Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Tytuł pozycji:

Deep neural network-based clustering technique for secure IIoT.

Tytuł:
Deep neural network-based clustering technique for secure IIoT.
Autorzy:
Mukherjee, Amrit
Goswami, Pratik
Yang, Lixia
Sah Tyagi, Sumarga K.
Samal, U. C.
Mohapatra, S. K.
Temat:
SECURITY systems
DEEP learning
DATA security
INTERNET of things
Źródło:
Neural Computing & Applications; Oct2020, Vol. 32 Issue 20, p16109-16117, 9p
Czasopismo naukowe
The advent of Industrial Internet of Things (IIoT) has determined the proliferation of smart devices connected to the Internet and injected a vast amount of data into it, which may undergo many computational stages at several clusters. On the one hand, the benefits brought by these technologies are well known; however, in the envisaged scenario, the exposure of data, services and infrastructures to malicious attacks has definitely grown. Even a single breach on any of the links of the data–service–infrastructure chain may seriously compromise the security of the end-user application. Therefore, the logical and smart clustering while satisfying security and reliability is a key issue for IIoT networks. A novel clustering method proposed based on power demand assures security of data information in IIoT-based applications. First, security capacity of the system is calculated from mutual information of primary channel and eavesdropping channel. Then, under the maximum transmit power constraint, an optimal transmit power is found based on deep learning technique, which maximizes security capacity of the system. Finally, the network is clustered according to the calculated power demand. Experimental results accredit the proposed method has higher security and reliability, as well as lower network time overhead and power consumption. [ABSTRACT FROM AUTHOR]
Copyright of Neural Computing & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Zaloguj się, aby uzyskać dostęp do pełnego tekstu.

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies