WeChat Mini Program
Old Version Features

Optimizing Data Privacy and Security Measures for Critical Infrastructures Via IoT Based ADP2S Technique

Zhenyu Xu, Jinming Wang, Shujuan Feng,Salwa Othmen, Chahira Lhioui,Aymen Flah,Zdenek Slanina

Scientific reports(2025)

Collage of Information Science and Technology

Cited 0|Views1
Abstract
The sensitive nature of the data processed by the critical infrastructures of a shared platform like the internet of things (IoT) makes it vulnerable to a wide range of security risks. These infrastructures must have robust security measures to protect the privacy of the user data transmitted to the processing systems that utilize them. However, data loss and complexities are significant issues when handling enormous data in IoT applications. This paper uses a reptile search optimization algorithm to offer attuned data protection with privacy scheme (ADP2S). This study follows the reptiles’ hunting behaviours to find a vulnerability in our IoT service’s security. The system activates the reptile swarm after successfully gaining access to explode ice. An attack of protection and authentication measures explodes at the breach location. The number of swarm densities and the extent to which they explore a new area are both functions of the severity of the breach. Service response and related loss prevention time verify fitness according to the service-level fitness value. The user and the service provider contribute to the authentication, which is carried out via elliptic curve cryptography and two-factor authentication. The reptile’s exploration and exploitation stages are merged by sharing a similar search location across the initialized candidates. The proposed scheme leverages breach detection and protection recommendations by 11.37% and 8.04%, respectively. It reduces the data loss, estimation time, and complexity by 6.58%, 10.9%, and 11.21%, respectively.
More
Translated text
Key words
Internet of things,Artificial intelligence,Big data,Optimization,Algorithms
PDF
Bibtex
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
Summary is being generated by the instructions you defined