Cargando…

Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks

An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved...

Descripción completa

Detalles Bibliográficos
Autores principales: Aljebreen, Mohammed, Alohali, Manal Abdullah, Saeed, Muhammad Kashif, Mohsen, Heba, Al Duhayyim, Mesfer, Abdelmageed, Amgad Atta, Drar, Suhanda, Abdelbagi, Sitelbanat
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10140898/
https://www.ncbi.nlm.nih.gov/pubmed/37112414
http://dx.doi.org/10.3390/s23084073
_version_ 1785033263501279232
author Aljebreen, Mohammed
Alohali, Manal Abdullah
Saeed, Muhammad Kashif
Mohsen, Heba
Al Duhayyim, Mesfer
Abdelmageed, Amgad Atta
Drar, Suhanda
Abdelbagi, Sitelbanat
author_facet Aljebreen, Mohammed
Alohali, Manal Abdullah
Saeed, Muhammad Kashif
Mohsen, Heba
Al Duhayyim, Mesfer
Abdelmageed, Amgad Atta
Drar, Suhanda
Abdelbagi, Sitelbanat
author_sort Aljebreen, Mohammed
collection PubMed
description An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT. This article presents a Binary Chimp Optimization Algorithm with Machine Learning based Intrusion Detection (BCOA-MLID) technique for secure IoT-WSN. The presented BCOA-MLID technique intends to effectively discriminate different types of attacks to secure the IoT-WSN. In the presented BCOA-MLID technique, data normalization is initially carried out. The BCOA is designed for the optimal selection of features to improve intrusion detection efficacy. To detect intrusions in the IoT-WSN, the BCOA-MLID technique employs a class-specific cost regulation extreme learning machine classification model with a sine cosine algorithm as a parameter optimization approach. The experimental result of the BCOA-MLID technique is tested on the Kaggle intrusion dataset, and the results showcase the significant outcomes of the BCOA-MLID technique with a maximum accuracy of 99.36%, whereas the XGBoost and KNN-AOA models obtained a reduced accuracy of 96.83% and 97.20%, respectively.
format Online
Article
Text
id pubmed-10140898
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-101408982023-04-29 Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks Aljebreen, Mohammed Alohali, Manal Abdullah Saeed, Muhammad Kashif Mohsen, Heba Al Duhayyim, Mesfer Abdelmageed, Amgad Atta Drar, Suhanda Abdelbagi, Sitelbanat Sensors (Basel) Article An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT. This article presents a Binary Chimp Optimization Algorithm with Machine Learning based Intrusion Detection (BCOA-MLID) technique for secure IoT-WSN. The presented BCOA-MLID technique intends to effectively discriminate different types of attacks to secure the IoT-WSN. In the presented BCOA-MLID technique, data normalization is initially carried out. The BCOA is designed for the optimal selection of features to improve intrusion detection efficacy. To detect intrusions in the IoT-WSN, the BCOA-MLID technique employs a class-specific cost regulation extreme learning machine classification model with a sine cosine algorithm as a parameter optimization approach. The experimental result of the BCOA-MLID technique is tested on the Kaggle intrusion dataset, and the results showcase the significant outcomes of the BCOA-MLID technique with a maximum accuracy of 99.36%, whereas the XGBoost and KNN-AOA models obtained a reduced accuracy of 96.83% and 97.20%, respectively. MDPI 2023-04-18 /pmc/articles/PMC10140898/ /pubmed/37112414 http://dx.doi.org/10.3390/s23084073 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Aljebreen, Mohammed
Alohali, Manal Abdullah
Saeed, Muhammad Kashif
Mohsen, Heba
Al Duhayyim, Mesfer
Abdelmageed, Amgad Atta
Drar, Suhanda
Abdelbagi, Sitelbanat
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title_full Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title_fullStr Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title_full_unstemmed Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title_short Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
title_sort binary chimp optimization algorithm with ml based intrusion detection for secure iot-assisted wireless sensor networks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10140898/
https://www.ncbi.nlm.nih.gov/pubmed/37112414
http://dx.doi.org/10.3390/s23084073
work_keys_str_mv AT aljebreenmohammed binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT alohalimanalabdullah binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT saeedmuhammadkashif binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT mohsenheba binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT alduhayyimmesfer binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT abdelmageedamgadatta binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT drarsuhanda binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks
AT abdelbagisitelbanat binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks