Optimizing data privacy and security measures for critical infrastructures via IoT based ADP2S technique

被引:0
作者
Xu, Zhenyu [1 ]
Wang, Jinming [1 ]
Feng, Shujuan [1 ]
Othmen, Salwa [2 ]
Lhioui, Chahira [3 ]
Flah, Aymen [4 ,5 ,6 ]
Slanina, Zdenek [7 ]
机构
[1] Zhejiang Shuren Univ, Collage Informat Sci & Technol, Hangzhou 310015, Peoples R China
[2] Northern Border Univ, Coll Sci & Arts Turaif, Dept Comp & Informat Technol, Ar Ar 91431, Saudi Arabia
[3] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[4] Univ Gabes, Natl Engn Sch Gabes, Gabes, Tunisia
[5] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, Punjab, India
[6] Appl Sci Private Univ, Appl Sci Res Ctr, Amman 11931, Jordan
[7] VSB Tech Univ Ostrava, ENET Ctr, Ostrava, Czech Republic
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
Internet of things; Artificial intelligence; Big data; Optimization; Algorithms; SYSTEMS;
D O I
10.1038/s41598-025-94824-2
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The sensitive nature of the data processed by the critical infrastructures of a shared platform like the internet of things (IoT) makes it vulnerable to a wide range of security risks. These infrastructures must have robust security measures to protect the privacy of the user data transmitted to the processing systems that utilize them. However, data loss and complexities are significant issues when handling enormous data in IoT applications. This paper uses a reptile search optimization algorithm to offer attuned data protection with privacy scheme (ADP2S). This study follows the reptiles' hunting behaviours to find a vulnerability in our IoT service's security. The system activates the reptile swarm after successfully gaining access to explode ice. An attack of protection and authentication measures explodes at the breach location. The number of swarm densities and the extent to which they explore a new area are both functions of the severity of the breach. Service response and related loss prevention time verify fitness according to the service-level fitness value. The user and the service provider contribute to the authentication, which is carried out via elliptic curve cryptography and two-factor authentication. The reptile's exploration and exploitation stages are merged by sharing a similar search location across the initialized candidates. The proposed scheme leverages breach detection and protection recommendations by 11.37% and 8.04%, respectively. It reduces the data loss, estimation time, and complexity by 6.58%, 10.9%, and 11.21%, respectively.
引用
收藏
页数:18
相关论文
共 32 条
  • [1] Model of the information security protection subsystem operation and method of optimization of its composition
    Al-Kasasbeh, Basil
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (03) : 511 - 516
  • [2] Baxley SM., 2022, Int. J. Crit. Infrastruct. Prot, V39, P100573
  • [3] Critical infrastructure protection based on memory-augmented meta-learning framework
    Bing, Xie
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (23) : 17197 - 17208
  • [4] A distributed security tomography framework to assess the exposure of ICT infrastructures to network threats
    Brignoli, M. A.
    Caforio, A. P.
    Caturano, F.
    D'Arienzo, M.
    Latini, M.
    Matta, W.
    Romano, S. P.
    Ruggiero, B.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [5] Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks
    Bringhenti, Daniele
    Yusupov, Jalolliddin
    Zarca, Alejandro Molina
    Valenza, Fulvio
    Sisto, Riccardo
    Bernabe, Jorge Bernal
    Skarmeta, Antonio
    [J]. COMPUTER NETWORKS, 2022, 213
  • [6] An approach of flow compensation incentive based on Q-Learning strategy for IoT user privacy protection
    Chen, Lu
    Zhang, De-gan
    Zhang, Jie
    Zhang, Ting
    Du, Jin-yu
    Fan, Hong-rui
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 148
  • [7] Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System
    Chinnasamy, P.
    Deepalakshmi, P.
    Dutta, Ashit Kumar
    You, Jinsang
    Joshi, Gyanendra Prasad
    [J]. MATHEMATICS, 2022, 10 (01)
  • [8] Chinnasamy P., 2024, Wirel. Person. Commun, V8, P1
  • [9] Blockchain 6G-Based Wireless Network Security Management with Optimization Using Machine Learning Techniques
    Chinnasamy, Ponnusamy
    Babu, G. Charles
    Ayyasamy, Ramesh Kumar
    Amutha, S.
    Sinha, Keshav
    Balaram, Allam
    [J]. SENSORS, 2024, 24 (18)
  • [10] A Security-Aware Framework for Designing Industrial Engineering Processes
    Dedousis, Panagiotis
    Stergiopoulos, George
    Arampatzis, George
    Gritzalis, Dimitris
    [J]. IEEE ACCESS, 2021, 9 : 163065 - 163085