{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T13:53:37Z","timestamp":1771682017973,"version":"3.50.1"},"reference-count":43,"publisher":"MDPI AG","issue":"16","license":[{"start":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T00:00:00Z","timestamp":1660608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Western Norway University of Applied Sciences, Bergen, Norway"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network\u2019s external foreign entities through the Internet (IP). IoT devices are in danger of security issues due to the surge in hacker attacks during Internet data exchange. If such strong attacks are to create a reliable security system, attack detection is essential. Attacks and abnormalities such as user-to-root (U2R), denial-of-service, and data-type probing could have an impact on an IoT system. This article examines various performance-based AI models to predict attacks and problems with IoT devices with accuracy. Particle Swarm Optimization (PSO), genetic algorithms, and ant colony optimization were used to demonstrate the effectiveness of the suggested technique concerning four different parameters. The results of the proposed method employing PSO outperformed those of the existing systems by roughly 73 percent.<\/jats:p>","DOI":"10.3390\/s22166117","type":"journal-article","created":{"date-parts":[[2022,8,17]],"date-time":"2022-08-17T03:15:27Z","timestamp":1660706127000},"page":"6117","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0137-9422","authenticated-orcid":false,"given":"Hassan A.","family":"Alterazi","sequence":"first","affiliation":[{"name":"Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia"}]},{"given":"Pravin R.","family":"Kshirsagar","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, G. H Raisoni College of Engineering, Nagpur 440016, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5034-3034","authenticated-orcid":false,"given":"Hariprasath","family":"Manoharan","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Panimalar Engineering College, Poonamallee, Chennai 600123, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4931-724X","authenticated-orcid":false,"given":"Shitharth","family":"Selvarajan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Kebri Dehar University, Kebri Dehar 001, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0438-4243","authenticated-orcid":false,"given":"Nawaf","family":"Alhebaishi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 22254, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9851-4103","authenticated-orcid":false,"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Brandon University, Brandon, MB R7A 6A9, Canada"},{"name":"Research Center for Interneural Computing, China Medical University, Taichung 406040, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8768-9709","authenticated-orcid":false,"given":"Jerry Chun-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Electrical Engineering and Mathematical Sciences, Western Norway University of Applied Sciences, 5063 Bergen, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"3801","DOI":"10.1109\/TII.2018.2836150","article-title":"Defending on\u2013off attacks using light probing messages in smart sensors for industrial communication systems","volume":"14","author":"Liu","year":"2018","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.cose.2019.05.016","article-title":"Designing an efficient security framework for detecting intrusions in virtual network of cloud computing","volume":"85","author":"Patil","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1007\/s00521-014-1629-6","article-title":"Binary optimization using hybrid particle swarm optimization and gravitational search algorithm","volume":"25","author":"Mirjalili","year":"2014","journal-title":"Neural Comput. Appl."},{"key":"ref_4","first-page":"541","article-title":"Anomaly network-based intrusion detection system using a reliable hybrid artificial bee colony and AdaBoost algorithms","volume":"31","author":"Mazini","year":"2018","journal-title":"J. King Saud. Univ. Comput. Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4287","DOI":"10.1007\/s00521-017-3317-9","article-title":"Efficient feature selection and classification algorithm based on PSO and rough sets","volume":"31","author":"Huda","year":"2018","journal-title":"Neural Comput. Appl."},{"key":"ref_6","first-page":"83","article-title":"Mitigation of Application Layer DDoS Flood Attack Against Web Servers","volume":"2","author":"Aljuhani","year":"2019","journal-title":"J. Inf. Secur. Cybercrimes Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"140","DOI":"10.11591\/eei.v6i2.605","article-title":"Review of detection DDOS attack detection using naive bayes classifier for network forensics","volume":"6","author":"Fadlil","year":"2017","journal-title":"Bull. Electr. Eng. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100056","DOI":"10.1016\/j.iot.2019.100056","article-title":"Toward the automation of threat modeling and risk assessment in iot systems","volume":"7","author":"Casola","year":"2019","journal-title":"Int. Things"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Cagnazzo, M., Hertlein, M., Holz, T., and Pohlmann, N. (2018, January 15\u201318). Threat modeling for mobile health systems. Proceedings of the 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Barcelona, Spain.","DOI":"10.1109\/WCNCW.2018.8369033"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"107042","DOI":"10.1016\/j.comnet.2019.107042","article-title":"Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic","volume":"168","author":"Elmasry","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"8457116","DOI":"10.1155\/2022\/8457116","article-title":"Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism","volume":"2022","author":"Khadidos","year":"2022","journal-title":"J. Sens."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Singhal, A., and Vaidya, J. (2020). Ml-supported identification and prioritization of threats in the ovvl threat modelling tool. Data and Applications Security and Privacy XXXIV, Springer International Publishing.","DOI":"10.1007\/978-3-030-49669-2"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Sion, L., van Landuyt, D., Wuyts, K., and Joosen, W. (2019, January 19\u201323). Privacy risk assessment for data subject-aware threat modeling. Proceedings of the 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2019.00023"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/s10586-017-0971-8","article-title":"A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection","volume":"21","author":"Malik","year":"2018","journal-title":"Clust. Comput."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"798","DOI":"10.1016\/j.compeleceng.2017.07.008","article-title":"Fuzzified cuckoo based clustering technique for network anomaly detection","volume":"71","author":"Garg","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Creech, G., Sitnikova, E., and Keshk, M. (2017, January 14\u201316). Collaborative anomaly detection framework for handling big data of cloud computing. Proceedings of the 2017 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2017.8190421"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Khadidos, A.O., Manoharan, H., Selvarajan, S., Khadidos, A.O., Alyoubi, K.H., and Yafoz, A. (2022). A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security. Energies, 15.","DOI":"10.3390\/en15103624"},{"key":"ref_18","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A., Du, X., and Guizani, M. (2018). A survey of machine and deep learning methods for internet of things (IoT) security. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","article-title":"Network Intrusion Detection for IoT Security based on Learning Techniques","volume":"21","author":"Chaabouni","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2716","DOI":"10.1109\/TII.2019.2956474","article-title":"Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT","volume":"16","author":"Farivar","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_21","first-page":"378","article-title":"Increasing accuracy and completeness of intrusion detection model using fusion of normalization, feature selection method and support vector machine","volume":"12","author":"Setiawan","year":"2019","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s43926-020-00001-4","article-title":"Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity","volume":"1","author":"Kuzlu","year":"2021","journal-title":"Discov. Internet Things"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"McDermott, D., Isaacs, J.P., and Petrovski, A.V. (2019). Evaluating awareness and perception of botnet activity within consumer internet-of-things (IoT) networks. Informatics, 6.","DOI":"10.3390\/informatics6010008"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"8547","DOI":"10.1109\/ACCESS.2018.2799306","article-title":"An Immune Genetic Algorithm for Multi-Echelon Inventory Cost Control of IoT Based Supply Chains","volume":"6","author":"Wang","year":"2018","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Han, J., Jeon, Y., and Kim, J. (2015, January 28\u201330). Security considerations for secure and trustworthy smart home system in the IoT environment. Proceedings of the 2015 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea.","DOI":"10.1109\/ICTC.2015.7354752"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Kraijak, S., and Tuwanut, P. (2015, January 21\u201323). A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. Proceedings of the 11th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2015), Shanghai, China.","DOI":"10.1049\/cp.2015.0714"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3329581","DOI":"10.1155\/2021\/3329581","article-title":"Artificial Intelligence Application in Cybersecurity and Cyberdefense","volume":"2021","author":"Jun","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_28","first-page":"229","article-title":"Identifying the factors of modern-day stress using machine learning","volume":"9","author":"Suroor","year":"2017","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"ref_29","first-page":"79","article-title":"A Novel Probabilistic-PSO Based Learning Algorithm for Optimization of Neural Networks for Benchmark Problems","volume":"7","author":"Akojwar","year":"2016","journal-title":"Wseas Trans. Electron."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2105","DOI":"10.1016\/j.engappai.2013.04.010","article-title":"An appraisal and design of a multi -agent system based cooperative wireless intrusion detection computational intelligence technique","volume":"26","author":"Shamshirband","year":"2013","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1286","DOI":"10.1111\/coin.12367","article-title":"Performance enhancement of safety message communication via designing dynamic power control mechanisms in vehicular ad hoc networks","volume":"37","author":"Alabbas","year":"2021","journal-title":"Comput. Intell."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Vald\u00e9s, J.F., and Luna-Valero, F. (2020). Detection and mitigation of DoS and DDoS attacks in iot-based stateful SDN: An experimental approach. Sensors, 20.","DOI":"10.3390\/s20030816"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1088\/1742-6596\/1345\/4\/042075","article-title":"Analysis on the Application of artificial Intelligence in classroom","volume":"1345","author":"Qi","year":"2019","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s42979-021-00557-0","article-title":"AI-Driven Cybersecurity: An Overview, Security Intelligence Modeling and Research Directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bao, H., He, H., Liu, Z., and Liu, Z. (2019, January 15\u201316). Research on information security situation awareness system based on big data and artificial intelligence technology. Proceedings of the 2019 international conference on robots intelligent system (ICRIS), Haikou, China.","DOI":"10.1109\/ICRIS.2019.00087"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"46424","DOI":"10.1109\/ACCESS.2022.3171660","article-title":"An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Na\u00efve Bayes (LNB) Classification Approach for Network Intrusion Detection System","volume":"10","author":"Shitharth","year":"2022","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Buccafurri, F., Holzinger, A., Kieseberg, P., Tjoa, A.M., and Weippl, E. (2016). Towards interactive machine learning (IML): Applying ant colony algorithms to solve the traveling salesman problem with the human-in-the-loop approach. Availability, Reliability, and Security in Information Systems, Springer.","DOI":"10.1007\/978-3-319-45507-5_6"},{"key":"ref_38","first-page":"231","article-title":"Performance Evolution of Optimization Techniques for Mathematical Benchmark Functions","volume":"1","author":"Sudhir","year":"2016","journal-title":"Int. J. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"146598","DOI":"10.1109\/ACCESS.2020.3013145","article-title":"Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature","volume":"8","author":"Wiafe","year":"2020","journal-title":"IEEE Access"},{"key":"ref_40","first-page":"6","article-title":"Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review","volume":"6","author":"Dilek","year":"2015","journal-title":"Int. J. Artif. Intell. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Padmaja, M., Shitharth, S., Prasuna, K., Chaturvedi, A., Kshirsagar, P.R., and Vani, A. (2021). Grow of Artificial Intelligence to Challenge Security in IoT Application. Wirel. Pers. Commun.","DOI":"10.1007\/s11277-021-08725-4"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"156297","DOI":"10.1109\/ACCESS.2021.3129053","article-title":"An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems","volume":"9","author":"Shitharth","year":"2021","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/TIFS.2022.3140687","article-title":"Model Inversion Attack by Integration of Deep Generative Models: Privacy-Sensitive Face Generation From a Face Recognition System","volume":"17","author":"Mahdi","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/16\/6117\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:09:19Z","timestamp":1760141359000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/16\/6117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,16]]},"references-count":43,"journal-issue":{"issue":"16","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["s22166117"],"URL":"https:\/\/doi.org\/10.3390\/s22166117","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,16]]}}}