dc.contributor.author | Yılmaz, Selim | |
dc.contributor.author | Aydoğan, Emre | |
dc.contributor.author | Şen, Sevil | |
dc.date.accessioned | 2021-09-23T11:10:47Z | |
dc.date.available | 2021-09-23T11:10:47Z | |
dc.date.issued | 2021 | en_US |
dc.identifier.citation | [1]S. Yilmaz, E. Aydogan, and S. Sen, “A Transfer Learning Approach for Securing Resource-Constrained IoT Devices”, IEEE Transactions on Information Forensics and Security, vol. 16, pp. 4405–4418, 2021. | en_US |
dc.identifier.issn | 1556-6013 | |
dc.identifier.issn | 1556-6021 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12809/9550 | |
dc.description.abstract | In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order to explore the complex characteristics of IoT, machine learning methods, which rely on long training time to generate intrusion detection models, are proposed in the literature. Furthermore, these systems need to learn a new/fresh model from scratch when the environment changes. This study explores the use of transfer learning in order to generate intrusion detection algorithms for such dynamically changing IoT. Transfer learning is an approach that stores knowledge learned from a problem domain/task and applies that knowledge to another problem domain/task. Here, it is employed in the following two settings: transferring knowledge for generating suitable intrusion algorithms for new devices, transferring knowledge for detecting new types of attacks. In this study, Routing Protocol for Low-Power and Lossy Network (RPL), a routing protocol for resource-constrained wireless networks, is used as an exemplar protocol and specific attacks against RPL are targeted. The experimental results show that the transfer learning approach gives better performance than the traditional approach. Moreover, the proposed approach significantly reduces learning time, which is an important factor for putting devices/networks in operation in a timely manner. Even though transfer learning has been considered a potential candidate for improving IoT security, to the best of our knowledge, this is the first application of transfer learning under these two settings in RPL-based IoT networks. | en_US |
dc.item-language.iso | eng | en_US |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | en_US |
dc.relation.isversionof | 10.1109/TIFS.2021.3096029 | en_US |
dc.item-rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | IoT | en_US |
dc.subject | Security | en_US |
dc.subject | Transfer learning | en_US |
dc.subject | Intrusion detection | en_US |
dc.subject | Genetic programming | en_US |
dc.subject | RPL. | en_US |
dc.title | A Transfer Learning Approach for Securing Resource-Constrained IoT Devices | en_US |
dc.item-type | article | en_US |
dc.contributor.department | MÜ, Mühendislik Fakültesi, Yazılım Mühendisliği Bölümü | en_US |
dc.contributor.authorID | 0000-0002-9516-6892 | en_US |
dc.contributor.institutionauthor | Yılmaz, Selim | |
dc.identifier.volume | 16 | en_US |
dc.identifier.startpage | 4405 | en_US |
dc.identifier.endpage | 4418 | en_US |
dc.relation.journal | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | en_US |
dc.relation.publicationcategory | Rapor | en_US |