hh.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT
Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.ORCID iD: 0000-0003-3830-1151
Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.ORCID iD: 0000-0002-2279-592X
Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).ORCID iD: 0000-0001-6408-5152
Electronics and Communications Engineering Department, American University in Cairo, New Cairo, Egypt.
Show others and affiliations
2020 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 7, no 9, p. 8462-8471Article in journal (Refereed) Published
Abstract [en]

The accelerated move toward the adoption of the Industrial Internet-of-Things (IIoT) paradigm has resulted in numerous shortcomings as far as security is concerned. One of the IIoT affecting critical security threats is what is termed as the false data injection (FDI) attack. The FDI attacks aim to mislead the industrial platforms by falsifying their sensor measurements. FDI attacks have successfully overcome the classical threat detection approaches. In this article, we present a novel method of FDI attack detection using autoencoders (AEs). We exploit the sensor data correlation in time and space, which in turn can help identify the falsified data. Moreover, the falsified data are cleaned using the denoising AEs (DAEs). Performance evaluation proves the success of our technique in detecting FDI attacks. It also significantly outperforms a support vector machine (SVM)-based approach used for the same purpose. The DAE data cleaning algorithm is also shown to be very effective in recovering clean data from corrupted (attacked) data. © 2014 IEEE.

Place, publisher, year, edition, pages
Piscataway: Institute of Electrical and Electronics Engineers (IEEE), 2020. Vol. 7, no 9, p. 8462-8471
Keywords [en]
Correlation, Support vector machines, Security, Training, Noise reduction, Feature extraction, Autoencoders (AEs), false data injection (FDI) attacks, Industrial Internet-of-Things (IIoT) security, machine learning (ML), support vector machine (SVM)
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hh:diva-43561DOI: 10.1109/JIOT.2020.2991693ISI: 000571765000052Scopus ID: 2-s2.0-85090794242OAI: oai:DiVA.org:hh-43561DiVA, id: diva2:1505083
Funder
The Swedish Foundation for International Cooperation in Research and Higher Education (STINT), IB2018-7469Available from: 2020-11-30 Created: 2020-11-30 Last updated: 2020-11-30Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Eldefrawy, Mohamed Hamdy

Search in DiVA

By author/editor
Aboelwafa, Mariam M. N.Seddik, Karim G.Eldefrawy, Mohamed HamdyGidlund, Mikael
By organisation
Centre for Research on Embedded Systems (CERES)
In the same journal
IEEE Internet of Things Journal
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 616 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf