1
|
Karthikeyan M, Manimegalai D, RajaGopal K. Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Sci Rep 2024; 14:231. [PMID: 38168562 PMCID: PMC10762054 DOI: 10.1038/s41598-023-50554-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/02/2023] [Accepted: 12/21/2023] [Indexed: 01/05/2024] Open
Abstract
A Wireless Sensor Network (WSN) aided by the Internet of Things (IoT) is a collaborative system of WSN systems and IoT networks are work to exchange, gather, and handle data. The primary objective of this collaboration is to enhance data analysis and automation to facilitate improved decision-making. Securing IoT with the assistance of WSN necessitates the implementation of protective measures to confirm the safety and reliability of the interconnected WSN and IoT components. This research significantly advances the current state of the art in IoT and WSN security by synergistically harnessing the potential of machine learning and the Firefly Algorithm. The contributions of this work are twofold: firstly, the proposed FA-ML technique exhibits an exceptional capability to enhance intrusion detection accuracy within the WSN-IoT landscape. Secondly, the amalgamation of the Firefly Algorithm and machine learning introduces a novel dimension to the domain of security-oriented optimization techniques. The implications of this research resonate across various sectors, ranging from critical infrastructure protection to industrial automation and beyond, where safeguarding the integrity of interconnected systems are of paramount importance. The amalgamation of cutting-edge machine learning and bio-inspired algorithms marks a pivotal step forward in crafting robust and intelligent security measures for the evolving landscape of IoT-driven technologies. For intrusion detection in the WSN-IoT, the FA-ML method employs a support vector machine (SVM) machine model for classification with parameter tuning accomplished using a Grey Wolf Optimizer (GWO) algorithm. The experimental evaluation is simulated using NSL-KDD Dataset, revealing the remarkable enhancement of the FA-ML technique, achieving a maximum accuracy of 99.34%. In comparison, the KNN-PSO and XGBoost models achieved lower accuracies of 96.42% and 95.36%, respectively. The findings validate the potential of the FA-ML technique as an active security solution for WSN-IoT systems, harnessing the power of machine learning and the Firefly Algorithm to bolster intrusion detection capabilities.
Collapse
Affiliation(s)
- M Karthikeyan
- Centre for Advanced Wireless Integrated Technology, Chennai Institute of Technology, Chennai, India.
| | - D Manimegalai
- Department of Electrical and Electronics Engineering, RajaLakshmi Engineering College, Thandalam, India
| | | |
Collapse
|
2
|
Aljebreen M, Alohali MA, Saeed MK, Mohsen H, Al Duhayyim M, Abdelmageed AA, Drar S, Abdelbagi S. Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks. SENSORS (BASEL, SWITZERLAND) 2023; 23:4073. [PMID: 37112414 PMCID: PMC10140898 DOI: 10.3390/s23084073] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/04/2023] [Revised: 02/24/2023] [Accepted: 03/01/2023] [Indexed: 06/19/2023]
Abstract
An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT. This article presents a Binary Chimp Optimization Algorithm with Machine Learning based Intrusion Detection (BCOA-MLID) technique for secure IoT-WSN. The presented BCOA-MLID technique intends to effectively discriminate different types of attacks to secure the IoT-WSN. In the presented BCOA-MLID technique, data normalization is initially carried out. The BCOA is designed for the optimal selection of features to improve intrusion detection efficacy. To detect intrusions in the IoT-WSN, the BCOA-MLID technique employs a class-specific cost regulation extreme learning machine classification model with a sine cosine algorithm as a parameter optimization approach. The experimental result of the BCOA-MLID technique is tested on the Kaggle intrusion dataset, and the results showcase the significant outcomes of the BCOA-MLID technique with a maximum accuracy of 99.36%, whereas the XGBoost and KNN-AOA models obtained a reduced accuracy of 96.83% and 97.20%, respectively.
Collapse
Affiliation(s)
- Mohammed Aljebreen
- Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
| | - Manal Abdullah Alohali
- Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
| | - Muhammad Kashif Saeed
- Department of Computer Science, Applied College, King Khalid University, Muhayil 63311, Saudi Arabia
| | - Heba Mohsen
- Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt
| | - Mesfer Al Duhayyim
- Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj 16273, Saudi Arabia
| | - Amgad Atta Abdelmageed
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
| | - Suhanda Drar
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
| | - Sitelbanat Abdelbagi
- Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
| |
Collapse
|
3
|
De SK. The goat search algorithms. Artif Intell Rev 2022; 56:1-37. [PMID: 36590758 PMCID: PMC9794115 DOI: 10.1007/s10462-022-10341-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/28/2022]
Abstract
This article develops an evolutionary nature inspired algorithm based on the social behavior of the goat, a pet of a farmer in a village life. In village life, we generally see the shepherds keep their goats free/untie from collar thread for grazing in the early morning and receives them at the end of the day when they come back into the home with their own efforts. But some day the goats did not come back in due time because of overfeeding of grass causing unable to move any more after meeting their grasp and began to get rest there. The shepherd feels more tempted and began to search for his/her goat. After untie, the goat began to graze herself through the walk on the path of the cultivated land and bank of the village ponds. The search process is going on through that path until it is not finally got. To characterize this problem some definitions like false walk, uniform and non-uniform steps, goat's jump, periodic walk and goodness of fit for various walk functions have been discussed here rigorously. Inspiring from this fact novel metaheuristic algorithms along with pseudocode and hardware specification have been discussed to optimize a benchmark multi-modal objective function having some singularity zones explicitly. Numerical results have been compared with some of the existing state- of -arts under 95% confidence intervals. Also, graphical illustrations are performed to validate the proposed approach. Finally, a conclusion is made followed by scope of future work.
Collapse
Affiliation(s)
- Sujit Kumar De
- Department of Mathematics, Midnapore College (Autonomous), Midnapore, 721101 India
| |
Collapse
|
4
|
Xiao C, Chen J, Wang L. Optimal Mapping of Spiking Neural Network to Neuromorphic Hardware for Edge-AI. SENSORS (BASEL, SWITZERLAND) 2022; 22:7248. [PMID: 36236344 PMCID: PMC9572825 DOI: 10.3390/s22197248] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/26/2022] [Revised: 09/11/2022] [Accepted: 09/21/2022] [Indexed: 06/16/2023]
Abstract
Neuromorphic hardware, the new generation of non-von Neumann computing system, implements spiking neurons and synapses to spiking neural network (SNN)-based applications. The energy-efficient property makes the neuromorphic hardware suitable for power-constrained environments where sensors and edge nodes of the internet of things (IoT) work. The mapping of SNNs onto neuromorphic hardware is challenging because a non-optimized mapping may result in a high network-on-chip (NoC) latency and energy consumption. In this paper, we propose NeuMap, a simple and fast toolchain, to map SNNs onto the multicore neuromorphic hardware. NeuMap first obtains the communication patterns of an SNN by calculation that simplifies the mapping process. Then, NeuMap exploits localized connections, divides the adjacent layers into a sub-network, and partitions each sub-network into multiple clusters while meeting the hardware resource constraints. Finally, we employ a meta-heuristics algorithm to search for the best cluster-to-core mapping scheme in the reduced searching space. We conduct experiments using six realistic SNN-based applications to evaluate NeuMap and two prior works (SpiNeMap and SNEAP). The experimental results show that, compared to SpiNeMap and SNEAP, NeuMap reduces the average energy consumption by 84% and 17% and has 55% and 12% lower spike latency, respectively.
Collapse
|
5
|
Khattab H, Mahafzah BA, Sharieh A. A hybrid algorithm based on modified chemical reaction optimization and best-first search algorithm for solving minimum vertex cover problem. Neural Comput Appl 2022; 34:15513-15541. [DOI: 10.1007/s00521-022-07262-w] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/17/2021] [Accepted: 03/29/2022] [Indexed: 02/05/2023]
|
6
|
Enhanced beetle antennae search algorithm for complex and unbiased optimization. Soft comput 2022; 26:10331-10369. [PMID: 36034767 PMCID: PMC9392993 DOI: 10.1007/s00500-022-07388-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 06/29/2022] [Indexed: 10/25/2022]
Abstract
AbstractBeetle Antennae Search algorithm is a kind of intelligent optimization algorithms, which has the advantages of few parameters and simplicity. However, due to its inherent limitations, BAS has poor performance in complex optimization problems. The existing improvements of BAS are mainly based on the utilization of multiple beetles or combining BAS with other algorithms. The present study improves BAS from its origin and keeps the simplicity of the algorithm. First, an adaptive step size reduction method is used to increase the usability of the algorithm, which is based on an accurate factor and curvilinearly reduces the step size; second, the calculated information of fitness functions during each iteration are fully utilized with a contemporary optimal update strategy to promote the optimization processes; third, the theoretical analysis of the multi-directional sensing method is conducted and utilized to further improve the efficiency of the algorithm. Finally, the proposed Enhanced Beetle Antennae Search algorithm is compared with many other algorithms based on unbiased test functions. The test functions are unbiased when their solution space does not contain simple patterns, which may be used to facilitate the searching processes. As a result, EBAS outperformed BAS with at least 1 orders of magnitude difference. The performance of EBAS was even better than several state-of-the-art swarm-based algorithms, such as Slime Mold Algorithm and Grey Wolf Optimization, with similar running times. In addition, a WSN coverage optimization problem is tested to demonstrate the applicability of EBAS on real-world optimizations.
Collapse
|
7
|
Optimizing the Neural Structure and Hyperparameters of Liquid State Machines Based on Evolutionary Membrane Algorithm. MATHEMATICS 2022. [DOI: 10.3390/math10111844] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/10/2022]
Abstract
As one of the important artificial intelligence fields, brain-like computing attempts to give machines a higher intelligence level by studying and simulating the cognitive principles of the human brain. A spiking neural network (SNN) is one of the research directions of brain-like computing, characterized by better biogenesis and stronger computing power than the traditional neural network. A liquid state machine (LSM) is a neural computing model with a recurrent network structure based on SNN. In this paper, a learning algorithm based on an evolutionary membrane algorithm is proposed to optimize the neural structure and hyperparameters of an LSM. First, the object of the proposed algorithm is designed according to the neural structure and hyperparameters of the LSM. Second, the reaction rules of the proposed algorithm are employed to discover the best neural structure and hyperparameters of the LSM. Third, the membrane structure is that the skin membrane contains several elementary membranes to speed up the search of the proposed algorithm. In the simulation experiment, effectiveness verification is carried out on the MNIST and KTH datasets. In terms of the MNIST datasets, the best test results of the proposed algorithm with 500, 1000 and 2000 spiking neurons are 86.8%, 90.6% and 90.8%, respectively. The best test results of the proposed algorithm on KTH with 500, 1000 and 2000 spiking neurons are 82.9%, 85.3% and 86.3%, respectively. The simulation results show that the proposed algorithm has a more competitive advantage than other experimental algorithms.
Collapse
|
8
|
Shadowed Type-2 Fuzzy Systems for Dynamic Parameter Adaptation in Harmony Search and Differential Evolution for Optimal Design of Fuzzy Controllers. MATHEMATICS 2021. [DOI: 10.3390/math9192439] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/16/2022]
Abstract
This article mainly focuses on the utilization of shadowed type-2 fuzzy systems used to achieve the goal of dynamically adapting the parameters of two already known algorithms in the literature: the harmony search and the differential evolution algorithms. It has already been established that type-2 fuzzy logic enhances the performance of metaheuristics by enabling parameter adaptation; however, the utilization of fuzzy logic results in an increased execution time. For this reason, in this article, the shadowed type-2 fuzzy approach is put forward as a way of reducing execution time, while maintaining the good results that the complete type-2 fuzzy model produces. The harmony search and differential evolution algorithms with shadowed type-2 parameter adaptations were applied to the problem of optimally designing fuzzy controllers. The simulations were performed with the controllers working in an ideal situation, and then with a real situation under different noise levels in order to reach a conclusion regarding the performance of each of the algorithms that were applied.
Collapse
|