{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T13:07:25Z","timestamp":1776776845670,"version":"3.51.2"},"reference-count":24,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T00:00:00Z","timestamp":1638921600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, and priority violation attack. The created method classifies the transmission outcomes used to predict the transmission state, whether it is jam data transmission or sensing data. After that, the sensing data is applied for network training that predicts the intermediate attacks. In addition to this, the channel access algorithm is used to validate the channel for every access that minimizes unauthorized access. After validating the channel according to the neural network, data have been transmitted over the network. The defined process is implemented, and the system minimizes different attacks on various levels of energy consumption. The effectiveness of the system is implemented using TensorFlow, and the system ensures the 99.02% of detection rate when compared with other techniques.<\/jats:p>","DOI":"10.1515\/jisys-2021-0173","type":"journal-article","created":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T22:49:15Z","timestamp":1639003755000},"page":"95-103","source":"Crossref","is-referenced-by-count":14,"title":["IoT network security using autoencoder deep neural network and channel access algorithm"],"prefix":"10.1515","volume":"31","author":[{"given":"Saif Mohammed","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Computer Science, Dijlah University College , Baghdad , Iraq"}]},{"given":"Amer S.","family":"Elameer","sequence":"additional","affiliation":[{"name":"Biomedical Informatics College, University of Information Technology and Communications (UOITC) , Baghdad , Iraq"}]},{"given":"Mustafa Musa","family":"Jaber","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Dijlah University College , Baghdad , Iraq"},{"name":"Department of Computer Science, Al-Turath University College , Baghdad , Iraq"}]}],"member":"374","published-online":{"date-parts":[[2021,12,8]]},"reference":[{"key":"2025120523411442247_j_jisys-2021-0173_ref_001","doi-asserted-by":"crossref","unstructured":"Hasan M, Islam MM, Zarif MI, Hashem MM. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things. 2019;7:100059.","DOI":"10.1016\/j.iot.2019.100059"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_002","doi-asserted-by":"crossref","unstructured":"Hussain F, Abbas SG, Shah GA, Pires IM, Fayyaz UU, Shahzad F, et al. A framework for malicious traffic detection in IoT healthcare environment. Sensors. 2021;21(9):3025.","DOI":"10.3390\/s21093025"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_003","doi-asserted-by":"crossref","unstructured":"Hafeez I, Ding AY, Antikainen M, Tarkoma S. Real-time IoT device activity detection in edge networks. In International Conference on Network and System Security. Cham: Springer; 2018. p. 221\u201336.","DOI":"10.1007\/978-3-030-02744-5_17"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_004","doi-asserted-by":"crossref","unstructured":"Dian FJ, Vahidnia R, Rahmati A. Wearables and the internet of things (IoT), applications, opportunities, and challenges: a survey. IEEE Access. 2020;8:69200\u201311.","DOI":"10.1109\/ACCESS.2020.2986329"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_005","unstructured":"Bughin J, Chui M, Manyika J. Clouds, big data, and smart assets: Ten tech-enabled business trends to watch. McKinsey Q. 2010;56(1):75\u201386."},{"key":"2025120523411442247_j_jisys-2021-0173_ref_006","doi-asserted-by":"crossref","unstructured":"Alfandi O, Khanji S, Ahmad L, Khattak A. A survey on boosting IoT security and privacy through blockchain. Clust Comput. 2020;24(1):1\u201319.","DOI":"10.1007\/s10586-020-03137-8"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_007","doi-asserted-by":"crossref","unstructured":"Mohanta BK, Jena D, Ramasubbareddy S, Daneshmand M, Gandomi AH. Addressing security and privacy issues of IoT using blockchain technology. IEEE Internet Things J. 2020;8(2):881\u20138.","DOI":"10.1109\/JIOT.2020.3008906"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_008","doi-asserted-by":"crossref","unstructured":"Reddy YB, Latifi S. Trust and access controls in IoT to avoid malicious activity. In: Cloud Network Management. London, UK: Chapman and Hall\/CRC; 2020. p. 87\u2013103.","DOI":"10.1201\/9780429288630-6"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_009","doi-asserted-by":"crossref","unstructured":"Bhatt P, Bhatt S, Ko M. Poster: IoT SENTINEL-An ABAC approach against cyber-warfare in organizations. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies; 2020. p. 223\u20135.","DOI":"10.1145\/3381991.3396227"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_010","doi-asserted-by":"crossref","unstructured":"Islam MR, Aktheruzzaman KM. An analysis of cybersecurity attacks against internet of things and security solutions. J Computer Commun 2020;8(4):11\u201325.","DOI":"10.4236\/jcc.2020.84002"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_011","doi-asserted-by":"crossref","unstructured":"Fan R, Pan J, Huang S. ARM-AFL: coverage-guided fuzzing framework for ARM-based IoT devices. In: International Conference on Applied Cryptography and Network Security. Cham: Springer; 2020. p. 239\u201354.","DOI":"10.1007\/978-3-030-61638-0_14"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_012","unstructured":"Alferidah DK, Jhanjhi NZ. A review on security and privacy issues and challenges in internet of things. Int J Computer Sci Netw Security IJCSNS. 2020;20(4):263\u201386."},{"key":"2025120523411442247_j_jisys-2021-0173_ref_013","doi-asserted-by":"crossref","unstructured":"Waheed N, He X, Ikram M, Usman M, Hashmi SS, Usman M. Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput Surv (CSUR). 2020;53(6):1\u201337.","DOI":"10.1145\/3417987"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_014","doi-asserted-by":"crossref","unstructured":"Chanal PM, Kakkasageri MS. Security and privacy in IOT: a survey. Wirel Personal Commun. 2020;115(2):1667\u201393.","DOI":"10.1007\/s11277-020-07649-9"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_015","doi-asserted-by":"crossref","unstructured":"Chen YW, Sheu JP, Kuo YC, Van Cuong N. Design and implementation of IoT DDoS attacks detection system based on machine learning. In: 2020 European Conference on Networks and Communications (EuCNC). United States: IEEE; 2020. p. 122\u20137.","DOI":"10.1109\/EuCNC48522.2020.9200909"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_016","doi-asserted-by":"crossref","unstructured":"Ujjan RM, Pervez Z, Dahal K, Bashir AK, Mumtaz R, Gonz\u00e1lez J. Towards flow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Gener Computer Syst. 2020;111:763\u201379.","DOI":"10.1016\/j.future.2019.10.015"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_017","doi-asserted-by":"crossref","unstructured":"Ullah F, Naeem H, Jabbar S, Khalid S, Latif MA, Al-Turjman F, et al. Cyber security threats detection in internet of things using deep learning approach. IEEE Access. 2019;7:124379\u201389. 10.1109\/ACCESS.2019.2937347.","DOI":"10.1109\/ACCESS.2019.2937347"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_018","doi-asserted-by":"crossref","unstructured":"Tsogbaatar E, Bhuyan MH, Taenaka Y, Fall D, Gonchigsumlaa K, Elmroth E, et al. DeL-IoT: a deep ensemble learning approach to uncover anomalies in IoT. Internet Things. 2021;14:100391.","DOI":"10.1016\/j.iot.2021.100391"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_019","doi-asserted-by":"crossref","unstructured":"Balasundaram J. A novel optimized bat extreme learning intrusion detection system for smart Internet of things networks. Int J Commun Syst. 2021;34(7):e4729.","DOI":"10.1002\/dac.4729"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_020","doi-asserted-by":"crossref","unstructured":"Basati A, Faghih MM. APAE: an IoT intrusion detection system using asymmetric parallel auto-encoder. Neural Comput Applic. 2021;2021:1\u201321. 10.1007\/s00521-021-06011-9.","DOI":"10.1007\/s00521-021-06011-9"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_021","doi-asserted-by":"crossref","unstructured":"Swarna Priya RM, Maddikunta PK, Parimala M, Koppu S, Gadekallu TR, Chowdhary CL, et al. An effective feature engineering for DNN using hybrid PCA-GWO for intrusion detection in IoMT architecture. Comput Commun. 2020;160:139\u201349.","DOI":"10.1016\/j.comcom.2020.05.048"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_022","doi-asserted-by":"crossref","unstructured":"Hafeez I, Antikainen M, Ding AY, Tarkoma S. IoT-KEEPER: detecting malicious IoT network activity using online traffic analysis at the edge. IEEE Trans Netw Serv Manag. 2020;17(1):45\u201359.","DOI":"10.1109\/TNSM.2020.2966951"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_023","doi-asserted-by":"crossref","unstructured":"Fortino G, Messina F, Rosaci D, Sarn\u00e8 GM. ResIoT: an IoT social framework resilient to malicious activities. IEEE\/CAA J Automatica Sin. 2020;7(5):1263\u201378.","DOI":"10.1109\/JAS.2020.1003330"},{"key":"2025120523411442247_j_jisys-2021-0173_ref_024","doi-asserted-by":"crossref","unstructured":"Ullah I, Mahmoud QH. A two-level flow-based anomalous activity detection system for IoT networks. Electronics. 2020;9(3):530.","DOI":"10.3390\/electronics9030530"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2021-0173\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2021-0173\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:43:30Z","timestamp":1764978210000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2021-0173\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,8]]},"references-count":24,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3,14]]},"published-print":{"date-parts":[[2022,3,14]]}},"alternative-id":["10.1515\/jisys-2021-0173"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2021-0173","relation":{},"ISSN":["2191-026X"],"issn-type":[{"value":"2191-026X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,8]]}}}