An Examination of the Secure Chaos of 5G Wireless Communication Based on the Intelligent Internet of Things

(1) * Janan Farag Yonan Mail (Ministry of Higher Education and Scientific Research, Iraq)
*corresponding author

Abstract


The implementation of an intelligent system for network control and monitoring that is built on an Internet of Things (IoT) is a focus of this line of research, with the end objective of improving the level of precision inside the network and its applications. You did indeed read it correctly; the system that is being referred to here is a deep neural network. The manner that it is constructed makes it possible for the layer that cannot be seen to contain more data. The application of element-modified deep learning and network buffer capacity control helps to improve the overall service quality that is provided by each sensor node. One method that can be applied to the process of instructing a machine to pay more attention includes deep learning in its various incarnations. The team was able to do calculations with a precision of 96.68 percent and the quickest execution time, thanks to the usage of wireless sensors. Using a sensor-based technique that has a brief implementation period, this piece has a degree of accuracy of 97.69 % when it comes to detecting and classifying proxies, and it does so using a method that is very efficient. On the other hand, our research represents a significant leap forward in comparison to earlier studies due to the fact that we were able to accurately identify and categorize a wide variety of invasions and real-time proxies.

Keywords


Deep learning; Intelligent-IoT; DNN; WSN

   

DOI

https://doi.org/10.31763/ijrcs.v2i4.769
      

Article metrics

10.31763/ijrcs.v2i4.769 Abstract views : 1051 | PDF views : 300

   

Cite

   

Full Text

Download

References


[1] K. Haseeb, N. Islam, A. Almogren, and I. U. Din, “Intrusion prevention framework for secure routing in wsn-based mobile internet of things,” IEEE Access, vol. 7, pp. 185496–185505, 2019, https://doi.org/10.1109/ACCESS.2019.2960633.

[2] O. B. Mora-Sánchez, E. López-Neri, E. J. Cedillo-Elias, E. Aceves-Martínez, and V. M. Larios, “Validation of IoT infrastructure for the construction of smart cities solutions on living lab platform,” IEEE Transactions on Engineering Management, vol. 68, no. 3, pp. 899-908, 2021, https://doi.org/10.1109/TEM.2020.3002250.

[3] M. Murad, O. Bayat, and H. M. Marhoon, "Design and implementation of a smart home system with two levels of security based on IoT technology," Indonesian Journal of Electrical Engineering and Computer Science, vol. 21, no.1, pp. 546-557, 2021, https://doi.org/10.11591/ijeecs.v21.i1.pp546-557.‏

[4] H. M. Marhoon, M. I. Mahdi, E. D. Hussein, and A. R. Ibrahim, "Designing and implementing applications of smart home appliances," Modern Applied Science, vol. 12, no. 12, pp. 8-17, 2018, https://doi.org/10.5539/mas.v12n12p8.‏

[5] M. Shobana and S. Poonkuzhali, “A novel approach to detect IoT malware by system calls using deep learning techniques,” 2020 International Conference on Innovative Trends in Information Technology (ICITIIT), pp. 1–5, 2020, https://doi.org/10.1109/ICITIIT49094.2020.9071531.

[6] F. Hussain, S. A. Hassan, R. Hussain, and E. Hossain, “Machine learning for resource management in cellular and IoT networks: Potentials, current solutions, and open challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1251-1275, 2020, https://doi.org/10.1109/COMST.2020.2964534.

[7] S. Yao, Y. Zhao, A. Zhang, S. Hu, H. Shao, C. Zhang, L. Su, and T. Abdelzaher, “Deep learning for the internet of things,” Computer, vol. 51, no. 5, pp. 32–41, 2018, https://doi.org/10.1109/MC.2018.2381131.

[8] Y. Choi, M. El-Khamy, and J. Lee, “Universal deep neural network compression,” IEEE Journal of Selected Topics in Signal Processing, vol. 14, no. 4, pp. 715-726, 2020, https://doi.org/10.1109/JSTSP.2020.2975903.

[9] S. Otoum, B. Kantarci, and H. T. Mouftah, “On the feasibility of deep learning in sensor network intrusion detection,” IEEE Networking Letters, vol. 1, no. 2, pp. 68–71, 2019, https://doi.org/10.1109/LNET.2019.2901792.

[10] W. Lee, M. Kim, and D.-H. Cho, “Deep cooperative sensing: Cooperative spectrum sensing based on convolutional neural networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 3005–3009, 2019, https://doi.org/10.1109/TVT.2019.2891291.

[11] A. Singh, S. Rathkanthiwar, and S. Kakde, “Leach based-energy efficient routing protocol for wireless sensor networks,” 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 4654–4658, 2016, https://doi.org/10.1109/ICEEOT.2016.7755602.

[12] M. M. Rashid and N. A. S. Al-Jamali, “Modified w-leach protocol in wireless sensor network,” Journal of Engineering, vol. 25, no. 3, pp. 68–80, 2019, https://doi.org/10.31026/j.eng.2019.03.06.

[13] J. Guo, C.-K. Wen, S. Jin, and G. Y. Li, “Convolutional neural network based multiple-rate compressive sensing for massive mimo CSI feedback: Design, simulation, and analysis,” IEEE Transactions on Wireless Communications, vol. 19, no. 4, pp. 2827-2840, 2020, https://doi.org/10.1109/TWC.2020.2968430.

[14] A. Mukherjee, P. Goswami, L. Yang, S. K. S. Tyagi, U. C. Samal, and S. K. Mohapatra, “Deep neural network-based clustering technique for secure IIOT,” Neural Computing and Applications, vol. 32, no. 20, pp. 16109–16117, 2020, https://doi.org/10.1007/s00521-020-04763-4.

[15] L. Mou, L. Bruzzone, and X. X. Zhu, “Learning spectral-spatial-temporal features via a recurrent convolutional neural network for change detection in multispectral imagery,” IEEE Transactions on Geoscience and Remote Sensing, vol. 57, no. 2, pp. 924–935, 2019, https://doi.org/10.1109/TGRS.2018.2863224.

[16] A. Sonny, P. K. Rai, A. Kumar, and M. Z. A. Khan, “Deep learning-based smart parking solution using channel state information in lte-based cellular networks,” 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), pp. 642–645, 2020, https://doi.org/10.1109/COMSNETS48256.2020.9027447.

[17] A. Belmonte-Hernández, G. Hernández-Peñaloza, D. M. Gutiérrez, and F. Álvarez, “Recurrent model for wireless indoor tracking and positioning recovering using generative networks,” IEEE Sensors Journal, vol. 20, no. 6, pp. 3356-3365, 2019, https://doi.org/10.1109/JSEN.2019.2958201.

[18] R. Yang, L. Feng, H. Wang, J. Yao, and S. Luo, “Parallel recurrent convolutional neural networks-based music genre classification method for mobile devices,” IEEE Access, vol. 8, pp. 19629–19637, 2020, https://doi.org/10.1109/ACCESS.2020.2968170.

[19] X. Zhang, Y. Dong, L. Wen, F. Lu, and W. Li, “Remaining useful life estimation based on a new convolutional and recurrent neural network,” 2019 IEEE 15th International Conference on Automation Science and Engineering (CASE), pp. 317–322, 2019, https://doi.org/10.1109/COASE.2019.8843078.

[20] M. Farsi, M. Badawy, M. Moustafa, H. A. Ali, and Y. Abdulazeem, “A congestion-aware clustering and routing (CCR) protocol for mitigating congestion in wsn,” IEEE Access, vol. 7, pp. 105402–105419, 2019, https://doi.org/10.1109/ACCESS.2019.2932951.

[21] A. Mukherjee, D. K. Jain, P. Goswami, Q. Xin, L. Yang, and J. J. Rodrigues, “Back propagation neural network based cluster head identification in mimo sensor networks for Intelligent Transportation Systems," IEEE Access, vol. 8, pp. 28524-28532, 2020, https://doi.org/10.1109/ACCESS.2020.2971969.

[22] S. Balakrishna, M. Thirumaran, V. K. Solanki, “IoT sensor data integration in healthcare using semantics and machine learning approaches,” A handbook of internet of things in biomedical and cyber physical system, pp. 275–300, 2020, https://doi.org/10.1007/978-3-030-23983-1_11.

[23] M. Shen, Y. Deng, L. Zhu, X. Du, and N. Guizani, “Privacy-preserving image retrieval for medical IoT systems: A blockchain-based approach,” IEEE Network, vol. 33, no. 5, pp. 27–33, 2019, https://doi.org/10.1109/MNET.001.1800503.

[24] A. Rahman, M. S. Hossain, N. A. Alrajeh, and F. Alsolami, “Adversarial examples–security threats to covid-19 deep learning systems in medical IoT devices,” IEEE Internet of Things Journal, vol. 8, no 12, pp. 9603-9610, 2021, https://doi.org/10.1109/JIOT.2020.3013710.

[25] Z. Yang, Q. Zhou, L. Lei, K. Zheng, and W. Xiang, “An IoT-cloud based wearable ECG monitoring system for smart healthcare,” Journal of medical systems, vol. 40, no. 12, 2016, https://doi.org/10.1007/s10916-016-0644-9.

[26] W.-J. Hu, J. Fan, Y.-X. Du, B.-S. Li, N. Xiong, and E. Bekkering, “Mdfc–resnet: An agricultural IoT system to accurately recognize crop diseases,” IEEE Access, vol. 8, pp. 115287–115298, 2020, https://doi.org/10.1109/ACCESS.2020.3001237.

[27] L. Zhou, Z. Qiu, and Y. He, “Application of WeChat mini-program and wi-fi soc in agricultural IoT: A low-cost greenhouse monitoring system,” Transactions of the ASABE, vol. 63, no. 2, pp. 325–337, 2020, https://doi.org/10.13031/trans.13499.

[28] F. Zantalis, G. Koulouras, S. Karabetsos, and D. Kandris, “A review of machine learning and IoT in smart transportation,” Future Internet, vol. 11, no. 4, p. 94, 2019, https://doi.org/10.3390/fi11040094.

[29] D. Rahbari and M. Nickray, “Low-latency and energy-efficient scheduling in fog-based IoT applications,” Turkish Journal of Electrical Engineering Computer Sciences, vol. 27, no. 2, pp. 1406–1427, 2019, https://doi.org/10.3906/elk-1810-47.

[30] H. Nasiri, S. Nasehi, and M. Goudarzi, “Evaluation of distributed stream processing frameworks for IoT applications in smart cities,” Journal of Big Data, vol. 6, no. 1, 2019, https://doi.org/10.1186/s40537-019-0215-2.

[31] M.-D. Gonzalez-Zamar, E. Abad-Segura, E. Vazquez-Cano, and E. Lopez- Meneses, “IoT technology applications-based smart cities: Research analysis,” Electronics, vol. 9, no. 8, p. 1246, 2020, https://doi.org/10.3390/electronics9081246.

[32] B. Zhang, W. Hu, D. Cao, Q. Huang, Z. Chen, and F. Blaabjerg, “Deep reinforcement learning–based approach for optimizing energy conversion in integrated electrical and heating system with renewable energy,” Energy Convers. Manag, vol. 202, p. 112199, 2019, https://doi.org/10.1016/j.enconman.2019.112199.

[33] H. Guangjie, W. Shen, T. Q. Duong, M. Guizani, and T. Hara, “A proposed security scheme against Denial of service attacks in cluster‐based wireless sensor networks,” Security Comm. Networks, vol. 7, pp. 2542– 2554, 2014, https://doi.org/10.1002/sec.373.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Janan Farag Yonan

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


About the JournalJournal PoliciesAuthor Information

International Journal of Robotics and Control Systems
e-ISSN: 2775-2658
Website: https://pubs2.ascee.org/index.php/IJRCS
Email: ijrcs@ascee.org
Organized by: Association for Scientific Computing Electronics and Engineering (ASCEE)Peneliti Teknologi Teknik IndonesiaDepartment of Electrical Engineering, Universitas Ahmad Dahlan and Kuliah Teknik Elektro
Published by: Association for Scientific Computing Electronics and Engineering (ASCEE)
Office: Jalan Janti, Karangjambe 130B, Banguntapan, Bantul, Daerah Istimewa Yogyakarta, Indonesia