Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Stabilization of Soil Co-Contaminated with Mercury and Arsenic by Different Types of Biochar
Next Article in Special Issue
Integrating Blockchain with Artificial Intelligence to Secure IoT Networks: Future Trends
Previous Article in Journal
Decomposition Analysis of the Aggregate Carbon Intensity (ACI) of the Power Sector in Colombia—A Multi-Temporal Analysis
Previous Article in Special Issue
A Novel COVID-19 Detection Technique Using Deep Learning Based Approaches
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments

by
Shailendra Pratap Singh
1,
Youseef Alotaibi
2,
Gyanendra Kumar
1,* and
Sur Singh Rawat
3,*
1
School of Computing Scineces and Engineering, Galgotias University, Greater Noida 201310, India
2
Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
3
Department of Computer Science and Engineering, Jagadguru Sri Shivarathreeshwara Academy of Technical Education, Noida 201301, India
*
Authors to whom correspondence should be addressed.
Sustainability 2022, 14(20), 13635; https://doi.org/10.3390/su142013635
Submission received: 19 September 2022 / Revised: 11 October 2022 / Accepted: 17 October 2022 / Published: 21 October 2022
(This article belongs to the Special Issue IoT Quality Assessment and Sustainable Optimization)
Figure 1
<p>Information system security taxonomy of smart applications.</p> ">
Figure 2
<p>Proposed model of the security overview of smart applications.</p> ">
Figure 3
<p>Proposed model of the security layer architecture.</p> ">
Figure 4
<p>Flowchart of the proposed algorithm.</p> ">
Figure 5
<p>Information security framework: mumber of generations versus fitness value.</p> ">
Figure 6
<p>Information security framework: number of generations versus fitness value of e-commerce.</p> ">
Figure 7
<p>Information security framework: number of generations versus fitness value of the confidentiality of data.</p> ">
Figure 8
<p>Information security framework: number of generations versus fitness value of the integrity of data.</p> ">
Figure 9
<p>Information security framework: number of generations versus fitness value of the availability of data.</p> ">
Figure 10
<p>Information security framework: number of generations versus fitness value of the authentication of data.</p> ">
Figure 11
<p>Data confidentiality in terms of the number of generations in three dimensions.</p> ">
Figure 12
<p>Data integrity in terms of the number of generations in three dimensions.</p> ">
Figure 13
<p>Data availability in terms of the number of generations in three dimensions.</p> ">
Figure 14
<p>Data authentication in terms of the number of generations in three dimensions.</p> ">
Versions Notes

Abstract

:
The usage of the Internet increased dramatically during the start of the twenty-first century, entangling the system with a variety of services, including social media and e-commerce. These systems begin producing a large volume of data that has to be secured and safeguarded from unauthorised users and devices. In order to safeguard the information of the cyber world, this research suggests an expanded form of differential evolution (DE) employing an intelligent mutation operator with an optimisation-based design. It combines a novel mutation technique with DE to increase the diversity of potential solutions. The new intelligent mutation operator improves the security, privacy, integrity, and authenticity of the information system by identifying harmful requests and responses and helping to defend the system against assault. When implemented on an e-commerce application, the performance of the suggested technique is assessed in terms of confidentiality, integrity, authentication, and availability. The experimental findings show that the suggested strategy outperforms the most recent evolutionary algorithm (EA).

1. Introduction

Technology and statistics advance quickly in the contemporary day, where the Internet is everywhere. The Internet is becoming increasingly important to organisations, governments, enterprises, and educational institutions. Although there may be a positive side, some of its negative aspects can not be ignored, which can seriously impact a person or an organisation. Malevolent systems are primarily responsible for tasks such as creating bogus websites, spreading infections, listening in on conversations, modification of data, etc. Some of these operations risk national security and military structure, which might result in significant losses since in IoT-enabled applications data or information mostly are transient and updated by anonymous self-governing devices. With such a large number of devices, terminals, and machines connecting to an Internet of Things (IoT) network, a huge amount of data and security vulnerability makes security a burning issue [1,2].
Confidentiality may be obtained through cryptography, which means “strange texts”. Cryptography has advanced to new levels in the modern world, offering businesses and people privacy to the point that only authorised staff may access the data [3]. With a lengthy history, strong fundamentals, and ongoing development, cryptography is still evolving today. The “secret” hieroglyphics utilised by the Egyptians are one of the first instances of encryption. The most popular method used today, the Caesar cypher, was also employed by the people of Rome in ancient times [4]. Ancient Greeks also used a scytale for cryptographic encryptions. Worldwide, people use cryptography to safeguard their data and information on a daily basis without even recognising that they are doing something so complex. While cryptography offers advantages, it also has certain disadvantages. Because cryptographic systems are so fragile, even a small alteration or mistake can have disastrous effects and result in system breaches [5].
Even though most systems no longer know that they are using it, cryptography is used daily to safeguard information and records by billions of systems worldwide. Although it is extremely advantageous, it is also seen as being rather brittle since cryptographic systems can be broken by a programming or specification error. Different kinds of assaults on information systems that undermine security, integrity, confidentiality, and availability are the work of the hostile system.
Therefore, the security of the system or application cannot be compromised; hence, it requires implementing the optimisation algorithm into the information system to recognise requests from these dangerous nodes and assist systems in warning them before the assault.
Although other classes of optimisation techniques are accessible in the literature, DE is one of the key strategies [6]. Numerous non-deterministic polynomial-time (NP)-complete problems in optimisation methods can be resolved using the population-based meta-heuristic method known as DE. It functions well across a variety of test areas. The optimisation method considers several operations for exploration and exploitation, such as mutation, crossover, and selection. A new vector known as the donor vector is produced during the mutation process. A crossover is then performed on the donor vector to generate a new vector known as the trailing vector. The target, donor, and trail vectors are ultimately picked as the three vectors’ most tasteful solutions. Based on the fitness value, they are then included in the population for the subsequent generations.

1.1. Problem Statement

Highlights of the problem description are as follows.
  • The time complexity of the existing evolutionary algorithms [7,8,9,10,11,12,13,14,15,16,17,18] is high. This is because of the several iterations to locate the ideal value. This difficulty worsens with a bigger population and a non-continuous function.
  • Security keeps up with the impressive advancements being made in the field of information systems [19]. Intelligent attacks in the IoT environment are viable by sending malicious requests and responses. As a result, it is necessary to safeguard the information by recognising the assaults before they are carried out.
The following is a list of improvements over existing approaches:
  • Most existing techniques are based on non-continuous functions, which increases the complexity of optimisation algorithms [10,11,12,13,20,21,22]. In contrast, the proposed method is based on the new automatic adaptation-based strategy, which is incorporated with DE to overcome the searching strategy, which reduces time complexity and provides diversity and convergence rate.
  • The methods available in the literature [5,19,23,24,25,26], when applied in the e-commerce application of information systems, are found to be insecure in terms of confidentiality, authenticity, availability, and integrity. In comparison, the proposed method optimises the best fitness function of the different generations of e-commerce applications, achieving better confidentiality, authenticity, availability, and integrity.
The proposed method is incorporated into the security framework to provide security for IoT-enabled applications. These can be any modern IoT applications because in the IoT network devices work independently, hence the possibilities of security attacks increase. This method is specially designed, keeping in the mind the requirements of IoT-enabled e-commerce applications such as supply chain management, banking, retail management, inventory management, etc., rather than general applications. IoT devices exchange data with each other, which helps retail and e-commerce firms to execute their operations smoothly and efficiently. As e-commerce grows in popularity, the possibilities for IoT use in the industry expand. This application can be handy in remote access management, tracking of product in journey, enhanced personalised experience about the customers and products, etc.
With the advancement of technologies such as artificial intelligence (AI), machine learning (ML), and data analytics the possibility of security attacks in IoT-enabled applications is increasing, hence it requires an advanced-level security shield which can cope with the coming challenges. Keeping the security vulnerability of IoT-enabled applications, this work proposed a new AI-based DE method to shield from the security attacks.

1.2. Author’s Contribution

Highlights of the author’s contribution are as follows:
  • A novel adaption-based strategy is devised and incorporated with the DE algorithm to identify the request of the malicious node to mitigate security attacks.
  • The devised mutation operator considers the environment factor, i.e., an internal environment that maintains the diversity in an initial generation and gives impetus to the convergence speed of the DE algorithm.
  • In the performance analysis of confidentiality, integrity, authentication, and availability, the proposed approach is tested on an e-commerce application.
  • The observed result shows that the proposed approach obtains a better solution in terms of best, average, and worst fitness functions on a 3-dimension application-based test.

1.3. Article Organisation

The organisation of the rest of the paper is as follows: Section 2 presents a description of existing DE variants and recent approaches devised for information security. Section 3 describes an application for an information security-based evolutionary model. Section 4 outlines a description of the proposed methodology. Section 5 describes the experimental result, in which the obtained results are compared with existing DE, and related standard cost estimation approaches. Finally, Section 6 concludes the study and paves future work paths.

2. Literature Review

The goal of the evolutionary algorithm is to solve the overall optimisation issue. The research makes it quite evident that DE has an issue with stagnation. To deal with these issues, a handful of multi-objective differential evolutionary (MODE) strategies and Pareto-based strategies have been suggested [6,7,8,9,10,11,12,27]. According to the population, the existing MODE-based technique [11] executes mutation and crossover. Additionally, non-dominating sorting was used to reduce the temporal complexity.
The authors of [16] proposed a homeostatic factor-based method to increase the diversity of NASA 93 projects. This method performs better than multi-objective-based software cost-estimating techniques. The authors of [18,19] presented a hybrid technique that controlled two distinct operators and can be applied in many applications. This method performs better than a number of earlier multi-objective algorithms. For multi-objective situations, the authors of [10] created a brand-new Pareto-based (PBDE) differential evolution approach.
Susan et al. [26] stated that computer security is a target that keeps evolving as time goes on. Various mathematical and algorithmic functions are significant concerns in several security tutorials, including hashing techniques and encryption. Othman O. Khalifa et al. [23] illustrated the main components, plans, and characteristics of cryptography are security and privacy. In this era, the age of information communication has played a significant role in the evolution and development of technology. Therefore, the data must be protected and kept secure while transferring through the communication source.
Nitin Jirwan et al. [24] stated that when the data is transmitted, the highest priority is given to data encryption among all the processes present, and an encryption algorithm is applied to data in order to reach the end-user without being interrupted or compromised. Various asymmetric and symmetric cryptographic techniques are used and demonstrated in information transmission.
Callas, J. [25] studied and discussed matters such as privacy enhancement using cryptography, laws related to cryptography, legal changes related to cryptography, reliability of algorithms, and privacy enhancement technologies. He determined and stated that the use of cryptography by society at this time would determine the future of cryptography. This includes the current laws and regulations on cryptography and what the community wants to achieve by using cryptography. He also stated that even with the recent progress of cryptographic algorithms, the field has a lot of things to be improved and new things to be discovered for future generations. He said that the future of cryptography depends on the machines producing strong and secure keys and the rightful owners of the keys to access the information, while others without the keys should not be able to access it. He also tried to explain the view of people on the privacy of messages and security such that any unauthorised person cannot read them.
Cryptography wants to achieve two primary goals: authenticity and privacy, as outlined by different authors [26,28,29,30,31]. The amount of security provided can be expressed in terms of the theoretical secrecy of Shannon and the theoretical authenticity of Simmon.
Schneier [32] stated that topics such as security should not be kept secret as they can be very brittle, and security secrecy is a matter to be made known and not kept secret. If by any means secrecy is lost or inaccessible, then getting it back would be nearly impossible. Schneier cited that encryption and decryption using more minor keys can be transmitted easily and must use a principle. The algorithm used for cryptography must be secure enough to be displayed to the public and still offer such security that no one can crack it. Public scrutiny is the only reliable method to be followed to make more and more improvements in security.
Cloud computing can be used for the secure transmission of cryptography, as cited by Chachapara K. et al. [33,34,35] and illustrated the frameworks such as AES and RSA. AES is, to date, one of the most robust cryptographic algorithms. Users using the cloud have the accessibility to generate various keys for different users and allow different types of permissions to access the files.
As stated in [36], many discussions about cryptography are being developed. The author mentioned that the hash function plays a significant role in cryptography, generating numbers for any piece of data. As the years passed, the weakness of MD5’s algorithm became known, and now a situation arose about how to create secure hash functions.
Gennaro, R. [37,38] cited the role of randomness in cryptography. A random process is one whose outcome or result is unknown and can vary from time to time. He stated that randomness is necessary for cryptography so that the output cannot be predicted, or any user cannot learn the pattern.
Preneel, B. [39] stated how cryptography was after the Snowden era was over. He discussed practices such as the security of ICT systems, surveillance of systems as a whole, and the methods through which the cryptographic systems could be attacked. From the literature study, various types of security taxonomy have been identified. These security threats can be classified into different groups, as depicted in Figure 1.
From the literature review, the following shortcomings have been identified, as shown in Table 1.
  • The modern information system not only requires the robust protection of data but also needs to identify the malicious attacks that will breach security.
  • The optimisation technique-based threat identification systems are now evolving. This technique can be used in information systems to maintain the integrity, authenticity, confidentiality, and availability of data. However, the existing methods suffer from the diversity issue in finding the optimal solution (threats) to secure the system.
  • The second issue with the existing optimisation technique is the non-constraints solution, hence delaying the search capability to identify the optimal solution. It also causes the local optimal problem in finding the optimal solution.
  • The tuning of security parameters in optimisation techniques is complex when identifying malicious attacks on data.

3. Related Terminologies of the Proposed Work

This section presents the different terminologies related to the proposed work and IoT-enable applications.

3.1. Deployment Scenario

The proposed method incorporated the security framework to check the validity of data from e-commerce sites. The proposed framework of the security model is designed according to the deployment scenario of different objects, as shown in Figure 2. In this figure, different components (along with attackers) are mounted in different locations and environments to access services. The attackers can disrupt the normal services of a user or devices, hence needs to prevent these attacks. This model represents the confidentiality of data according to the visit to an e-commerce site. Therefore, the optimisation-based security framework checked the confidentiality and integrity of data: these checks, the acceptance rate of different authenticated users and hackers, and the confidentiality and integrity level of requests, and the response of data for different users and malicious systems.

3.2. Layered Stack of Information Security Model

The layered protocol stack of modern IoT-based information security systems is depicted in Figure 3. This layered architecture is proposed keeping in mind the security management requirements of different components. In modern IoT-enabled applications, individual devices request multiple services and need to respond independently without interaction with a human. The top-most layer of this architecture provides smart collaboration and coordination between the different applications and services.
The confidentiality, integrity, availability, and authenticity of service requests are managed by the security management layer. This layer is in charge of accurately mapping, evaluating, and processing service requests prior to execution in order to achieve the necessary level of security to serve a request. Consequently, this layer handles the generation, administration, and implementation of service requests as well as object virtualisation. The major methods used to ensure security include optimisation, surveillance, translation, coordination, etc. This layer employs a more expressive security policy for use control, which allows event-based authorisations and responsibilities with temporal operators.
The data generated from various sources are stored in the cloud/middle layer. To deliver effective services, this layer manages, purifies, transforms, and analyses data. The communication between the devices is established via the perception and communication layers.

4. Materials and Methods

4.1. Materials

This section describes the data sets used for the experimental evaluation of the proposed work. The data set used for evaluation consists of requests from different sources, including malicious requests to access the information system’s data. An automatic request generator system generates these requests [21,22]. The data sets are taken over a two-month time period. These requests are passed to our proposed optimisation technique to identify malicious requests. These malicious request attacks can be related to authenticity, integrity, confidentiality, or data availability.

4.2. Proposed Method

This section presents the detailed work of the proposed optimisation technique. The DE algorithm is a global optimisation algorithm that tackles constraint and unconstrained issues. However, solving real-world application-based problems with evolutionary algorithms such as DE, particle swarm optimisation (PSO), whale optimisation (WOA) algorithm, and artificial bee (ABCO) colony optimisation is challenging.
Therefore, it is inevitable to design a new evolutionary algorithm that must protect real-world information from malicious attacks. Hence, this work outlines a novel agile adaption-based operator (AABO). This operator automates the adaptation technique to select the best vector from the global search space. It enhances the maintenance of diversity and convergence speeds. This paper presents a better environment for automatically adapting to the environment. The proposed work creates a feasible solution for global search space according to agile adaption-based selection. The process of selection strategy is explained step by step, as given below:

4.2.1. Initialisation

This section outlines random population members of the particular problem or application. This application randomly initialised population members with tuning parameters of problem specification. This problem lies between the lower and upper bound values. Let f v i = { β i , 1 ( t ) , β i , 2 ( t ) , β i , 3 ( t ) , β i , 4 ( t ) , …, β i , D ( t ) } be the i th vector, where individual component β i , d ( t ) values are assigned using Equation (2). After that, the vector can be re-formulated as follows:
f v i = { β i , 1 ( t ) , β i , 2 ( t ) , β i , 3 ( t ) , i , 4 ( t ) , , i , D ( t ) }
The starting population is selected randomly between lower and upper bound
β i , d = X i , d L + r a n d ( ) × ( β i , d U β i , d L )
where β i , d U depicts the variable’s value of the upper bound according to the taken problem area and β i , d L denotes the lower bound value of the variable according to the taken problem. These vectors are used in application-based problems.

4.2.2. Agile Adaption-Based Operators (AABO)

This section presents the design of a modified version of the original mutation operator of the DE algorithm. This operator modifies the best vector of the standard DE algorithm. This operator incorporates the agile-based adaption techniques according to the feasible search area. The agile adaption-based fitness function to select the best vector and the process is explained in Equation (3):
A u t = A u t o m a t i c r a n d o m v e c t o r × ( A i , d U A i , d L )
where A u t denotes the feasible solution of the current environment, and Automatic random vector denotes the selection random best vector according to the lower bound and upper bound.

4.2.3. Generation of New Donor Vector(DV)

The DE method is used to construct a DE/BEST/1 mutation scheme. The scheme incorporates the agile adaption vector for a specific mutation, which provides sufficient diversity. Equations (5) and (6) define the donor vector and the viable environment, respectively.
D V i , G = α r 1 i , G + δ 1 · ( α r 2 i , G α r 3 i , G )
Update the adaption operator:
A v i , G = A u t r 1 i , G + δ 1 · ( f v 1 r 2 i , G f v 2 r 3 i , G )
A v i , G = A u t r 1 i , G + δ 1 · ( f v 3 r 2 i , G f v 4 r 3 i , G )
where A V i , G represents the donor vector used in the agile adaption concept for heuristic search and G is iteration or generation. A u t r 1 i , G represents the agile adaption-based vector, which is selected according to the best fitness value. δ 1 is a mutant factor; it selects a random value between 0.1 to 1.8. This value helps the optimum search from the difference vector of the mutation operator. f v 1 r 2 i , G , f v 2 r 3 i , G , f v 3 r 2 i , G , and  f v 4 r 3 i , G denote the difference vector of mutation strategy. These mutation strategies (Equations (5) and (6)) provide sufficient diversity for the donor vector and also enhance the convergence rate.

4.3. The Proposed Algorithm

The pseudo-code of the proposed algorithm is shown in the Algorithm 1. This algorithm will be incorporated into the e-commerce-based application to enhance security by considering the set objective functions.
Crossover: It applies the crossover operator after completing the mutation operator. The operator compares the mutant vector to the original vector to find the best adaption value and selects the best ideal value of the search space. It can stop iterating when it finds the best search space value.
Selection: After completing the crossover operator, AAOB applies the selection process of the best optimum vector. This operator compares mutant and offspring vectors. AAOB selects the best optimum vectors or values according to the fitness function. In the operator selection, the concept of the survival of the fittest is generally used. This idea is used in choosing the best optimum value. Still, if it does not produce an optimal value, then this operator finally chooses the original vectors. The whole process is outlined using Algorithm 1 and a flowchart, as shown in Figure 4.
   Algorithm 1: Proposed DE-Based Evolutionary Algorithm
Sustainability 14 13635 i001

4.4. Algorithm of Information Security Model

As shown in Algorithm 1, the proposed method is used in an IoT-enabled e-commerce application to estimate data during data requests and responses to multiple users to improve the system’s security. Various constraint functions, such as secrecy and integrity, were added to this technique. This e-commerce-based technique is discussed step-by-step in Algorithm 2. The objective functions such as i n t e g r i t y and c o n f i d e n t i a l i t y were optimised using this proposed technique. The following is a complete description in the form of pseudo-code of the new p r o p o s e d _ S e c u r i t y algorithm:
  • In step 1, the initial input of data requests and data responses of the e-commerce-based application are determined.
  • In the second step, the newly obtained vector from various constraint functions is added to the population.
  • Afterward, weights assigned to each objective function are done using Equation (13).
  • Finally, Step x.1 to Step x.6 are iterated to find optimum solution for i n t e g r i t y , c o n f i d e n t i a l i t y , etc.
   Algorithm 2: Proposed Information Security-Based Evolutionary Algorithm
Sustainability 14 13635 i002

4.5. System Model: Objectives Function of Information Security Model

This section presents five different types of objectives function used for the information service framework, i.e., confidentiality (CONF), integrity (INT), authentication (AUTH), and information request and response ( I S r e q , I S r e s ) metrics. These are used to evaluate the proposed algorithm’s effectiveness. The detailed specifications of these objectives are available in [3,8]:
(I) 
Confidentiality of Data (CONF): The first objective (C1), the confidentiality of the system is represented as CONF( I S i t , I S j t ). Information requests I S i t and data responses I S j t are transmitted between requesting and responding nodes. The C1 in terms of cost is obtained by applying Equation (9):
C O N F ( I S i t , I S j t ) = ( I S i t I S j t ) 2 + ( I S i t I S j t ) 2
where I S i t denotes information request and I S j t denotes information respond and service cost calculated by CONF( I S i t , I S j t ) during the data transmission.
(II) 
Integrity of Data (INT): The second objective (C2) is calculated in terms of modifying data communication per unit time of node using Equation (10):
I N T i , j = ( C O N F ( I S i t , I S j t ) 2 ) × I S i , j
where I N T i , j denotes the integrity or rate of data modification between insecure nodes i and j, I S i , j denotes the modified transmitted and responded on devices(systems), and CONF( I S i t , I S j t ) denotes the confidentiality of nodes in the information system.
(III) 
Availability of Data (AVL): The third objective is the availability of data services within the e-commerce framework. In terms of the availability of data from the server or cloud, the third objective (C3) is computed as follows: Equation (11):
A V L = i = 1 t j = 1 t ( C O N F ( I S i t , I S j t ) + I N T i , j )
where C O N F ( I S i t , I S j t ) is respond data for I S i t to different request information system ( I S j t ). I N T i , j denotes modified data per unit time between different nodes i and j.
(IV) 
Authentication of Data (AUTH): The third objective is the authenticity of data services within the e-commerce framework. In terms of the authenticity of data from nodes, the third objective (C4) is computed as follows: Equation (12):
A U T H = i = 1 t j = 1 t ( C O N F ( I S i t , I S j t ) + I N T i , j ) / I S r e q · I S r e s
where C O N F ( I S i t , I S j t ) is respond data for I S i t to different request information systems ( I S j t ). I N T i , j denotes modified data per unit time between different nodes i and j. I S r e q denotes the number of requests for nodes, and I S r e s denotes the number of responses (the connection between nodes) for nodes from the system.

4.6. Formulation of Fitness Function of Information System

The fitness functions of the IoT-enabled services obtained by applying Equations (9)–(12) are non-contradictory. Hence, a summation of the weighted approach is applied using Equation (13), for all the objectives ( C 1 , C 2 , C 3 , and C 4 ) and these objectives are turned into a single function to evaluate the final performance.
F i t n e s s = f u n 1 × C 1 + f u n 2 × C 2 + f u n 3 × C 3 + f u n 4 × C 4
where values of f u n 1 , f u n 1 , f u n 3 , and f u n 4 are the weights assigned to each of the objective functions. The weight factor is crucial to evaluate the performance from one to another objective in multi-objective problems. The proposed IoT-enabled system is compared based on the fitness function with PSO, DE, and the whale optimisation method (WOA).

5. Experimentation and Analysis

5.1. Simulation Framework

The description of the simulation framework considered to execute the proposed and existing algorithms are as follows:
  • The test-bed was conducted using a Windows 10 Pro 64-bit operating system, an Intel Core i7-8850H processor, and 8 GB of RAM.
  • Every benchmark serves as a test-bed in the specified search space, which is [ 10 , 10 ] D , with D standing for dimension.
  • For the comparative analysis, the proposed algorithm is computed 30 times, with the best, average, and worst fitness functions.
  • Each test function’s initial population is set at 100. For the maximising the problem, the exploration and exploitation phases are carried out across it.

5.2. Experimental Setup

This section presents a designed simulation framework of the security model based on the line of the optimisation model. This framework works with the proposed method and tests the security function and parameters, as shown in Table 2. It also checks the performance of standard evolutionary optimisation algorithms in the same simulation framework [7,18,40]. The previous section explained the algorithm’s parameters for different scenarios, such as confidentiality, integrity, availability, and authentication functions. The results of the proposed method are compared in several scenarios of information systems (e-commerce) on these parameters. Furthermore, each goal function was performed ten times in succession, and the statistics values were calculated. The proposed method uses 100 generations for testing the confidentiality, data integrity, availability, and authentication indicator, which are shown in Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10.
In order to compare the best front method with other ones, convergence speed is employed. This method employs an adaptation-based approach to get the most optimal front. The first rank value from the global search area is chosen as the best ideal front indicator. Its vector is a workable optimum solution in the search space because of this. Therefore, the suggested algorithms must identify the best rank in the region of the global search in order to obtain the best optimisation solution. Otherwise, these solutions are not feasible for search purposes.

5.3. Comparison of Fitness Function of the Proposed Work with Referenced Methods

The fitness function of the proposed method is used to compare the performance using Equation (13). When the local optimal problem is evaluated, then it provides sufficient diversity. The reason behind this is that it uses environmental factors to evaluate the convergence speed. The result of the performance is observed in Figure 5.
In Figure 5, the X-axis and Y-axis represent the number of generations and the fitness value, respectively. It shows the performance of algorithms in terms of the security of the data from e-commerce applications. Figure 5 depicts the comparison of all algorithms in terms of the fitness function; it also shows the convergence rate. For all of the security objective issues, the proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values to enhance the security of the system achieve encouraging performance, which shows that the suggested methodology has a high convergence speed and diversity.
In Figure 6, the X-axis and Y-axis denote the number of generations and the fitness value of the IoT-enabled e-commerce application, respectively. It shows the performance of the algorithms in terms of the security of the data from e-commerce applications. Figure 6 presents the comparative analysis of all algorithms regarding the improved security fitness rate. The proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values enhance the system’s security and achieve encouraging performance for the fitness value, which shows that the suggested methodology has a high convergence speed and variety.
In Figure 7, the X-axis and Y-axis denote the number of generations and the fitness value of confidentiality of data. This figure shows the performance of the algorithms in terms of the confidentiality of the data from e-commerce applications. The results shown in Figure 7 depict the comparison of all algorithms in terms of the fitness function. The proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values for enhancing the system’s confidentiality achieve encouraging performance, which shows that the suggested methodology has a high convergence speed and diversity.
In Figure 8, the X-axis and Y-axis denote the number of generations and the fitness value of integrity of data, respectively. This figure shows the performance of the algorithms in terms of the integrity of the data from e-commerce applications. The results in Figure 8 depict the comparison of all algorithms in terms of the fitness function. The proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values for enhancing the system’s integrity achieve encouraging performance, which shows that the suggested methodology has a high convergence speed and diversity.
In Figure 9, the X-axis and Y-axis denote the number of generations and the fitness value of data availability, respectively. This shows the performance of the algorithms in terms of the availability of data from e-commerce applications. Figure 9 compares all algorithms in terms of the fitness function. The proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values for enhancing the system’s service availability achieve encouraging performance, which shows that the suggested methodology has a high convergence speed and diversity.
In Figure 10, the X-axis and Y-axis denote the number of generations and the fitness value of data authentication, respectively. Figure 10 shows the performance of the algorithms in terms of the authenticity of the data from e-commerce applications. The results shown in Figure 10 depicted the comparison of all algorithms in terms of the fitness function. The proposed algorithm delivers superior fitness values compared to DE [7], PSO [18], and WOA [40]. The fitness values enhance the authenticity of the system and achieve encouraging performance, which shows that the suggested methodology has a high convergence speed and diversity.
The proposed method is compared with the standard evolutionary algorithms. The results show that it gives better performance in terms of conversion speed and diversity for all fitness values, as shown in Figure 9 and Figure 10.

5.4. Result Analysis of IoT-Enabled Application

To ensure the security performance of the proposed optimisation technique, a double-check is done by applying it to the IoT-based e-commerce information system. The performance is checked on all set objectives and control parameters as shown in Table 3.

5.4.1. Result Analysis of the Confidentiality

The confidentiality is incorporated into the IoT-based network model with Equation (9) to produce the values. These values are available in Table 4 according to the best, average, and worst-case fitness functions. The performance is evaluated in all cases of 50, 100, 150, 200, 250, 300, 350, 400, 450, and 500 generations in three dimensions. From the observed results shown in the table, it is clear that the confidentiality of the proposed method is better than referenced optimisation methods. The best-case scenario represents the high confidentiality of the systems. The average case represents the mean confidentiality of the systems. The worst-case scenario represents the low confidentiality of the systems. Finally, it can be concluded from Table 2 and Table 3 that the proposed method achieves higher confidentiality than existing methods.
In Figure 11, the X-axis and Y-axis represent the number of generations and fitness value of confidentiality of data, respectively. Figure 11 shows the performance of the algorithms in terms of confidentiality and security of the data from e-commerce applications. The fitness values achieve encouraging performance, which indicates that the proposed method achieves a high convergence speed and diversity.

5.4.2. Result Analysis of the Integrity

This section outlines the application of optimised techniques to check the integrity of the e-commerce system. This method is incorporated into the network model with Equation (10) to generate the value. These values are mentioned in Table 5 according to the best, average, and worst-case fitness functions. The performance is evaluated in all cases of 50, 100, 150, 200, 250, 300, 350, 400, 450, and 500 generations in three dimensions. From this table, it is clear that the best-case scenario represents high integrity, the average case represents mean integrity, and the worst-case scenario represents the low integrity of the systems. The observed values available in Table 5 indicate that the proposed method gives higher performance than other standard optimisation algorithms in terms of integrity.
In Figure 12, the X-axis and the Y-axis represents the number of generations and fitness value of the integrity of the data, respectively. Figure 12 shows the performance of the algorithms regarding the integrity and security of the data from e-commerce applications. The fitness values achieve pretty encouraging performance, which indicates the proposed method has high convergence speed and diversity.

5.4.3. Result Analysis of the Availability of Information System

In this section, the method is applied the optimised techniques and we checked the availability of the information system. This method is applied to the IoT-based network model with Equation (11) to produce the values. The values are available in Table 6 according to the best, average, and worst-case fitness functions. The performance is evaluated in all cases of 50, 100, 150, 200, 250, 300, 350, 400, 450, and 500 generations in three dimensions. This table shows the best-case scenario represents the high availability of the systems, the average case represents the mean availability, and The worst-case scenario represents the low availability of the systems. Table 6 shows that the performance of the proposed method is better than that of other standard optimisation algorithms in terms of availability.
In Figure 13, the X-axis represents the number of generations and the Y-axis represents the fitness value of the availability of the data. Figure 13 shows the performance of the algorithms in terms of the availability and security of the data from e-commerce applications. The fitness values for enhancing the system’s security achieve pretty encouraging performance, which shows that the suggested methodology has high convergence speed and variety.

5.4.4. Result Analysis of the Authentication of Information System

This section checks the authenticity of the e-commerce system. This method is incorporated into the network model with Equation (12) to generate the value. These values are mentioned in Table 7 according to the best, average, and worst fitness functions, which check the performance of different generations such as 50, 100, 150, 200, 250, 300, 350, 400, 450, and 500 in three dimensions. This table shows that the performance of the proposed method is better than that of other standard optimisation algorithms in terms of authenticity. The best, average, and worst cases represent the systems’ high, mean, and low authenticity. Table 7 shows that the performance of the proposed method is better than that of other standard optimisation algorithms in terms of authenticity.
In Figure 14, the X-axis represents the number of generations and the Y-axis represents the fitness value of the authenticity of the data. Figure 14 shows the performance of the algorithms in terms of authenticity and security of the data from e-commerce applications. The fitness values for enhancing the system’s authenticity show encouraging performance and show that the suggested methodology has a high convergence speed and diversity.

6. Conclusions

Nearly all industries have some sort of operation on the Internet and with that arises a need for basic security features such as confidentiality, authenticity, availability, and integrity. Cryptography aims to achieve these features with the help of evolutionary algorithms. This paper introduced a new variant of the mutation operator that provides sufficient diversity for the DE algorithm and enhances the optimal convergence rate for confidentiality, authenticity, availability, and integrity. In addition, the introduced approach is also used to evaluate security problems for enhanced confidentiality, authenticity, availability, and data integrity and accurately predicts the security fitness cost by optimizing the tuning parameters. The findings on several benchmark functions show that the proposed technique performs much better than previous DE algorithm versions on maximal variants, which is very encouraging. The proposed method is applied and tested in IoT-enabled e-commerce applications but in future it can be extended into other applications by incorporating the input parameters according to the requirements.

Author Contributions

Conceptualisation: S.P.S. and S.S.R.; Methodology: S.P.S. and Y.A.; Validation: Y.A. and G.K.; Formal Analysis: Y.A. and G.K.; Investigation: S.S.R. and G.K. Resources: Y.A. and S.S.R.; Data Curation: S.P.S. and G.K.; Writing—Original Draft Preparation: G.K. and S.P.S.; Writing—Review and Editing: Y.A. and S.S.R.; Visualisation: G.K. and S.S.R.; Supervision: Y.A. and S.S.R.; Project Administration: S.P.S., Y.A. and S.S.R.; Funding Acquisition: Y.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Deanship of Scientific Research at Umm Al-Qura University, Grant Code: 22UQU4281768DSR07.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data associated with this work will be provided by the corresponding author upon reasonable request.

Acknowledgments

The author would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4281768DSR07).

Conflicts of Interest

We certify that there is no conflict of interest involved in the subject or materials discussed in manuscript.

References

  1. Feng, B.; Zhou, H.; Li, G.; Zhang, Y.; Sood, K.; Yu, S. Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges. IEEE Netw. 2021, 35, 196–201. [Google Scholar] [CrossRef]
  2. Feng, B.; Tian, A.; Yu, S.; Li, J.; Zhou, H.; Zhang, H. Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking. IEEE Internet Things J. 2022, 9, 12931–12944. [Google Scholar] [CrossRef]
  3. Sharma, N.; Prabhjot; Kaur, H. A Review of Information Security using Cryptography Technique. Int. J. Adv. Res. Comput. Sci. 2017, 8, 323–326. [Google Scholar]
  4. Preneel, B. Understanding Cryptography: A Textbook for Students and Practitioners; Springer: London, UK, 2010. [Google Scholar]
  5. Katz, J.; Lindell, Y. Introduction t:o Modern Cryptography; Taylor & Francis Group, LLC: London, UK, 2008. [Google Scholar]
  6. Rainer, S.; Price, K. Differential Evolution—A Simple and Efficient Adaptive Scheme for Global Optimization Over Continuous Spaces; International Computer Science Institute: Berkeley, CA, USA, 1995. [Google Scholar]
  7. Bili, C.; Lin, Y.; Zeng, W.; Zhang, D.; Si, Y.-W. Modified differential evolution algorithm using a new diversity maintenance strategy for multi-objective optimization problems. Appl. Intell. 2015, 43, 49–73. [Google Scholar]
  8. Shi, Q.; Chen, W.; Jiang, T.; Shen, D.; Gao, S. Handling Multiobjectives with Adaptive Mutation Based ϵ-Dominance Differential Evolution. ICSI-CCI 2015, 9140, 523–532. [Google Scholar]
  9. Singh, S.P. Improved based Differential Evolution Algorithm using New Environment Adaption Operator. J. Inst. Eng. India Ser. B 2021, 103, 107–117. [Google Scholar] [CrossRef]
  10. Singh, P.S.; Kumar, A. Pareto Based Differential Evolution with Homeostasis Based Mutation. J. Intell. Fuzzy Syst. 2017, 32, 3245–3257. [Google Scholar] [CrossRef]
  11. Chen, X.; Du, W.; Qian, F. Multi-objective differential evolution with ranking-based mutation operator and its application in chemical process optimization. Chemom. Intell. Lab. Syst. 2014, 136, 85–96. [Google Scholar] [CrossRef]
  12. Zhang, X.; Tian, Y.; Cheng, R.; Jin, Y. An efficient approach to nondominated sorting for evolutionary multiobjective optimization. IEEE Trans. Evol. Comput. 2015, 19, 201–213. [Google Scholar] [CrossRef] [Green Version]
  13. Deb, K.P.; Agarwal, A.; Meyarivan, T.S. A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef] [Green Version]
  14. Leandro, L.M.; Xin, Y. Software Effort Estimation as a Multi-objective Learning Problem. Acm Trans. Softw. Eng. Methodol. TOSEM 2013, 22, 1–32. [Google Scholar]
  15. Singh, S.P.; Kumar, A. Software cost estimation using homeostasis mutation based differential evolution. In Proceedings of the IEEE International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India, 5 January 2017; pp. 173–181. [Google Scholar]
  16. Singh, S.P.; Singh, V.P.; Mehta, A.K. Differential evolution using homeostasis adaption based mutation operator and its application for software cost estimation. J. King Saud-Univ. Inf. Sci. 2021, 33, 740–752. [Google Scholar] [CrossRef]
  17. Tan, Y.Y.; Jiao, Y.C.; Li, H.; Wang, X.K. A modification to MOEA/D-DE for multiobjective optimization problems with complicated Pareto sets. Inf. Sci. 2012, 213, 14–38. [Google Scholar] [CrossRef]
  18. Beed, R.; Roy, A.; Sarkar, S.; Bhattacharya, D. A hybrid multiobjective tourroute optimization algorithm based on particle swarm optimization and artificial bee colony optimization. Comput. Intell. 2020, 36, 884–909. [Google Scholar] [CrossRef]
  19. Lincke, S.; Hollan, J.A. Network Security: Focus on Security, Skills, and Stability. In Proceedings of the 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee, WI, USA, 10–13 October 2007; p. F1D-10. [Google Scholar]
  20. Bader, J.; Zitzler, E. HypE: An algorithm for fast hyper volume-based many-objective optimization. Evol. Comput. 2011, 19, 45–76. [Google Scholar] [CrossRef] [PubMed]
  21. Ganesan, R.; Jajodia, S.; Cam, H. Optimal scheduling of cybersecurity analysts for minimizing risk. ACM Trans. Intell. Syst. Technol. 2017, 8, 1–32. [Google Scholar] [CrossRef]
  22. Ganesan, R.; Shah, A.; Jajodia, S.; Cam, H. Optimizing alert data management processes at a cyber security operations center. In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense; Springer: Berlin/Heidelberg, Germany, 2019; pp. 206–231. [Google Scholar]
  23. Khalifa, O.O.; Islam, M.R.; Khan, S.; Shebani, M.S. Communications cryptography. In Proceedings of the RF and Microwave Conference, Selangor, Malaysia, 5–6 October 2004. [Google Scholar]
  24. Jirwan, N.; Singh, A.; Vijay, S. Review and Analysis of Cryptography Techniques. Int. J. Sci. Eng. Res. 2013, 3, 1–6. [Google Scholar]
  25. Callas, J. The Future of Cryptography. Inf. Syst. Secur. 2007, 16, 15–22. [Google Scholar] [CrossRef]
  26. Massey, J.L. Cryptography—A selective survey. Digit. Commun. 1986, 85, 3–25. [Google Scholar]
  27. Das, S.; Mullick, S.; Suganthan, P.N. Recent advances in differential evolution—An updated survey. Swarm Evol. Comput. 2016, 27, 1–30. [Google Scholar] [CrossRef]
  28. Rawat, S.S.; Singh, S.; Alotaibi, Y.; Alghamdi, S.; Kumar, G. Infrared Target-Background Separation Based on Weighted Nuclear Norm Minimization and Robust Principal Component Analysis. Mathematics 2022, 10, 2829. [Google Scholar] [CrossRef]
  29. Anuradha, D.; Subramani, N.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Rajagopal, M. Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 2867. [Google Scholar] [CrossRef] [PubMed]
  30. Ramasamy, V.; Alotaibi, Y.; Khalaf, O.I.; Samui, P.; Jayabalan, J. Prediction of groundwater table for Chennai Region using soft computing techniques. Arab. J. Geosci. 2022, 15, 827. [Google Scholar] [CrossRef]
  31. Sennan, S.; Kirubasri; Alotaibi, Y.; Pandey, D.; Alghamdi, S. EACR-LEACH: Energy-aware cluster-based routing protocol for WSN based IoT. Comput. Mater. Contin. 2022, 72, 2159–2174. [Google Scholar] [CrossRef]
  32. Schneier, B. The Non-Security of Secrecy. Commun. ACM 2004, 47, 120. [Google Scholar] [CrossRef]
  33. Chachapara, K.; Bhadlawala, S. Secure sharing with cryptography in cloud. In Proceedings of the 2013 International Conference on Engineering (NUiCONE), Nirma University, Ahmedabad, India, 28–30 November 2013. [Google Scholar]
  34. Alotaibi, Y. A New Meta-Heuristics Data Clustering Algorithm Based on Tabu Search and Adaptive Search Memory. Symmetry 2022, 14, 623. [Google Scholar] [CrossRef]
  35. Kumar, G.; Tomar, P. A Stateless Spatial IPv6 Address Configuration Scheme for Internet of Things. IETE J. Res. 2021, 1–14. [Google Scholar] [CrossRef]
  36. Orman, H. Recent Parables in Cryptography. IEEE Internet Comput. 2014, 18, 82–86. [Google Scholar] [CrossRef]
  37. Gennaro, R. Randomness in cryptography. IEEE Secur. Priv. 2006, 4, 64–67. [Google Scholar] [CrossRef]
  38. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. [Google Scholar] [CrossRef]
  39. Preneel, B. Cryptography and Information Security in the Post Snowden Era. In Proceedings of the IEEE/ACM 1st International Workshop on Technical and Legal aspects of data privacy and Security, Florence, Italy, 18 May 2015. [Google Scholar]
  40. Chen, H.; Duncklee, A.; Jajodia, S.; Liu, R.; Mcnamara, S.; Subrahmanian, V.S. PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Technol. 2022, 22, 1–24. [Google Scholar] [CrossRef]
  41. Wang, Z.; Zhang, Q.; Zhou, A.; Gong, M.; Jiao, L. Adaptive Replacement Strategies for MOEA/D. IEEE Trans. Cybern. 2016, 46, 474–486. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Information system security taxonomy of smart applications.
Figure 1. Information system security taxonomy of smart applications.
Sustainability 14 13635 g001
Figure 2. Proposed model of the security overview of smart applications.
Figure 2. Proposed model of the security overview of smart applications.
Sustainability 14 13635 g002
Figure 3. Proposed model of the security layer architecture.
Figure 3. Proposed model of the security layer architecture.
Sustainability 14 13635 g003
Figure 4. Flowchart of the proposed algorithm.
Figure 4. Flowchart of the proposed algorithm.
Sustainability 14 13635 g004
Figure 5. Information security framework: mumber of generations versus fitness value.
Figure 5. Information security framework: mumber of generations versus fitness value.
Sustainability 14 13635 g005
Figure 6. Information security framework: number of generations versus fitness value of e-commerce.
Figure 6. Information security framework: number of generations versus fitness value of e-commerce.
Sustainability 14 13635 g006
Figure 7. Information security framework: number of generations versus fitness value of the confidentiality of data.
Figure 7. Information security framework: number of generations versus fitness value of the confidentiality of data.
Sustainability 14 13635 g007
Figure 8. Information security framework: number of generations versus fitness value of the integrity of data.
Figure 8. Information security framework: number of generations versus fitness value of the integrity of data.
Sustainability 14 13635 g008
Figure 9. Information security framework: number of generations versus fitness value of the availability of data.
Figure 9. Information security framework: number of generations versus fitness value of the availability of data.
Sustainability 14 13635 g009
Figure 10. Information security framework: number of generations versus fitness value of the authentication of data.
Figure 10. Information security framework: number of generations versus fitness value of the authentication of data.
Sustainability 14 13635 g010
Figure 11. Data confidentiality in terms of the number of generations in three dimensions.
Figure 11. Data confidentiality in terms of the number of generations in three dimensions.
Sustainability 14 13635 g011
Figure 12. Data integrity in terms of the number of generations in three dimensions.
Figure 12. Data integrity in terms of the number of generations in three dimensions.
Sustainability 14 13635 g012
Figure 13. Data availability in terms of the number of generations in three dimensions.
Figure 13. Data availability in terms of the number of generations in three dimensions.
Sustainability 14 13635 g013
Figure 14. Data authentication in terms of the number of generations in three dimensions.
Figure 14. Data authentication in terms of the number of generations in three dimensions.
Sustainability 14 13635 g014
Table 1. Technical gaps within existing techniques.
Table 1. Technical gaps within existing techniques.
Existing MethodYearApproachGap
[7]2015The proposed method provides sufficient diversity for search space.This approach is better in performance, but it suffers from the lack of convergence rate.
[8]2015The proposed method was the design and implementation of the new mutation operator.This approach was not satisfactory for some multi-objective problems.
[9]2022The proposed method designs a new operator called the environment mutation operator. This operator helps to enhance the diversity and convergence rate.This approach is better in performance, but some benchmark functions do not provide good diversity.
[10]2017The proposed method designs a new mutation strategy called the homeostasis mutation operator. This operator found the first-ranking Pareto front.The homeostasis operator provides sufficient diversity in the ZDT series, but it does not sufficiently provide the DTLZ series.
[11]2014The proposed algorithms design the new swarm optimisation algorithm. This algorithm achieves the best optimum value from search space.On some benchmark functions, the performance of this method is limited.
[12]2015This work proposed a new strategy called the whale optimisation algorithm. This approach provided a convergence rate according to the swarm behaviour for global search space.This approach performs better on some benchmark functions. However, its convergence rate is not satisfactory.
[13]2002The proposed work designed a new operator called the dynamics-based control parameter. This parameter enhanced the convergence rate and diversity for a given search space.The proposed method performs better, but its diversity and convergence rate are unsatisfactory.
[21]2017Optimisation model to schedule the malicious risk according to high to low risk. It also maximises alert coverage.Its performance is limited to a specific application.
[22]2019Proposed an integrated framework to alert and schedule the risk at cyber security Data canter.Its performance is limited to a specific application.
[2]2009The proposed work designs a firewall technology. The purpose of this method is the protection of information from the attack of malicious systems.The accuracy of identifying the high-risk attack is limited.
[40]2022It has proposed a probabilistic cyber attack alert management system by formulating the problem as a bi-level non-linear optimization problem. It solves complex issues with a linear solution.Complexity is high, and performance is also limited.
[33,36,37,39,41]2013, 2014, 
2006, 2015
AES, RSA, cryptography (MD5), randomness in cryptography, attacks on cryptographyThese methods do not deal with identifying attacks but rather encrypt them from unauthorised access.
Table 2. Parameter of the proposed algorithm.
Table 2. Parameter of the proposed algorithm.
Sr. No.Parameter NameDescription of Terminology UsedDefined Value and Syntax
1Population (Pop)Population size100
2objective (obj)Number of four objectivesCONF, INT, AUTH, and AVL
3Search space(s)Decision variable(s)Search area
4GenNumber of iterations or generations50 to 500
5 δ 1 Mutant valueMutant value (0.23 to 1.4)
62-DTwo-dimension-based scenario2-Dimension
73-DThree-dimension-based scenario3-Dimension
8Crossover rate (Cr)Enhanced the convergence rateCr (0.2 to 0.5)
9IE1Enhanced the convergence rate of search environmentrand (0, 1)
Table 3. Control parameters of the proposed algorithm.
Table 3. Control parameters of the proposed algorithm.
Sr. No.ParameterType
1DE algorithm environmental factor1 [EF1]rand (0, 1)
2DE algorithm environmental factor2 [EF2]rand (0.01–0.5)
3DE algorithm scale factor ( δ 1 )(0.2–1.8)
4DE algorithm crossover Rate (Cr)(0.1–0.8)
5Dimension (D)(3)
6Function evaluations100 to 500
7Number of iteration50, 100, 150, 200, 250, 300, 350, 400, 450, 500
8Search space(100, −100)
9Number of runs30
10Experimental matrix area( 100 × 100 )
11 I S Smart information system
12 C O N F , I N T , A V L & A U T H Objective function of smart information security
13 α Number of requests from nodes
14 β Number of requests from malicious nodes
15 ( 100 × 100 ) Smart information system framework
16 β _ i d Identification service
17 β _ T y p e Types of services of smart agriculture
18 A V L The serviceability of the different devices or objects
19 C O N F The service request of the confidentiality from nodes
20 I N T The service request modified from nodes
21 A U T H The service request of the authentication from nodes
22 D A T A S E T The service request from the nodes
Table 4. Confidentiality in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
Table 4. Confidentiality in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
GenerationPSO AlgoWOA Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
503.2559232.6047382.2828571.3023693.8808563.228611
1003.2612242.6089792.1550061.3044893.6635093.047794
1503.0785792.4628641.9032791.2314323.2355742.69178
2002.7189692.1751761.757541.0875882.9878182.485664
5002.5107722.0086171.617541.0043092.7498182.287664
3002.3107721.8486171.6005380.9243092.7209142.263618
3502.2864831.8291861.4959250.9145932.5430732.115666
4002.1370361.7096291.4933960.8548152.5387732.112089
4502.1334231.7067381.4653960.8533692.4911732.072489
5002.0934231.6747381.4653960.8373692.4911732.072489
GenerationDE AlgoProposed Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
502.2897051.9404282.5225564.3048152.7165992.833025
1002.1614711.8317552.3812814.0637252.5644572.674362
1501.9089881.6177872.1031233.589042.2649022.361969
2001.7628131.4939091.9420823.3142192.0914732.181107
5001.6223931.3749091.7873823.0502191.9248732.007367
3001.6053391.3604571.7685943.0181571.904641.986267
3501.5004131.2715371.6529982.8208881.7801511.856444
4001.4978761.2693871.6502032.8161181.7771411.853304
4501.4697921.2455871.6192632.7633181.7438211.818556
5001.4697921.2455871.6192632.7633181.7438211.818556
Table 5. Integrity in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
Table 5. Integrity in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
GenerationPSO AlgoWOA Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
502.0934231.6747381.4513960.8373691.2336871.603793
1002.0734231.6587381.4373960.8293691.2217871.588323
1502.0534231.6427381.4373960.8213691.2217871.588323
2002.0534231.6427381.4233960.8213691.2098871.572853
5002.0334231.6267381.4093960.8133691.1979871.557383
3002.0134231.6107381.405870.8053691.1949891.553486
3502.0083861.6067081.4017410.8033541.191481.548924
4002.0024871.601991.3734560.8009951.1674381.517669
4501.962081.5696641.3885960.7848321.1803071.534399
5001.9837091.5869671.3309550.7934831.1313121.470705
GenerationDE AlgoProposed Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
501.455751.7271611.8011822.7369182.4673732.052689
1001.4417081.7105011.7838082.7105182.4435732.032889
1501.4417081.7105011.7838082.7105182.4435732.032889
2001.4276661.6938411.7664342.6841182.4197732.013089
5001.4136241.6771811.749062.6577182.3959731.993289
3001.4100881.6729851.7446852.6510692.3899791.988302
3501.4059461.6680721.7395612.6432832.382961.982462
4001.3775771.6344131.7044592.5899462.3348761.94246
4501.3927621.6524291.7232482.6184952.3606131.963872
5001.3349481.5838361.6517152.50982.2626231.88235
Table 6. Availability in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
Table 6. Availability in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
GenerationPSO AlgoWOA Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
500.6928190.5542550.4708290.2771280.8004090.665887
1000.6726130.538090.4626370.2690450.7864830.654301
1500.660910.5287280.4587380.2643640.7798540.648786
2000.655340.5242720.456270.2621360.7756590.645296
5000.6518140.5214510.4458190.2607260.7578920.630515
3000.6368840.5095070.4379030.2547540.7444340.619319
3500.6255750.500460.4368840.250230.7427030.617879
4000.624120.4992960.4368840.2496480.7427030.617879
4500.624120.4992960.4345770.2496480.738780.614616
5000.6208240.4966590.4205770.248330.714980.594816
GenerationDE AlgoProposed Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
500.4722420.4002050.5202660.8878490.5602870.584299
1000.4640250.3932420.5112140.8724010.5505380.574133
1500.4601140.3899270.5069050.8650490.5458980.569294
2000.4576390.3878290.5041780.8603940.5429610.566231
5000.4471560.3789460.492630.8406870.5305240.553261
3000.4392160.3722170.4838820.8257590.5211040.543437
3500.4381950.3713520.4827570.8238390.5198920.542173
4000.4381950.3713520.4827570.8238390.5198920.542173
4500.435880.369390.4802070.8194870.5171460.53931
5000.4218380.357490.4647370.7930870.5004860.521936
Table 7. Authentication in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
Table 7. Authentication in three dimensions. The proposed algorithm compared with the evolutionary algorithm on a security model.
GenerationPSO AlgoWOA Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
501.9013641.5210911.3508560.7605461.6075191.910496
1001.9297941.5438361.3186620.7719181.5692071.864964
1501.8838021.5070421.1786620.7535211.4026071.666964
2001.6838021.3470421.3746620.6735211.6358471.944164
5001.9638021.5710421.1106180.7855211.3216361.570731
3001.5865971.2692781.3457410.6346391.6014311.903262
3501.9224871.5379891.1930620.7689951.4197441.68733
4001.7043741.3634991.3313850.681751.5843481.882958
4501.9019781.5215831.1886730.7607911.4145211.681123
5001.6981041.3584840.4849730.6792420.5771180.685891
GenerationDE AlgoProposed Algo
Best Fit FunAverge Fit FunWorse Fit FunBest Fit FunAverge Fit FunWorse Fit Fun
501.3549091.1482281.4926962.5473292.2964551.676412
1001.3226181.1208621.4571212.4866192.2417251.636459
1501.1821981.0018621.3024212.2226192.0037251.462719
2001.3787861.1684621.5190012.5922192.3369251.705955
5001.113950.9440251.2272332.0943091.8880511.378277
3001.3497781.143881.4870432.5376822.2877591.670064
3501.1966411.0141031.3183332.2497742.0282051.48059
4001.3353791.1316771.471182.5106112.2633541.652248
4501.1922391.0103721.3134842.2414982.0207441.475143
5000.4864280.4122271.5358951.9145211.8244541.601852
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Singh, S.P.; Alotaibi, Y.; Kumar, G.; Rawat, S.S. Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments. Sustainability 2022, 14, 13635. https://doi.org/10.3390/su142013635

AMA Style

Singh SP, Alotaibi Y, Kumar G, Rawat SS. Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments. Sustainability. 2022; 14(20):13635. https://doi.org/10.3390/su142013635

Chicago/Turabian Style

Singh, Shailendra Pratap, Youseef Alotaibi, Gyanendra Kumar, and Sur Singh Rawat. 2022. "Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments" Sustainability 14, no. 20: 13635. https://doi.org/10.3390/su142013635

APA Style

Singh, S. P., Alotaibi, Y., Kumar, G., & Rawat, S. S. (2022). Intelligent Adaptive Optimisation Method for Enhancement of Information Security in IoT-Enabled Environments. Sustainability, 14(20), 13635. https://doi.org/10.3390/su142013635

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop