IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v16y2024i24p11040-d1545189.html
   My bibliography  Save this article

Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments’ Sustainability Through IoT Devices

Author

Listed:
  • Kavitha Ramaswami Jothi

    (Department of Electronics and Communication Engineering, University College of Engineering, Panruti 607106, India)

  • Balamurugan Vaithiyanathan

    (Department of Electronics and Communication Engineering, University College of Engineering, Panruti 607106, India)

Abstract

Even while living circumstances and construction techniques have generally improved, occupants of these spaces frequently feel unsatisfied with the sense of security they provide, which leads to looking for and eventually enacting ever-more-effective safety precautions. The continuous uncertainty that contemporary individuals experience, particularly with regard to their protection in places like cities, prompted the field of computing to design smart devices that attempt to reduce threats and ultimately strengthen people’s sense of protection. Intelligent apps were developed to provide protection and make a residence a smart and safe home. The proliferation of technology for smart homes necessitates the implementation of rigorous safety precautions to protect users’ personal information and avoid illegal access. The importance of establishing cyber security has been recognized by academic and business institutions all around the globe. Providing reliable computation for the Internet of Things (IoT) is also crucial. A new method for enhancing safety in smart home environments’ sustainability using IoT devices is presented in this paper, combining the Whale Optimization Algorithm (WOA) with Deep Convolutional Neural Networks (DCNNs). WOA-DCNN hybridization seeks to enhance safety measures by efficiently identifying and averting possible attacks in real time. We show how effective the proposed approach is in defending smart home systems from a range of safety risks via in-depth testing and analysis. By providing a potential path for protecting smart home surroundings in a world that is growing more linked, this research advances the state of the art in IoT security.

Suggested Citation

  • Kavitha Ramaswami Jothi & Balamurugan Vaithiyanathan, 2024. "Developing a Hybrid Approach with Whale Optimization and Deep Convolutional Neural Networks for Enhancing Security in Smart Home Environments’ Sustainability Through IoT Devices," Sustainability, MDPI, vol. 16(24), pages 1-29, December.
  • Handle: RePEc:gam:jsusta:v:16:y:2024:i:24:p:11040-:d:1545189
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/16/24/11040/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/16/24/11040/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Iyad Katib & Mahmoud Ragab, 2023. "Blockchain-Assisted Hybrid Harris Hawks Optimization Based Deep DDoS Attack Detection in the IoT Environment," Mathematics, MDPI, vol. 11(8), pages 1-16, April.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fatmah Y. Assiri & Mahmoud Ragab, 2023. "Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment," Mathematics, MDPI, vol. 11(19), pages 1-16, September.
    2. Rayed AlGhamdi, 2023. "Design of Network Intrusion Detection System Using Lion Optimization-Based Feature Selection with Deep Learning Model," Mathematics, MDPI, vol. 11(22), pages 1-17, November.
    3. Walid I. Khedr & Ameer E. Gouda & Ehab R. Mohamed, 2023. "P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture," Mathematics, MDPI, vol. 11(16), pages 1-36, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:16:y:2024:i:24:p:11040-:d:1545189. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.