Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Volume 16 , Issue 1 , PP: 101-117, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection

Hitesh Kumar Sharma 1 * , Samta Jain Goyal 2 , Sumit Kumar 3 , Abhishek Kumar 4

  • 1 Research Scholar, Amity University, Gwalior, M.P, India - (hiteshkumar1706@gmail.com)
  • 2 Associate Professor, Amity University, Gwalior, M.P, India - (sjgoyal@gwa.amity.edu)
  • 3 Assistant Professor, G.N.S University, Sasaram, Bihar, India - (sumit170787@gmail.com)
  • 4 Research Scholar, Amity University, Gwalior, M.P, India - (abhishek.kumar13@s.amity.edu)
  • Doi: https://doi.org/10.54216/FPA.160108

    Received: July 19, 2023 Revised: November 15, 2023 Accepted: April 18, 2024
    Abstract

    As IoT devices increase, accuracy and data security become increasingly crucial. This research recommends a powerful threat detection system that accelerates message responses to improve IoT security. The recommended strategy finds dangers in using many data sources. Our deep learning system is DenseNet. It groups photographs nicely. We show how the approach works using real-world experiments. It has few false positives and negatives and is effective at recognizing items. Through ablation research, we examine how design and component selections impact technique performance. This clarifies the method's fundamentals. The research reveals that feature selection, fusion, and DenseNet design improve the technique. We discuss the need for fine-tuning hyperparameters to improve approaches and monitor more individuals. The strategy makes IoT communities safer and more robust by laying the groundwork for threat detection and response. This approach solves message transmission delay concerns, making the IoT safer. These discoveries may benefit hacking specialists. They improve and speed up IoT security. 

    Keywords :

    Detection , Efficiency , Fusion , IoT , Optimization , Response Time , Security , Threat , Timeliness , Validation.

    References

    [1]    K. Li, C. Yan, L. J. Chen, and X. Mou, “A review of deep learning-based target detection algorithms,” Computer Engineering, 2022.

    [2]    H. Liang, Q. Wang, Q. Zhang, and C. Li, “A review of research on small target detection techniques,” Computer Engineering and Applications, vol. 57, no. 01, pp. 17–28, 2021.

    [3]    Roy, V., Shukla, S. Designing Efficient Blind Source Separation Methods for EEG Motion Artifact Removal Based on Statistical Evaluation. Wireless Pers Commun 108, 1311–1327 (2019). https://doi.org/10.1007/s11277-019-06470-3.

    [4]    D. Bavkar, R. Kashyap, and V. Khairnar, "Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection," in Inventive Communication and Computational Technologies, G. Ranganathan, G. A. Papakostas, and Á. Rocha, Eds. Singapore: Springer, 2023, vol. 757, Lecture Notes in Networks and Systems. [Online]. Available: https://doi.org/10.1007/978-981-99-5166-6_13

    [5]    J. Redmon and A. Farhadi, “YOLO9000: better, faster, stronger,” in IEEE Conference on Computer Vision & Pattern Recognition, pp. 6517–6525, 2017.

    [6]    W. Liu, D. Anguelov, and D. Erhan, SSD: Single Shot MultiBox Detector, Springer, Cham, 2016.

    [7]    H. Law and J. Deng, “CornerNet: detecting objects as paired keypoints,” International Journal of Computer Vision, vol. 128, no. 3, pp. 642–656, 2020.

    [8]    K. Duan, S. Bai, L. Xie, H. Qi, and T. Qi, “Centernet: keypoint triplets for object detection,” in Proceedings of the IEEE/CVF international conference on computer vision, pp. 6569–6578, Seoul, Korea (South), 27 October-02 November 2019.

    [9]    V. Roy and S. Shukla, "Mth Order FIR Filtering for EEG Denoising Using Adaptive Recursive Least Squares Algorithm," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), 2015, pp. 401-404, doi: 10.1109/CICN.2015.85.

    [10] V. Roy et al., “Detection of sleep apnea through heart rate signal using Convolutional Neural Network,” International Journal of Pharmaceutical Research, vol. 12, no. 4, pp. 4829-4836, Oct-Dec 2020.

    [11] Z. Tian, C. Shen, H. Chen, and T. He, “Fcos: fully convolutional one-stage object detection,” in Proceedings of the IEEE/CVF international conference on computer vision, pp. 9627–9636, Seoul, Korea (South), 27 October-02 November 2019.

    [12] J. Redmon and A. Farhadi, “Yolov3: an incremental improvement,” 2018, [Online]. Available: http://arXiv.org/abs/1804.02767.

    [13] Z. Liu, T. Zheng, G. Xu, Z. Yang, H. Liu, and D. Cai, “Training-time-friendly network for real-time object detection,” in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 07, pp. 11685–11692, 2020.

    [14] G. Howard, M. Zhu, and B. Chen, “MobileNets: efficient convolutional neural networks for mobile vision applications,” Computer Vision and Pattern Recognition, 2017.

    [15] K. He, X. Zhang, and S. Ren, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016.

    [16] H. P. Sahu and R. Kashyap, "FINE_DENSEIGANET: Automatic medical image classification in chest CT scan using Hybrid Deep Learning Framework," International Journal of Image and Graphics [Preprint], 2023. [Online]. Available: https://doi.org/10.1142/s0219467825500044

    [17] S. Stalin, V. Roy, P. K. Shukla, A. Zaguia, M. M. Khan, P. K. Shukla, A. Jain, "A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach," Mathematical Problems in Engineering, vol. 2021, Article ID 2942808, 11 pages, 2021. [Online]. Available: https://doi.org/10.1155/2021/2942808

    [18] X. Ding, Y. Guo, G. Ding, and J. Han, “Acnet: strengthening the kernel skeletons for powerful CNN via asymmetric convolution blocks,” in Proceedings of the IEEE/CVF international conference on computer vision, pp. 1911–1920, IEEE, Seoul, Korea (South), 27 October-02 November 2019.

    [19] Y. Hua, J. Wang, J. Rong, H. Guodong, and L. Li, “Research on the identification of small stupid insects based on ResNet network,” Forestry and Environmental Science, vol. 37, no. 06, pp. 124–129, 2021.

    [20] B. A. Alabsi, M. Anbar, and S. D. A. Rihan, "CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks," Sensors, vol. 23, no. 14, p. 6507, 2023. [Online]. Available: https://doi.org/10.3390/s23146507

    [21] H. Meziane and N. Ouerdi, "A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems," Sci Rep, vol. 13, p. 21255, 2023. [Online]. Available: https://doi.org/10.1038/s41598-023-46640-9

    [22] Y. Tu, H. Chen, L. Yan, and X. Zhou, "Task Offloading Based on LSTM Prediction and Deep Reinforcement Learning for Efficient Edge Computing in IoT," Future Internet, vol. 14, no. 2, p. 30, 2022. [Online]. Available: https://doi.org/10.3390/fi14020030

    [23] F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, "Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models," Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167-185, 2024. [Online]. Available: https://doi.org/10.1016/j.iotcps.2023.12.003

    [24] N. Zhu, C. Zhu, L. Zhou, Y. Zhu, and X. Zhang, "Optimization of the Random Forest Hyperparameters for Power Industrial Control Systems Intrusion Detection Using an Improved Grid Search Algorithm," Appl. Sci., vol. 12, p. 10456, 2022. [Online]. Available: https://doi.org/10.3390/app122010456

    [25] J. Li, M. S. Othman, H. Chen, et al., "Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning," J Big Data, vol. 11, p. 36, 2024. [Online]. Available: https://doi.org/10.1186/s40537-024-00892-y

    [26] Z. Chen, Z. Song, T. Zhang, et al., "IoT devices and data availability optimization by ANN and KNN," EURASIP J. on Info. Security, vol. 2024, no. 2, 2024. [Online]. Available: https://doi.org/10.1186/s13635-023-00145-0

    [27] V. Gugueoth, S. Safavat, and S. Shetty, "Security of Internet of Things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects," ICT Express, vol. 9, no. 5, pp. 941-960, 2023. [Online]. Available: https://doi.org/10.1016/j.icte.2023.03.006

    [28] X. Liu and Y. Deng, "A new QoS-aware service discovery technique in the Internet of Things using whale optimization and genetic algorithms," J. Eng. Appl. Sci., vol. 71, no. 4, 2024. [Online]. Available: https://doi.org/10.1186/s44147-023-00334-1

    [29] M. Osman, J. He, N. Zhu, and F. M. M. Mokbal, "An ensemble learning framework for the detection of RPL attacks in IoT networks based on the genetic feature selection approach," Ad Hoc Networks, vol. 152, 103331, 2024. [Online]. Available: https://doi.org/10.1016/j.adhoc.2023.103331

    Cite This Article As :
    Kumar, Hitesh. , Jain, Samta. , Kumar, Sumit. , Kumar, Abhishek. Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection. Fusion: Practice and Applications, vol. , no. , 2024, pp. 101-117. DOI: https://doi.org/10.54216/FPA.160108
    Kumar, H. Jain, S. Kumar, S. Kumar, A. (2024). Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection. Fusion: Practice and Applications, (), 101-117. DOI: https://doi.org/10.54216/FPA.160108
    Kumar, Hitesh. Jain, Samta. Kumar, Sumit. Kumar, Abhishek. Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection. Fusion: Practice and Applications , no. (2024): 101-117. DOI: https://doi.org/10.54216/FPA.160108
    Kumar, H. , Jain, S. , Kumar, S. , Kumar, A. (2024) . Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection. Fusion: Practice and Applications , () , 101-117 . DOI: https://doi.org/10.54216/FPA.160108
    Kumar H. , Jain S. , Kumar S. , Kumar A. [2024]. Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection. Fusion: Practice and Applications. (): 101-117. DOI: https://doi.org/10.54216/FPA.160108
    Kumar, H. Jain, S. Kumar, S. Kumar, A. "Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection," Fusion: Practice and Applications, vol. , no. , pp. 101-117, 2024. DOI: https://doi.org/10.54216/FPA.160108