Addressing Adversarial Attacks in IoT Using Deep Learning AI Models

被引:0
作者
Bommana, Sesibhushana Rao [1 ]
Veeramachaneni, Sreehari [2 ]
Ahmed, Syed Ershad [1 ]
Srinivas, M. B. [3 ]
机构
[1] BITS Pilani Hyderabad, EEE Dept, Hyderabad 500078, India
[2] Sri Sivasubramaniya Nadar Coll Engn, IT Dept, Chennai 603110, India
[3] Aditya Univ, ECE Dept, Kakinada 533437, Andhra Pradesh, India
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Internet of Things; Biological system modeling; Security; Feature extraction; Deep learning; Adaptation models; Filtering; Artificial intelligence; Data models; Accuracy; Adversarial attacks; IoT; CNN; INTERNET;
D O I
10.1109/ACCESS.2025.3552529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial attacks, specialized attacks, pose a severe threat to AI model performance in various applications, including the Internet of Things (IoT). Various defense mechanisms have been proposed to counter these attacks. However, their primary limitation lies in their inability to effectively handle broader datasets derived from diverse applications. In this study, we utilize multiple AI models with adaptive weights applied at different neural network layers to achieve enhanced performance and more robust results. This study introduces a novel AI-based deep learning model to detect adversarial threats within IoT systems, optimizing data preprocessing, feature extraction, and classification through a holistic approach. A three-stage filtering technique featuring Adaptive Weights was applied to enhance the data preprocessing efficiency. A two-level adaptive feature extraction strategy was utilized to maximize feature learning performance. This is refined using adaptive dilated enriched convolution operations, whereas statistical attributes are optimized through a Quantum-inspired Coati Optimization Algorithm (Q-COA). A dual system based on self-attention combines a Restricted Boltzmann Machine (RBM) with a Recurrent Convolutional Neural Network (RCNN). This configuration effectively identifies adversarial attacks by linking classifiers via a self-attention-driven weight-sharing mechanism. The proposed two-level weight-sharing approach surpasses conventional classifiers and achieves superior classification accuracy. This comprehensive Artificial Intelligence (AI) model significantly improves the preprocessing efficiency, feature learning performance, and classification accuracy, offering an innovative and robust solution for adversarial attack detection in IoT systems. The performance metric, Area Under the Curve (AUC), achieves values of 0.95 and 0.97 for two datasets using the proposed model, highlighting its effectiveness compared to the models in the comparison.
引用
收藏
页码:50437 / 50449
页数:13
相关论文
共 36 条
  • [1] Abrishamchi MAN, 2017, IEEE IND ELEC, P8144, DOI 10.1109/IECON.2017.8217429
  • [2] Deep learning and big data technologies for IoT security
    Amanullah, Mohamed Ahzam
    Habeeb, Riyaz Ahamed Ariyaluran
    Nasaruddin, Fariza Hanum
    Gani, Abdullah
    Ahmed, Ejaz
    Nainar, Abdul Salam Mohamed
    Akim, Nazihah Md
    Imran, Muhammad
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 495 - 517
  • [3] Enhancing IoT network security through deep learning-powered Intrusion Detection System
    Bakhsh, Shahid Allah
    Khan, Muhammad Almas
    Ahmed, Fawad
    Alshehri, Mohammed S.
    Ali, Hisham
    Ahmad, Jawad
    [J]. INTERNET OF THINGS, 2023, 24
  • [4] Balestriero R., 2022, arXiv, DOI DOI 10.48550/ARXIV.2209.14778
  • [5] Adversarial Attacks Against IoT Networks using Conditional GAN based Learning
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    Amhoud, El Mehdi
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2788 - 2793
  • [6] A wavelet denoising approach based on unsupervised learning model
    Bnou, Khawla
    Raghay, Said
    Hakim, Abdelilah
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2020, 2020 (01)
  • [7] Bohara M. H., 2021, Blockchain for 5G-Enabled IoT, DOI [10.1007/978-3-030-67490-813, DOI 10.1007/978-3-030-67490-813]
  • [8] RPL Attack Detection and Prevention in the Internet of Things Networks Using a GRU Based Deep Learning
    Cakir, Semih
    Toklu, Sinan
    Yalcin, Nesibe
    [J]. IEEE ACCESS, 2020, 8 : 183678 - 183689
  • [9] Coati Optimization Algorithm: A new bio-inspired metaheuristic algorithm for solving optimization problems
    Dehghani, Mohammad
    Montazeri, Zeinab
    Trojovska, Eva
    Trojovsky, Pavel
    [J]. KNOWLEDGE-BASED SYSTEMS, 2023, 259
  • [10] DENG G, 1993, NUCLEAR SCIENCE SYMPOSIUM & MEDICAL IMAGING CONFERENCE, VOLS 1-3, P1615, DOI 10.1109/NSSMIC.1993.373563