RETRACTED ARTICLE: Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach
The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective technique of data processing. In addition, cloud computing services are used in edge computing, often referred to as fog computing, to address new IoT chall...
Gespeichert in:
Veröffentlicht in: | Optical and quantum electronics 2024, Vol.56 (2), Article 251 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective technique of data processing. In addition, cloud computing services are used in edge computing, often referred to as fog computing, to address new IoT challenges. Cloud computing is vulnerable to many infiltration flaws as a result of its Identity Server's shaky connection and dispersed communication features. Since distributed cloud computing systems are widely used, the great majority of research has concentrated on vulnerability scanning and defense. Nevertheless, there is still promise for the creation of fresh intrusion defense and detection methods. As a result, employing an edge computing-based topology of the network, this research proposed a novel hybrid optimal intelligence technique for the detection and authorization of anomalous dangerous behaviors in IoT networks. To discover anomalies in edge computing networks for detecting device behavior, a unique Evolving Neuro-Fuzzy Intelligence for Anomaly Detection (EFNI-AD) method is proposed in this research. Additionally, an Improved Cipher Crypto System (ICCS) is developed to ensure the reliability of data-passing edge devices. The edge device functions as a certification authority (CA) for the specified trusted domain. In this proposed ICCS paradigm, the edge node just verifies the certificate once to eliminate the overhead of edge devices, and once confidence has been established, all communication may be conducted utilizing regional credentials. The Lionized African Buffalo Optimization (LABO) also improves the assault detection system and trust authorization. The simulation findings indicate that the proposed methods outperform the current methods in terms of several performance criteria such as Packet delivery time, End-to-End delay, throughput, Routing overhead, Packet loss, Accuracy, processing time, Packet Delivery Ratio, and Recall. The proposed method provides lower end-to-end delay and a higher packet delivery ratio. |
---|---|
ISSN: | 0306-8919 1572-817X |
DOI: | 10.1007/s11082-023-05781-x |