2023
DOI: 10.32604/csse.2023.037130
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Cat Swarm Optimization Based Clustering with Intrusion Detection Technique for Future Internet of Things Environment

Abstract: The Internet of Things (IoT) is one of the emergent technologies with advanced developments in several applications like creating smart environments, enabling Industry 4.0, etc. As IoT devices operate via an inbuilt and limited power supply, the effective utilization of available energy plays a vital role in designing the IoT environment. At the same time, the communication of IoT devices in wireless mediums poses security as a challenging issue. Recently, intrusion detection systems (IDS) have paved the way t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Afterwards, in the upgrade position, it is essential to verify the searching space boundaries; it could be led to employ in Eq. ( 7), π‘π‘œπ‘  𝑖 𝑛𝑒𝑀 (𝑑 + 1) βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ— = max (min (π‘π‘œπ‘  𝑖 𝑛𝑒𝑀 (𝑑 + 1) βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ— + 𝑒𝑏) , 𝑙𝑏) (7) A novel temporary position is exchanged once the estimation function is enhanced. Then, π‘ƒπ‘œπ‘  𝑖 (𝑑 + 1) is equivalent to 𝑠 𝑖 𝑛𝑒𝑀 (𝑑 + 1).…”
Section: B Feature Selection Using Rkoamentioning
confidence: 99%
See 1 more Smart Citation
“…Afterwards, in the upgrade position, it is essential to verify the searching space boundaries; it could be led to employ in Eq. ( 7), π‘π‘œπ‘  𝑖 𝑛𝑒𝑀 (𝑑 + 1) βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ— = max (min (π‘π‘œπ‘  𝑖 𝑛𝑒𝑀 (𝑑 + 1) βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ—βƒ— + 𝑒𝑏) , 𝑙𝑏) (7) A novel temporary position is exchanged once the estimation function is enhanced. Then, π‘ƒπ‘œπ‘  𝑖 (𝑑 + 1) is equivalent to 𝑠 𝑖 𝑛𝑒𝑀 (𝑑 + 1).…”
Section: B Feature Selection Using Rkoamentioning
confidence: 99%
“…In the meantime, Intrusion detection can resolve these issues and ensure network data security [6]. Intrusion detection can be an effective technique, which attempts to alert and identify the attempted intrusions into the system or network [7]. However, the number of online businesses across traffic is increasing every day and therefore, the network features have also become highly difficult thus carrying further challenges for intrusion detection [8].…”
Section: Introductionmentioning
confidence: 99%
“…The utmost care is to be taken with web-related gadgets, as more IoT gadgets depend on the web. It is ubiquitous in the workplace that the IoT gadgets deployed in an entity can be utilized for applying privacy and security features [ 6 ]. For instance, wearable gadgets that send and collect users’ health data to connected smartphones must avoid data leakage to ensure privacy.…”
Section: Introductionmentioning
confidence: 99%