Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method

Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are propose...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of computer network and information security Vol. 16; no. 3; pp. 1 - 15
Main Authors Yadawad, Ranganath, Kulkarni, Umakant P., Alzubi, Jafar A.
Format Journal Article
LanguageEnglish
Published 08.06.2024
Online AccessGet full text
ISSN2074-9090
2074-9104
DOI10.5815/ijcnis.2024.03.01

Cover

Loading…
Abstract Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are proposed for secure data transmission, but the current methods do not provide high accuracy and it provide high computational time. To resolve these problems, an Auto-metric Graph Neural Network for Attack Detection and Secure Data Transmission using Optimized Enhanced Identity-Based Encryption in IoT (AGNN-AWHSE-ST-IoT) is proposed. Primarily, the input data is taken from the NSL-KDD dataset. The input data is gathered with the aid of NSL-KDD is pre-processed using three steps, crisp data conversion, splitting, and normalization. Then the Pre-processed input is fed into the Colour Harmony Algorithm (CHA) based feature selection to select the important features. After feature selection, the preferred features are given to the AGNN classifier. After classifying, the data is given to Enhanced Identity-Based Encryption (EIBE), and it is optimized using Wild Horse Optimizer (WHO) for transmitting the data more safely. The outcomes of the normal data are displayed using the LCD monitor. The AGNN-AWHSE-ST-IoT method is implemented in PYTHON. The AGNN-AWHSE-ST-IoT method attains 8.888%, 13.953%, 19.512% higher accuracy, 2.105%, 6.593%, 8.988% higher cumulative accuracy, 54.285%, 54.285%, 52.941% lower encryption time, 8.2%, 3.3%, 6.9% lower decryption time, 11.627%, 10.344%, 6.666% higher security level and 60.869%, 70% and 64% lower computational time than the existing approaches such as SBAS-ST-IoT, BDN-GWMNN-ST-IoT and DNN-LSTM-ST-IoT respectively.
AbstractList Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and efficiency. The key concerns in most SCs that immediately impact network performance are security and privacy. Numerous approaches are proposed for secure data transmission, but the current methods do not provide high accuracy and it provide high computational time. To resolve these problems, an Auto-metric Graph Neural Network for Attack Detection and Secure Data Transmission using Optimized Enhanced Identity-Based Encryption in IoT (AGNN-AWHSE-ST-IoT) is proposed. Primarily, the input data is taken from the NSL-KDD dataset. The input data is gathered with the aid of NSL-KDD is pre-processed using three steps, crisp data conversion, splitting, and normalization. Then the Pre-processed input is fed into the Colour Harmony Algorithm (CHA) based feature selection to select the important features. After feature selection, the preferred features are given to the AGNN classifier. After classifying, the data is given to Enhanced Identity-Based Encryption (EIBE), and it is optimized using Wild Horse Optimizer (WHO) for transmitting the data more safely. The outcomes of the normal data are displayed using the LCD monitor. The AGNN-AWHSE-ST-IoT method is implemented in PYTHON. The AGNN-AWHSE-ST-IoT method attains 8.888%, 13.953%, 19.512% higher accuracy, 2.105%, 6.593%, 8.988% higher cumulative accuracy, 54.285%, 54.285%, 52.941% lower encryption time, 8.2%, 3.3%, 6.9% lower decryption time, 11.627%, 10.344%, 6.666% higher security level and 60.869%, 70% and 64% lower computational time than the existing approaches such as SBAS-ST-IoT, BDN-GWMNN-ST-IoT and DNN-LSTM-ST-IoT respectively.
Author Kulkarni, Umakant P.
Alzubi, Jafar A.
Yadawad, Ranganath
Author_xml – sequence: 1
  givenname: Ranganath
  surname: Yadawad
  fullname: Yadawad, Ranganath
– sequence: 2
  givenname: Umakant P.
  surname: Kulkarni
  fullname: Kulkarni, Umakant P.
– sequence: 3
  givenname: Jafar A.
  surname: Alzubi
  fullname: Alzubi, Jafar A.
BookMark eNp9kE1OwzAQhS0EEgV6AHa-QIodJ42zjAq0SPwsWsQymtgT6v7Yle2CuBDnJKGwYcFopDca6Xszemfk2DqLhFxyNsolz6_MSlkTRilLsxETI8aPyCBlRZaUnGXHvzMr2SkZhrBiXY1zLgoxIJ_VPrpki9EbRacedkv6iHsPm07iu_Nr2jpPqxhBrek1RlTROEu7vnOLpIGAms634CO9sW_GO7tFGynYbotq75FeQwS68GDD1oTQs_tg7Cut9BtY1dEvZqPpzPmAdB47ELzuvJT_2H1fesC4dPqCnLSwCTj80XPyfHuzmMyS-6fp3aS6T1TKBE846LZshGxaBg3L8hLHBUcEqUWZSlHIFMsmy8YSCo1SchRSs7LkucAihYyLc1IcfJV3IXhsa2Ui9I9ED2ZTc1b3ideHxOs-8ZqJmvUk_0PuvOmC-fiH-QI9zoqo
CitedBy_id crossref_primary_10_1186_s13677_024_00699_5
crossref_primary_10_1007_s13198_024_02512_7
ContentType Journal Article
CorporateAuthor Department of Computer Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka-580002, India
CorporateAuthor_xml – name: Department of Computer Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka-580002, India
DBID AAYXX
CITATION
DOI 10.5815/ijcnis.2024.03.01
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2074-9104
EndPage 15
ExternalDocumentID 10_5815_ijcnis_2024_03_01
GroupedDBID .DC
5VS
8FE
8FG
AAYXX
ABUWG
AFKRA
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
AZQEC
BENPR
BGLVJ
BPHCQ
BVBZV
CCPQU
CITATION
DWQXO
GNUQQ
HCIFZ
K6V
K7-
KQ8
KWQ
OK1
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
V3M
ID FETCH-LOGICAL-c2031-1adf9b38bf0ab0459e671eea8d39283782e9b4468a7de881e38d099153e72a413
ISSN 2074-9090
IngestDate Tue Jul 01 04:12:13 EDT 2025
Thu Apr 24 23:05:32 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 3
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2031-1adf9b38bf0ab0459e671eea8d39283782e9b4468a7de881e38d099153e72a413
OpenAccessLink https://www.mecs-press.org/ijcnis/ijcnis-v16-n3/IJCNIS-V16-N3-1.pdf
PageCount 15
ParticipantIDs crossref_citationtrail_10_5815_ijcnis_2024_03_01
crossref_primary_10_5815_ijcnis_2024_03_01
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-06-08
PublicationDateYYYYMMDD 2024-06-08
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-08
  day: 08
PublicationDecade 2020
PublicationTitle International journal of computer network and information security
PublicationYear 2024
SSID ssj0000651373
Score 2.3106835
Snippet Smart cities (SCs) are being constructed with the huge placement of the Internet of Things (IoT). Real-time enhancements to life quality based on comfort and...
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 1
Title Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ1bi9NAFICH0n3RB_GK643z4JMhtZlMc3nsSrUKu4i0y-JLmFuk2zaVboK4P8hf6A_wTCadjqsLrhBCSdMhyfk655Iz5xDyUgo2VCKnYV6mLGQ8iUOepqOwZKwsBStpJs3i5OOTZDpnH85GZ73eTy9rqanFQF7-dV3J_0gVj6FczSrZG0jWDYoH8DPKF_coYdz_k4zHTb0J16YnlgzemcrTgam1gQ_9xCZ3tzmE47rmcokTS61tW3Dc3m9modFfaGyucdxgsl_uZnM5TRReIxI1t-XPkQYTVguaNrQw3iUO4Jyigulme2ESEruYxKSS2-92Ijpu21P79u_vAUivbIXsuksEVXfptiqUW1sZXHSN9tw0xRX_Zvn8xKsv3LwE2L-XWi1NxMd8OV_zJdITfBw4tleXjVjYFOGS4wMa-KEPytoULW-2piaZNB_afqMD7R3rehq7KT7xUI69-TryFL9dVnpVpYyytvrG4lxWC1PenbK2KG6015-7nIEratUlO6KbZQYp7BCFGaIYxoVZdHhA0bmhfXJwdHr0-dTFBtEsjOI2OcLdoX0hb8Z5_celeCaVZxvN7pI7nVMDY0voPdLT1X1y2yt1-YD88FiFllWwrELHKqCowbIKjlXAzbEKLavgsQoICVhWwbAKPqvQsgo7VsGwCi2rsGMV9qyCZfUhmb-dzN5Mw65HSCgp6qMw4qrMRZyJcsgFuie5TtJIa54pNPxNswSqc8FYkvFU6SyLdJwpdIpQz-uUcrTgHpF-tan0YwJZLlWkVZwqzlg2StA3EaNIUsXRK6JSH5Lh7jEXsiugb_q4rIprJXxIXrmffLXVY64_-clNTn5Kbu3_Ec9Iv942-jmax7V40dH0C7CHxZM
linkProvider ProQuest
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Auto-metric+Graph+Neural+Network+for+Attack+Detection+on+IoT-based+Smart+Environment+and+Secure+Data+Transmission+using+Advanced+Wild+Horse+Standard+Encryption+Method&rft.jtitle=International+journal+of+computer+network+and+information+security&rft.au=Yadawad%2C+Ranganath&rft.au=Kulkarni%2C+Umakant+P.&rft.au=Alzubi%2C+Jafar+A.&rft.date=2024-06-08&rft.issn=2074-9090&rft.eissn=2074-9104&rft.volume=16&rft.issue=3&rft.spage=1&rft.epage=15&rft_id=info:doi/10.5815%2Fijcnis.2024.03.01&rft.externalDBID=n%2Fa&rft.externalDocID=10_5815_ijcnis_2024_03_01
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2074-9090&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2074-9090&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2074-9090&client=summon