1 Introduction

In recent years, the role played by Cyber Physical Systems (CPS) gained much importance in industry 4.0 applications namely, smart energy, smart factory, smart cities, smart healthcare, smart building, and smart transportation. The emergent CPS is a feedback control system-based pervasive sensing method [1]. Therefore, CPS represents a vision of physical devices that include sensor-enabled mobile devices, sensors, and actuators that perform feedback control loops. These actuator devices deliver and receive data from a control system that performs the given applications. In general, the physical devices are assumed to be seamlessly incorporated into day-to-day living objects in the name of ‘embedded devices or systems’. The existence of feedback loops, assisted by a pervasive sensing system, is the general feature of each proposal on CPS [2]. In this regard, CPS focuses on various problems like realtime application development that provides customized service in the context of Internet of Things (IoT) and improvement of incorporation levels in embedded device. The conceptual framework of CPS that can manage physical objects, consists of four layers such as networking, applications, security, and Cyber Physical Sensor System (CPSS) [3]. The network layers provide the links between application layer and CPSS through distinct IoT transmission systems. The application layers handle user interface services, data processing, storage, visualization, and analysis services [4]. CPSS layers consist of actuators, controllers, single chip computing platforms, and sensors while altogether it communicates with physical objects. The sensing element is developed to provide highly reliable outcomes that require low maintenance cost. Figure 1 illustrates the framework of CPS technique [5].

Fig. 1
figure 1

Sensor-based CPS

CPSS gathers the status about physical objects and transmits it to the application layer via network layer [6]. All these layers are susceptible and prone to cyberattack, which creates some disturbance or malfunction that leads to serious impact [7]. The study considers vulnerabilities, CPSS function, and security threats while it also provides feasible solution to the threats found. The data created by sensors at the time of continuous sensing period generally consists of higher temporal coherence. Due to this, certain information exists in the sustaining data sequence which might be wasting the energy and causing redundant transmission of data. Therefore, prediction was introduced based on fusion and data sensing systems to process the original information in sensors and reduce redundant transmission [8]. In order to attain the objective of expanding the network lifetime, the proposed scheme takes full advantage of higher temporal coherence of the sensed data to reduce unwanted transmission and save the energy of sensors [9]. Furthermore, some problems including data leakage at the time of communication remain a major problem in WSN in terms of data security. The presented model organized the sensors into clusters of distinct sizes in a way such that all the clusters can interact with fusion centre in an interleaved manner [10]. For various data fusion and sensing network topologies (for example, tree, chain, and star), the optimum solution is given by determining the amount of communications for all the nodes.

The current research paper presents a Deep Learning with Metaheuristics based Data Sensing and Encoding (DLMB-DSE) scheme for CPSS. The aim of the proposed DLMB-DSE technique is to present a prediction-based data sensing and fusion approach to reduce the quantity of data communication and maintain maximum coverage by ensuring security. In addition, DLMB-DSE technique involves the design of Optimal Deep Belief Network (DBN) with Adagrad optimizer to primarily predict the data of succeeding period with less number of data items. Furthermore, Equilibrium Optimizer (EO)-based optimal key generation with Multi-Key Homomorphic Encryption (MKHE) technique is also applied for useful data encoding and decoding processes, thereby accomplishing security. In order to demonstrate the enhanced performance of the proposed DLMB-DSE technique, a series of simulation experiments was conducted on benchmark sensor datasets.

Rest of the paper is planned as follows. Section 2 offers information on related works, Sect. 3 provides the proposed model, Sect. 4 discusses about performance validation, and Sect. 5 concludes the paper.

2 Related works

In Dai et al. [11], a CPS with remote state assessment was considered under DoS attacks in infinite time-horizon. The goal is to frame the policy for selecting local channels in a certain state, so as to transfer the messages and mitigate the overall estimate error covariance, due to energy-saving in an infinite time-horizon. Wu et al. [12], utilized a linear discrete-time state-space system to describe the proposed system, in which a sparse vector is adapted later to attack the models. By collecting sensor measurements and utilizing an iterative model, a novel approach was attained in descriptor procedure that happens to be the basis for assessing system state under unknown input circumstance.

Meleshko et al. [13] presented a method for the detection of anomalous data from sensor nodes in Cyber-Physical Systems in line with water supply system. The method depends upon ML and modelling of technical systems. The basic information for ML was attained on the designed hardware or software prototypes of the water supply system with the help of actuators, microcontrollers, and sensors. Liu et al. [14] proposed a Trust-Based Active Detection (TBAD) system to reduce data redundancy and improve the consistency of gathering data packets. Furthermore, the assessment trust of the node, stored in data packet header, would be identified, once the UAV suspects the storing trust of sensors.

Venkatasubramanian et al. [15] introduced Physiology-based System-wide Information Security (PySIS) system that applies generative model concept in which synthetic physiological signals are generated to extend PKA so as to assist end-to-end data privacy in CHMS from sensor nodes to PHR. Shin et al. [16] presented a smart sensor attack identification and detection system-based DNN technique, named ‘DL model’, without the priori knowledge of deception attack that modifies the sensing data over time.

3 The proposed model

In this study, a novel DLMB-DSE technique is presented for the prediction of data sensing and fusion approach to reduce the quantity of data communication and maintain maximum coverage by ensuring security. The proposed DLMB-DSE technique involves a series of operations namely, DBN-based prediction, Adamax-based hyperparameter tuning, MKHE-based encryption, and EO-based optimal key generation process. Adamax and EO techniques are used to accomplish improved security and overall network efficiency. Figure 2 illustrates the working process involved in the proposed method.

Fig. 2
figure 2

Process involved in the Proposed Model

3.1 Predictive model for data sensing and fusion process

Initially, optimal DBN model is used in the prediction of data for succeeding period with least number of data items. This model aims at making the initial predicted value, estimate the actual value, with maximum accuracy. DBN is nothing but stacked RBM except the fact that initial RBM has undirected connection. This network structure considerably decreases the training difficulty and creates possible DL outcomes. An easy and effective layer‐wise trained technique is presented to DBN by Hinton [17]. It trained the layer consecutively and greedily by tying the weight of unlearned layer. In this study, CD was used to learn the weight of single layer and iterate until every layer gets trained. Afterward, the network weight was fine‐tuned by following two‐pass up‐down technique. This technique almost continuously demonstrated the network learned with no pre‐trained models as this stage performs as ‘regularizer’ and helps in supervision of the optimized issue. The energy, limited from the directed method, is computed with the help of Eq. (1), in which the maximal energy is upper bounded in Eq. (2). Further, it attains equivalence, if the network weight is tied. By equal, the derivatives are equivalent to Eq. (3) and are utilized to resolve the now-simpler maximized issue.

$$E\left({x}^{0}, {h}^{0}\right)=-\left(\mathrm{ log }p\left({h}^{0}\right)+\mathrm{ log }p\left({x}^{0}|{h}^{0}\right)\right)$$
(1)
$$ \begin{aligned} {\text{log}}p(x^{0} ) & \ge \sum _{{\forall h^{0} }} Q(h^{0} |x^{0} )({\text{log}}p(h^{0} ) + {\text{log}}p(x^{0} |h^{0} )) \\ & \; - \sum _{{\forall h^{0} }} Q(h^{0} |x^{0} ){\text{log}}Q(h^{0} |x^{0} ) \\ \end{aligned} $$
(2)
$$\frac{\partial \mathrm{ log }p({x}^{0})}{\partial {\xi }_{n,\mathfrak{m}}}={\sum }_{\forall {h}^{0}}Q\left({h}^{0}|{x}^{0}\right)\mathrm{log }p\left({h}^{0}\right)$$
(3)

After iteratively learning the weight of networks, the up-down technique fine-tunes the weight of the network. The wake‐sleep technique is an unsupervised technique which is used for training NN from two stages: the ‘wake’ stage is executed on feed‐forward path to compute the weight whereas ‘sleep’ stage is implemented on feed-back path. The up‐down technique was implemented in the network to reduce the under‐fit that is generally detected as greedily‐trained network [18]. Especially, in the primary stage (up‐pass) of this technique, the weight on directed connection is called ‘generative weight’ while the parameters are altered by computing wake‐phase probability, sampling of the states, and updating the weight using CD. On the other hand, the secondary phase (down‐pass) stochastically stimulates the previous layer with top‐down connections named after inference weight/parameter. This sleep‐phase probability computed the states that are sampled and the resultant was evaluated.

In order to enhance the training efficiency of DBN approach, Adamax optimizer is utilized in this study to adjust the hyperparameter value of DBN technique [19]. It can be an altered version of Adam optimizer in which the distributed variance is proposed to be \(\infty \). Also, the maximized weights are defined through Eq. (4):

$${w}_{t}^{i}={w}_{t-1}^{i}-\frac{\eta }{{v}_{t}+\epsilon }\cdot {\widehat{m}}_{t}$$
(4)

where:

$${\widehat{m}}_{t}= \frac{{m}_{t}}{1-{\beta }_{1}^{t}}$$
(5)
$${v}_{t}=max({\beta }_{2}\cdot {v}_{t-1},|{G}_{t}|)$$
(6)
$${m}_{t}={\beta }_{1}{m}_{t-1}+(1-{\beta }_{1}) G$$
(7)
$$G={\nabla }_{w}C\left({w}_{t}\right)$$
(8)

where η implies the learning rate, \({w}_{t}\) stands for weight at step \(t,\) \(C\left(.\right)\) denotes the cost function, and \({\nabla }_{w}C\left({w}_{t}\right)\) signifies the gradient of weight parameter \({w}_{t}\) \(x\) and equal label \(y\). \({\beta }_{i}\) is utilized to selecting the data required for old upgrade, where \({\beta }_{i}\in [\mathrm{0,1}].\) \({m}_{t}\) and \({v}_{t}\) are referred to as 1st and 2nd moments.

figure h

3.2 Data encoding and decoding process

Once the data is sensed, the next stage is to encode the sensed data to ensure ‘secure data transmission process’. An encryption system \(E(k, x)\) for a key \(k\) and an input \(x\) is named as homomorphic if, for the encryption method \(E\) and operation \(f\), there is an effective method \(G\). Thus,

$$E\left(k, f\left({x}_{1}, \dots , {x}_{n}\right)\right)=G\left(k, f\left(E\left({x}_{1}\right), \dots , E\left({x}_{n}\right)\right)\right)$$
(9)

The above formula only holds for addition or multiplication while the system is named partially as ‘homomorphic encryption’. It is known as Fully Homomorphic Encryption (FHE), whether it holds for addition or multiplication. Multi‐Key Homomorphic Encryption (MKHE) enables multiple participants to employ distinct keys for encryption [20]. The aggregated ciphertext, attained after conducting polynomial operation on many individual ciphertexts, can only be decrypted together by integrating the corresponding secret keys, related to this ciphertext. While homomorphic multiplication is not involved in federated learning method, the study proposed an additive homomorphism of MKHE. MKHE is a Ring Learning with Errors (RLWE)‐based homomorphic encryption system.

$$R={\mathbb{Z}}[X]/({X}^{n}+1)$$
(10)

where \(n\) represents the power of 2D, \( \mathbb{Z}[X] \) denotes the polynomial ring with integer coefficient and the element in \(R\) satisfies \({X}^{n}=-1.\) \( R_{q} = \mathbb{Z}_{q} [X]/(X^{n} + 1) \) denotes the residue ring of \(R\) with coefficient modulo, an integer \(q\). For parameter \((n, q, \chi , \psi \), assume polynomial of the forms \((a, b=s\cdot a+e)\in {R}_{q}^{2}\), the \(b\) is computationally indistinguishable from uniform random elements of \({R}_{q}\) whereas \(a\) is randomly selected from \({R}_{q},\) \(s\) denotes the key distribution \(\chi \) over \({R}_{q}\), and \(e\) represents the error distribution \(\psi \) over \(R.\) MKHE assumes Common Reference String (CRS) due to which each device shares a random polynomial vector \(a\leftarrow U({R}_{q}^{d})\), now \(U(\cdot )\) is drawn from uniform distribution. Consider \(s{k}_{i}=(1, {s}_{i})\) represents the secret key \({s}_{i},\) \(\overline{sk}=(1, {s}_{1}, \dots {s}_{N})\) for the concatenation of different secret keys. Where \(c{t}_{i}=({c}_{0}^{{d}_{i}}, {c}_{1}^{{d}_{i}})\) represents the ciphertext of plaintext \({m}_{i}\) from remote device \({d}_{i},i=1,\dots ,N.\)

For a variable \(\lambda \), set the RLWE dimension \(n\), ciphertext modulus \(q\), key distribution \(\chi ,\) and error distribution \(\psi \) over \(R\). Create a random vector \(a\leftarrow U({R}_{q}^{d})\). Return the public variable \((n, q, \chi , \psi , a)\). A remote device \({d}_{i}\) generates a secret key \({s}_{i}\leftarrow \chi \), and computes the public key as \({b}_{i}=-{s}_{i}\cdot a+{e}_{i}\in {R}_{q}^{2}\), now \({e}_{i}\) represents the error vector derived from error distribution \(\psi \) through \(R.\) Fig. 3 demonstrates the process involved in MKHE technique.

Fig. 3
figure 3

Process involved in MKHE

3.3 Encoding and decoding

Before encryption, a complex number is initially extended into a vector and then encrypted as a polynomial of ring \(R\) based on complex canonical embedding map. Decryption process changes the polynomial into a complex vector after decoding. After encoding a message vector into a plaintext\({m}_{i}\), viz. an element of a cyclotomic ring \(,\) \({d}_{i}\) encrypt \({m}_{i}\) as a ciphertext \(c{t}_{i}=({c}_{0}^{{d}_{i}}, {c}_{1}^{{d}_{i}})\) in which \({c}_{0}^{{d}_{i}}={v}_{i}\cdot {b}_{i}+{m}_{i}+{e}_{0}^{{d}_{i}}(mod q)\) and\({c}_{1}^{{d}_{i}}={v}_{i}\cdot a+{e}_{1}^{{d}_{i}}(mod q)\). Now \(a=a[0]\) and \({b}_{i}={b}_{i}[0],\) \({v}_{i}\leftarrow \chi \) and \( e_{0}^{{d_{i} }} ,e_{1}^{{d_{i} }} \leftarrow \psi \). A small error is injected to guarantee the security and is detached by the rounding process after running homomorphic operation. In MKHE, an additive ciphertext related to \(N\) distinct parties are expressed as \({C}_{sum}^{d}\stackrel{\scriptscriptstyle\mathrm{def}}{=}({\sum }_{i=1}^{N}{c}_{0}^{{d}_{i}}, {c}_{1}^{{d}_{1}}, {c}_{1}^{{d}_{2}}, \dots , {c}_{1}^{{d}_{N}})\in {R}_{q}^{N+1}.\)

In the decoding method, \({d}_{i}\) calculates a dot product of \(s{k}_{i}=(1, {s}_{i})\) and \(c{t}_{i}=({c}_{0}^{{d}_{i}}, {c}_{1}^{{d}_{i}})\)

$$ \begin{aligned} < & ct_{i} ,sk_{i} > (\bmod q) = c_{0}^{{d_{i} }} + c_{1}^{{d_{i} }} \cdot s_{i} (\bmod q) \\ =\, & v_{i} \cdot b_{i} + m_{i} + e_{0}^{{d_{i} }} + v_{i} \cdot a \cdot s_{i} + e_{1}^{{d_{i} }} \cdot s_{i} (\bmod q) \\ =\, & v_{i} \cdot \left( { - s_{i} \cdot a + e_{i} } \right) + m_{i} + e_{0}^{{d_{i} }} + v_{i} \cdot a \cdot s_{i} + e_{1}^{{d_{i} }} \cdot s_{i} \left( {\bmod q} \right) \\ =\, & m_{i} + v_{i} \cdot e_{i} + e_{0}^{{d_{i} }} + e_{1}^{{d_{i} }} \cdot s_{i} (\bmod q) \\ \approx\, & m_{i} \\ \end{aligned} $$
(11)

Additive homomorphism. where \(c{t}_{i}=({c}_{0}^{{d}_{i}}, {c}_{1}^{{d}_{i}})\) and \(c{t}_{j}=({c}_{0}^{{d}_{j}}, {c}_{1}^{{d}_{j}})\) represents two ciphertexts of plaintext message \({m}_{i}\) and \({m}_{j}\) from remote devices, \({d}_{i}\) and \({d}_{j}\). The amount of the ciphertexts is \({C}_{sum}^{d}\stackrel{\scriptscriptstyle\mathrm{def}}{=}({c}_{0}^{{d}_{i}}+{c}_{0}^{{d}_{j}}, {c}_{1}^{{d}_{i}}, {c}_{1}^{{d}_{j}})\). It is decoded by calculating a dot product of \({C}_{sum}\) and \(\overline{sk}=(1, {s}_{i}, {s}_{j})\):

$$ \begin{aligned} < & C_{{sum}} ,\overline{{sk}} > ;\left( {modq} \right) = \,\left( {c_{0}^{{d_{i} }} + c_{0}^{{d_{j} }} } \right) + c_{1}^{{d_{i} }} \cdot s_{i} + c_{1}^{{d_{j} }} \cdot s_{j} \left( {modq} \right) \\ =\, & (c_{0}^{{d_{i} }} + c_{1}^{{d_{i} }} \cdot s_{i} ) + (c_{0}^{{d_{j} }} + c_{1}^{{d_{j} }} \cdot s_{j} )(modq) \\ \approx\, & m_{i} + m_{j} \\ \end{aligned} $$
(12)

Decoding of the sum. The distributed decoding-based noise flooding is presented in MKHE, because it is not acceptable to consider that any party holds different secret keys. Decryption process contains two processes such as merge and partial decryption.

\(\mathrm{MK}-\mathrm{ CKKS}.\mathrm{PartDec}({c}_{1}^{{d}_{i}},{s}_{i})\): Assumed a polynomial \({c}_{1}^{{d}_{i}}\) and a secret\({s}_{i}\), sample an error \({e}_{i}^{*}\leftarrow \varphi \) and return \({\mu }_{i}={c}_{1}^{{d}_{i}}\cdot {s}_{i}+{e}_{i}^{*}(mod q)\).

\(\mathrm{MK}-\mathrm{ CKKS}.\mathrm{Merge }({\sum }_{i=1}^{N}{c}_{0}^{{d}_{i}},\{{\mu }_{i}{\}}_{1\le i\le N})\): Calculate and return \(={\sum }_{i=1}^{N}{c}_{0}^{{d}_{i}}+{\sum }_{i=1}^{N}{\mu }_{i}\left(mod q\right)\approx <{C}_{Sum}, \overline{sk}>(mod q)\).

Here, \({e}_{i}^{*}\) is created from error distribution \(\varphi \) that has large variances, when compared to standard error distribution, \(\psi .\)

3.4 Optimal Key generation process

In order to improve the efficiency of MKHE technique, an optimal set of keys is generated with the help of EO algorithm. The basic concept of single objective EO was established in 2020. EO depends upon a dynamic mass balance on a control volume where it utilizes a mass balance formula. In terms of eligibility as a fine-tuned technique, EO has several advantages. This attribute has the capability for maintaining a balance between detection and exploitation, for executing them rapidly, and for retaining the flexibility amongst individual solutions. Thus the outcome which addressed the optimization issues with many single objectives, started dealing with real world issues after which it gained popularity [21]. In the subsequent three stages, the mathematical method of single objective EO technique is explained. During initialization, EO utilizes a specific group, whereas all the particles explain the vector of focus that contains solutions to the problems. A primary focus vector is arbitrarily established using a subsequent equation from search spaces.

$${Y}_{j}^{initial}=lb+ran{d}_{j}\left(ub-lb\right), j=\mathrm{0,1},\mathrm{2,3},\dots ,n$$
(13)

where, \({Y}_{j}^{initial}\) refers to vector focus on \({j}^{th}\) particle, \(ub\) and \(lb\) imply the upper and lower limits of the variables, \(ran{d}_{j}\) signifies a arbitrary number between 0 and 1and \(n\) stands for the amount of particles. EO technique chases the system equilibrium state. But, after attaining the equilibrium state, EO attains near‐optimal solutions. It does not recognize the count of concentration, which gains the equilibrium state. So, it allocates equilibrium candidates to four optimum particles from the populations and one more that is composed of average of four optimum particles. During exploitation as well as exploration techniques, these five equilibrium candidates assist EO. The four primary candidates seek optimum exploration, while the 5th candidate with average value seek alteration from exploitation. These five candidates retain a vector named as ‘equilibrium pool’.

$${\overrightarrow{C}}_{\mathrm{eq},\mathrm{pool}}=\left\{{\overrightarrow{C}}_{eq\left(1\right)} ,{\overrightarrow{C}}_{eq\left(2\right)},{\overrightarrow{C}}_{eq\left(3\right)},{\overrightarrow{C}}_{eq\left(4\right)},{\overrightarrow{C}}_{eq\left(ave\right)}\right\}$$
(14)

The upgrade of concentration permits EO to balance the exploration as well as exploitation equally.

$$\overrightarrow{F}={e}^{-\overrightarrow{\lambda }(t-{t}_{0})}$$
(15)

where \(\overrightarrow{\lambda }\) implies the arbitrary vector that is assumed between 0 and 1, permitting turnover rate fluctuation on a time period, and \(t\) has decreased as the iteration count improves as per Eq. (16).

$$t=(1-\frac{It}{{\mathrm{Max}}_{-}it}{)}^{\left({a}_{2}\frac{It}{{\mathrm{Max}}_{-}it}\right)}$$
(16)

It and \({\mathrm{Max}}_{-}it\) correspond to present and maximal amount of iterations, and \({a}_{2}\) implies the constants to control the capacity for exploitation. Another variable \({a}_{1}\) is utilized for improving combined of exploration and exploitation and is determined as:

$$ \vec{t} = \frac{1}{{\vec{\lambda }}}\ln \left({a_{1} ~sign~\left( {\vec{r} - 0.5} \right)\left[ {1 - \overrightarrow {{e^{{ - \vec{\lambda }t}} }} } \right]} \right) + t $$
(17)

The generation rate has demonstrated as \(G\) that increases exploitation and is defined as:

$$\overrightarrow{G}={\overrightarrow{G}}_{0}{e}^{-\overrightarrow{l}(t-{t}_{0})}$$
(18)

where, \(\overrightarrow{l}\) signifies the arbitrary vector between zero and one, and the primary generation rate named as \({\overrightarrow{G}}_{0}\) is expressed as follows.

$${\overrightarrow{G}}_{0}=G\overrightarrow{C}P\left({\overrightarrow{C}}_{\mathrm{eq}}-\overrightarrow{\lambda }\overrightarrow{C}\right)$$
(19)
$$G\overrightarrow{C}P=\left\{\begin{array}{l}0.5{r}_{1},{r}_{2}\ge GP\\ 0, {r}_{2}<GP\end{array}\right.$$
(20)

where the arbitrary numbers are demonstrated as \({r}_{1}\) and \({r}_{2}\) which differbetween 0 and 1. The vector \(\overrightarrow{GC}P\) stands for generation rate control parameter which controls if the rate of generation is implemented to upgrade the phase or not. Eventually, EO is upgraded utilizing in Eq. (21).

$$\overrightarrow{C}=\overrightarrow{C}+\left(\overrightarrow{C}-{\overrightarrow{C}}_{eq}\right).\overrightarrow{F}+\frac{\overrightarrow{G}}{\overrightarrow{\lambda }V}\left(1-\overrightarrow{F}\right)$$
(21)

The value of \(V\) is equivalent to 1.

4 Experimental validation

This section validates the performance of the proposed DLMB-DSE technique on 3 real-word data namely, temperature data, humidity data, and light data. The results were inspected under varying user threshold values in terms of Successful Prediction Rate (SPR) and Average Error Rate (AER). Figure 4 shows the predictive analysis results accomplished by DLMB-DSE technique on temperature data. The figure demonstrates that the proposed DLMB-DSE technique effectively predicted the values which were almost closer to the actually sensed temperature data.

Fig. 4
figure 4

Predictive analysis results of DLMB-DSE technique on temperature data

Table 1 and Fig. 5 offers SPR analysis results accomplished by DLMB-DSE technique with recent methods under distinct threshold values. The experimental results report that the proposed DLMB-DSE technique enhances SPR values and indicates better predictive performance. For instance, with a threshold value of 0.2, DLMB-DSE technique offered a high SPR of 37.02%, whereas GM, GM_OP_ELM, GM_LSSVM, and GM_KRLS techniques obtained the least SPR values such as 10.62%, 22.30%, 23.06%, and 31.18% respectively. Meanwhile, with a threshold value of 2.2, the proposed DLMB-DSE approach obtained a maximum SPR of 96.41%, whereas GM, GM_OP_ELM, GM_LSSVM, and GM_KRLS methods obtained the least SPR values such as 79.66%, 86%, 87.27%, and 92.60% correspondingly. Eventually, with a threshold value of 3.8, the proposed DLMB-DSE approach offered a superior SPR of 96.92%, whereas GM, GM_OP_ELM, GM_LSSVM, and GM_KRLS systems achieved minimum SPR values such as 88.29%, 91.08%, 92.60%, and 93.62% correspondingly.

Table 1 SPR analysis results of DLMB-DSE technique under distinct threshold on temperature data
Fig. 5
figure 5

SPR analysis of DLMB-DSE technique on temperature data

A detailed AER analysis was conducted between DLMB-DSE technique and recent techniques under various threshold values and the results are shown in Fig. 6. The results indicate that the proposed DLMB-DSE technique attained minimal AER values under all thresholds. For instance, with a threshold value of 0.2, DLMB-DSE technique demonstrated the least AER of 0.0225%, whereas GM_OP_ELM, GM_LSSVM, and GM_KRLS techniques exhibited increased ARR values such as 0.0454%, 0.0368%, and 0.0311% respectively. Along with that, with a threshold value of 0.325, DLMB-DSE algorithm demonstrated the least ARR of 0.1368%, whereas GM_OP_ELM, GM_LSSVM, and GM_KRLS methodologies exhibited improved ARR values such as 0.1965%, 0.1873%, and 0.1562% correspondingly.

Fig. 6
figure 6

AER analysis results of DLMB-DSE technique on temperature data

Figure 7 illustrates the predictive analysis results accomplished by DLMB-DSE technique on humidity data. The figure shows that DLMB-DSE approach outperformed the existing methods in terms of predicting the values and it is almost closer with actually sensed data in humidity data.

Fig. 7
figure 7

Predictive analysis results of DLMB-DSE technique on humidity data

Table 2 and Fig. 8 offers SPR analysis results accomplished by DLMB-DSE technique and other recent methods under varying threshold values. The experimental results reported that DLMB-DSE approach reached a enhanced SPR value and indicates better predictive performance. For instance, with a threshold value of 0.2, the proposed DLMB-DSE technique achieved a superior SPR of 12.74%, whereas GM algorithm, GM_OP_ELM system, GM_LSSVM approach, and GM_KRLS techniques obtained less SPR values such as 4.76%, 8.86%, 9.32%, and 9.09% correspondingly. In the meantime, with a threshold value of 2.2, the proposed DLMB-DSE technique offered a high SPR of 83.41%, whereas GM algorithm, GM_OP_ELM system, GM_LSSVM approach, and GM_KRLS systems gained low SPR values such as 53.32%, 74.06%, 76.57%, and 78.17% correspondingly. At last, with a threshold value of 3.8, the proposed DLMB-DSE technique offered a high SPR of 87.29%, whereas GM algorithm, GM_OP_ELM system, GM_LSSVM approach, and GM_KRLS methods obtained the least SPR values such as 73.15%, 83.41%, 85.23%, and 85.92% correspondingly.

Table 2 SPR analysis results of DLMB-DSE technique under distinct threshold on humidity data
Fig. 8
figure 8

SPR analysis results of DLMB-DSE technique on humidity data

A brief AER analysis was conducted between DLMB-DSE algorithm and recent techniques under various threshold values and the results are shown in Fig. 9. The outcomes designate that the proposed DLMB-DSE technique obtained minimal AER values under all the thresholds. For instance, with a threshold value of 0.025, the proposed DLMB-DSE technique achieved a minimum ARR of 0.0756%, whereas GM_OP_ELM approach, GM_LSSVM system, and GM_KRLS techniques achieved high ARR values such as 0.1355%, 0.0939%, and 0.0956% correspondingly. In addition, with a threshold value of 0.325, the proposed DLMB-DSE technique demonstrated the least ARR of 0.1685%, whereas GM_OP_ELM method, GM_LSSVM system, and GM_KRLS techniques portrayed maximum ARR values such as 0.2423%, 0.2033%, and 0.1981% correspondingly.

Fig. 9
figure 9

AER analysis results of DLMB-DSE technique on humidity data

Figure 10 portrays the predictive analysis results achieved by DLMB-DSE system on light data. The figure exhibits that the proposed DLMB-DSE approach predicted the values effectively and it is almost closer with actually sensed data in light data.

Fig. 10
figure 10

Predictive analysis results of DLMB-DSE technique on light data

Table 3 and Fig. 11 provides the SPR analysis results accomplished by DLMB-DSE technique and other recent methods under distinct threshold values. The experimental outcomes infer that the proposed DLMB-DSE technique gained high SPR values indicating better predictive performance. For instance, with a threshold value of 0.2, DLMB-DSE method offered a maximum SPR of 35.43%, whereas GM approach, GM_OP_ELM technique, GM_LSSVM methodology, and GM_KRLS techniques obtained the least SPR values such as 27.36%, 30.35%, 29.44%, and 32.95% correspondingly.

Table 3 SPR analysis results of DLMB-DSE technique under distinct threshold on light data
Fig. 11
figure 11

SPR analysis of DLMB-DSE technique on light data

Besides, with a threshold value of 2.0, the proposed DLMB-DSE technique presented a high SPR of 64.20%, whereas GM system, GM_OP_ELM algorithm, GM_LSSVM approach, and GM_KRLS methodologies obtained low SPR values such as 42.07%, 50.79%, 57.69%, and 59.77% correspondingly. Finally, with a threshold value of 4.0, the proposed DLMB-DSE technique accessed a high SPR of 72.66%, whereas GM methodology, GM_OP_ELM system, GM_LSSVM approach, and GM_KRLS techniques reached minimum SPR values namely, 49.75%, 59.38%, 68.10%, and 70.97%.

A detailed AER analysis was conducted between DLMB-DSE technique and recent approaches under different threshold values and the results are portrayed in Fig. 12. The results infer that the proposed DLMB-DSE approach obtained the least AER values under all thresholds. For instance, with a threshold value of 0.5, the proposed DLMB-DSE technique demonstrated the least ARR of 3.1786%, whereas GM_OP_ELM system, GM_LSSVM approach, and GM_KRLS techniques demonstrated high ARR values such as 6.4742%, 4.0483%, and 3.8881% respectively. Followed by, with a threshold value of 4.0, the proposed DLMB-DSE system achieved a minimal ARR of 4.2542%, whereas GM_OP_ELM algorithm, GM_LSSVM method, and GM_KRLS techniques demonstrated the maximum ARR values namely, 6.8404%, 5.1010%, and 4.9179%.

Fig. 12
figure 12

AER analysis results of DLMB-DSE technique on light data

Finally, Computation Time (CT) analysis was conducted between DLMB-DSE technique and recent methods on three datasets and the results are given in Table 4. The experimental results infer that the proposed DLMB-DSE technique required the least CT over other methods. For instance, with temperature data, DLMB-DSE technique required a minimal CT of 0.0314 s, whereas GM_OP_ELM system, GM_LSSVM method, and GM_KRLS techniques required the maximum CT such as 0.0672 s, 0.0554 s, and 0.0830 s respectively.

Table 4 Computation time analysis results of DLMB-DSE technique and existing approaches under three datasets

Besides, with humidity data, the proposed DLMB-DSE approach required a low CT of 0.5824 s, whereas GM_OP_ELM algorithm, GM_LSSVM method, and GM_KRLS techniques demanded maximal CT such as 1.1073 s, 1.0364 s, and 1.5328 s correspondingly. In addition, with light data, DLMB-DSE technique required a less CT of 0.0711 s, whereas GM_OP_ELM technique, GM_LSSVM system, and GM_KRLS methodologies required high CT such as 0.1184 s, 0.0987 s, and 0.1184 s correspondingly. From the above discussed tables and figures, it is evident that DLMB-DSE technique has the ability to outperform other methods on three real world datasets namely temperature data, humidity data, and light data. The enhanced performance is due to the utilization of Adamax and EO optimizers which helped in accomplished improved security and overall network efficiency.

5 Conclusion

In this study, a novel DLMB-DSE technique has been presented for the prediction of data sensing and fusion approach so as to reduce the quantity of data communication and maintain maximum coverage by ensuring security. The proposed DLMB-DSE technique involves a series of operations namely, DBN-based prediction, Adamax-based hyperparameter tuning, MKHE-based encryption, and EO-based optimal key generation process. The utilization of Adamax and EO optimizers helped in accomplishing improved security and overall network efficiency. In order to demonstrate the enhanced performance of the proposed DLMB-DSE technique, a series of simulations was conducted on benchmark sensor datasets. The experimental results exhibit the promising performance of DLMB-DSE technique over other methods under different measures. Therefore, DLMB-DSE technique can be used to accomplish effective data sensing and fusion approach for CPSS with maximum security. In future, resource allocation and task scheduling approaches can be designed to improve the performance of CPSS.