IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v14y2022i24p16741-d1002677.html
   My bibliography  Save this article

Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles

Author

Listed:
  • Mohammed Rizwanullah

    (Department of Computer and Self Development, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia)

  • Hanan Abdullah Mengash

    (Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia)

  • Mohammad Alamgeer

    (Department of Information Systems, College of Science & Art at Mahayil, King Khalid University, Abha, Saudi Arabia)

  • Khaled Tarmissi

    (Department of Computer Science, College of Computing and Information System, Umm Al-Qura University, Mecca, Saudi Arabia)

  • Amira Sayed A. Aziz

    (Department of Digital Media, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt)

  • Amgad Atta Abdelmageed

    (Department of Computer and Self Development, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia)

  • Mohamed Ibrahim Alsaid

    (Department of Computer and Self Development, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia)

  • Mohamed I. Eldesouki

    (Department of Information System, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia)

Abstract

The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespread applications in the private and public sectors, from logistics to environment monitoring. The incorporation of 5G technologies, satellites, and UAVs has provoked telecommunication networks to advance to provide more stable and high-quality services to remote areas. However, UAVs are vulnerable to cyberattacks because of the rapidly expanding volume and poor inbuilt security. Cyber security and the detection of cyber threats might considerably benefit from the development of artificial intelligence. A machine learning algorithm can be trained to search for attacks that may be similar to other types of attacks. This study proposes a new approach: metaheuristics with machine learning-enabled cybersecurity in unmanned aerial vehicles (MMLCS-UAVs). The presented MMLCS-UAV technique mainly focuses on the recognition and classification of intrusions in the UAV network. To obtain this, the presented MMLCS-UAV technique designed a quantum invasive weed optimization-based feature selection (QIWO-FS) method to select the optimal feature subsets. For intrusion detection, the MMLCS-UAV technique applied a weighted regularized extreme learning machine (WRELM) algorithm with swallow swarm optimization (SSO) as a parameter tuning model. The experimental validation of the MMLCS-UAV method was tested using benchmark datasets. This widespread comparison study reports the superiority of the MMLCS-UAV technique over other existing approaches.

Suggested Citation

  • Mohammed Rizwanullah & Hanan Abdullah Mengash & Mohammad Alamgeer & Khaled Tarmissi & Amira Sayed A. Aziz & Amgad Atta Abdelmageed & Mohamed Ibrahim Alsaid & Mohamed I. Eldesouki, 2022. "Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles," Sustainability, MDPI, vol. 14(24), pages 1-15, December.
  • Handle: RePEc:gam:jsusta:v:14:y:2022:i:24:p:16741-:d:1002677
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/14/24/16741/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/14/24/16741/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:14:y:2022:i:24:p:16741-:d:1002677. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.