Table 2 Performance analysis on privacy preservation model in industrial IoT for three test cases in terms of CPA and KPA attacks.
From: A smart privacy preserving framework for industrial IoT using hybrid meta-heuristic algorithm
Algorithms | Test case 1 | Test case 2 | Test case 3 |
|---|---|---|---|
CPA attack | |||
JA | 0.99276 | 0.9981 | 0.99424 |
GWO | 0.98927 | 0.99529 | 0.99823 |
GOA | 0.99229 | 0.99981 | 0.99005 |
BHO | 0.93447 | 0.99878 | 0.99401 |
G–BHO | 0.99459 | 0.9999 | 0.99856 |
KPA attack | |||
JA | 0.97648 | 0.99891 | 0.99792 |
GWO | 0.99678 | 0.99947 | 0.99792 |
GOA | 0.99501 | 0.99998 | 0.95178 |
BHO | 0.99638 | 0.99991 | 0.98373 |
G–BHO | 0.99709 | 0.99999 | 0.9987 |