Threat detection in Internet of Things using Cuckoo search Chicken Swarm optimisation algorithm

Author(s):  
Sivaram Rajeyyagari
2021 ◽  
Vol 20 (1) ◽  
pp. 127-132
Author(s):  
Fadilah Eka Prasetiyo ◽  
Didik Setiyadi Setiyadi

The comfort and safety of a house is the dream of any home owner, even a house that has a modern security system will be more in demand than a house with an ordinary security system. By utilizing existing technology, it is possible to create an excellent security system from theft and fire. In order to overcome these problems, a prototype of a security threat detection system was made using telegrams based on the internet of things. This can minimize the inconvenience of home owners when they are not at home in a long time, such as the owner of the house going out of town or abroad. The design of this smart home uses the NodeMCU ESP8266 Wifi Module as a controller, the telegram application as a notification when an unknown person opens a door or window, and when a fire occurs. The sensor used to detect the security of burglars is a Magnetic Door Switch, this sensor is placed on doors and windows. The sensor used to detect fire indications is the Flame Sensor which is placed on the ceiling of the house


The Internet of Things connected devices will send data to cloud storage but cloud storage management carries their applications without any infrastructure investment by distributed computing. Therefore, manyindustries are doing their business in the cloud. For a while,the processing ofthe original data setand several intermediate data sets wasrendered by data-intensive applications. However, a challenging task is to support the privacy of the intermediate data set.Inourearlier research, optimal privacy preserving based data search in the cloud was presented using cuckoo search encryption algorithm toimprove the security.In this paper applied the orthogonal learning PSO(OLPSO) algorithm tohelp secure the IoT data in a cloud environment and improve the data transfer as well as decrease the data loss rate with efficient memory


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Vivek Christopher ◽  
Tharmasanthiran Aathman ◽  
Kayathiri Mahendrakumaran ◽  
Rashmika Nawaratne ◽  
Daswin De Silva ◽  
...  

2020 ◽  
Vol 2020 ◽  
pp. 1-21
Author(s):  
Azeema Yaseen ◽  
Mohsin Nazir ◽  
Aneeqa Sabah ◽  
Shahzadi Tayyaba ◽  
Zuhaib Ashfaq Khan ◽  
...  

The internet of things is used as a demonstrative keyword for evolution of the internet and physical realms, by means of pervasive distributed commodities with embedded identification, sensing, and actuation abilities. Imminent intellectual technologies are subsidizing internet of things for information transmission within physical and autonomous digital entities to provide amended services, leading towards a new communication era. Substantial amounts of heterogeneous hardware devices, e.g., radio frequency identification (RFID) tags, sensors, and various network protocols are exploited to support object identification and network communication. Data generated by these digital objects is termed as “Big Data” and incorporates high dimensional space with noisy, irrelevant, and redundant features. Direct execution of mining techniques onto such kind of high dimensionality attribute space can increase cost and complexity. Data analytic mechanisms are embedded into internet of things to permit intelligent decision-making capabilities. These notions have raised new challenges regarding internet of things from a data and algorithm perspective. The proposed study identifies the problem in the internet of things network and proposes a novel cuckoo search-based outdoor data management. The technique of the feature extraction is used for the extraction of expedient information from raw and high-dimensional data. After the implementation for the cuckoo search-based feature extraction, few test benchmarks are introduced to evaluate the performance of mutated cuckoo search algorithms. The consequential low-dimensional data optimizes classification accuracy along with reduced complexity and cost.


Sign in / Sign up

Export Citation Format

Share Document