M. Adversarial attacks against network intrusion detection in iot systems. IEEE Internet Things J. 2020, 8, 10327–10335. [Google Scholar] [CrossRef]
  49. Ferrag, M.A.; Maglaras, L.; Ahmim, A.; Derdour, M.; Janicke, H. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet 2020, 12, 44. [Google Scholar] [CrossRef] [Green Version]
  50. Gassais, R.; Ezzati-Jivan, N.; Fernandez, J.M.; Aloise, D.; Dagenais, M.R. Multi-level host-based intrusion detection system for Internet of things. J. Cloud Comput. 2020, 9, 1–16. [Google Scholar] [CrossRef]
  51. Thapa, N.; Liu, Z.; Kc, D.B.; Gokaraju, B.; Roy, K. Comparison of machine learning and deep learning models for network intrusion detection systems. Future Internet 2020, 12, 167. [Google Scholar] [CrossRef]
  52. Evain, E.; Sun, Y.; Faraz, K.; Garcia, D.; Saloux, E.; Gerber, B.L.; De Craene, M.; Bernard, O. Motion estimation by deep learning in 2D echocardiography: Synthetic dataset and validation. IEEE Trans. Med. Imaging 2022, 41, 1911–1924. [Google Scholar] [CrossRef]
  53. Mandal, S.; Roy, D.; Das, S. Prostate cancer: Cancer detection and classification using deep learning. In Advanced Machine Learning Approaches in Cancer Prognosis; Springer: Cham, Switzerland, 2021; pp. 375–394. [Google Scholar]
  54. Wang, L.; Han, M.; Li, X.; Zhang, N.; Cheng, H. Review of classification methods on unbalanced data sets. IEEE Access 2021, 9, 64606–64628. [Google Scholar] [CrossRef]
  55. Das, S.; Sengupta, S. Feature Extraction and Disease Prediction from Paddy Crops Using Data Mining Techniques. In Computational Intelligence in Pattern Recognition; Springer: Singapore, 2020; pp. 155–163. [Google Scholar]
  56. Alani, M.M. BotStop: Packet-based efficient and explainable IoT botnet detection using machine learning. Comput. Commun. 2022, 193, 53–62. [Google Scholar] [CrossRef]
  57. Abu Al-Haija, Q.; Al-Dala’ien, M.A. ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks. J. Sens. Actuator Netw. 2022, 11, 18. [Google Scholar] [CrossRef]
  58. Faysal, J.A.; Mostafa, S.T.; Tamanna, J.S.; Mumenin, K.M.; Arifin, M.M.; Awal, M.A.; Shome, A.; Mostafa, S.S. XGB-RF: A hybrid machine learning approach for IoT intrusion detection. Telecom 2022, 3, 52–69. [Google Scholar] [CrossRef]
  59. Nowroozi, E.; Mekdad, Y.; Berenjestanaki, M.H.; Conti, M.; Fergougui, A.E. Demystifying the transferability of adversarial attacks in computer networks. IEEE Trans. Netw. Serv. Manag. 2022, 19, 3387–3400. [Google Scholar] [CrossRef]
Figure 1. Work flow of proposed detection scheme.
Figure 1. Work flow of proposed detection scheme.
Sensors 22 09416 g001
Figure 2. Proposed network model.
Figure 2. Proposed network model.
Sensors 22 09416 g002
Figure 3. Validation accuracy vs. validation loss.
Figure 3. Validation accuracy vs. validation loss.
Sensors 22 09416 g003
Figure 4. Accuracy, precision, recall, and F1-score analysis.
Figure 4. Accuracy, precision, recall, and F1-score analysis.
Sensors 22 09416 g004
Figure 5. TPR, TNC, and MCC Analysis.
Figure 5. TPR, TNC, and MCC Analysis.
Sensors 22 09416 g005
Figure 6. FPR, FNR, FDR, and FOR analysis.
Figure 6. FPR, FNR, FDR, and FOR analysis.
Sensors 22 09416 g006
Figure 7. Confusion matrix analysis.
Figure 7. Confusion matrix analysis.
Sensors 22 09416 g007
Figure 8. ROC curve analysis.
Figure 8. ROC curve analysis.
Sensors 22 09416 g008
Figure 9. Testing time analysis.
Figure 9. Testing time analysis.
Sensors 22 09416 g009
Table 1. Existing literature.
Table 1. Existing literature.
Ref.YearProposed WorkClassifierDatasetLimitations
[38]2022A security mechanism is devised for anomaly detectionReLU PPO2Oakridge Lab datasetComputation overhead increases
[39]2022An analytical model is presented to filter organic traffic flowsCNNCICDS2017, UNSW-NB15Not suitable for resource-constrained environments
[40]2022A security framework is proposed for DOS detectionLSTMGRU, BLSN-BaIoTCommunicational delays experienced
[41]2022An efficient IDS is designed for industrial IoTLSTMUNSW-NB15, NSL-KDDAppropriate for small-scale networks only
[42]2022A malicious entity identification scheme is designed.CNNCICIDS2017Demands significant system resources
[43]2021An extensive intrusion detection mechanism is constitutedDNNNSL-KDD, UNSW-NB15Extensive latencies have been noticed
[44]2021A multilayer threat classification model is proposed GRUCNNADFA-LD,KDD99Complexities increases in large-scale industrial networks
[45]2021Suspicious events detection scheme is designedLSTM, SFLNIoT-ID20The communication stream is not stable
[46]2021A systematic approach is presented for abnormal traffic detectionPCA-DLN-BaIoTExtensive computational resources required
[47]2021A dynamic traffic analysis scheme is formulatedBinary, MulticlassBOT-IoTHighly resource consumptive
[48]2020An IDS is proposed for large-scale generic networksDNNMirari datasetNot efficient for medium-scale networks
 [49]2020A secure communication framework is designedForest PSBOT-IoT, CICIDS2017Computational overhead increases
[50]2020The threat identification and classification model is designedDT, MLP, LSTMCustomized datasetConsiderable increase in communication delays
[51]2020An extensive attacks analysis approach is proposed CARTCNNNSL-KDD, KDD-99Significantly complex for large-scale networks
Table 2. Proposed hybrid model details.
Table 2. Proposed hybrid model details.
AlgorithmLayersAFNeuronsOptimizerLFEpochsBatch-Size
Cu-DNNGRUDNN Layer (4)RELU(400, 300, 200, 50) CC-E
GRU LAYER (2)RELU(200, 100) CC-E
Dropout-(0.7)Adam 1532
Output Layer (1)Softmax(08)
Dense (2)-(200, 50)
Cu-LSTMDNNLSTM Layer (2)RELU(200, 100) CC-E
DNN Layer (4)RELU(400, 300, 200, 50) CC-E
Dropout-(0.7)Adam 1532
Dense (2)-(200, 50)
Output Layer (1)Softmax(08)
Cu-BLSTMBLSTM Layer (4)RELU(400, 300, 200, 100) CC-E
Output Layer (1)Softmax(08)
Dropout-(0.7)Adam 1532
Dense (2)-(200, 50)
Cu-GRUGRU Layer (4)RELU(400, 300, 200, 100) CC-E
Output Layer (1)Softmax(08)
Dropout-(0.7)Adam 1532
Dense (2)-(200, 50)
Table 3. N-BaIoT dataset details.
Table 3. N-BaIoT dataset details.
AttackAttack Instances
Normal61,400
Mirai Scan4200
Mirai UDP4161
Mirai Ack4153
Mirai SYN4200
Mirai UDP Plain4165
Gafgyt Junk4190
Gafgyt Combo4220
Gafgyt TCP4225
Total94,914
Table 4. Experimental setup.
Table 4. Experimental setup.
ProcessorI7 (3.33 GHz)
OS Windows10
RAM16 GB
LanguagePython
GPUGeforce-1060
IDESpyder
Generation8th
LibrariesNumpy, Tensorflow, Pandas, Keras, and Scikitlearn
Table 5. Class-wise detection accuracy.
Table 5. Class-wise detection accuracy.
ClassCu-DNNGRUCu-LSTMDNNCu-BLSTMCu-GRU
Normal99.92%99.15%98.96%98.69%
Mirai Scan99.86%97.79%97.29%98.51%
Mirai UDP98.89%98.62%97.61%98.12%
Mirai Ack99.71%97.43%98.10%98.68%
Mirai SYN99.68%98.81%97.62%98.25%
Mirai UDP Plain99.14%98.89%97.83%97.89%
Gafgyt Junk98.61%96.61%97.26%98.64%
Gift Combo99.85%97.90%98.15%97.68%
Gafgyt TCP99.12%97.36%97.25%98.36%
Table 6. Cross-validation results.
Table 6. Cross-validation results.
ParameterModelsF1F2F3F4F5F6F7F8F9F10
Accuracy (%)Cu-DNNGRU98.6198.8999.1499.1299.1499.8699.6899.7199.8599.92
Cu-LSTMDNN98.8997.4396.6197.3697.7998.9099.1598.8198.6297.90
Cu-BLSTM98.9698.1597.6297.2697.6197.2597.3197.8397.2998.10
Cu-GRU98.6897.6897.8998.6598.5198.2598.3698.1298.6498.69
Recall (%)Cu-DNNGRU99.6599.1599.3498.7298.6998.9498.2098.3198.8699.12
Cu-LSTMDNN99.1598.6998.4598.9498.7898.6598.1598.1497.5697.37
Cu-BLSTM98.2698.2698.1497.1997.3697.5397.4997.8397.9698.32
Cu-GRU98.5298.3498.9198.7998.8699.3598.6598.6198.6998.54
F-score (%)Cu-DNNGRU98.9999.4199.3499.1199.1198.8999.1499.2999.2499.81
Cu-LSTMDNN98.3298.1697.9397.8598.1998.9999.3699.5799.5799.61
Cu-BLSTM97.6597.8697.9597.8197.7397.4997.7299.1998.6497.53
Cu-GRU98.5498.8498.1798.2599.6599.5899.6198.9698.2198.49
Precision (%)Cu-DNNGRU98.2499.6499.1299.3699.5299.4199.4399.0898.4198.71
Cu-LSTMDNN98.6597.5697.3597.5697.5197.4697.197.2597.3698.42
Cu-BLSTM98.6598.6798.4698.6297.5197.5997.4397.3597.1697.35
Cu-GRU99.1598.4697.6997.5498.5398.1597.5698.3698.1398.69
Table 7. Comparison of the proposed model with recent threat detection approaches.
Table 7. Comparison of the proposed model with recent threat detection approaches.
Ref.ClassifierDatasetAccuracyPrecisionRecallF1-Score
P r o p o s e d Cu-DNNGRUN-BaIoT99.39%99.09%98.89%99.21%
[56]BotStopN-BaIoT99.01%99.02%98.82%98.09%
[57]ELBA-IoTN-BaIoT98.79%98.90%98.59%98.39%
[58]XGB-RFN-BaIoT99.22%98.99%99.78%99.09%
[59]CNNN-BaIoT99.16%98.97%99.63%99.04%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Attique, D.; Wang, H.; Wang, P. Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries. Sensors 2022, 22, 9416. https://doi.org/10.3390/s22239416

AMA Style

Attique D, Wang H, Wang P. Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries. Sensors. 2022; 22(23):9416. https://doi.org/10.3390/s22239416

Chicago/Turabian Style

Attique, Danish, Hao Wang, and Ping Wang. 2022. "Fog-Assisted Deep-Learning-Empowered Intrusion Detection System for RPL-Based Resource-Constrained Smart Industries" Sensors 22, no. 23: 9416. https://doi.org/10.3390/s22239416

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop