Optimal Feature Subset Selection Using Cuckoo Search on Iot Network Samah Osama M

Optimal Feature Subset Selection Using Cuckoo Search on Iot Network Samah Osama M

Int. J. Advanced Networking and Applications 4475 Volume: 11 Issue: 06 Pages: 4475-4485 (2020) ISSN: 0975-0290 Optimal Feature Subset Selection Using Cuckoo Search on IoT Network Samah Osama M. Kamel Department of Informatics Research, Electronics Research Institute, Cairo, Egypt Email: [email protected] SanaaAbouElhamayed Department of InformaticsResearch, ElectronicsResearch Institute, Cairo, Egypt Email:[email protected] ----------------------------------------------------------------------ABSTRACT----------------------------------------------------------- The Internet of Things (IoT) became the basic axis in the information and network technology to create a smart environment. To build such an environment; it needs to use some IoT simulators such as Cooja Simulator. Cooja simulator creates an IoT environment and produces an IoT routing dataset that contains normal and malicious motes. The IoT routing dataset may have redundant and noisy features. The feature selection can affect on the performance metrics of the learning model. The feature selection can reduce complexity and over-fitting problem. There are many approaches for feature selection especially meta-heuristic algorithms such as Cuckoo search (CS). This paper presented a proposed model for feature selection that is built on using a standard cuckoo search algorithm to select near-optimal or optimal features. A proposed model may modify the CS algorithm which has implemented using Dagging with base learner Bayesian Logistic Regression (BLR). It increases the speed of the CS algorithm and improves the performance of BLR. Support Vector Machine (SVM), Deep learning, and FURIA algorithms are used as classification techniques used to evaluate the performance metrics. The results have demonstrated that the algorithm proposed is more effective and competitive in terms of performance of classification and dimensionality reduction. It achieved high accuracy that is near to 98 % and low error that is about 1.5%. Keywords – IoT, Feature Selection, Meta-heuristic, Cuckoo Search Algorithm, Deep Learning. ----------------------------------------------------------------------------------------------------------------------------- -------------------- Date of Submission: May 12, 2020 Date of Acceptance: June 16, 2020 ------------------------------------------------------------------------------------------------------------------------------------------------- 1. INTRODUCTION rise to the exhausting of network resources such as power and memory. Besides; these attacks can damage the entire The Internet of Things (IoT) plays an important role in network and have a bad effect on security requirements the information technology revolution. IoT creates a new such as privacy, availability, integrity, and confidentiality. intelligent environment to build a smart world. The creation of a real environment of IoT network needs IoTapplications improve people's life and all fields of to test and correct new protocol especially RPL protocol communication, industries, education, commercial and the properties of many smart sensors that is power business, healthcare, agriculture, etc. The IoT network consumption, performance, and memory. Therefore; there provides the connection between physical and virtual are many simulators to achieve such requirements for IoT objects such as smart devices using sensors. Therefore; the networks. One such simulator is the Cooja Simulator that IoT network takes advantage of every smart device and is the most famous simulator of the IoT network which creates a new system with newly developed capabilities. creates a real environment of IoT network by generating All smart devices can send and receive all information many nodes including normal and malicious nodes. The among each other. identification of malicious nodes (attacks) needs to The structure of the IoT network contains six layers analyze strange behavior and their effect on power namely; coding, perception, network, middleware, consumption. Thence; the detection (classification) application, and business layer. In this work; we focus on technique with high-performance metrics is a major the network layer because it is the key element in the IoT problem because the routing dataset has many irrelevant, network. The network layer is responsible for the noise, and redundant features. The high- dimensionality specification and functions of physical objects. The reduction of features affects onthe accuracy of the learning network layer connects different smart devices to model when unwanted and insignificant features are used. exchange data over the IEEE 802.15 protocol using IPv6. Therefore; reducing these features is an important step to IPv6 protocol is responsible for the connection between build a learning model with high-performance metrics. smart devices via IPv6 over Low-Power Wireless Personal The dimensionality reduction can be divided into feature Area Networks (6LoWPAN) [2]. The routing process is extraction and selection. The feature selection approaches based on Low Power and Lossy Networks (LLNs) named are split into three parts, namely, flat feature, structure RPL which is used to build a network over constrained feature, and streaming feature. The flat feature technique nodes [3]. Consequently; these devices and the exchanged is typically divided into three techniques that are filter, data will be exposed to different types of attacks that give wrapper, and embedded. The filter feature technique Int. J. Advanced Networking and Applications 4476 Volume: 11 Issue: 06 Pages: 4475-4485 (2020) ISSN: 0975-0290 depends on the characteristics of the training data such as more robust and efficient algorithm. Standard CS distance, consistency, dependency, information, and algorithm is based on L´evyflights which uses random correlation. It doesn’t depend on that the selected feature walk to explore to search space to improve CS. The will achieve high-performance metrics. disadvantage of standard CS is that its convergence rate In contrast; the wrapper feature technique depends on the that it may be a little slower [17, 18]. evaluation of the quality of the selected features which are Therefore; this paper introduced a proposed model that used to increase performance metrics. Then the wrapper modifies the standard CS algorithm using Dagging based technique is more efficient than a filter feature technique on BLR to obtain a robust model for the feature selection to build robust learners to achieve high performance [4]. method. This proposed model improves the speed of the Most of the researches try to find solutions for hard standard CS algorithm and the performance of BLR optimization problems in the real-world which is through utilizing a Dagging ensemble learner.This work implemented in a finite time. Therefore; meta-heuristic achieves two experiments to present two models to algorithms are used to solve the problem of heuristic introduce the impact of Dagging on standard CS algorithm optimization algorithm in a certain or small enough time. and BLR. The first model has been implemented using Meta-heuristic is a high-level problem which is an standard CS algorithm using Dagging based on BLR and independent framework which provides a set of strategies the second model has been performed using standard CS schemas to develop optimization problem. The idea of algorithm using BLR. Therefore; there are two models. meta-heuristic is nature-inspired that provides high The performance metics of the first model based on performance to solve complex problems [5]. Meta- standard CS algorithm using Dagging based on BLR is heuristic algorithms can solve a problem of large scale higher than the model of standard CS algorithm using data with high dimensionality which is an obstacle to most BLR. additionally; The using of Dagging based on BLR researchers. It is a convenient solution for the global increases the speeed of the standard CS algorithm and optimization problem [6]. Meta-heuristic is classified into improves the performance of BLR. two categories namely; biological algorithms and bio- The remaining paper has been structured as follows: inspired algorithms. Biological algorithms include related works present some of the researches. Section three simulated annealing, gravitational search algorithm, shows the system Architecture that illustrates IoT routing magnetic optimization algorithm, external optimization, dataset generation, classification techniques, and the and harmony search. Bio-inspired algorithms are divided Proposed Optimized Approach. The performance metrics into two classes that are evolutionary methods such as have been used in this work and can be displayed in genetic algorithm, evolution strategy, evolutionary section four. Section five looks at the methodology used to programming, and swarm intelligent algorithms. Swarm build the paper. The experimental results are introduced intelligent algorithms are inspired by organisms’ life that and analyzed in Section six. The final part is the is classified into Stigmergic-based algorithm and conclusion for this work. imitation-based algorithm. Stigmergic-based algorithm is used to interact among all elements of the environment 2. RELATED WORKS indirect way such as Ant Colony Optimization. On the The feature selection methods are the main axis for contrary; the imitation-based algorithm is used to interact classification and prediction performance to obtain a among all elements of the environment indirectly way. robust model. In this

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us