Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems

被引:9
作者
Eshmawi, Ala' A. [1 ]
Khayyat, Mashael [2 ]
Abdel-Khalek, S. [3 ]
Mansour, Romany F. [4 ]
Dwivedi, Umesh [5 ]
Joshi, Krishna Kumar [5 ]
Gupta, Deepak [6 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Dept Cybersecur, Jeddah, Saudi Arabia
[2] Univ Jeddah, Coll Comp Sci & Engn, Dept Informat Syst & Technol, Jeddah, Saudi Arabia
[3] Taif Univ, Coll Sci, Dept Math & Stat, Taif 21944, Saudi Arabia
[4] New Valley Univ, Fac Sci, Dept Math, El Kharga 72511, Egypt
[5] Babu Banarsi Das Northern India Inst Technol, Dept Comp Sci & Engn, Lucknow, Uttar Pradesh, India
[6] Maharaja Agrasen Inst Technol, Dept Comp Sci & Engn, Delhi, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 04期
关键词
Cyber physical systems; Security; Sensing process; Data fusion; Encryption; Artificial intelligence; Key generation;
D O I
10.1007/s10586-022-03654-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber Physical System (CPS) plays an important role in industry 4.0 applications such as smart factories, smart energy, smart transportation, smart buildings, smart healthcare, etc. Similarly, Cyber Physical Sensor System (CPSS) has gained popularity in recent times and is composed of a computing platform linked to an actuator, sensor, and wireless access point. In real-time scenarios, CPSS continuously gathers data from physical objects and conducts real-time control events based on the process algorithm. Then, the gathered data is transferred to the control centre or cloud services via network layer for further processing. In this scenario, there exists a need to identify the way of utilizing the intellect correctly, by designing effective data sensing and fusion schemes for CPSS. With this background, the current paper presents a Deep Learning with Metaheuristics based Data Sensing and Encoding (DLMB-DSE) scheme for CPSS. The aim of the proposed DLMB-DSE technique is to present a prediction-based data sensing and fusion approach to reduce the quantity of data communication and maintain maximum coverage by ensuring security. DLMB-DSE technique involves the design of Optimal Deep Belief Network (DBN) with Adagrad optimizer to primarily predict the data of the succeeding period with minimum number of data items. It also helps in making the primary predicted value, estimate the actual value, with maximum accuracy. Besides, Multi-Key Homomorphic Encryption (MKHE) technique is also applied for useful data encoding and decoding processes, thereby accomplishing security. Moreover, the novelty of the study lies in optimal key generation process, followed in MKHE technique, using Equilibrium Optimizer (EO). This helps in improving the security. A wide range of experiments was implemented to validate the better performance of the proposed DLMB-DSE technique. The experimental results exhibit the promising performance of DLMB-DSE approach over other methods under different measures.
引用
收藏
页码:2245 / 2257
页数:13
相关论文
共 21 条
[1]   An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems [J].
Adil, Muhammad ;
Khan, Muhammad Khurram ;
Jadoon, Muhammad Mohsin ;
Attique, Muhammad ;
Song, Houbing ;
Farouk, Ahmed .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (05) :2719-2730
[2]  
Amma NG., 2022, CLUSTER COMPUT, V16, P1
[3]  
Ammi M., 2022, CLUSTER COMPUT, V24, P1
[4]   Multi-paradigm modeling for cyber-physical systems: A systematic mapping review [J].
Barisic, Ankica ;
Ruchkin, Ivan ;
Savic, Dusan ;
Mohamed, Mustafa Abshir ;
Al-Ali, Rima ;
Li, Letitia W. ;
Mkaouar, Hana ;
Eslampanah, Raheleh ;
Challenger, Moharram ;
Blouin, Dominique ;
Nikiforova, Oksana ;
Cicchetti, Antonio .
JOURNAL OF SYSTEMS AND SOFTWARE, 2022, 183
[5]   Characterization of Cyber-Physical Sensor Systems [J].
Berger, Christoph ;
Hees, Andreas ;
Braunreuther, Stefan ;
Reinhart, Gunther .
RESEARCH AND INNOVATION IN MANUFACTURING: KEY ENABLING TECHNOLOGIES FOR THE FACTORIES OF THE FUTURE - PROCEEDINGS OF THE 48TH CIRP CONFERENCE ON MANUFACTURING SYSTEMS, 2016, 41 :638-643
[6]   Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference [J].
Chen, Hao ;
Dai, Wei ;
Kim, Miran ;
Song, Yongsoo .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :395-412
[7]   Distributed Reinforcement Learning for Cyber-Physical System With Multiple Remote State Estimation Under DoS Attacker [J].
Dai, Pengcheng ;
Yu, Wenwu ;
Wang, He ;
Wen, Guanghui ;
Lv, Yuezu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04) :3212-3222
[8]   Equilibrium optimizer: A novel optimization algorithm [J].
Faramarzi, Afshin ;
Heidarinejad, Mohammad ;
Stephens, Brent ;
Mirjalili, Seyedali .
KNOWLEDGE-BASED SYSTEMS, 2020, 191
[9]  
Hinton G., 2010, NEURAL NETWORKS TRIC, V9, P926, DOI [DOI 10.1007/978-3-642-35289-8_32, 10.1007/978-3-642-35289-8_32]
[10]   Federated learning enables intelligent reflecting surface in fog-cloud enabled cellular network [J].
Lakhan, Abdullah ;
Mohammed, Mazin Abed ;
Kadry, Seifedine ;
Abdulkareem, Karrar Hameed ;
AL-Dhief, Fahad Taha ;
Hsu, Ching-Hsien .
PEERJ COMPUTER SCIENCE, 2021, 7