2022
DOI: 10.3390/su142013635
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments

Abstract: The usage of the Internet increased dramatically during the start of the twenty-first century, entangling the system with a variety of services, including social media and e-commerce. These systems begin producing a large volume of data that has to be secured and safeguarded from unauthorised users and devices. In order to safeguard the information of the cyber world, this research suggests an expanded form of differential evolution (DE) employing an intelligent mutation operator with an optimisation-based des… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 38 publications
0
6
0
Order By: Relevance
“…Research has been conducted to determine LQI, a channel prediction model, and RSSI in an outdoor setting concerning signaling [24]. The new intelligent mutation operator improves the security, privacy, integrity, and authenticity of the information system by identifying harmful requests and responses and helping to defend the system against assault [25]. Single-chip nodes for autonomous node programming over a USB model design were covered in another article [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Research has been conducted to determine LQI, a channel prediction model, and RSSI in an outdoor setting concerning signaling [24]. The new intelligent mutation operator improves the security, privacy, integrity, and authenticity of the information system by identifying harmful requests and responses and helping to defend the system against assault [25]. Single-chip nodes for autonomous node programming over a USB model design were covered in another article [26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…For this purpose, the steering value of PWM = −75 is used in Equation ( 16). There is a steering angle δ of δ = a + b • PW M = 9.10034 × 10 −3 + 2.22607 × 10 −3 • (−75) = −0.1579 = −9.04 (22) Inserting this into Equation ( 13), we obtain the expected change in orientation as follows:…”
Section: Determination Of the Dynamics Of The Steering Trainmentioning
confidence: 99%
“…Each environment has different protocols to maximize performance and minimize security threats. In [22], the authors devised methods to enhance security in IoT-enabled environments. Secure routing planning methods have been suggested by [23,24].…”
mentioning
confidence: 99%
“…The blockchain network is a promising choice for trust management because it has been present and active in several research areas, including wireless networks [50] and the IoT [51][52][53]. The UAV ad-hoc network's resource restriction is essential for developing a trust management system that makes use of the decentralised blockchain.…”
Section: Blockchain Technologymentioning
confidence: 99%