Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Inte...
Uložené v:
| Vydané v: | Sensors (Basel, Switzerland) Ročník 22; číslo 16; s. 6117 |
|---|---|
| Hlavní autori: | , , , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Basel
MDPI AG
01.08.2022
MDPI |
| Predmet: | |
| ISSN: | 1424-8220, 1424-8220 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent. |
|---|---|
| AbstractList | High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent. High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network's external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent. |
| Audience | Academic |
| Author | Selvarajan, Shitharth Srivastava, Gautam Alhebaishi, Nawaf Alterazi, Hassan A. Lin, Jerry Chun-Wei Manoharan, Hariprasath Kshirsagar, Pravin R. |
| AuthorAffiliation | 2 Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur 440016, India 5 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia 8 Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway 4 Department of Computer Science, Kebri Dehar University, Kebri Dehar 001, Ethiopia 7 Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan 1 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia 3 Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai 600123, India 6 Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada |
| AuthorAffiliation_xml | – name: 7 Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan – name: 8 Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway – name: 2 Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur 440016, India – name: 1 Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia – name: 6 Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada – name: 3 Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai 600123, India – name: 4 Department of Computer Science, Kebri Dehar University, Kebri Dehar 001, Ethiopia – name: 5 Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia |
| Author_xml | – sequence: 1 givenname: Hassan A. orcidid: 0000-0003-0137-9422 surname: Alterazi fullname: Alterazi, Hassan A. – sequence: 2 givenname: Pravin R. surname: Kshirsagar fullname: Kshirsagar, Pravin R. – sequence: 3 givenname: Hariprasath orcidid: 0000-0001-5034-3034 surname: Manoharan fullname: Manoharan, Hariprasath – sequence: 4 givenname: Shitharth orcidid: 0000-0002-4931-724X surname: Selvarajan fullname: Selvarajan, Shitharth – sequence: 5 givenname: Nawaf orcidid: 0000-0003-0438-4243 surname: Alhebaishi fullname: Alhebaishi, Nawaf – sequence: 6 givenname: Gautam orcidid: 0000-0001-9851-4103 surname: Srivastava fullname: Srivastava, Gautam – sequence: 7 givenname: Jerry Chun-Wei orcidid: 0000-0001-8768-9709 surname: Lin fullname: Lin, Jerry Chun-Wei |
| BookMark | eNplkk1rGzEQhpeS0ny0h_6DhV7agxN9rnYvhWD6YQgkkOTSi5C0I1tmV3IlbYL76yvHbmlSdBgxet9HM9KcVkc-eKiq9xidU9qhi0QIbhqMxavqBDPCZi0h6Oif_XF1mtIaIUIpbd9Ux7RBmLeiPal-3ER4AJ9d8HWw9XyrIda3YKbo8rZ-dHlV5xXUC58hesg7zd3K-WWq71MJ9Y2K2ZkB6ttHFcf6epPd6H6pHe9t9dqqIcG7Qzyr7r9-uZt_n11df1vML69mhrU8z3pdiukQ5bgVBkRDGDK00wRra7kWYHtOOtMSQ4BQwFZrBp2iWNBWay0oPasWe24f1FpuohtV3MqgnHxKhLiUhyKlpYw0jaECgDFMWYu6gutoz3hjO9ixPu9Zm0mP0JvyMlENz6DPT7xbyWV4kF3BYYwK4OMBEMPPCVKWo0sGhkF5CFOSRCDRYMS4KNIPL6TrMEVfnmqnahhnvMNFdb5XLVVpwHkbyr2mrB5GZ8ocWFfyl4I1vBSAeTFc7A0mhpQiWGlcfvqQYnSDxEjuhkb-HZri-PTC8aff_7W_ARpiwNg |
| CitedBy_id | crossref_primary_10_20525_ijrbs_v12i4_2473 crossref_primary_10_3390_biomimetics9060307 crossref_primary_10_3389_fcomp_2023_997159 crossref_primary_10_2174_0123520965276302240115075612 crossref_primary_10_1007_s11760_024_03142_z crossref_primary_10_3390_s22197169 crossref_primary_10_1007_s11694_023_02294_9 crossref_primary_10_1088_2631_8695_adf942 crossref_primary_10_32604_cmc_2023_038534 crossref_primary_10_1109_ACCESS_2025_3583922 crossref_primary_10_3390_coatings13091604 crossref_primary_10_1038_s41598_025_91856_6 crossref_primary_10_1109_ACCESS_2023_3307492 crossref_primary_10_1186_s44147_025_00635_7 crossref_primary_10_3390_electronics12030747 crossref_primary_10_1016_j_neucom_2024_127427 crossref_primary_10_1080_01468030_2024_2342275 crossref_primary_10_1016_j_compeleceng_2023_108773 crossref_primary_10_1016_j_knosys_2024_112633 crossref_primary_10_1109_ACCESS_2025_3531216 |
| Cites_doi | 10.1109/ACCESS.2022.3171660 10.3390/informatics6010008 10.1109/TIFS.2022.3140687 10.1007/s43926-020-00001-4 10.3390/en15103624 10.1109/TII.2018.2836150 10.1109/WCNCW.2018.8369033 10.11591/eei.v6i2.605 10.1109/SPW.2019.00023 10.1109/COMST.2019.2896380 10.1109/TII.2019.2956474 10.1007/s11277-021-08725-4 10.1016/j.cose.2019.05.016 10.1007/s00521-014-1629-6 10.1088/1742-6596/1345/4/042075 10.1007/978-3-319-45507-5_6 10.1155/2022/8457116 10.1007/s42979-021-00557-0 10.1109/MilCIS.2017.8190421 10.1111/coin.12367 10.1016/j.iot.2019.100056 10.1007/s00521-017-3317-9 10.3390/s20030816 10.1109/ICTC.2015.7354752 10.1109/ACCESS.2018.2799306 10.1016/j.comnet.2019.107042 10.1016/j.engappai.2013.04.010 10.1109/ACCESS.2020.3013145 10.1049/cp.2015.0714 10.1016/j.compeleceng.2017.07.008 10.1007/978-3-030-49669-2 10.1109/ACCESS.2021.3129053 10.1155/2021/3329581 10.1007/s10586-017-0971-8 10.1109/ICRIS.2019.00087 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2022 MDPI AG 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2022 by the authors. 2022 |
| Copyright_xml | – notice: COPYRIGHT 2022 MDPI AG – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2022 by the authors. 2022 |
| DBID | AAYXX CITATION 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI 7X8 5PM DOA |
| DOI | 10.3390/s22166117 |
| DatabaseName | CrossRef ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni Edition) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) Medical Database ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central ProQuest Health & Medical Research Collection Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | CrossRef MEDLINE - Academic Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1424-8220 |
| ExternalDocumentID | oai_doaj_org_article_f34266c37ee44134809bb493d456f9e3 PMC9413110 A746531115 10_3390_s22166117 |
| GrantInformation_xml | – fundername: Western Norway University of Applied Sciences, Bergen, Norway |
| GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFFHD AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PJZUB PPXIY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. 7XB 8FK AZQEC DWQXO K9. PKEHL PQEST PQUKI 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c485t-db6019035187ce76240c39b21bff5b7efd529c82c2e23e1fbb4e9a31738bbb733 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 25 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000845197700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1424-8220 |
| IngestDate | Fri Oct 03 12:50:28 EDT 2025 Tue Nov 04 01:55:50 EST 2025 Fri Sep 05 10:20:23 EDT 2025 Tue Oct 07 07:47:08 EDT 2025 Tue Nov 04 18:17:01 EST 2025 Tue Nov 18 21:55:49 EST 2025 Sat Nov 29 07:18:25 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 16 |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c485t-db6019035187ce76240c39b21bff5b7efd529c82c2e23e1fbb4e9a31738bbb733 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-9851-4103 0000-0001-8768-9709 0000-0003-0137-9422 0000-0001-5034-3034 0000-0003-0438-4243 0000-0002-4931-724X |
| OpenAccessLink | https://www.proquest.com/docview/2706454591?pq-origsite=%requestingapplication% |
| PMID | 36015878 |
| PQID | 2706454591 |
| PQPubID | 2032333 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_f34266c37ee44134809bb493d456f9e3 pubmedcentral_primary_oai_pubmedcentral_nih_gov_9413110 proquest_miscellaneous_2707610457 proquest_journals_2706454591 gale_infotracacademiconefile_A746531115 crossref_citationtrail_10_3390_s22166117 crossref_primary_10_3390_s22166117 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-08-01 |
| PublicationDateYYYYMMDD | 2022-08-01 |
| PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Sensors (Basel, Switzerland) |
| PublicationYear | 2022 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Shitharth (ref_42) 2021; 9 Dilek (ref_40) 2015; 6 Sudhir (ref_38) 2016; 1 Mahdi (ref_43) 2022; 17 ref_13 ref_35 ref_12 Patil (ref_2) 2019; 85 Malik (ref_14) 2018; 21 Shamshirband (ref_30) 2013; 26 ref_32 Aljuhani (ref_6) 2019; 2 Farivar (ref_20) 2020; 16 Fadlil (ref_7) 2017; 6 ref_18 Setiawan (ref_21) 2019; 12 Wiafe (ref_39) 2020; 8 Mirjalili (ref_3) 2014; 25 ref_17 ref_16 ref_37 Elmasry (ref_10) 2020; 168 Kuzlu (ref_22) 2021; 1 Shitharth (ref_36) 2022; 10 Qi (ref_33) 2019; 1345 Jun (ref_27) 2021; 2021 Akojwar (ref_29) 2016; 7 Chaabouni (ref_19) 2019; 21 ref_25 Suroor (ref_28) 2017; 9 Alabbas (ref_31) 2021; 37 Casola (ref_8) 2019; 7 ref_23 Liu (ref_1) 2018; 14 Sarker (ref_34) 2021; 2 Wang (ref_24) 2018; 6 ref_41 Garg (ref_15) 2018; 71 ref_26 ref_9 Khadidos (ref_11) 2022; 2022 Huda (ref_5) 2018; 31 Mazini (ref_4) 2018; 31 |
| References_xml | – volume: 10 start-page: 46424 year: 2022 ident: ref_36 article-title: An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3171660 – ident: ref_23 doi: 10.3390/informatics6010008 – volume: 17 start-page: 357 year: 2022 ident: ref_43 article-title: Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2022.3140687 – volume: 1 start-page: 7 year: 2021 ident: ref_22 article-title: Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity publication-title: Discov. Internet Things doi: 10.1007/s43926-020-00001-4 – ident: ref_17 doi: 10.3390/en15103624 – volume: 14 start-page: 3801 year: 2018 ident: ref_1 article-title: Defending on–off attacks using light probing messages in smart sensors for industrial communication systems publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2018.2836150 – ident: ref_9 doi: 10.1109/WCNCW.2018.8369033 – volume: 9 start-page: 229 year: 2017 ident: ref_28 article-title: Identifying the factors of modern-day stress using machine learning publication-title: Int. J. Eng. Sci. Technol. – volume: 2 start-page: 83 year: 2019 ident: ref_6 article-title: Mitigation of Application Layer DDoS Flood Attack Against Web Servers publication-title: J. Inf. Secur. Cybercrimes Res. – volume: 6 start-page: 140 year: 2017 ident: ref_7 article-title: Review of detection DDOS attack detection using naive bayes classifier for network forensics publication-title: Bull. Electr. Eng. Inform. doi: 10.11591/eei.v6i2.605 – ident: ref_13 doi: 10.1109/SPW.2019.00023 – volume: 21 start-page: 2671 year: 2019 ident: ref_19 article-title: Network Intrusion Detection for IoT Security based on Learning Techniques publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2019.2896380 – volume: 16 start-page: 2716 year: 2020 ident: ref_20 article-title: Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2019.2956474 – ident: ref_41 doi: 10.1007/s11277-021-08725-4 – ident: ref_18 – volume: 85 start-page: 402 year: 2019 ident: ref_2 article-title: Designing an efficient security framework for detecting intrusions in virtual network of cloud computing publication-title: Comput. Secur. doi: 10.1016/j.cose.2019.05.016 – volume: 25 start-page: 1423 year: 2014 ident: ref_3 article-title: Binary optimization using hybrid particle swarm optimization and gravitational search algorithm publication-title: Neural Comput. Appl. doi: 10.1007/s00521-014-1629-6 – volume: 1345 start-page: 402 year: 2019 ident: ref_33 article-title: Analysis on the Application of artificial Intelligence in classroom publication-title: J. Phys. Conf. Ser. doi: 10.1088/1742-6596/1345/4/042075 – ident: ref_37 doi: 10.1007/978-3-319-45507-5_6 – volume: 2022 start-page: 8457116 year: 2022 ident: ref_11 article-title: Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism publication-title: J. Sens. doi: 10.1155/2022/8457116 – volume: 2 start-page: 1 year: 2021 ident: ref_34 article-title: AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions publication-title: SN Comput. Sci. doi: 10.1007/s42979-021-00557-0 – ident: ref_16 doi: 10.1109/MilCIS.2017.8190421 – volume: 37 start-page: 1286 year: 2021 ident: ref_31 article-title: Performance enhancement of safety message communication via designing dynamic power control mechanisms in vehicular ad hoc networks publication-title: Comput. Intell. doi: 10.1111/coin.12367 – volume: 7 start-page: 100056 year: 2019 ident: ref_8 article-title: Toward the automation of threat modeling and risk assessment in iot systems publication-title: Int. Things doi: 10.1016/j.iot.2019.100056 – volume: 31 start-page: 4287 year: 2018 ident: ref_5 article-title: Efficient feature selection and classification algorithm based on PSO and rough sets publication-title: Neural Comput. Appl. doi: 10.1007/s00521-017-3317-9 – volume: 31 start-page: 541 year: 2018 ident: ref_4 article-title: Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms publication-title: J. King Saud. Univ. Comput. Inf. Sci. – volume: 1 start-page: 231 year: 2016 ident: ref_38 article-title: Performance Evolution of Optimization Techniques for Mathematical Benchmark Functions publication-title: Int. J. Comput. – ident: ref_32 doi: 10.3390/s20030816 – volume: 7 start-page: 79 year: 2016 ident: ref_29 article-title: A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems publication-title: Wseas Trans. Electron. – ident: ref_25 doi: 10.1109/ICTC.2015.7354752 – volume: 12 start-page: 378 year: 2019 ident: ref_21 article-title: Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine publication-title: Int. J. Intell. Eng. Syst. – volume: 6 start-page: 8547 year: 2018 ident: ref_24 article-title: An Immune Genetic Algorithm for Multi-Echelon Inventory Cost Control of IoT Based Supply Chains publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2799306 – volume: 6 start-page: 6 year: 2015 ident: ref_40 article-title: Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review publication-title: Int. J. Artif. Intell. Appl. – volume: 168 start-page: 107042 year: 2020 ident: ref_10 article-title: Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic publication-title: Comput. Netw. doi: 10.1016/j.comnet.2019.107042 – volume: 26 start-page: 2105 year: 2013 ident: ref_30 article-title: An appraisal and design of a multi -agent system based cooperative wireless intrusion detection computational intelligence technique publication-title: Eng. Appl. Artif. Intell. doi: 10.1016/j.engappai.2013.04.010 – volume: 8 start-page: 146598 year: 2020 ident: ref_39 article-title: Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3013145 – ident: ref_26 doi: 10.1049/cp.2015.0714 – volume: 71 start-page: 798 year: 2018 ident: ref_15 article-title: Fuzzified cuckoo based clustering technique for network anomaly detection publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2017.07.008 – ident: ref_12 doi: 10.1007/978-3-030-49669-2 – volume: 9 start-page: 156297 year: 2021 ident: ref_42 article-title: An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3129053 – volume: 2021 start-page: 3329581 year: 2021 ident: ref_27 article-title: Artificial Intelligence Application in Cybersecurity and Cyberdefense publication-title: Wirel. Commun. Mob. Comput. doi: 10.1155/2021/3329581 – volume: 21 start-page: 667 year: 2018 ident: ref_14 article-title: A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection publication-title: Clust. Comput. doi: 10.1007/s10586-017-0971-8 – ident: ref_35 doi: 10.1109/ICRIS.2019.00087 |
| SSID | ssj0023338 |
| Score | 2.518053 |
| Snippet | High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects... |
| SourceID | doaj pubmedcentral proquest gale crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database |
| StartPage | 6117 |
| SubjectTerms | Accuracy Air conditioning Algorithms Analysis ant colony optimization Artificial intelligence cyber security threats Cybersecurity Cyberterrorism Data security genetic algorithm Internet of Things Mathematical optimization optimization techniques particle swarm optimization Privacy Safety and security measures Sensors Software Transmission Control Protocol/Internet Protocol (Computer network protocol) Ventilation |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NaxUxEB-k9KAH8RNXa4ki6GXp20zSbI5tafEgtVCV4iVssgkW2n3y3qvif-9MNu_5ngpevC27c5hMMl_Zmd8AvEqIyoeo6kBPlKCESd2ZQIGcpPAZQ-zbfKH_6Z05PW0vLuzZ2qgvrgkb4YFHwe0lZB8S0MRInhtVO7HeK4s9ef5kY8b5pKhnmUyVVAsp8xpxhJCS-r25lA05ojyV7Jf3ySD9f5ri38sj1_zNyT24WwJFcTAyeB9uxeEB3FmDD3wIn5f4S9NBTJM4-uHjTJyXgXSCb1gFhXdivPSLC6YZx3SKXCggzsrqxfn3bnYt3pP1uC5tmY_g48nxh6O3dZmVUAfV6kXd-33uCkfdtCZEsnAkdrReNj4l7U1MvZY2tDLIKDE2iWQYbUfBA7bee4P4GLaG6RCfgCAV7bXvI3YmKfTJmiZ1LZLfR-112q_gzVKGLhQgcZ5nceUooWBxu5W4K3i5Iv06omf8jeiQN2JFwIDX-QUdA1cE4f51DCp4zdvoWC2JmdCV7gJaEgNcuQPDQHJk2HUFO8uddkVf504axu1T2jYVvFh9Jk3j3yfdEKc3mcZQsKk0cWw2TsgG65tfhssvGbPbKsY1mjz9H2t9BrclN2HkMsQd2FrMbuJz2A7fFpfz2W5WhJ-Siw4W priority: 102 providerName: Directory of Open Access Journals |
| Title | Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization |
| URI | https://www.proquest.com/docview/2706454591 https://www.proquest.com/docview/2707610457 https://pubmed.ncbi.nlm.nih.gov/PMC9413110 https://doaj.org/article/f34266c37ee44134809bb493d456f9e3 |
| Volume | 22 |
| WOSCitedRecordID | wos000845197700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: DOA dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: M~E dateStart: 20010101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Health & Medical Collection customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: 7X7 dateStart: 20010101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthcomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central (subscription) customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: BENPR dateStart: 20010101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1424-8220 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023338 issn: 1424-8220 databaseCode: PIMPY dateStart: 20010101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELbolgMceCMCZWUQElyibvyo4xNqq61AoktEAS1cotixoRJNSnYL4sJvZ8bxpl1AXLhEkT1SnIxn_M3E_oaQJ55zYawTqYU7CFDsJK2UBSDHAD5z6-o8JPTfv1KzWT6f6yIm3BZxW-XKJwZHXbcWc-TbTCGzmpA6e376NcWqUfh3NZbQ2CCbyFQmRmRzbzor3gwhF4cIrOcT4hDcby8Yy2BBCtXJzlehQNb_p0v-fZvkhXXn4Pr_jvgGuRYRJ93tp8hNcsk1t8jVCzyEt8nHFZFT29DW0_0fxnX0KFa2o5iqpYATaZ89dEuU6et90rDjgBZx_tGj71V3Ql-DGzqJ5zvvkHcH07f7L9JYdCG1IpfLtDY7eLycyyxX1oGrBP1xbVhmvJdGOV9Lpm3OLHOMu8wbI5yuAIXw3BijOL9LRk3buHuEgq3X0tSOV8oLbrxWma9yDgCCSyP9TkKerZRQ2shIjoUxvpQQmaC-ykFfCXk8iJ72NBx_E9pDTQ4CyJwdGtruUxk_ROk5YhLLlXOABLnIJxpeQfMakKTXjifkKc6DEu0bBmOreEwBXgmZsspdhYx0sELIhGyt9F5Gw1-U50pPyKOhG0wW_8NUjWvPgowC1CokjFitTbG1oa_3NMefA_m3FkiQNLn_74c_IFcYntMIOxW3yGjZnbmH5LL9tjxedGOyoeYqXPNxtJhxSEbA9fDnFNqKl4fFh1-xryQS |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwEB5VWyTogTciUMAgEFyibmynjg8IlULVVbfLSi2o5RJixy6VaFJ2t1T9U_xGZvJqFxC3HrhFyUixk8_zsucbgOdeCGmsk6HFKwxQbD_MlEVHjqP7LKzLkyqh_2moRqNkb0-PF-BnWwtDxypbnVgp6ry0lCNf4YqY1WSsozfH30PqGkW7q20LjRoWW-7sFEO26evBO_y_LzjfeL-7vhk2XQVCK5N4FuZmleqnRRwlyjrUBThAoQ2PjPexUc7nMdc24ZY7LlzkjZFOZ2hmRWKMUZQARZW_KBHsSQ8Wx4Pt8X4X4gmM-Gr-IiF0f2XKeYQGsOqGdm71quYAf5qA349lXrBzGzf-ty90E643HjVbq5fALVhwxW1YusCzeAc-t0RVZcFKz9bPjJuwnaZzH6NUNEM_mNXZUTcjmbqfKatOVLBxs77Yzmk2OWIfUM0eNfWrd-HjpUzuHvSKsnD3gaEuy2OTO5EpL4XxWkU-SwQ6SCI2sV8N4FX701PbMK5T449vKUZehI-0w0cAzzrR45pm5G9Cbwk5nQAxg1c3yslB2nyI1AvyuaxQzqGnK2TS1zgFLXL0lL12IoCXhLuU9BcOxmZNGQZOiZjA0jVFjHtoAeMAllucpY1im6bnIAvgafcYVRLtM2WFK08qGYVeuYxxxGoO0nNDn39SHH6tyM21JAKo_oN_v_wJXN3c3R6mw8Fo6yFc41STUp3KXIbebHLiHsEV-2N2OJ08blYogy-XDflfHTF7wQ |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqFiE48EYEChgEgku0Gz_q-IBQaVmxallWKqCWS4gdGyrRpGS3VP1r_DpmEiftAuLWA7coGWnt7Od5ZeYbQp54zoWxTsQWriBAscM4VxYcOQbuM7euSJuE_sdtNZmku7t6ukR-dr0wWFbZ6cRGUReVxRz5gClkVhNSJwMfyiKmm6OXh99jnCCFX1q7cRotRLbcyTGEb7MX4034r58yNnr9fuNNHCYMxFakch4XZg17qblMUmUd6AVYLNeGJcZ7aZTzhWTapswyx7hLvDHC6RxMLk-NMQqToaD-V8AlF3DGVqbjt9O9PtzjEP21XEac6-FgxlgCxrCZjHZqAZtBAX-ag99LNM_YvNHV__ltXSNXgqdN19ujcZ0sufIGuXyGf_Em-dQRWFUlrTzdODGupjthoh_FFDUF_5i2WVM3R5l2ziltKi3oNJw7unOc1wf0Hajfg9DXeot8OJfN3SbLZVW6O4SCjiukKRzPlRfceK0Sn6ccHCcujfRrEXneASCzgYkdB4J8yyAiQ6xkPVYi8rgXPWzpR_4m9ApR1AsgY3hzo6q_ZOFFZJ6jL2a5cg48YC7SoYYtaF6AB-214xF5hhjMUK_BYmwe2jNgS8gQlq0rZOIDyygjstphLgsKb5adAi4ij_rHoKrw-1NeuuqokVHgrQsJK1YL8F5Y-uKTcv9rQ3quBRJDDe_--8cfkouA82x7PNm6Ry4xbFVpijVXyfK8PnL3yQX7Y74_qx-Ew0rJ5_NG_C8UzISB |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Prevention+of+Cyber+Security+with+the+Internet+of+Things+Using+Particle+Swarm+Optimization&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Alterazi%2C+Hassan+A&rft.au=Kshirsagar%2C+Pravin+R&rft.au=Manoharan%2C+Hariprasath&rft.au=Selvarajan%2C+Shitharth&rft.date=2022-08-01&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=22&rft.issue=16&rft.spage=6117&rft_id=info:doi/10.3390%2Fs22166117&rft.externalDBID=HAS_PDF_LINK |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |