Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ IET Cyber-Physical S...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
IET Cyber-Physical Systems
Article . 2025 . Peer-reviewed
License: CC BY
Data sources: Crossref
DBLP
Article . 2025
Data sources: DBLP
versions View all 2 versions
addClaim

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

Authors: Siu Ting Tsoi; Anish Jindal;

CIDER: Cyber‐Security in Industrial IoT Using Deep Learning and Ring Learning with Errors

Abstract

ABSTRACT Traditional security measures such as access control and authentication need to be more effective against ever‐evolving threats. Moreover, security concerns increase as more industries shift towards adopting the industrial Internet of things (IIoT). Therefore, this paper proposes secure measures using deep machine learning‐based intrusion detection and advanced encryption schemes based on lattice‐based cryptography on three‐layered cloud‐edge‐fog IIoT architecture. The novelty of the paper is an integrated security framework for IIoT that combines deep learning‐based intrusion detection system (IDS) with lightweight cryptographic protocols. For deep learning, multi‐layer perception (MLP), convolutional neural network (CNN), and TabNet were implemented for intruder detection systems from edge to cloud layer, and ring learning with error (RLWE) was proposed for homomorphic encryption to communicate data between fog and edge layer. The evaluation experiments were performed on the Ton_IoT dataset and the results show that the deep learning models have a very good accuracy of around 92% for multiclass attack classification. Moreover, RLWE results show improved encryption time and reduced ciphertext size against standard Learning With Error encryption.

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
1
Average
Average
Average
gold
Related to Research communities