Enabling secure and efficient industry 4.0 transformation through trust-authorized anomaly detection in cloud environments with a hybrid AI approach

N. Prakash, J. Vignesh, M. Ashwin, Sudhir Ramadass,N. Veeranjaneyulu,Shashikant V. Athawale, Ananda Ravuri, Balambigai Subramanian

Optical and Quantum Electronics(2024)

引用 0|浏览1
暂无评分
摘要
The swift advancement of next-generation technologies for wireless communication has led to the cloud computing model becoming a more effective technique of data processing. In addition, cloud computing services are used in edge computing, often referred to as fog computing, to address new IoT challenges. Cloud computing is vulnerable to many infiltration flaws as a result of its Identity Server's shaky connection and dispersed communication features. Since distributed cloud computing systems are widely used, the great majority of research has concentrated on vulnerability scanning and defense. Nevertheless, there is still promise for the creation of fresh intrusion defense and detection methods. As a result, employing an edge computing-based topology of the network, this research proposed a novel hybrid optimal intelligence technique for the detection and authorization of anomalous dangerous behaviors in IoT networks. To discover anomalies in edge computing networks for detecting device behavior, a unique Evolving Neuro-Fuzzy Intelligence for Anomaly Detection (EFNI-AD) method is proposed in this research. Additionally, an Improved Cipher Crypto System (ICCS) is developed to ensure the reliability of data-passing edge devices. The edge device functions as a certification authority (CA) for the specified trusted domain. In this proposed ICCS paradigm, the edge node just verifies the certificate once to eliminate the overhead of edge devices, and once confidence has been established, all communication may be conducted utilizing regional credentials. The Lionized African Buffalo Optimization (LABO) also improves the assault detection system and trust authorization. The simulation findings indicate that the proposed methods outperform the current methods in terms of several performance criteria such as Packet delivery time, End-to-End delay, throughput, Routing overhead, Packet loss, Accuracy, processing time, Packet Delivery Ratio, and Recall. The proposed method provides lower end-to-end delay and a higher packet delivery ratio.
更多
查看译文
关键词
Cloud computing,Artificial intelligence,Anomaly detection,Optimization,Malicious attack,And data transmission,Industry 4.0
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要