999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Energy Aware Secure Cyber-Physical Systems with Clustered Wireless Sensor Networks

2022-11-11 10:48:02MasoudAlajmiMohamedNourSiwarBenHajHassineMimounaAbdullahAlkhonainiManarAhmedHamzaIshfaqYaseenAbuSarwarZamaniandMohammedRizwanullah
Computers Materials&Continua 2022年9期

Masoud Alajmi,Mohamed K.Nour,Siwar Ben Haj Hassine,Mimouna Abdullah Alkhonaini,Manar Ahmed Hamza,Ishfaq Yaseen,Abu Sarwar Zamani and Mohammed Rizwanullah

1Department of Computer Engineering,College of Computers and Information Technology,Taif University,Taif,21944,Saudi Arabia

2Department of Computer Science,College of Computing and Information System,Umm Al-Qura University,Saudi Arabia

3Department of Computer Science,College of Science&Art at Mahayil,King Khalid University,Abha,62529,Saudi Arabia

4Department of Computer Science,College of Computer and Information Sciences,Prince Sultan University,Saudi Arabia

5Department of Computer and Self Development,Preparatory Year Deanship,Prince Sattam bin Abdulaziz University,AlKharj,Saudi Arabia

Abstract: Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical components.The greatly interrelated and united characteristics of CPS resulting in the development of cyber physical energy systems(CPES).At the same time, the rising ubiquity of wireless sensor networks(WSN)in several application areas makes it a vital part of the design of CPES.Since security and energy efficiency are the major challenging issues in CPES,this study offers an energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithms(EASCPSMA).The presented EASCPS-MA technique intends to attain lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm (IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation (RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.

Keywords: Intrusion detection system; metaheuristics; stacked autoencoder;deep learning;cyber physical energy systems;clustering;wsn

1 Introduction

Advances in technologies have been shifting computation to a wide-ranging of devices,involving phones, toys, and home appliances.Besides improving their computational abilities, advancements are also enabling this device to communicate with one another for achieving common or individual objectives which they are unable to attain individually [1].These abilities are bringing novel development and research opportunity to a wide-ranging of application fields, like intelligent road safety, smart grid, and healthcare [2].Also, they are bringing additional problems regarding the control of the physical environments and computational abilities have become an essential component.The idea of Cyber Physical System (CPS)has developed as a potential tool in which the operation of the engineered and physical schemes is integrated, monitored, controlled, and coordinated with the help of communication and computing core [3,4].In this technique, embedded devices, sensors,and actuators are networked for controlling, sensing, and monitoring the physical environment.The growing pervasiveness of wireless sensor networks (WSN)in various applications makes this technology a significant element of CPS design[3].WSN is mainly deployed as interfaces where situ data are gathered from or about the physical environments and then transmitted to the interfaces and cyber environment where novel parameters or instructions are injected from the cyber environments to the physical world.

Previously, various clustering protocol focuses on the multihop inter-clustering [5] among the base station(BS)and the cluster heads(CH)for increased durability of the network,but only a few considered the intra-cluster transmission (among their CH and devices).The structure of clustering process is shown in Fig.1.Existing intra-clustering systems [6].Usually consider direct connections among their CHs and Cluster Members(CMs),hence, a considerable amount of clusters is created.In a largescale network,the distance among their CHs and nodes mayn’t be comparatively short for transmission.Thus,direct transmission becomes obstructive,and k-hop intra-clustering transmission must be used for ensuring the network scalability.Even though information and communication technology(ICT)is progressed highly in CPS,but still cyber-security is considering a major problem in various fields.The most complex vulnerability in CPS is intrusion hazard.Over the last few years,they paid close attention to the development of CPS security [7].Intrusion detection system (IDS)is the most significant application to maximize the security of CPS.Usually,The IDS method is employed to efficiently avoid attacks.In 1980,Anderson proposed the concept of IDS,which is followed by a great amount of researchers on IDS.Generally,IDS methods are classified into 2 main categories:anomaly and misuse predictions.At first,feature of familiar attacks is employed for misuse predictions.Now,the audited data is associated with the dataset and stated as an intrusion.Though misuse detector generates the minimal false positive(FP)rate,this detector has huge drawbacks.For instance,using this detector, maximizing and developing a wide-ranging dataset represents a challenging task, and familiar attacks are predicted[8-10].

Otoum et al.[11] developed a relative analysis of Artificial Intelligence (AI)-driven IDS for wirelessly connected sensor which tracks critical application.Particularly proposed a thorough review of the usage of machine learning(ML),deep learning(DL),and reinforcement learning(RL)solutions to recognize intrusion behaviors in the gathered traffics.Liu et al.[12] examine a hierarchically distributed IDS which searches for achieving the all-around security protection of CPS as per the system architecture and attack kinds.This could implement a joint recursive prediction of measurement noise covariance matrices, dynamic system state, and time-varying process by the variation Bayes approximation architecture.

Figure 1:Overview of clustering process in CPS

In [13], a heterogeneous clustering based secured routing system is presented which offers trust based secured network for detecting black hole and wormhole attacks created by malicious node existence in wireless Adhoc network.The experimental results show that the presented method identifies the malicious node efficiently in wireless Adhoc network.Alqahtani et al.[14] developed a hierarchical DL scheme based on big data for additionally boosting the efficacy of IDS-based ML method.It employs content-functional and behavioral functionality to capture content details and network traffic.All the DL models in the presented architecture aim at learning the certain data distribution in an individual cluster.Quincozes et al.[15] investigate how Feature Selection might enhance IDS precision.Especially, presented and adopted Greedy Randomized Adaptive Search Procedure(GRASP)metaheuristics model for improving the classification accuracy in CPS perception layers.Singh et al.[16]focused on faster prevention and detection of intrusion with an ML method based Gaussian Process Regression (GPR)technique.Also developed three models based feature scaling for precise estimation of k-barrier coverage possibility.

This paper presents energy aware secure cyber physical systems with clustered wireless sensor networks using metaheuristic algorithm(EASCPS-MA).The presented EASCPS-MA technique plans to reach lower energy utilization via clustering and security using intrusion detection.The EASCPSMA technique encompasses two main stages namely improved fruit fly optimization algorithm(IFFOA)based clustering and optimal deep stacked autoencoder(OSAE)based intrusion detection.Besides,the optimal selection of stacked autoencoder(SAE)parameters takes place using root mean square propagation (RMSProp)model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.

The rest of the paper is organized as follows.Section 2 introduces the proposed model and Section 3 validates the performance of the proposed model.Lastly,Section 4 draws the conclusion.

2 The Proposed Model

In this study, an effective EASCPS-MA technique has been presented to reach lower energy utilization via clustering and security using intrusion detection in CPES environment.The EASCPSMA technique encompasses two main stages namely IFFOA based clustering and SAE based intrusion detection.Besides,the optimal selection of SAE parameters takes place using RMSProp model.The detailed processes involved in two stages are offered in the succeeding sections.

2.1 Process Involved in IFFOA Based Clustering Technique

Basic FOA is stimulated by the foraging behavior of fruit flies(FFs).The foraging performance of FFs are divided as to visual and olfactory search stage.During the olfactory foraging,FF places and search food source nearby the population,after evaluating the smell concentration(SC)respective for all feasible food source.During the visual foraging step,an optimum food source with higher odor concentration value is revealed,afterwards the FF group flies near it[17].Based on the food search features of FF swarm,the FOA is separated as to many stages as follows:

Initialization the parameters of FOA like the maximal iteration number the population size, a primary FF swarm place(X-axis,Y-axis),and the arbitrary flight distance range.

To provide an arbitrary place(Xi,Yi)and distance to food search of individual FF,whereisignifies the population size.

Primarily,compute the distance of food place to origin(D).Afterward,calculate the SC judgment value(S)that is the reciprocal of distance of the food place to the origins.

Exchange the SC judgment value(S)with SC judgment function(is also named as FF)for finding the SC(Smell)of individual place of FF.

Define the FF with higher SC and the equivalent place amongst the FF swarm.

Maintain the maximum SC value and co-ordinatesxandy.Afterward,the FF swarm flies nearby the place with higher SC value.

The circulation stops if the SC is no longer higher than the preceding iterative SC or once the iterative number obtains the higher iterative number.

Rather than creating novel solution by altering each decision variable of the population locations such as the original FOA,IFFOA creates novel solution by arbitrarily electing indexes to improve the search.

where,λsignifies the searching radius of FF in all the iterations,λmaxrepresent the maximal searching radius,andλmindenotes the minimal searching radius.Iter denotes the existing number of iterations,and Max-Iterindicates the maximal number of iterations.

d∈{1,2,...,n}shows an index arbitrarily chosen from uniformly distributed decision variable,nimplies the dimensions of the solutions,rand()means an arbitrary value in[0,1],and the position ofxi,jis upgraded using Eq.(2).Δjsignifies the value of the optimum solution in thejthparameter.The proposed IFFOA based clustering method focuses on dividingnsensors as to optimal or existing number of clustersCopt.In the clustering, the neighboring nodes have been chosen for CH using Euclidean distance that generate user which minimal transmission range outcomes from decreased energy consumption as illustrated in Fig.2.However,it can be difficult to identify the distance from mobile conditions.To solve the issue,the distance for adjacent Node is determined by MEEDG-CSN technique.For creating and selecting CH,the IFFOA based clustering method consider this problem as maximization problem and derive as FF contain degree(DEG),residual energy(RDE),and average distance to neighbors(ADTN).The fitnessfunction(FF)was defined by:

Figure 2:Overall pipeline of EASCPS-MA technique

Whereasα+β+γ= 1.Mostly,the RDE of sensor node(SN)(x)in the transmission ofkbit data to get SN(y)i.e.,located at distanced,as follows

In whichErepresent the present energy level of SN andETdenotes the energy spent on data transmission.

WhileEedetermines the energy of electron andEaindicates the amplified energy,ERimplies the energy consumed on data reception as follows

Furthermore, the AADTN indicates the average value of distance of the neighboring SN from their 1-hop transmission range.

At a time t,the DEG denotes the SN degree represents the number of neighboring nodes present to SN as:

2.2 Process Involved in OSAE Based Intrusion Detection Technique

At this stage,the OSAE model can be applied for the detection and classification of intrusions.The SAE employed in this work was proposed by several Logistic Regression(LR)and autoencoder(AE)layers[18].The AE is a basic unit of SAE classification model.It is made up of decode or reconstruction phase(Layer 2 to Layer 3)and encoder phase(Layer 1 to Layer 2).This procedure is shown as(1)and(2),whereasWandWT(transpose of W)represent weight matrix ofbandb′mode are 2 dissimilar bias vectors of this modesis determined as non-linearity function like sigmoid function employed;yindicates a latent parameter implication of input layerx,andzis considered as a prediction ofxgivenyhas same shape asx.

Several AE layer is jointly stacked in unsupervised pretraining stage (Layer 1 to 4).The second depiction′y′processed by AE was employed as input to forthcoming AE layer.The layer undertakes training as AE by decreasing reconstruction error, which is calculated concurrently [15].Next,reconstructing error (loss functionL(x,z))is evaluated in huge iteration.Now, it employs crossentropy to measure reconstructing errors,as shown below,whereasxkandzkrepresentkrhelement ofxandz,respectively.

The reconstructing error is constrained under the application of gradient descent (GD).The weights should be upgraded according to the Eqs.(23)-(25)whereasLdenotes a learning rate.

When the layer is pre-trained,a model is supervised under finetuning phase.From supervised finetuning phase,an LR layer was added in an output layer of unsupervised pretrained stage.In the study,probability with input vectorx(Layer 4)derives under the classi,in whichydetermines a forecasted class of input vectorx,·Wandbillustrates a weight matrix and a bias vector, respectively,WjandWjindicates theirhandjthrow of matrixW,respectively;bjandbjillustratesithandjthpart of vector,bindividually, and softmax is a non-linearity function employed in the study.A class with maximal probability is assumed as prediction labelypredof input vectorx,as follows.

For optimal parameter tuning of the SAE model,the RMSProp model can be utilized to increase the detection rate.is an optimization method developed in [19].To additionally enhance the loss function in the upgrade of the problems of excessive swing and accelerate the convergence function,RMSProp method utilized the differential squared weighted average for the gradient of bias b and weight W.The sum of squares of past gradient is small owing to gentler direction, which results in small learning drop.

whereassdwandsdbrepresent the gradient and gradient momentum gathered using the loss function in the preceding iteration t - 1 andβvector represent an exponential of gradient.To prevent the denominator becomes 0,εis going to be a smaller number.RMSProp assists in eliminating the direction of the larger swing and utilized for correcting the swing thus the swing in all the dimensions are small.At the same time, it makes the network function converge fast.RMSProp is same as momentum in that it removes the wobble in gradient descent, includes minibatch gradient descent,and permits to utilization of a high learning rate a to accelerate learning model.

Algorithm 1:Fruit fly optimization algorithm Initialize parameters NP,T,randValue;Arbitrarily initialize population location(X -axis,Yaxis);Xi =Xaxis+rand_Value;Yi =Yaxis+rand_Value;Dist=images/BZ_1248_443_677_481_723.png+Y2 Si = 1 X2i i;Dist;Smelli =fitn(Si);[best_Smell,best_Index]=min m(Smell);smell_Best=best_Smell;Xi =Xaxis+rand_Value;Yi =Yaxis+rand_Value;while t <T Xi =Xaxis+rand_Value;Yi =Yaxis+rand_Value;Dist=images/BZ_1248_592_1263_630_1309.png+Y2 Si = 1 X2i i;Dist;Smelli =fitn(Si);[best_Smell,best_Index]=min(Smell);If[best_Smell,best_index]=min(Smell);smell_Best=best_Smell X =X(best_Index);Y =Y(best_Index);End if t=t+1;End while

3 Experimental Validation

This section investigates the performance analysis of the EASCPS-MA technique with recent methods [19,20] in terms of different measures.Tab.1 and Fig.3 offer the average number of CHs (ANCH)analysis of the EASCPS-MA technique with other methods under dissimilar nodes.The results show that the EASCPS-MA technique has offered lower ANCH under all nodes.For instance,on 200 nodes,the EASCPS-MA technique has provided a minimum ANCH of 56 whereas the multihop low energy adaptive clustering hierarchy (MH_LEACH), Mezghani, and Distributed Clustering based 2-Hop Connectivity (DC2HC)techniques have attained maximum ANCH of 149,78,and 72 respectively.Also,on 1000 nodes,the EASCPS-MA technique has gained a reduced ANCH of 76 whereas the MH_LEACH,Mezghani,and D2MHC techniques have obtained increased ANCH of 235,110,and 98 respectively.

Tab.2 and Fig.4 depict the average energy consumed (ACM)analysis of the EASCPS-MA technique with existing techniques under dissimilar nodes.The experimental values defined that the EASCPS-MA technique has resulted in decreased ACM under all nodes.For instance, on 200 nodes, the EASCPS-MA technique has attained a lower ACM of 4.92J whereas the MH_LEACH,Mezghani,and D2MHC techniques have provided higher ACM of 8.03J,16.39J,and 9.20J respectively.In addition,on 1000 nodes,the EASCPS-MA technique has resulted to least ACM of 18.91J whereas the MH_LEACH,Mezghani,and D2MHC techniques have reached to raised ACM of 51.16J,49.22J,and 35.23J respectively.

Table 1: ANCH analysis of EASCPS-MA technique

Figure 3:Comparative ANCH analysis of EASCPS-MA technique

Table 2: AEC analysis of EASCPS-MA technique

Figure 4:Comparative AEC analysis of EASCPS-MA technique

The first node death (FNDH)and last node death (LNDH)analysis of the EASCPS-MA technique is inspected in Tab.3.Fig.5 examines the FNDH analysis of the EASCPS-MA technique under distinct nodes and the experimental results reported that the EASCPS-MA technique has gained improved lifetime.For instance, with 200 nodes, the EASCPS-MA technique has reached improved FNDH of 1476 rounds whereas the MH_LEACH,Mezghani,and D2MHC techniques have attained reduced FNDH of 1476,1709,and 1969 rounds respectively.Moreover,on 1000 nodes,the EASCPS-MA technique has provided maximum FNDH of 2922 rounds whereas the MH_LEACH,Mezghani, and D2MHC techniques have accomplished minimum FNDH of 1697, 2565, and 2723 rounds respectively.

Table 3: FNDH and LNDH analysis of EASCPS-MA technique

Figure 5:Comparative FNDH analysis of EASCPS-MA technique

Fig.6 observes the LNDH analysis of the EASCPS-MA technique under distinctive nodes and the simulation outcomes revealed that the EASCPS-MA technique has extended to enhanced lifetime.For instance,with 200 nodes,the EASCPS-MA technique has demonstrated better LNDH of 29925 rounds whereas the MH_LEACH,Mezghani,and D2MHC techniques have attained reduced LNDH of 23901, 23270, and 29504 rounds respectively.Furthermore, on 1000 nodes, the EASCPS-MA technique has provided superior LNDH of 21379 rounds whereas the MH_LEACH,Mezghani,and D2MHC techniques have depicted inferior LNDH of 15496,11363,and 16827 rounds respectively.

Figure 6:Comparative LNDH analysis of EASCPS-MA technique

An overall IDS results of the EASCPS-MA technique on the detection of several attacks are provided in Tab.4 and Fig.7.The results denoted that the EASCPS-MA technique has identified the DoS attacks with thecn,recl,Fmeas,andaccuyof 97.25%,98.75%,98.39%,and 98.56%.Eventually,the EASCPS-MA technique has detected the root to local(R2l)attacks with thecn,recl,Fmeas,andaccuyof 98.785%,98.82%,99.44%,and 99.12%.Meanwhile,the EASCPS-MA technique has identified the User to Root(U2R)attacks with thecn,recl,Fmeas,andaccuyof 98.20%,99.14%,98.77%,and 99.15%.

Table 4: Intrusion detection analysis of EASCPS-MA technique

Figure 7:Overall intrusion detection analysis of EASCPS-MA technique

Finally, an overall comparison study of the intrusion results offered by the EASCPS-MA technique with recent methods in Tab.5 and Fig.8.The results show that the decision tree(DT)model has gained least outcome with the minimal values of thecn,recl,Fmeas, andaccuy.At the same time,the improved deep belief network(IDBN),random forest(RF),and support vector machine(SVM)models have shown moderately closer values ofcn,recl,Fmeas,andaccuy.

Table 5: Comparative intrusion detection analysis of EASCPS-MA technique

Figure 8:Comparison study of intrusion detection results of EASCPS-MA technique

Likewise, the PT-DSAE model has accomplished considerable outcomes with thecn,recl,Fmeas,andaccuyof 97.95%,92.16%,90.89%,and 96.18%respectively.However,the EASCPS-MA technique has outperformed the other methods with thecn,recl,Fmeas,andaccuyof 98.45%,99.15%,99.16%,and 99.09%respectively.By observing the analysis of the detailed results,it is confirmed that the EASCPSMA technique can accomplish improved clustering and intrusion detection performance compared to recent methods interms of several measures.

4 Conclusion

In this study, an effective EASCPS-MA technique has been presented to reach lower energy utilization via clustering and security using intrusion detection in CPES environment.The EASCPSMA technique encompasses two main stages namely IFFOA based clustering and OSAE based intrusion detection.Besides, the optimal selection of SAE parameters takes place using RMSProp model.The extensive performance validation of the EASCPS-MA technique takes place and the results are inspected under varying aspects.The simulation results reported the improved effectiveness of the EASCPS-MA technique over other recent approaches interms of several measures.Therefore,the EASCPS-MA technique can be used as an effective tool for accomplishing energy efficiency and security.In future,the EASCPS-MA technique can be extended to the design of hybrid DL model to enhance security.

Funding Statement:This study was funded by the Deanship of Scientific Research, Taif University Researchers Supporting project number(TURSP-2020/195),Taif University,Taif,Saudi Arabia.The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number (RGP 2/25/43).The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4310373DSR02).The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges(APC)of this publication.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 亚洲综合色吧| 成人免费视频一区| 制服丝袜无码每日更新| 亚洲日本中文字幕乱码中文| 久久免费成人| 国产成人亚洲毛片| 成人韩免费网站| 天天综合网色中文字幕| 亚洲人成网线在线播放va| 亚洲动漫h| 欧美日本视频在线观看| 国产人妖视频一区在线观看| 香蕉久久国产精品免| 欧美成一级| 亚洲欧洲国产成人综合不卡| 国产亚洲精品自在线| 露脸国产精品自产在线播| 日韩精品毛片| 国产精品部在线观看| 亚洲欧美日韩视频一区| 成人午夜视频网站| 爆操波多野结衣| 国产在线精彩视频论坛| 91香蕉视频下载网站| 亚洲欧洲日产国产无码AV| 免费国产一级 片内射老| 毛片国产精品完整版| 久久香蕉国产线看观看精品蕉| 91精品最新国内在线播放| 国产成人无码Av在线播放无广告 | 久久久无码人妻精品无码| 在线观看国产精美视频| 四虎AV麻豆| 中日无码在线观看| 男女精品视频| 2021国产在线视频| 日韩在线2020专区| 91美女视频在线| 亚洲国产系列| 国产精品自拍露脸视频| 久久男人视频| 91成人免费观看| 国产精品部在线观看| 五月天久久综合国产一区二区| 久久一级电影| 91久久偷偷做嫩草影院电| 无码在线激情片| 这里只有精品在线| 久久精品一品道久久精品| 国产区免费精品视频| 亚洲高清无码精品| 91久久精品日日躁夜夜躁欧美| 一级成人欧美一区在线观看| 99精品伊人久久久大香线蕉| 久久亚洲国产视频| 日韩国产综合精选| 99精品伊人久久久大香线蕉| 亚洲日产2021三区在线| 国内a级毛片| 亚洲欧洲日产国码无码av喷潮| 青青草91视频| 亚洲国产精品日韩欧美一区| 国产精品观看视频免费完整版| 三区在线视频| 亚洲黄色视频在线观看一区| 性色一区| 九九久久精品免费观看| 国产99视频免费精品是看6| 一本大道香蕉高清久久| 亚洲日韩精品欧美中文字幕| 国产成人综合日韩精品无码首页| 国产日本视频91| 黄色免费在线网址| 亚洲一区波多野结衣二区三区| 男女猛烈无遮挡午夜视频| 国产精品久久久久久久伊一| 亚洲国产av无码综合原创国产| 2021国产乱人伦在线播放 | 国产欧美在线| a级毛片网| 欧美福利在线| 高h视频在线|