Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are propose...
Saved in:
Published in | International journal of computer network and information security Vol. 16; no. 3; pp. 1 - 15 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
08.06.2024
|
Online Access | Get full text |
ISSN | 2074-9090 2074-9104 |
DOI | 10.5815/ijcnis.2024.03.01 |
Cover
Loading…
Abstract | Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are proposed for secure data transmission, but the current methods do not provide high accuracy and it provide high computational time. To resolve these problems, an Auto-metric Graph Neural Network for Attack Detection and Secure Data Transmission using Optimized Enhanced Identity-Based Encryption in IoT (AGNN-AWHSE-ST-IoT) is proposed. Primarily, the input data is taken from the NSL-KDD dataset. The input data is gathered with the aid of NSL-KDD is pre-processed using three steps, crisp data conversion, splitting, and normalization. Then the Pre-processed input is fed into the Colour Harmony Algorithm (CHA) based feature selection to select the important features. After feature selection, the preferred features are given to the AGNN classifier. After classifying, the data is given to Enhanced Identity-Based Encryption (EIBE), and it is optimized using Wild Horse Optimizer (WHO) for transmitting the data more safely. The outcomes of the normal data are displayed using the LCD monitor. The AGNN-AWHSE-ST-IoT method is implemented in PYTHON. The AGNN-AWHSE-ST-IoT method attains 8.888%, 13.953%, 19.512% higher accuracy, 2.105%, 6.593%, 8.988% higher cumulative accuracy, 54.285%, 54.285%, 52.941% lower encryption time, 8.2%, 3.3%, 6.9% lower decryption time, 11.627%, 10.344%, 6.666% higher security level and 60.869%, 70% and 64% lower computational time than the existing approaches such as SBAS-ST-IoT, BDN-GWMNN-ST-IoT and DNN-LSTM-ST-IoT respectively. |
---|---|
AbstractList | Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are proposed for secure data transmission, but the current methods do not provide high accuracy and it provide high computational time. To resolve these problems, an Auto-metric Graph Neural Network for Attack Detection and Secure Data Transmission using Optimized Enhanced Identity-Based Encryption in IoT (AGNN-AWHSE-ST-IoT) is proposed. Primarily, the input data is taken from the NSL-KDD dataset. The input data is gathered with the aid of NSL-KDD is pre-processed using three steps, crisp data conversion, splitting, and normalization. Then the Pre-processed input is fed into the Colour Harmony Algorithm (CHA) based feature selection to select the important features. After feature selection, the preferred features are given to the AGNN classifier. After classifying, the data is given to Enhanced Identity-Based Encryption (EIBE), and it is optimized using Wild Horse Optimizer (WHO) for transmitting the data more safely. The outcomes of the normal data are displayed using the LCD monitor. The AGNN-AWHSE-ST-IoT method is implemented in PYTHON. The AGNN-AWHSE-ST-IoT method attains 8.888%, 13.953%, 19.512% higher accuracy, 2.105%, 6.593%, 8.988% higher cumulative accuracy, 54.285%, 54.285%, 52.941% lower encryption time, 8.2%, 3.3%, 6.9% lower decryption time, 11.627%, 10.344%, 6.666% higher security level and 60.869%, 70% and 64% lower computational time than the existing approaches such as SBAS-ST-IoT, BDN-GWMNN-ST-IoT and DNN-LSTM-ST-IoT respectively. |
Author | Kulkarni, Umakant P. Alzubi, Jafar A. Yadawad, Ranganath |
Author_xml | – sequence: 1 givenname: Ranganath surname: Yadawad fullname: Yadawad, Ranganath – sequence: 2 givenname: Umakant P. surname: Kulkarni fullname: Kulkarni, Umakant P. – sequence: 3 givenname: Jafar A. surname: Alzubi fullname: Alzubi, Jafar A. |
BookMark | eNp9kE1OwzAQhS0EEgV6AHa-QIodJ42zjAq0SPwsWsQymtgT6v7Yle2CuBDnJKGwYcFopDca6Xszemfk2DqLhFxyNsolz6_MSlkTRilLsxETI8aPyCBlRZaUnGXHvzMr2SkZhrBiXY1zLgoxIJ_VPrpki9EbRacedkv6iHsPm07iu_Nr2jpPqxhBrek1RlTROEu7vnOLpIGAms634CO9sW_GO7tFGynYbotq75FeQwS68GDD1oTQs_tg7Cut9BtY1dEvZqPpzPmAdB47ELzuvJT_2H1fesC4dPqCnLSwCTj80XPyfHuzmMyS-6fp3aS6T1TKBE846LZshGxaBg3L8hLHBUcEqUWZSlHIFMsmy8YSCo1SchRSs7LkucAihYyLc1IcfJV3IXhsa2Ui9I9ED2ZTc1b3ideHxOs-8ZqJmvUk_0PuvOmC-fiH-QI9zoqo |
CitedBy_id | crossref_primary_10_1186_s13677_024_00699_5 crossref_primary_10_1007_s13198_024_02512_7 |
ContentType | Journal Article |
CorporateAuthor | Department of Computer Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka-580002, India |
CorporateAuthor_xml | – name: Department of Computer Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka-580002, India |
DBID | AAYXX CITATION |
DOI | 10.5815/ijcnis.2024.03.01 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2074-9104 |
EndPage | 15 |
ExternalDocumentID | 10_5815_ijcnis_2024_03_01 |
GroupedDBID | .DC 5VS 8FE 8FG AAYXX ABUWG AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BENPR BGLVJ BPHCQ BVBZV CCPQU CITATION DWQXO GNUQQ HCIFZ K6V K7- KQ8 KWQ OK1 P62 PHGZM PHGZT PIMPY PQQKQ PROAC V3M |
ID | FETCH-LOGICAL-c2031-1adf9b38bf0ab0459e671eea8d39283782e9b4468a7de881e38d099153e72a413 |
ISSN | 2074-9090 |
IngestDate | Tue Jul 01 04:12:13 EDT 2025 Thu Apr 24 23:05:32 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c2031-1adf9b38bf0ab0459e671eea8d39283782e9b4468a7de881e38d099153e72a413 |
OpenAccessLink | https://www.mecs-press.org/ijcnis/ijcnis-v16-n3/IJCNIS-V16-N3-1.pdf |
PageCount | 15 |
ParticipantIDs | crossref_citationtrail_10_5815_ijcnis_2024_03_01 crossref_primary_10_5815_ijcnis_2024_03_01 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-06-08 |
PublicationDateYYYYMMDD | 2024-06-08 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-08 day: 08 |
PublicationDecade | 2020 |
PublicationTitle | International journal of computer network and information security |
PublicationYear | 2024 |
SSID | ssj0000651373 |
Score | 2.3106835 |
Snippet | Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and... |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 1 |
Title | Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method |
Volume | 16 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1bi9NAFICH0n3RB_GK643z4JMhtZlMc3nsSrUKu4i0y-JLmFuk2zaVboK4P8hf6A_wTCadjqsLrhBCSdMhyfk655Iz5xDyUgo2VCKnYV6mLGQ8iUOepqOwZKwsBStpJs3i5OOTZDpnH85GZ73eTy9rqanFQF7-dV3J_0gVj6FczSrZG0jWDYoH8DPKF_coYdz_k4zHTb0J16YnlgzemcrTgam1gQ_9xCZ3tzmE47rmcokTS61tW3Dc3m9modFfaGyucdxgsl_uZnM5TRReIxI1t-XPkQYTVguaNrQw3iUO4Jyigulme2ESEruYxKSS2-92Ijpu21P79u_vAUivbIXsuksEVXfptiqUW1sZXHSN9tw0xRX_Zvn8xKsv3LwE2L-XWi1NxMd8OV_zJdITfBw4tleXjVjYFOGS4wMa-KEPytoULW-2piaZNB_afqMD7R3rehq7KT7xUI69-TryFL9dVnpVpYyytvrG4lxWC1PenbK2KG6015-7nIEratUlO6KbZQYp7BCFGaIYxoVZdHhA0bmhfXJwdHr0-dTFBtEsjOI2OcLdoX0hb8Z5_celeCaVZxvN7pI7nVMDY0voPdLT1X1y2yt1-YD88FiFllWwrELHKqCowbIKjlXAzbEKLavgsQoICVhWwbAKPqvQsgo7VsGwCi2rsGMV9qyCZfUhmb-dzN5Mw65HSCgp6qMw4qrMRZyJcsgFuie5TtJIa54pNPxNswSqc8FYkvFU6SyLdJwpdIpQz-uUcrTgHpF-tan0YwJZLlWkVZwqzlg2StA3EaNIUsXRK6JSH5Lh7jEXsiugb_q4rIprJXxIXrmffLXVY64_-clNTn5Kbu3_Ec9Iv942-jmax7V40dH0C7CHxZM |
linkProvider | ProQuest |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Auto-metric+Graph+Neural+Network+for+Attack+Detection+on+IoT-based+Smart+Environment+and+Secure+Data+Transmission+using+Advanced+Wild+Horse+Standard+Encryption+Method&rft.jtitle=International+journal+of+computer+network+and+information+security&rft.au=Yadawad%2C+Ranganath&rft.au=Kulkarni%2C+Umakant+P.&rft.au=Alzubi%2C+Jafar+A.&rft.date=2024-06-08&rft.issn=2074-9090&rft.eissn=2074-9104&rft.volume=16&rft.issue=3&rft.spage=1&rft.epage=15&rft_id=info:doi/10.5815%2Fijcnis.2024.03.01&rft.externalDBID=n%2Fa&rft.externalDocID=10_5815_ijcnis_2024_03_01 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2074-9090&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2074-9090&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2074-9090&client=summon |