Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed
{"title":"Tasmanian devil optimization with deep autoencoder for intrusion detection in IoT assisted unmanned aerial vehicle networks","authors":"Noha Negm , Hayam Alamro , Randa Allafi , Majdi Khalid , Amal M. Nouri , Radwa Marzouk , Aladdin Yahya Othman , Noura Abdelaziz Ahmed","doi":"10.1016/j.asej.2024.102943","DOIUrl":null,"url":null,"abstract":"<div><h3>Background</h3><div>Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.</div></div><div><h3>Objective</h3><div>This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.</div></div><div><h3>Methods</h3><div>The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).</div></div><div><h3>Results</h3><div>The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.</div></div><div><h3>Conclusion</h3><div>The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.</div></div>","PeriodicalId":48648,"journal":{"name":"Ain Shams Engineering Journal","volume":"15 11","pages":"Article 102943"},"PeriodicalIF":6.0000,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ain Shams Engineering Journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2090447924003186","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
Background
Recently, a developing count of physical objects is linked to the Internet at an unprecedented rate, calcifying the knowledge of the Internet of Things (IoT). In several paradigms of IoT applications, unmanned aerial vehicles (UAVs) and satellites for IoT have concerned much attention and are experiencing quick progress. As for UAVs, because of their superiority in maneuverability and cost, it is established an increasingly extensive consumption in several IoT scenarios like disaster relief, rapid transportation, and environment monitoring. Security remains a main problem in the IoT supported UAV networks that are solved by the employ of intrusion detection system (IDS) methods.
Objective
This article aims to present a Tasmanian Devil Optimization with Deep Autoencoder for Intrusion Detection System (TDODAE-IDS) technique in IoT assisted Unmanned Aerial Vehicle Networks.
Methods
The presented TDODAE-IDS technique majorly concentrates on the effectual identification of the intrusions in the IoT based UAV networks. To accomplish this, the presented TDODAE-IDS system designs a new TDO algorithm for the feature subset selection process. Moreover, the DAE model classifies the existence of intrusion in the UAV network and the hyperparameter tuning of the DAE model takes place using the dragonfly algorithm (DFA).
Results
The simulation results of the TDODAE-IDS approach were tested on a benchmark IDS dataset and the results are assessed under several measures.
Conclusion
The comprehensive comparative analysis highlighted the enhanced outcomes of the TDODAE-IDS algorithm over other recent approaches with maximum accuracy of 99.36%. Therefore, the proposed model can be employed to accomplish security in the IoT assisted UAV networks.
期刊介绍:
in Shams Engineering Journal is an international journal devoted to publication of peer reviewed original high-quality research papers and review papers in both traditional topics and those of emerging science and technology. Areas of both theoretical and fundamental interest as well as those concerning industrial applications, emerging instrumental techniques and those which have some practical application to an aspect of human endeavor, such as the preservation of the environment, health, waste disposal are welcome. The overall focus is on original and rigorous scientific research results which have generic significance.
Ain Shams Engineering Journal focuses upon aspects of mechanical engineering, electrical engineering, civil engineering, chemical engineering, petroleum engineering, environmental engineering, architectural and urban planning engineering. Papers in which knowledge from other disciplines is integrated with engineering are especially welcome like nanotechnology, material sciences, and computational methods as well as applied basic sciences: engineering mathematics, physics and chemistry.