Adaptive Multi-Layer Security Framework (AMLSF) for real-time applications in smart city networks
Abstract
This study introduces the Adaptive Multi-Layer Security Framework (AMLSF), a novel approach designed for real-time applications in smart city networks, addressing the current challenges in security systems. AMLSF innovatively incorporates machine learning algorithms for dynamic adjustment of security protocols based on real-time threat analysis and device behavior patterns. This approach marks a significant shift from static security measures, offering an adaptive encryption mechanism that scales according to application criticality and device mobility. Our methodology integrates hierarchical key management with real-time adaptability, further enhanced by an advanced rekeying strategy sensitive to device mobility and communication overhead. The paper’s findings reveal a substantial improvement in security efficiency. AMLSF outperforms existing models in encryption strength, rekeying time, communication overhead, and computational time by significant margins. Notably, AMLSF demonstrates an adaptability increase of over 30% compared to traditional models, with encryption strength and computational time efficiency improving by approximately 25%. These results underscore AMLSF’s capability in delivering robust, dynamic security without sacrificing performance. The achievements of AMLSF are significant, indicating a promising direction for smart city security frameworks. Its ability to adapt in real-time to various security needs, coupled with its performance efficiency, positions AMLSF as a superior choice for smart city networks facing diverse and evolving security threats. This framework sets a new benchmark in smart city security, paving the way for future developments in this rapidly advancing field.
Keywords
Full Text:
PDFReferences
1. Dhiman G, Kumar V. Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Advances in Engineering Software. 2017, 114: 48-70. doi: 10.1016/j.advengsoft.2017.05.014
2. Dhiman G, Kumar V. Emperor penguin optimizer: A bio-inspired algorithm for engineering problems. Knowledge-Based Systems. 2018, 159: 20-50. doi: 10.1016/j.knosys.2018.06.001
3. Kaur S, Awasthi LK, Sangal AL, et al. Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Engineering Applications of Artificial Intelligence. 2020, 90: 103541. doi: 10.1016/j.engappai.2020.103541
4. Pradeep G, Ramamoorthy S, Krishnamurthy M, Saritha V. Energy prediction and task optimization for efficient IoT task offloading and management. International Journal of Intelligent Systems and Applications in Engineering. 2023, 12(1s): 411-427.
5. Dhiman G, Kaur A. STOA: A bio-inspired based optimization algorithm for industrial engineering problems. Engineering Applications of Artificial Intelligence. 2019, 82: 148-174. doi: 10.1016/j.engappai.2019.03.021
6. Kumar R, Dhiman G. A comparative study of fuzzy optimization through fuzzy number. International Journal of Modern Research. 2021, 1: 1-14.
7. Chatterjee I. Artificial intelligence and patentability: Review and discussions. International Journal of Modern Research. 2021, 1: 15-21.
8. Alrashed FA, Alsubiheen AM, Alshammari H, et al. Stress, Anxiety, and Depression in Pre-Clinical Medical Students: Prevalence and Association with Sleep Disorders. Sustainability. 2022, 14(18): 11320. doi: 10.3390/su141811320
9. Ahmad F, Shahid M, Alam M, et al. Levelized Multiple Workflow Allocation Strategy Under Precedence Constraints with Task Merging in IaaS Cloud Environment. IEEE Access. 2022, 10: 92809-92827. doi: 10.1109/access.2022.3202651
10. Singamaneni KK, Dhiman G, Juneja S, et al. A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks. Sensors. 2022, 22(18): 6741. doi: 10.3390/s22186741
11. Vaishnav PK, Sharma S, Sharma P. Analytical review analysis for screening COVID-19. International Journal of Modern Research. 2021, 1: 22-29.
12. Gupta VK, Shukla SK, Rawat RS. Crime tracking system and people’s safety in India using machine learning approaches. International Journal of Modern Research. 2022, 2(1): 1-7.
13. Sharma T, Nair R, Gomathi S. Breast cancer image classification using transfer learning and convolutional neural network. International Journal of Modern Research. 2022, 2(1): 8-16.
14. Shukla SK, Gupta VK, Joshi K, et al. Self-aware execution environment model (SAE2) for the performance improvement of multicore systems. International Journal of Modern Research. 2022, 2(1): 17-27.
15. Gracias JS, Parnell GS, Specking E, et al. Smart Cities—A Structured Literature Review. Smart Cities. 2023, 6(4): 1719-1743. doi: 10.3390/smartcities6040080
16. Kazmi SHA, Qamar F, Hassan R, et al. Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions. Wireless Personal Communications. 2023, 130(4): 2753-2800. doi: 10.1007/s11277-023-10402-7
17. Haroon M, Misra DK, Husain M, et al. Security Issues in the Internet of Things for the Development of Smart Cities. Advances in Cyberology and the Advent of the Next-Gen Information Revolution. Published online June 16, 2023: 123-137. doi: 10.4018/978-1-6684-8133-2.ch007
18. Ahmad MO, Tripathi G, Siddiqui F, et al. BAuth-ZKP—A Blockchain-Based Multi-Factor Authentication Mechanism for Securing Smart Cities. Sensors. 2023, 23(5): 2757. doi: 10.3390/s23052757
19. Siddiqui S, Hameed S, Shah SA, et al. Smart contract-based security architecture for collaborative services in municipal smart cities. Journal of Systems Architecture. 2023, 135: 102802. doi: 10.1016/j.sysarc.2022.102802
20. Abdalzaher M, Fouda M, Emran A, et al. A Survey on Key Management and Authentication Approaches in Smart Metering Systems. Energies. 2023, 16(5): 2355. doi: 10.3390/en16052355
21. Hasan MK, Habib AA, Shukur Z, et al. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. Journal of Network and Computer Applications. 2023, 209: 103540. doi: 10.1016/j.jnca.2022.103540
22. Srikanth GU, Geetha R, Prabhu S. An efficient Key Agreement and Authentication Scheme (KAAS) with enhanced security control for IIoT systems. International Journal of Information Technology. 2023, 15(3): 1221-1230. doi: 10.1007/s41870-023-01173-2
23. Bagga P, Das AK, Rodrigues JJPC. Bilinear pairing-based access control and key agreement scheme for smart transportation. Cyber Security and Applications. 2023, 1: 100001. doi: 10.1016/j.csa.2022.100001
24. Waseem M, Adnan Khan M, Goudarzi A, et al. Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges. Energies. 2023, 16(2): 820. doi: 10.3390/en16020820
25. Sheik SA, Muniyandi AP. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review. Cyber Security and Applications. 2023, 1: 100002. doi: 10.1016/j.csa.2022.100002
26. Su S, Ju X. A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things. Internet of Things. 2023, 22: 100718. doi: 10.1016/j.iot.2023.100718
27. Raeisi M, Sesay AB. Handover Reduction in 5G High-Speed Network Using ML-Assisted User-Centric Channel Allocation. IEEE Access. 2023, 11: 84113-84133. doi: 10.1109/access.2023.3297982
28. Saha S, Chattopadhyay AK, Barman AK, et al. Secret Image Sharing Schemes: A Comprehensive Survey. IEEE Access. 2023, 11: 98333-98361. doi: 10.1109/access.2023.3304055
29. Singh J, Singh P, Hedabou M, et al. An Efficient Machine Learning-Based Resource Allocation Scheme for SDN-Enabled Fog Computing Environment. IEEE Transactions on Vehicular Technology. 2023, 72(6): 8004-8017. doi: 10.1109/tvt.2023.3242585
30. Halba K, Griffor E, Lbath A, et al. IoT Capabilities Composition and Decomposition: A Systematic Review. IEEE Access. 2023, 11: 29959-30007. doi: 10.1109/access.2023.3260182
31. Dhiman G, Kumar V. Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Advances in engineering software. 2017, 114: 48-70.
32. Dhiman G, Kumar V. Emperor penguin optimizer: A bio-inspired algorithm for engineering problems. Knowledge based systems. 2018, 159: 20-50.
33. Dhiman G, Kumar V. Seagull Optimization Algorithm: Theory and its Applications for Large-Scale Industrial Engineering Problems. Knowledge based systems. 2019, 165: 169-196.
34. Dhiman G, Kumar V. STOA: A Bio-inspired based Optimization Algorithm for Industrial Engineering Problems. Engineering applications of artificial intelligence. 2019, 82: 148-174.
35. Kaur S, Awasthi LA, Sangal AL, et.al. Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Engineering applications of artificial intelligence. 2020, 90: 103541. doi: 10.1016/j.engappai.2020.103541
36. Dehghani M, Montazeri Z, Malik OP, et. Al. BOSA: Binary Orientation Search Algorithm. International Journal of Innovative Technology and Exploring Engineering (IJITEE). 2019, 9(1): 5306-5310.
37. Dhiman G, Garg M, Nagar A, et al. A Novel Algorithm for Global Optimization: Rat Swarm Optimizer. Journal of Ambient intelligence and humanized computer. 2021, 12: 8457–8482. doi: 10.1007/s12652-020-02580-0.
38. Dehghani M, Montazeri Z, Dehghani A, et al. MLO: Multi Leader Optimizer. International Journal of Intelligent Engineering and Systems. 2020, 13. doi: 10.22266/ijies2020.1231.32.
39. Dehghani M, Montazeri Z, Givi H, et al. Darts Game Optimizer: A New Optimization Technique Based on Darts Game. International Journal of Intelligent Engineering and Systems. doi: 10.22266/ijies2020.1031.26.
40. Dehghani M, Montazeri Z, Dhiman G, et al. A Spring Search Algorithm Applied to Engineering Optimization Problems. Applied Sciences. 2020, 10(18): 6173. doi: 10.3390/app10186173.
41. Dhiman G, Oliva D, Kaur A, et al. BEPO: A novel binary emperor penguin optimizer for automatic feature selection. Knowledge-Based Systems. 2021, 211. doi: 10.1016/j.knosys.2020.106560.
42. Dhiman G. ESA: A Hybrid Bio-inspired Metaheuristic Optimization Approach for engineering problems. Engineering computations. 2019, 37: 323–353. doi: 10.1007/s00366-019-00826-w.
43. Tengrihan. Smart City Denmark Traffic Dataset. Available online: https://www.kaggle.com/datasets/tengrihan/smart-city-traffic-dataset (accessed on 17 November 2023).
44. Yuan Y, Wu L, Zhang X. Gini-Impurity Index Analysis. IEEE Transactions on Information Forensics and Security. 2021, 16: 3154-3169. doi: 10.1109/tifs.2021.3076932
45. Whaiduzzaman M, Mahi MJN, Barros A, et al. BFIM: Performance Measurement of a Blockchain Based Hierarchical Tree Layered Fog-IoT Microservice Architecture. IEEE Access. 2021, 9: 106655-106674. doi: 10.1109/access.2021.3100072
DOI: https://doi.org/10.32629/jai.v7i5.1370
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 M. Sethu Ram, R. Anandan
License URL: https://creativecommons.org/licenses/by-nc/4.0/