{"id":"https://openalex.org/W4400276264","doi":"https://doi.org/10.1109/wcnc57260.2024.10570786","title":"IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks","display_name":"IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks","publication_year":2024,"publication_date":"2024-04-21","ids":{"openalex":"https://openalex.org/W4400276264","doi":"https://doi.org/10.1109/wcnc57260.2024.10570786"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc57260.2024.10570786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc57260.2024.10570786","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020889298","display_name":"Md Morshed Alam","orcid":"https://orcid.org/0000-0003-2877-5345"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Morshed Alam","raw_affiliation_strings":["University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055075998","display_name":"Israt Jahan","orcid":"https://orcid.org/0000-0002-7370-4282"},"institutions":[{"id":"https://openalex.org/I94658018","display_name":"University of Memphis","ror":"https://ror.org/01cq23130","country_code":"US","type":"education","lineage":["https://openalex.org/I94658018"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Israt Jahan","raw_affiliation_strings":["University of Memphis,Department of Computer Science,Memphis,USA"],"affiliations":[{"raw_affiliation_string":"University of Memphis,Department of Computer Science,Memphis,USA","institution_ids":["https://openalex.org/I94658018"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110551419","display_name":"Weichao Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weichao Wang","raw_affiliation_strings":["University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte,Department of Software and Information Systems,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5020889298"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":0.7787,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68111764,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8177818059921265},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7128787040710449},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7078385949134827},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.6262134313583374},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4650968313217163},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3660896420478821}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8177818059921265},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7128787040710449},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7078385949134827},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.6262134313583374},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4650968313217163},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3660896420478821},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc57260.2024.10570786","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc57260.2024.10570786","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.550000011920929,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1522301498","https://openalex.org/W2025113626","https://openalex.org/W2046033161","https://openalex.org/W2054127354","https://openalex.org/W2064675550","https://openalex.org/W2076337359","https://openalex.org/W2121805588","https://openalex.org/W2890559797","https://openalex.org/W2947175569","https://openalex.org/W2972103753","https://openalex.org/W2986164614","https://openalex.org/W3007016253","https://openalex.org/W3156544905","https://openalex.org/W3159748891","https://openalex.org/W3181227461","https://openalex.org/W4221152368","https://openalex.org/W4298857966","https://openalex.org/W4324007228","https://openalex.org/W6631190155","https://openalex.org/W6637967152","https://openalex.org/W6754979079","https://openalex.org/W6780559895","https://openalex.org/W6794187937"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4306904969","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W2138720691"],"abstract_inverted_index":{"In":[0,131],"trigger-action":[1],"IoT":[2,4,10,24,60,75,86,113],"platforms,":[3],"devices":[5,25],"report":[6,55],"event":[7,57,106],"conditions":[8,58],"to":[9,54,59,71,88,108,136,163],"hubs":[11,19,61],"notifying":[12],"their":[13],"cyber":[14],"states":[15],"and":[16,62,123,156,178,181],"let":[17],"the":[18,101,151,165,173],"invoke":[20],"actions":[21],"in":[22,33,100,111],"other":[23],"based":[26,142,161],"on":[27,82],"functional":[28,38],"dependencies":[29,39],"defined":[30],"as":[31],"rules":[32],"a":[34,41,68,138,158],"rule":[35],"engine.":[36],"These":[37],"create":[40],"chain":[42,53],"of":[43,125],"interactions":[44],"that":[45,103,172],"help":[46],"automate":[47],"network":[48],"tasks.":[49],"Adversaries":[50],"exploit":[51],"this":[52,132],"fake":[56],"perform":[63],"remote":[64],"injection":[65,147,184],"attacks":[66,185],"upon":[67],"smart":[69],"environment":[70],"indirectly":[72],"control":[73],"target":[74],"devices.":[76],"Existing":[77],"defense":[78,98,144,167],"efforts":[79],"usually":[80],"depend":[81],"static":[83],"analysis":[84],"over":[85],"apps":[87],"develop":[89],"rule-based":[90],"anomaly":[91],"detection":[92],"mechanisms.":[93],"We":[94,149],"also":[95],"see":[96],"ML-based":[97],"mechanisms":[99],"literature":[102],"harness":[104],"physical":[105],"fingerprints":[107],"determine":[109],"anomalies":[110],"an":[112],"network.":[114],"However,":[115],"these":[116],"methods":[117],"often":[118],"demonstrate":[119],"long":[120],"response":[121],"time":[122],"lack":[124],"adaptability":[126],"when":[127],"facing":[128],"complicated":[129],"attacks.":[130,148],"paper,":[133],"we":[134],"propose":[135],"build":[137],"deep":[139,159],"reinforcement":[140],"learning":[141],"real-time":[143],"system":[145],"for":[146,154],"define":[150],"reward":[152],"functions":[153],"defenders":[155],"implement":[157],"Q-network":[160],"approach":[162],"identify":[164,180],"optimal":[166],"policy.":[168],"Our":[169],"experiments":[170],"show":[171],"proposed":[174],"mechanism":[175],"can":[176],"effectively":[177],"accurately":[179],"defend":[182],"against":[183],"with":[186],"reasonable":[187],"computation":[188],"overhead.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
