IJSREG Trion Studio

No Publication Cost

Vol 10, No 3:

subscription

Energy-Efficient Path Selection Based on Deep Neural Networks and Security Management in IoT
Abstract
In this study, the internet of things (IoT) security and energy improvement aims can be reconciled by employing the energy-efficient path selection technique. The suggested approach combines machine learning, security, deep learning, and IOT energy improvement. To produce the data, first establish the network, then carry out attacks and confirm the paths. Build a neural network with performance evaluation and predicting skills. Nodes in a network are therefore by definition negative. The optimum line of action must then be chosen. To anticipate energy by utilising the stolen time, total time, total energy, and packet delivery rate parameters, deep learning with deep neural networks, IOT, and security management are required. By employing deep neural networks to forecast energy and life maximization, deep learning, management, and longevity energy efficiency can be improved. All of the following are measured: the speed of packet delivery, total energy used, total time used, and stolen time. Here the highest number is 500 that is used to process 500 packets using a neural network. With an improvement of 100, 200, 300, and 400 packets, the lowest theft rate of theft acquired by 500 packets is 2.5. The entire amount of time spent was 364.10 seconds, with a packet delivery rate of 81.24.
Full Text
PDF
References
1. A.K. Agarwal; R.K. Jindal; D. Chaudhary; R.G. Tiwari and M. Sharma; (2022) Security and Privacy Concerns in the Internet of Things: A Comprehensive Review. 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), 254–259.
2. A.O. Khadidos; S. Shitharth; A.O. Khadidos; K. Sangeetha and K.H, Alyoubi; Healthcare Data Security using IoT Sensors Based on Random Hashing Mechanism. Journal of Sensors, 2022, p. 8457116 (2022).
3. A.M. Al-Shahrani; A. Rizwan; M. Sánchez-Chero; C.E. Rosas-Prado; E.B. Salazar and N.A. Awad; An Internet of Things (IoT)-Based Optimization to Enhance Security in Healthcare Applications. Mathematical Problems in Engineering, 2022, p. 6802967 (2022).
4. A. Rejeb; K. Rejeb; H. Treiblmaier; A. Appolloni; S. Alghamdi; Y. Alhasawi and M. Iranmanesh; The Internet of Things (IoT) in healthcare: Taking stock and moving forward. Internet of Things, 22, p. 100721 (2023).
5. B. Wu; X. Lv; W.D. Shamsi and E.G. Dizicheh; Optimal Deploying IoT Services on the Fog Computing: A Metaheuristic-based Multi-objective Approach. Journal of King Saud University - Computer and Information Sciences, 34(10), 10010–10027 (2022).
6. B.YuceandY.Rezgui;AnANN-GASemanticRule-BasedSystemtoReducetheGapBetweenPredicted and Actual Energy Consumption in Buildings. IEEE Transactions on Automation Science and Engineering, 14(3), 1351–1363 (2017).
7. C. Chilipirea; A. Ursache; D.O. Popa and F. Pop; (2016) Energy Efficiency and Robustness for IoT: Building a Smart Home Security System. 2016 IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 43–48.
8. D. Dudeja; S.Y. Hera; N.V. Doohan; N. Dubey; R. Mahaveerakannan; T.A. Ahanger and S.K. Hinga; Energy Efficient and Secure Information Dissemination in Heterogeneous Wireless Sensor Networks using Machine Learning Techniques. Wireless Communications and Mobile Computing, 2022, p. 2206530 (2022).
9. D.E. Ott; (2016) IoT Security through the Lens of Energy Efficiency: Energy as a First-Order Security Consideration. 2016 Cybersecurity Symposium (CYBERSEC), Coeur d'Alene, ID, USA, 20–25.
10. E. Honkavaara; M.A. Eskelinen; I. Polonen; H. Saari; H. Ojanen; R. Mannila; C. Holmlund; T. Hakala; P. Litkey; T. Rosnell; N. Viljanen and M. Pulkkanen; Remote Sensing of 3-D Geometry and Surface Moisture of a Peat Production Area using Hyperspectral Frame Cameras in Visible to Short-Wave Infrared Spectral Ranges Onboard a Small Unmanned Airborne Vehicle (UAV). IEEE Transactions on Geoscience and Remote Sensing, 54(9), 5440–5454 (2016).
11. E. Yaacoub; A. Chehab; M. Al-Husseini; K. Abualsaud; T. Khattab and M. Guizani; (2019) Joint Security and Energy Efficiency in IoT Networks Through Clustering and Bit Flipping. 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), Tangier, Morocco, 1385–1390.
12. F. Luo; T. Feng and L. Zheng; Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network. Security and Communication Networks, 2021, p. 8090547 (2021).
13. H.U. Khan; M. Sohail; F. Ali; S. Nazir; Y.Y. Ghadi and I. Ullah; Prioritizing the Multi-Criterial Features based on Comparative Approaches for Enhancing Security of IoT Devices. Physical Communication, 59, p. 102084 (2023).
14. J. Höglund; M. Furuhed and S. Raza; Lightweight Certificate Revocation for Low-Power IoT with end-to- end Security. Journal of Information Security and Applications, 73, p. 103424 (2023).
15. J. Huang; Energy Efficiency Improvement of Composite Energy Building Energy Supply System Based on Multiobjective Network Sensor Optimization. Journal of Sensors, 2022, p. 6935830 (2022).
16. J.P.A. Yaacoub; H.N. Noura and O. Salman; Security of Federated Learning with IoT Systems: Issues, Limitations, Challenges, and Solutions. Internet of Things and Cyber-Physical Systems, 3, 155–179 (2023).
17.J. Wang; C. Liu; J. Xu; J. Wang; S. Hao; W. Yi, and J. Zhong; IoT-DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning. Security and Communication Networks, 2022, p. 1443978 (2022).
18.J.Y. Lee and J. Lee; Current Research Trends in IoT Security: A Systematic Mapping Study. Mobile Information Systems, 2021, p. 8847099 (2021).
19. K. Ho-Van and T. Do-Dac; Relay Selection for Security Improvement in Cognitive Radio Networks with Energy Harvesting. Wireless Communications and Mobile Computing, 2021, p. 9921782 (2021).
20. L. Elhaloui; M. Tabaa; S. Elfilali and E. Benlahmer; Dynamic Security of IoT Network Traffic using SDN. Procedia Computer Science, 220, 356–363 (2023).
21. L. Salman; S. Salman; S. Jahangirian; M. Abraham; F. German; C. Blair and P. Krenz; (2016) Energy Efficient IoT-based Smart Home. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 526–529.
22. L. Xu; H. Yin; H. Jia; W. Lin; X. Zhou; Y. Fu and X. Yu; Data Secure Transmission Intelligent Prediction Algorithm for Mobile Industrial IoT Networks. Digital Communications and Networks, 9(2), 400–410 (2023)
23.L. Zhu and L. Huang; A Resource Scheduling Method for Enterprise Management Based on Artificial Intelligence Deep Learning. Mobile Information Systems, 2022, p. 4277149 (2022).
24. M.B. Alazzam; F. Alassery and A. Almulihi; Federated Deep Learning Approaches for the Privacy and Security of IoT Systems. Wireless Communications and Mobile Computing, 2022, p. 1522179 (2022).
25.M. Kumar; P. Mukherjee; S. Verma; Kavita; J. Shafi; M. Wozniak and M.F. Ijaz; A Smart Privacy Preserving Framework for Industrial IoT using Hybrid Meta-Heuristic Algorithm. Scientific Reports, 13(1), p. 5372 (2023).
26.M. Mittal; R.P. De-Prado; Y. Kawai; S. Nakajima and J.E. Muñoz-Expósito; Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks. Energies, 14(11), p. 3125 (2021).
27. M. Moradi; M. Moradkhani and M.B. Tavakoli; Security-Level Improvement of IoT-Based Systems using Biometric Features. Wireless Communications and Mobile Computing, 2022, p. 8051905 (2022).
28.M.S. Ahmad and S.M. Shah; Unsupervised Ensemble Based Deep Learning Approach for Attack Detection in IoT Network. Concurrency and Computation: Practice and Experience, 34(27), p. e7338 (2022).
29.P. Kanuch and D. Macko; (2019) Optimizing Energy Efficiency of Secured IoT Communication by OpenHip. 2019 42nd International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary, 174–177.
30.R. Zgheib; G. Chahbandarian; F. Kamalov; H.E. Messiry and A. Al-Gindy; Towards an ML-based Semantic IoT for Pandemic Management: A Survey of Enabling Technologies for COVID-19. Neurocomputing, 528, 160–177 (2023).
31.S. Bharati and P. Podder; Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions. Security and Communication Networks, 2022, p. 8951961 (2022).
32. S. Cha; S. Baek; S. Kang and S. Kim; Security Evaluation Framework for Military IoT Devices. Security and Communication Networks, 2018, p. 6135845 (2018).
33. S. Dharur; C. Hota and K. Swaminathan; (2017) Energy Efficient IoT Framework for Smart Buildings. 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), 793–800.
34. S. Hameed; F.I. Khan and B. Hameed; Understanding Security Requirements and Challenges in Internet of Things (IoT): A Review. Journal of Computer Networks and Communications, 2019, p. 9629381 (2019).
35. S. Rani; A. Kataria; V. Sharma; S. Ghosh; V. Karar; K. Lee and C. Choi; Threats and Corrective Measures for IoT Security with Observance of Cybercrime: A Survey. Wireless Communications and Mobile Computing, 2021, p. 5579148 (2021).
36. T. Qureshi; M. Saeed; K. Ahsan; A.A. Malik; E.S. Muhammad and N. Touheed; Smart Agriculture for Sustainable Food Security Using Internet of Things (IoT). Wireless Communications and Mobile Computing, 2022, p. 9608394 (2022).
37. W.K.A. Hasan; Y. Ran; J. Agbinya and G. Tian; (2019) A Survey of Energy Efficient IoT Network in Cloud Environment. 2019 Cyber-Security and Cyber-Forensics Conference (CCC), Melbourne, VIC, Australia, 13–21.
38. W. Wang; Y. Sun and Y. Li; Security-Enhanced Certificate-Based Remote Data Integrity Batch Auditing for Cloud-IoT. Security and Communication Networks, 2022, p. 7882662 (2022).
39. Z.A. Khan and P. Herrmann; (2021) Energy-efficient Protection of IoT Networks using Trust Management on the IEEE 802.15.4 Protocol. 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 1–7.

ISSN(P) 2350-0174

ISSN(O) 2456-2378

Journal Content
Browser