Improved Intrusion Detection in the Internet of Things: A Multi-Layered Neural Network Approach and Analysis
DOI:
https://doi.org/10.47839/ijc.23.2.3546Keywords:
Deep Learning, IDS, KNN, IoT, Machine Learning, Artificial IntelligenceAbstract
The (IoT) Internet of Things is a complex notion that refers to the interconnection of several individual devices over a network (IoT). The data gathered by these interconnected devices have the potential to have far-reaching consequences for human society, the economy, and the environment. The IoT is especially vulnerable to a variety of vulnerabilities in hostile environments like the internet. High-end security solutions are not adequate to safeguard an IoT system due to adequate storage and less processing capabilities. This emphasizes the need for ascendable, strewn, and robust smart security solutions. In this study, IoT networks are safeguarded depleting a multiple-layered security strategy centered on deep learning. The proposed architecture employs the use of three intrusion detection datasets CIC-IDS, BoT-IoT, and ToN-IoT to weigh the performance of the insinuated multiple-layered approach. Irrevocably, compared to 92% accuracy for the existing methodologies, the new layout obtained 98% accuracy.
References
Y. Wan, K. Xu, G. Xue and F. Wang, “IoTArgos: A multi-layer security monitoring system for Internet-of-Things in smart homes,” Proceedings of the INFOCOM’2020 IEEE Conference on Computer Communications, Toronto, Canada, 2020, pp. 874-883, https://doi.org/10.1109/INFOCOM41043.2020.9155424.
M. Ejaz, T. Kumar, M. Ylianttila and E. Harjula, “Performance and efficiency optimization of multi-layer IoT edge architecture,” Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 2020, pp. 1-5, https://doi.org/10.1109/6GSUMMIT49458.2020.9083896.
Y. Liu, K.-F. Tsang, C. K. Wu, Y. Wei, H. Wang and H. Zhu, “IEEE P2668-compliant multi-layer IoT-DDoS defense system using deep reinforcement learning,” IEEE Transactions on Consumer Electronics, vol. 69, no. 1, pp. 49-64, 2023, https://doi.org/10.1109/TCE.2022.3213872.
M. Ammad et al., “A novel fog-based multi-level energy-efficient framework for IoT-enabled smart environments,” IEEE Access, vol. 8, pp. 150010-150026, 2020, https://doi.org/10.1109/ACCESS.2020.3010157.
M. Cui, C. Zhang, Y. Chen, Z. Zhang, T. Wu and H. Wen, “Multilayer dynamic encryption for security OFDM-PON using DNA-reconstructed chaotic sequences under cryptanalysis,” IEEE Access, vol. 9, pp. 18052-18060, 2021, https://doi.org/10.1109/ACCESS.2021.3054380.
R. S. Vairagade and S. H. Brahmananda, “Secured multi-tier mutual authentication protocol for secure IoT system,” Proceedings of the 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 2020, pp. 195-200, https://doi.org/10.1109/CSNT48778.2020.9115786.
A. Vochescu, I. Culic and A. Radovici, “Multi-layer security framework for IoT devices,” Proceedings of the 2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet), Bucharest, Romania, 2020, pp. 1-5, https://doi.org/10.1109/RoEduNet51892.2020.9324871.
S. Xu, J. Liu, N. Kato and Y. Du, “Intelligent reflecting surface backscatter enabled multi-tier computing for 6G Internet of Things,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 2, pp. 320-333, 2023, https://doi.org/10.1109/JSAC.2022.3231861.
O. A. Wahab, A. Mourad, H. Otrok and T. Taleb, “Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems,” IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1342-1397, 2021, https://doi.org/10.1109/COMST.2021.3058573.
S. Wang and J. Liu, "Feature Embedding for Improved Anomaly Detection in IoT Networks," Journal of Internet of Things, vol. 11, no. 2, pp. 167-182, 2023.
K. Wang et al., “Task offloading with multi-tier computing resources in next generation wireless networks,” IEEE Journal on Selected Areas in Communications, vol. 41, no. 2, pp. 306-319, 2023, https://doi.org/10.1109/JSAC.2022.3227102.
H. S. K. Sheth, I. A. K and A. K. Tyagi, “Deep learning, blockchain based multi-layered authentication and security architectures,” Proceedings of the 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 2022, pp. 476-485, https://doi.org/10.1109/ICAAIC53929.2022.9793179.
M. Farooq and M. Hassan, “IoT smart homes security challenges and solution,” International Journal of Security and Networks, vol. 16, no. 4, pp. 235-243, 2021, https://doi.org/10.1504/IJSN.2021.119395.
J. Liu, M. Nogueira, J. Fernandes and B. Kantarci, “Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems,” IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 123-159, 2022, https://doi.org/10.1109/COMST.2021.3136132.
S. Al Janah, N. Zhang and S. W. Tay, “A survey on smart home authentication: Toward secure, multi-level and interaction-based identification,” IEEE Access, vol. 9, pp. 130914-130927, 2021, https://doi.org/10.1109/ACCESS.2021.3114152.
K. Brown and M. Johnson, "Reinforcement Learning for Adaptive Anomaly Detection in Edge Computing," Journal of Edge Computing, vol. 19, no. 3, pp. 225-238, 2022.
M. Farooq, “Supervised learning techniques for intrusion detection systems based on multi-layer classification approach,” International Journal of Advanced Computer Science and Applications, vol 13, no. 3, pp. 311- 315, 2022, https://doi.org/10.14569/IJACSA.2022.0130338.
H. Babbar, S. Rani, S. Garg, G. Kaddoum, M. J. Piran and M. S. Hossain, “A secure multilayer architecture for software-defined space information networks,” IEEE Consumer Electronics Magazine, vol. 12, no. 2, pp. 64-72, 2023, https://doi.org/10.1109/MCE.2021.3139169.
L. Zhao, X. Zhang, J. Chen and L. Zhou, “Physical layer security in the age of artificial intelligence and edge computing,” IEEE Wireless Communications, vol. 27, no. 5, pp. 174-180, 2020, https://doi.org/10.1109/MWC.001.2000044.
D. Novaliendry, et al., “Medical Internet-of-Things based breast cancer diagnosis using hyper parameter-optimized neural networks,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, issue 105, pp. 65-71, 2024.
H. Smith and L. Wang, "Novel Algorithms for Anomaly Detection in Wireless Sensor Networks," in Proceedings of the International Conference on Wireless Communications, 2023, pp. 136-145.
I. A. Elgendy, W.-Z. Zhang, Y. Zeng, H. He, Y.-C. Tian and Y. Yang, “Efficient and secure multi-user multi-task computation offloading for mobile-edge computing in mobile IoT networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 4, pp. 2410-2422, 2020, https://doi.org/10.1109/TNSM.2020.3020249.
I. Cheikh, R. Aouami, E. Sabir, M. Sadik and S. Roy, “Multi-layered energy efficiency in LoRa-WAN networks: A tutorial,” IEEE Access, vol. 10, pp. 9198-9231, 2022, https://doi.org/10.1109/ACCESS.2021.3140107.
M. A. Hossain, A. R. Hossain and N. Ansari, “AI in 6G: Energy-efficient distributed machine learning for multilayer heterogeneous networks,” IEEE Network, vol. 36, no. 6, pp. 84-91, 2022, https://doi.org/10.1109/MNET.104.2100422.
Q. Wang, X. Li, and S. Zhang, "Evaluating IDS/IPS Performance Using Attack Scenarios and Metrics," Journal of Computer Security, vol. 30, no. 3, pp. 315-328, 2022.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.