Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions

[1]  Fadi Al-Turjman,et al.  Machine learning for wearable IoT‐based applications: A survey , 2019, Trans. Emerg. Telecommun. Technol..

[2]  Lav Gupta,et al.  Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things , 2019, IEEE Internet of Things Journal.

[3]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[4]  K. Werbach The Blockchain and the New Architecture of Trust , 2018 .

[5]  Ali A. Ghorbani,et al.  Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization , 2018, ICISSP.

[6]  Martin A. Riedmiller,et al.  Advanced supervised learning in multi-layer perceptrons — From backpropagation to adaptive learning algorithms , 1994 .

[7]  Roberto Therón,et al.  UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs , 2018, Comput. Secur..

[8]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[9]  Michael J. Coblenz Obsidian: A Safer Blockchain Programming Language , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).

[10]  Abdelmadjid Bouabdallah,et al.  TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[11]  Salil S. Kanhere,et al.  BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.

[12]  Robert C. Atkinson,et al.  Threat analysis of IoT networks using artificial neural network intrusion detection system , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[13]  Shu Yang,et al.  A survey on application of machine learning for Internet of Things , 2018, International Journal of Machine Learning and Cybernetics.

[14]  Fadi Al-Turjman,et al.  Task scheduling in cloud‐based survivability applications using swarm optimization in IoT , 2018, Trans. Emerg. Telecommun. Technol..

[15]  Deepak Gupta,et al.  An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy , 2020, Future Gener. Comput. Syst..

[16]  John S. Baras,et al.  Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[17]  Sherali Zeadally,et al.  Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 , 2018, IEEE Transactions on Industrial Informatics.

[18]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[19]  Jugal K. Kalita,et al.  Towards Generating Real-life Datasets for Network Intrusion Detection , 2015, Int. J. Netw. Secur..

[20]  Walid Saad,et al.  Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things , 2017, 2018 IEEE International Conference on Communications (ICC).

[21]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[22]  Chong Kuan Chen,et al.  IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.

[23]  Deepak Gupta,et al.  Automated detection and classification of fundus diabetic retinopathy images using synergic deep learning model , 2020, Pattern Recognit. Lett..

[24]  Hsiao-Hwa Chen,et al.  An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.

[25]  Deepak Kumar Sharma,et al.  A Machine Learning Approach Using Classifier Cascades for Optimal Routing in Opportunistic Internet of Things Networks , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[26]  Salim Hariri,et al.  Anomaly behavior analysis for IoT sensors , 2018, Trans. Emerg. Telecommun. Technol..

[27]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[28]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[29]  Saakshi Bhargava,et al.  Internet of Things and Blockchain: Integration, Need, Challenges, Applications, and Future Scope , 2020 .

[30]  Hwee Pink Tan,et al.  Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications , 2014, IEEE Communications Surveys & Tutorials.

[31]  Deepak Kumar Sharma,et al.  IoT Architecture for Preventive Energy Conservation of Smart Buildings , 2019, Energy Conservation for IoT Devices.

[32]  Mohamed Hamdi,et al.  Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).

[33]  Andrei Petrovski,et al.  Botnet Detection in the Internet of Things using Deep Learning Approaches , 2018, 2018 International Joint Conference on Neural Networks (IJCNN).

[34]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[35]  Joel J. P. C. Rodrigues,et al.  Adapting weather conditions based IoT enabled smart irrigation technique in precision agriculture mechanisms , 2018, Neural Computing and Applications.

[36]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[37]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[38]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[39]  Samuel Greengard,et al.  The Internet of Things , 2015 .

[40]  Deepak Kumar Sharma,et al.  Cryptocurrency Mechanisms for Blockchains: Models, Characteristics, Challenges, and Applications , 2020 .

[41]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[42]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[43]  Amit Kumar Jaiswal,et al.  Identifying pneumonia in chest X-rays: A deep learning approach , 2019, Measurement.

[44]  Ashish Khanna,et al.  Immigration Control and Management System Using Blockchain , 2020, SSRN Electronic Journal.