Book Image

Hands-On Deep Learning for IoT

By : Dr. Mohammad Abdur Razzaque, Md. Rezaul Karim
Book Image

Hands-On Deep Learning for IoT

By: Dr. Mohammad Abdur Razzaque, Md. Rezaul Karim

Overview of this book

Artificial Intelligence is growing quickly, which is driven by advancements in neural networks(NN) and deep learning (DL). With an increase in investments in smart cities, smart healthcare, and industrial Internet of Things (IoT), commercialization of IoT will soon be at peak in which massive amounts of data generated by IoT devices need to be processed at scale. Hands-On Deep Learning for IoT will provide deeper insights into IoT data, which will start by introducing how DL fits into the context of making IoT applications smarter. It then covers how to build deep architectures using TensorFlow, Keras, and Chainer for IoT. You’ll learn how to train convolutional neural networks(CNN) to develop applications for image-based road faults detection and smart garbage separation, followed by implementing voice-initiated smart light control and home access mechanisms powered by recurrent neural networks(RNN). You’ll master IoT applications for indoor localization, predictive maintenance, and locating equipment in a large hospital using autoencoders, DeepFi, and LSTM networks. Furthermore, you’ll learn IoT application development for healthcare with IoT security enhanced. By the end of this book, you will have sufficient knowledge need to use deep learning efficiently to power your IoT-based applications for smarter decision making.
Table of Contents (15 chapters)
Free Chapter
1
Section 1: IoT Ecosystems, Deep Learning Techniques, and Frameworks
4
Section 2: Hands-On Deep Learning Application Development for IoT
10
Section 3: Advanced Aspects and Analytics in IoT

Data collection

For both of the use cases, we can generate our own datasets and train and test the models on them. In the following paragraphs, we briefly present how we can create a dataset for device-level host intrusion detection through a DoS attack.

CPU utilisation data

For the DoS attack, we need an attack machine and a target machine. We are using a Kali Linux machine as the attacker and a Windows machine as the target (which can be home gateway/Raspberry Pi 3/sensors). In Kali Linux, a DoS attack can be achieved in multiple ways. One way is to use the hping3. hping3 command as a network tool to send custom TCP/IP packets, and allowing for the testing of firewalls, port scanning, address spoofing, and more.

This can...