Cargando…
Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks
An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10140898/ https://www.ncbi.nlm.nih.gov/pubmed/37112414 http://dx.doi.org/10.3390/s23084073 |
_version_ | 1785033263501279232 |
---|---|
author | Aljebreen, Mohammed Alohali, Manal Abdullah Saeed, Muhammad Kashif Mohsen, Heba Al Duhayyim, Mesfer Abdelmageed, Amgad Atta Drar, Suhanda Abdelbagi, Sitelbanat |
author_facet | Aljebreen, Mohammed Alohali, Manal Abdullah Saeed, Muhammad Kashif Mohsen, Heba Al Duhayyim, Mesfer Abdelmageed, Amgad Atta Drar, Suhanda Abdelbagi, Sitelbanat |
author_sort | Aljebreen, Mohammed |
collection | PubMed |
description | An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT. This article presents a Binary Chimp Optimization Algorithm with Machine Learning based Intrusion Detection (BCOA-MLID) technique for secure IoT-WSN. The presented BCOA-MLID technique intends to effectively discriminate different types of attacks to secure the IoT-WSN. In the presented BCOA-MLID technique, data normalization is initially carried out. The BCOA is designed for the optimal selection of features to improve intrusion detection efficacy. To detect intrusions in the IoT-WSN, the BCOA-MLID technique employs a class-specific cost regulation extreme learning machine classification model with a sine cosine algorithm as a parameter optimization approach. The experimental result of the BCOA-MLID technique is tested on the Kaggle intrusion dataset, and the results showcase the significant outcomes of the BCOA-MLID technique with a maximum accuracy of 99.36%, whereas the XGBoost and KNN-AOA models obtained a reduced accuracy of 96.83% and 97.20%, respectively. |
format | Online Article Text |
id | pubmed-10140898 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101408982023-04-29 Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks Aljebreen, Mohammed Alohali, Manal Abdullah Saeed, Muhammad Kashif Mohsen, Heba Al Duhayyim, Mesfer Abdelmageed, Amgad Atta Drar, Suhanda Abdelbagi, Sitelbanat Sensors (Basel) Article An Internet of Things (IoT)-assisted Wireless Sensor Network (WSNs) is a system where WSN nodes and IoT devices together work to share, collect, and process data. This incorporation aims to enhance the effectiveness and efficiency of data analysis and collection, resulting in automation and improved decision-making. Security in WSN-assisted IoT can be referred to as the measures initiated for protecting WSN linked to the IoT. This article presents a Binary Chimp Optimization Algorithm with Machine Learning based Intrusion Detection (BCOA-MLID) technique for secure IoT-WSN. The presented BCOA-MLID technique intends to effectively discriminate different types of attacks to secure the IoT-WSN. In the presented BCOA-MLID technique, data normalization is initially carried out. The BCOA is designed for the optimal selection of features to improve intrusion detection efficacy. To detect intrusions in the IoT-WSN, the BCOA-MLID technique employs a class-specific cost regulation extreme learning machine classification model with a sine cosine algorithm as a parameter optimization approach. The experimental result of the BCOA-MLID technique is tested on the Kaggle intrusion dataset, and the results showcase the significant outcomes of the BCOA-MLID technique with a maximum accuracy of 99.36%, whereas the XGBoost and KNN-AOA models obtained a reduced accuracy of 96.83% and 97.20%, respectively. MDPI 2023-04-18 /pmc/articles/PMC10140898/ /pubmed/37112414 http://dx.doi.org/10.3390/s23084073 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Aljebreen, Mohammed Alohali, Manal Abdullah Saeed, Muhammad Kashif Mohsen, Heba Al Duhayyim, Mesfer Abdelmageed, Amgad Atta Drar, Suhanda Abdelbagi, Sitelbanat Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title | Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title_full | Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title_fullStr | Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title_full_unstemmed | Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title_short | Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks |
title_sort | binary chimp optimization algorithm with ml based intrusion detection for secure iot-assisted wireless sensor networks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10140898/ https://www.ncbi.nlm.nih.gov/pubmed/37112414 http://dx.doi.org/10.3390/s23084073 |
work_keys_str_mv | AT aljebreenmohammed binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT alohalimanalabdullah binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT saeedmuhammadkashif binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT mohsenheba binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT alduhayyimmesfer binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT abdelmageedamgadatta binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT drarsuhanda binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks AT abdelbagisitelbanat binarychimpoptimizationalgorithmwithmlbasedintrusiondetectionforsecureiotassistedwirelesssensornetworks |