Choudhary Vandana, Tanwar Sarvesh, Choudhury Tanupriya, Kotecha Ketan
Amity Institute of Information Technology, Amity University, Noida 201313, India.
Research Professor, CSE Department, Graphic Era Deemed to be University, Dehradun, Uttarakhand 248002, India.
MethodsX. 2024 May 4;12:102747. doi: 10.1016/j.mex.2024.102747. eCollection 2024 Jun.
The Internet of Things (IoT) has radically reformed various sectors and industries, enabling unprecedented levels of connectivity and automation. However, the surge in the number of IoT devices has also widened the attack surface, rendering IoT networks potentially susceptible to a plethora of security risks. Addressing the critical challenge of enhancing security in IoT networks is of utmost importance. Moreover, there is a considerable lack of datasets designed exclusively for IoT applications. To bridge this gap, a customized dataset that accurately mimics real-world IoT scenarios impacted by four different types of attacks-blackhole, sinkhole, flooding, and version number attacks was generated using the Contiki-OS Cooja Simulator in this study. The resulting dataset is then consequently employed to evaluate the efficacy of several metaheuristic algorithms, in conjunction with Convolutional Neural Network (CNN) for IoT networks. •The proposed study's goal is to identify optimal hyperparameters for CNNs, ensuring their peak performance in intrusion detection tasks.•This study not only intensifies our comprehension of IoT network security but also provides practical guidance for implementation of the robust security measures in real-world IoT applications.
物联网(IoT)已经彻底改变了各个部门和行业,实现了前所未有的连接性和自动化水平。然而,物联网设备数量的激增也扩大了攻击面,使物联网网络可能容易受到大量安全风险的影响。应对增强物联网网络安全性这一关键挑战至关重要。此外,专门为物联网应用设计的数据集相当匮乏。为了弥补这一差距,本研究使用Contiki-OS Cooja模拟器生成了一个定制数据集,该数据集准确模拟了受四种不同类型攻击——黑洞攻击、陷洞攻击、泛洪攻击和版本号攻击影响的真实世界物联网场景。然后,将所得数据集用于评估几种元启发式算法与物联网网络卷积神经网络(CNN)相结合的效果。•本研究的目标是为卷积神经网络识别最优超参数,确保其在入侵检测任务中的最佳性能。•本研究不仅加深了我们对物联网网络安全的理解,还为在实际物联网应用中实施强大的安全措施提供了实践指导。