Basit öğe kaydını göster

dc.contributor.authorYılmaz, Selim
dc.contributor.authorAydoğan, Emre
dc.contributor.authorŞen, Sevil
dc.date.accessioned2021-09-23T11:10:47Z
dc.date.available2021-09-23T11:10:47Z
dc.date.issued2021en_US
dc.identifier.citation[1]S. Yilmaz, E. Aydogan, and S. Sen, “A Transfer Learning Approach for Securing Resource-Constrained IoT Devices”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4405–4418, 2021.en_US
dc.identifier.issn1556-6013
dc.identifier.issn1556-6021
dc.identifier.urihttps://hdl.handle.net/20.500.12809/9550
dc.description.abstractIn recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order to explore the complex characteristics of IoT, machine learning methods, which rely on long training time to generate intrusion detection models, are proposed in the literature. Furthermore, these systems need to learn a new/fresh model from scratch when the environment changes. This study explores the use of transfer learning in order to generate intrusion detection algorithms for such dynamically changing IoT. Transfer learning is an approach that stores knowledge learned from a problem domain/task and applies that knowledge to another problem domain/task. Here, it is employed in the following two settings: transferring knowledge for generating suitable intrusion algorithms for new devices, transferring knowledge for detecting new types of attacks. In this study, Routing Protocol for Low-Power and Lossy Network (RPL), a routing protocol for resource-constrained wireless networks, is used as an exemplar protocol and specific attacks against RPL are targeted. The experimental results show that the transfer learning approach gives better performance than the traditional approach. Moreover, the proposed approach significantly reduces learning time, which is an important factor for putting devices/networks in operation in a timely manner. Even though transfer learning has been considered a potential candidate for improving IoT security, to the best of our knowledge, this is the first application of transfer learning under these two settings in RPL-based IoT networks.en_US
dc.item-language.isoengen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.relation.isversionof10.1109/TIFS.2021.3096029en_US
dc.item-rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectIoTen_US
dc.subjectSecurityen_US
dc.subjectTransfer learningen_US
dc.subjectIntrusion detectionen_US
dc.subjectGenetic programmingen_US
dc.subjectRPL.en_US
dc.titleA Transfer Learning Approach for Securing Resource-Constrained IoT Devicesen_US
dc.item-typearticleen_US
dc.contributor.departmentMÜ, Mühendislik Fakültesi, Yazılım Mühendisliği Bölümüen_US
dc.contributor.authorID0000-0002-9516-6892en_US
dc.contributor.institutionauthorYılmaz, Selim
dc.identifier.volume16en_US
dc.identifier.startpage4405en_US
dc.identifier.endpage4418en_US
dc.relation.journalIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYen_US
dc.relation.publicationcategoryRaporen_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster