New Advances in Robust Deep-Learning-Based Intrusion Detection and Blockchain Security for IoT

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Network Science".

Deadline for manuscript submissions: closed (30 April 2024) | Viewed by 2182

Special Issue Editors


E-Mail Website
Guest Editor
Network Security Lab, Computer Science and Information Engineering, National Taipei University, New Taipei 237, Taiwan
Interests: intrusion detection; deep learning; blockchain; Internet of Things; network

E-Mail Website
Guest Editor
Computer Center, National Taipei University, New Taipei City 237303, Taiwan
Interests: network security; security topics in operating systems; applied cryptography; information security management; computer networks

Special Issue Information

Dear Colleagues,

Deep learning has become one of the most rapidly growing fields and constantly provides many new and advanced models for intrusion detection in the context of the Internet of Things (IoT), especially with regard to defending large-scale IoT devices against various kinds of network attacks. Deep learning models require high-quality datasets for high accuracy classification. However, many IoT intrusion detection datasets consist of discrete numbers and potentially contain more noise than image-based datasets. Thus, the development of advanced data quality enhancement mechanisms is desirable for robust intrusion detection models. In addition, such robust detection models require adversarial attack defenses. Moreover, due to the distributed design of IoT environments, a blockchain is suitable for the distributed security protection of IoT together with deep-learning-based intrusion detection for IoT security.

This Special Issue invites research or review papers on new, advanced, and robust deep-learning-based intrusion detection and blockchain security protection systems for IoT environments. Robust deep-learning-based intrusion detection may involve data quality enhancement and feature selection or extraction. As self-supervised learning and contrastive learning have successfully improved the classification quality of image-based datasets, they offer great potential for improving intrusion detection accuracy. Regarding the detection of adversarial attacks, generative adversarial networks have also become attractive detection solutions for images, so they may be suitable for application to the numeric datasets of intrusion detection. In IoT-distributed environments, the design of blockchain is suitable as a secure distributed ledger offering non-reputable and secure transfer characteristics. Distributed deep learning models such as federated learning can be effectively employed alongside blockchain as a hybrid security defense for IoT-distributed environments.

Examples of some topics of interest are as follows:

  • Deep learning
  • Intrusion detection
  • Data quality enhancement
  • Feature selection or extraction
  • Self-supervised learning
  • Contrastive learning
  • Adversarial attack detection
  • Generative adversarial networks
  • Blockchain
  • Federated learning

Dr. Chinyang Henry Tseng
Prof. Dr. Woei-Jiunn Tsaur
Prof. Dr. Hsing-Chung Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

26 pages, 6424 KiB  
Article
Enhancing IoT Security: A Few-Shot Learning Approach for Intrusion Detection
by Theyab Althiyabi, Iftikhar Ahmad and Madini O. Alassafi
Mathematics 2024, 12(7), 1055; https://doi.org/10.3390/math12071055 - 31 Mar 2024
Cited by 2 | Viewed by 1481
Abstract
Recently, the number of Internet of Things (IoT)-connected devices has increased daily. Consequently, cybersecurity challenges have increased due to the natural diversity of the IoT, limited hardware resources, and limited security capabilities. Intrusion detection systems (IDSs) play a substantial role in securing IoT [...] Read more.
Recently, the number of Internet of Things (IoT)-connected devices has increased daily. Consequently, cybersecurity challenges have increased due to the natural diversity of the IoT, limited hardware resources, and limited security capabilities. Intrusion detection systems (IDSs) play a substantial role in securing IoT networks. Several researchers have focused on machine learning (ML) and deep learning (DL) to develop intrusion detection techniques. Although ML is good for classification, other methods perform better in feature transformation. However, at the level of accuracy, both learning techniques have their own certain compromises. Although IDSs based on ML and DL methods can achieve a high detection rate, the performance depends on the training dataset size. Incidentally, collecting a large amount of data is one of the main drawbacks that limits performance when training datasets are lacking, and such methods can fail to detect novel attacks. Few-shot learning (FSL) is an emerging approach that is employed in different domains because of its proven ability to learn from a few training samples. Although numerous studies have addressed the issues of IDSs and improved IDS performance, the literature on FSL-based IDSs is scarce. Therefore, an investigation is required to explore the performance of FSL in IoT IDSs. This work proposes an IoT intrusion detection model based on a convolutional neural network as a feature extractor and a prototypical network as an FSL classifier. The empirical results were analyzed and compared with those of recent intrusion detection approaches. The accuracy results reached 99.44%, which shows a promising direction for involving FSL in IoT IDSs. Full article
Show Figures

Figure 1

Back to TopTop