Industrial Internet of Things (IIoT) finds use in several industrial applications like robots, medical devices, and software-defined manufacturing processes. Apart from the promising benefits of the IIoT networks, several challenging issues need to be resolved, such as network connectivity, security, privacy, heterogeneity, scheduling, and energy efficiency. Due to the large-scale deployment and heterogeneity of the nodes in IIoT networks, some energy-limited nodes have existed in the IIoT networks, resulting in reduced network lifetime. At the same time, security and privacy are also considered as the major issues that exist in the design of IIoT, which can be addressed using secure routing techniques. In this view, this study develops a trust-aware multiobjective metaheuristic optimization-based secure clustering with route planning (TAMOMO-SCRP) technique for cluster-based IIoT environment. The presented TAMOMO-SCRP technique mainly focuses on the design of bald eagle search (BES) algorithm for clustering and routing processes. The proposed TAMOMO-SCRP model derives a fitness function for accomplishing maximum energy efficiency and security. For an effective clustering process, the TAMOMO-SCRP model designs an objective function involving four parameters such as trust level (TL), communication cost (CC), residual energy (RE), and node degree (ND). Besides, the route selection process is based on the fitness function with two variables, namely, queue length and link quality. For assessing the enhanced performance of the TAMOMO-SCRP model, a wide range of experiments were carried out to get the outcomes of network life time(NLT) as 39451,half network die (HND) as 25950 and Stability period (SP) 8000 time calculated no. of alive nodes. The achieved outcomes make sure the better performance of the TAMOMO-SCRP technique against the other recent approaches.INDEX TERMS Industrial Internet of Things, clustering, bald eagle search algorithm, trust aware protocols, security.
<abstract> <p>A wide variety of applications like patient monitoring, rehabilitation sensing, sports and senior surveillance require a considerable amount of knowledge in recognizing physical activities of a person captured using sensors. The goal of human activity recognition is to identify human activities from a collection of observations based on the behavior of subjects and the surrounding circumstances. Movement is examined in psychology, biomechanics, artificial intelligence and neuroscience. To be specific, the availability of pervasive devices and the low cost to record movements with machine learning (ML) techniques for the automatic and quantitative analysis of movement have resulted in the growth of systems for rehabilitation monitoring, user authentication and medical diagnosis. The self-regulated detection of human activities from time-series smartphone sensor datasets is a growing study area in intelligent and smart healthcare. Deep learning (DL) techniques have shown enhancements compared to conventional ML methods in many fields, which include human activity recognition (HAR). This paper presents an improved wolf swarm optimization with deep learning based movement analysis and self-regulated human activity recognition (IWSODL-MAHAR) technique. The IWSODL-MAHAR method aimed to recognize various kinds of human activities. Since high dimensionality poses a major issue in HAR, the IWSO algorithm is applied as a dimensionality reduction technique. In addition, the IWSODL-MAHAR technique uses a hybrid DL model for activity recognition. To further improve the recognition performance, a Nadam optimizer is applied as a hyperparameter tuning technique. The experimental evaluation of the IWSODL-MAHAR approach is assessed on benchmark activity recognition data. The experimental outcomes outlined the supremacy of the IWSODL-MAHAR algorithm compared to recent models.</p> </abstract>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.