Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
- Title
- Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT
- Creator
- Kumar A.; Rahmath M.; Raju Y.; Reddy Vulapula S.; Prathap B.R.; Hassan M.M.; Mohamed M.A.; Asakipaam S.A.
- Description
- The Internet of Things (IoT) is a broad term that refers to the collection of information about all of the items that are linked to the Internet. It supervises and controls the functions from a distance, without the need for human interaction. It has the ability to react to the environment either immediately or via its previous experiences. In a similar vein, robots may learn from their experiences in the environment that is relevant to their applications and respond appropriately without the need for human interaction. A greater number of sensors are being distributed across the environment in order to collect and evaluate the essential information. They are gaining ground in a variety of industries, ranging from the industrial environment to the smart home. Sensors are assisting in the monitoring and collection of data from all of the real-time devices that are reliant on all of the different types of fundamental necessities to the most advanced settings available. This research study was primarily concerned with increasing the efficiency of the sensing and network layers of the Internet of Things to increase cyber security. Due to the fact that sensors are resource-constrained devices, it is vital to provide a method for reacting, analysing, and transmitting data collected from the sensors to the base station as efficient as possible. Resource requirements, such as energy, computational power, and storage, vary depending on the kind of sensing devices and communication technologies that are utilised to link real-world objects together. Sensor networks' physical and media access control layers, as well as their applications in diverse geographical and temporal domains, are distinct from one another. Transmission coverage range, energy consumption, and communication technologies differ depending on the application requirements, ranging from low constraints to high resource enrich gadgets. This has a direct impact on the performance of the massive Internet of Things environment, as well as the overall network lifetime of the environment. Identifying and communicating matching items in a massively dispersed Internet of Things environment is critical in terms of spatial identification and communication. 2022 Anand Kumar et al.
- Source
- Security and Communication Networks, Vol-2022
- Date
- 2022-01-01
- Publisher
- Hindawi Limited
- Coverage
- Kumar A., Cambridge Institute of Technology, North Campus, Karnataka, Bangalore, 562110, India; Rahmath M., Department of Computer Science, Prince Sattam Bin Abdulaziz University, Wadi Ad-Dawasir, Saudi Arabia; Raju Y., Department of Computer Science and Engineering, Vignana Bharathi Institute of Technology, Telangana, Hyderabad, India; Reddy Vulapula S., Department of IT, Vignana Bharathi Institute of Technology, Hyderabad, India; Prathap B.R., Department of Computer Science and Engineering, Christ University, Bangalore, India; Hassan M.M., Department of Biology, College of Science, Taif University, P.O. Box 11099, Taif, 21944, Saudi Arabia; Mohamed M.A., Department of Medical Instruments Engineering Techniques, AI-Turath University, Baghdad, 10021, Iraq, Department of Medical Instruments Engineering Techniques, Al-Farahidi University, Baghdad, 10021, Iraq; Asakipaam S.A., Department of Electrical and Electronics Engineering, Tamale Technical University, Tamale, Ghana
- Rights
- All Open Access; Gold Open Access
- Relation
- ISSN: 19390114
- Format
- Online
- Language
- English
- Type
- Article
Collection
Citation
Kumar A.; Rahmath M.; Raju Y.; Reddy Vulapula S.; Prathap B.R.; Hassan M.M.; Mohamed M.A.; Asakipaam S.A., “Enhanced Secure Technique for Detecting Cyber Attacks Using Artificial Intelligence and Optimal IoT,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 23, 2025, https://archives.christuniversity.in/items/show/15317.