Your browser doesn't support javascript.
loading
Towards secure IoT networks: A comprehensive study of metaheuristic algorithms in conjunction with CNN using a self-generated dataset.
Choudhary, Vandana; Tanwar, Sarvesh; Choudhury, Tanupriya; Kotecha, Ketan.
Afiliación
  • Choudhary V; Amity Institute of Information Technology, Amity University, Noida 201313, India.
  • Tanwar S; Amity Institute of Information Technology, Amity University, Noida 201313, India.
  • Choudhury T; Research Professor, CSE Department, Graphic Era Deemed to be University, Dehradun, Uttarakhand 248002, India.
  • Kotecha K; Adjunct Professor, CSE Department, Symbiosis Institute of Technology, Symbiosis International (Deemed University) (SIU), Lavale Campus, Pune, Maharashtra 412115, India.
MethodsX ; 12: 102747, 2024 Jun.
Article en En | MEDLINE | ID: mdl-38774685
ABSTRACT
The Internet of Things (IoT) has radically reformed various sectors and industries, enabling unprecedented levels of connectivity and automation. However, the surge in the number of IoT devices has also widened the attack surface, rendering IoT networks potentially susceptible to a plethora of security risks. Addressing the critical challenge of enhancing security in IoT networks is of utmost importance. Moreover, there is a considerable lack of datasets designed exclusively for IoT applications. To bridge this gap, a customized dataset that accurately mimics real-world IoT scenarios impacted by four different types of attacks-blackhole, sinkhole, flooding, and version number attacks was generated using the Contiki-OS Cooja Simulator in this study. The resulting dataset is then consequently employed to evaluate the efficacy of several metaheuristic algorithms, in conjunction with Convolutional Neural Network (CNN) for IoT networks. •The proposed study's goal is to identify optimal hyperparameters for CNNs, ensuring their peak performance in intrusion detection tasks.•This study not only intensifies our comprehension of IoT network security but also provides practical guidance for implementation of the robust security measures in real-world IoT applications.
Palabras clave

Texto completo: 1 Bases de datos: MEDLINE Idioma: En Revista: MethodsX Año: 2024 Tipo del documento: Article País de afiliación: India

Texto completo: 1 Bases de datos: MEDLINE Idioma: En Revista: MethodsX Año: 2024 Tipo del documento: Article País de afiliación: India