Design of Metaheuristic Optimization Algorithms for Deep Learning Model for Secure IoT Environment

被引:16
|
作者
Sagu, Amit [1 ]
Gill, Nasib Singh [1 ]
Gulia, Preeti [1 ]
Singh, Pradeep Kumar [2 ]
Hong, Wei-Chiang [3 ,4 ]
机构
[1] Maharshi Dayanand Univ, Dept Comp Sci & Applicat, Rohtak 124001, India
[2] Narsee Monjee Inst Management Studies NMIMS, Sch Technol Management & Engn, Chandigarh 160014, India
[3] Asia Eastern Univ Sci & Technol, Dept Informat Management, New Taipei 22046, Taiwan
[4] Yuan Ze Univ, Dept Informat Management, Chungli 320315, Taiwan
关键词
deep learning models; IoT security; optimization algorithms; MACHINE; NETWORK;
D O I
10.3390/su15032204
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Because of the rise in the number of cyberattacks, the devices that make up the Internet of Things (IoT) environment are experiencing increased levels of security risks. In recent years, a significant number of centralized systems have been developed to identify intrusions into the IoT environment. However, due to diverse requirements of IoT devices such as dispersion, scalability, resource restrictions, and decreased latency, these strategies were unable to achieve notable outcomes. The present paper introduces two novel metaheuristic optimization algorithms for optimizing the weights of deep learning (DL) models, use of DL may help in the detection and prevention of cyberattacks of this nature. Furthermore, two hybrid DL classifiers, i.e., convolutional neural network (CNN) + deep belief network (DBN) and bidirectional long short-term memory (Bi-LSTM) + gated recurrent network (GRU), were designed and tuned using the already proposed optimization algorithms, which results in ads to improved model accuracy. The results are evaluated against the recent approaches in the relevant field along with the hybrid DL classifier. Model performance metrics such as accuracy, rand index, f-measure, and MCC are used to draw conclusions about the model's validity by employing two distinct datasets. Regarding all performance metrics, the proposed approach outperforms both conventional and cutting-edge methods.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment
    Raj, Meghana Gopal
    Pani, Santosh Kumar
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2022, 18 (01)
  • [32] An optimal metaheuristic optimization based ElGamal public key cryptosystem for privacy in IoT environment
    Devi, P.
    Sathyalakshmi, S.
    Subramanian, D. Venkata
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021,
  • [33] An Effective Feature Selection Model Using Hybrid Metaheuristic Algorithms for IoT Intrusion Detection
    Kareem, Saif S.
    Mostafa, Reham R.
    Hashim, Fatma A.
    El-Bakry, Hazem M.
    SENSORS, 2022, 22 (04)
  • [34] Fuzzy Finite Element Model Updating Using Metaheuristic Optimization Algorithms
    Boulkaibet, I.
    Marwala, T.
    Friswell, M. I.
    Khodaparast, H. H.
    Adhikari, S.
    SPECIAL TOPICS IN STRUCTURAL DYNAMICS, VOL 6, 2017, : 91 - 101
  • [35] IoT Integrated Edge Platform for Secure Industrial Application with Deep Learning
    Balaji, B. Saravana
    Paja, Wieslaw
    Antonijevic, Milos
    Stoean, Catalin
    Bacanin, Nebojsa
    Zivkovic, Miodrag
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2023, 13
  • [36] Classifying IoT security risks using Deep Learning algorithms
    Abbass, Wissam
    Bakraouy, Zineb
    Baina, Amine
    Bellafkih, Mostafa
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 205 - 210
  • [37] A review on smart city - IoT and deep learning algorithms, challenges
    Rajyalakshmi, Vankadhara
    Lakshmanna, Kuruva
    INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2022, 13 (01) : 3 - 26
  • [38] Deep Learning Enabled Secure IoT Handover Authentication for Blockchain Networks
    Salim, Mikail Mohammed
    Shanmuganathan, Vimal
    Loia, Vincenzo
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2021, 11
  • [39] Toward Secure and Efficient Deep Learning Inference in Dependable IoT Systems
    Qiu, Han
    Zheng, Qinkai
    Zhang, Tianwei
    Qiu, Meikang
    Memmi, Gerard
    Lu, Jialiang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3180 - 3188
  • [40] Secure framework for IoT applications using Deep Learning in fog Computing
    Chakraborty, Ananya
    Kumar, Mohit
    Chaurasia, Nisha
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 77