S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar, M. Vigenesh
{"title":"优化自动分离联邦图神经网络与增强知名签名的基于信任的物联网路由攻击检测","authors":"S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar, M. Vigenesh","doi":"10.1002/ett.70158","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The term Internet-of-Things (IoT) refers to the interconnection of things to a physical network that is equipped with sensors, software, and other devices to share information among themselves. The objective of IoT is to enable objects to be accessible and interconnected through the internet. Thus, security for IoT devices is a significant problem because devices linked with the IoT network are resource-constrained. Also, exchanging information among nodes using internet attacks or insecure internet is aimed at destroying IoT standing Routing Protocol (RPL). To address those challenges, an Optimized auto Separate Federated Graph neural with enhanced well-known Signature trust-based Routing Protocol attack detection method (OSFG-SRPL) is proposed. It undergoes three stages such as behavior generation, sequence prediction, and trust analysis. Initially, double-layer angle multi-kernel extreme learning analysis and skill Fick's law optimization algorithms are proposed for the feature extraction and feature selection purpose. The trust evaluation is performed in terms of investigating the device's traffic flow and detecting its behavior deviations in the attack environment, which is called a sequence prediction issue. It is efficiently handled by the proposed auto Separate Osprey Federated Graph neural network with Node-level capsule Bi-directional Long Short-Term Memory (SOFG-NBiLSTM) network. Finally, the introduced approach predicts the traffic behavior based on historical behavior and deviation analysis, which is used for malicious node detection in the RPL attack scenario. The detection accuracy of the introduced system is 99.99% and 99.98% for the benchmark datasets RPL-NIDDS17 and RADAR, respectively, which is more efficient than the other methods.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimized Auto Separate Federated Graph Neural With Enhanced Well-Known Signature Trust-Based Routing Attacks Detection in Internet of Things\",\"authors\":\"S. Syed Jamaesha, M. S. Gowtham, M. Ramkumar, M. Vigenesh\",\"doi\":\"10.1002/ett.70158\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div>\\n \\n <p>The term Internet-of-Things (IoT) refers to the interconnection of things to a physical network that is equipped with sensors, software, and other devices to share information among themselves. The objective of IoT is to enable objects to be accessible and interconnected through the internet. Thus, security for IoT devices is a significant problem because devices linked with the IoT network are resource-constrained. Also, exchanging information among nodes using internet attacks or insecure internet is aimed at destroying IoT standing Routing Protocol (RPL). To address those challenges, an Optimized auto Separate Federated Graph neural with enhanced well-known Signature trust-based Routing Protocol attack detection method (OSFG-SRPL) is proposed. It undergoes three stages such as behavior generation, sequence prediction, and trust analysis. Initially, double-layer angle multi-kernel extreme learning analysis and skill Fick's law optimization algorithms are proposed for the feature extraction and feature selection purpose. The trust evaluation is performed in terms of investigating the device's traffic flow and detecting its behavior deviations in the attack environment, which is called a sequence prediction issue. It is efficiently handled by the proposed auto Separate Osprey Federated Graph neural network with Node-level capsule Bi-directional Long Short-Term Memory (SOFG-NBiLSTM) network. Finally, the introduced approach predicts the traffic behavior based on historical behavior and deviation analysis, which is used for malicious node detection in the RPL attack scenario. The detection accuracy of the introduced system is 99.99% and 99.98% for the benchmark datasets RPL-NIDDS17 and RADAR, respectively, which is more efficient than the other methods.</p>\\n </div>\",\"PeriodicalId\":23282,\"journal\":{\"name\":\"Transactions on Emerging Telecommunications Technologies\",\"volume\":\"36 5\",\"pages\":\"\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Transactions on Emerging Telecommunications Technologies\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/ett.70158\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70158","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Optimized Auto Separate Federated Graph Neural With Enhanced Well-Known Signature Trust-Based Routing Attacks Detection in Internet of Things
The term Internet-of-Things (IoT) refers to the interconnection of things to a physical network that is equipped with sensors, software, and other devices to share information among themselves. The objective of IoT is to enable objects to be accessible and interconnected through the internet. Thus, security for IoT devices is a significant problem because devices linked with the IoT network are resource-constrained. Also, exchanging information among nodes using internet attacks or insecure internet is aimed at destroying IoT standing Routing Protocol (RPL). To address those challenges, an Optimized auto Separate Federated Graph neural with enhanced well-known Signature trust-based Routing Protocol attack detection method (OSFG-SRPL) is proposed. It undergoes three stages such as behavior generation, sequence prediction, and trust analysis. Initially, double-layer angle multi-kernel extreme learning analysis and skill Fick's law optimization algorithms are proposed for the feature extraction and feature selection purpose. The trust evaluation is performed in terms of investigating the device's traffic flow and detecting its behavior deviations in the attack environment, which is called a sequence prediction issue. It is efficiently handled by the proposed auto Separate Osprey Federated Graph neural network with Node-level capsule Bi-directional Long Short-Term Memory (SOFG-NBiLSTM) network. Finally, the introduced approach predicts the traffic behavior based on historical behavior and deviation analysis, which is used for malicious node detection in the RPL attack scenario. The detection accuracy of the introduced system is 99.99% and 99.98% for the benchmark datasets RPL-NIDDS17 and RADAR, respectively, which is more efficient than the other methods.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications