Enhancing IoT Security through an Artificial Neural Network Approach
DOI:
https://doi.org/10.4108/eetiot.5045Keywords:
Internet of Things (IoT) Security, Artificial Neural Networks (ANNs), Long Short-Term Memory (LSTM)Abstract
This study aims to fortify Internet of Things (IoT) security through the strategic implementation of Artificial Neural Networks (ANNs). With the rapid expansion of IoT devices, traditional security measures have struggled to cope with the dynamic and complex nature of these environments. ANNs, known for their adaptability, are explored as a promising solution to enhance security. The central objective is to significantly improve the accuracy of IoT security measures by optimizing ANN architectures. Using a curated dataset with key environmental parameters, the study evaluates three ANN models—Backpropagation Neural Network (BPNN), Multilayer Perceptron (MLP), and Long Short-Term Memory (LSTM). The evaluation metrics include accuracy, precision, recall, and F1-score across different train-test splits. Results show that LSTM consistently outperforms BPNN and MLP, demonstrating superior accuracy and the ability to capture temporal dependencies within IoT security data. Implications stress the importance of aligning model selection with specific application goals, considering factors like computational efficiency. In conclusion, this research contributes valuable insights into the practical implementation of ANNs for IoT security, guiding future optimization efforts and addressing real-world deployment challenges to safeguard sensitive data and ensure system resilience in the evolving IoT landscape.
Downloads
References
[1] A. Bhardwaj, K. Kaushik, S. Bharany, and S. K. Kim, “Forensic analysis and security assessment of IoT camera firmware for smart homes,” Egypt. Informatics J., vol. 24, no. 4, p. 100409, 2023, doi: 10.1016/j.eij.2023.100409.
[2] A. Nazir, J. He, N. Zhu, A. Wajahat, and F. Ullah, “Jou rna,” J. King Saud Univ. - Comput. Inf. Sci., p. 101939, 2024, doi: 10.1016/j.jksuci.2024.101939.
[3] M. Vishwakarma and N. Kesswani, “DIDS: A Deep Neural Network based real-time Intrusion detection system for IoT,” Decis. Anal. J., vol. 5, no. November, p. 100142, 2022, doi: 10.1016/j.dajour.2022.100142.
[4] T. Gaber, J. B. Awotunde, M. Torky, S. A. Ajagbe, M. Hammoudeh, and W. Li, “Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks,” Internet of Things (Netherlands), vol. 24, no. October, p. 100977, 2023, doi: 10.1016/j.iot.2023.100977.
[5] B. Lal, S. Ravichandran, R. Kavin, N. Anil Kumar, D. Bordoloi, and R. Ganesh Kumar, “IOT-BASED cyber security identification model through machine learning technique,” Meas. Sensors, vol. 27, no. March, p. 100791, 2023, doi: 10.1016/j.measen.2023.100791.
[6] M. Soori, B. Arezoo, and R. Dastres, “Artificial neural networks in supply chain management, a review,” J. Econ. Technol., vol. 1, no. October, pp. 179–196, 2023, doi: 10.1016/j.ject.2023.11.002.
[7] M. W. Hasan, “Building an IoT temperature and humidity forecasting model based on long short-term memory (LSTM) with improved whale optimization algorithm,” Memories - Mater. Devices, Circuits Syst., vol. 6, no. October, p. 100086, 2023, doi: 10.1016/j.memori.2023.100086.
[8] M. R. Islam, K. Oliullah, M. M. Kabir, M. Alom, and M. F. Mridha, “Machine learning enabled IoT system for soil nutrients monitoring and crop recommendation,” J. Agric. Food Res., vol. 14, no. November, p. 100880, 2023, doi: 10.1016/j.jafr.2023.100880.
[9] A. S. Hamza, R. Tashakkori, B. Underwood, W. O’Brien, and C. Campell, “BeeLive: The IoT platform of Beemon monitoring and alerting system for beehives,” Smart Agric. Technol., vol. 6, no. July, p. 100331, 2023, doi: 10.1016/j.atech.2023.100331.
[10] Y. Xing and L. Tong, “Accelerating reliability-based topology optimization via gradient online learning and prediction,” Aerosp. Sci. Technol., vol. 145, p. 108836, 2024, doi: 10.1016/j.ast.2023.108836.
[11] S. M. S. Bukhari et al., “Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability,” Ad Hoc Networks, vol. 155, no. January, p. 103407, 2024, doi: 10.1016/j.adhoc.2024.103407.
[12] N. Omer, A. H. Samak, A. I. Taloba, and R. M. Abd El-Aziz, “A novel optimized probabilistic neural network approach for intrusion detection and categorization,” Alexandria Eng. J., vol. 72, pp. 351–361, 2023, doi: 10.1016/j.aej.2023.03.093.
[13] S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things (Netherlands), vol. 24, no. July, p. 100936, 2023, doi: 10.1016/j.iot.2023.100936.
[14] S. Y. Diaba et al., “SCADA securing system using deep learning to prevent cyber infiltration,” Neural Networks, vol. 165, pp. 321–332, 2023, doi: 10.1016/j.neunet.2023.05.047.
[15] O. I. Abiodun, A. Jantan, A. E. Omolara, K. V. Dada, N. A. E. Mohamed, and H. Arshad, “State-of-the-art in artificial neural network applications: A survey,” Heliyon, vol. 4, no. 11, p. e00938, 2018, doi: 10.1016/j.heliyon.2018.e00938.
[16] G. Raman MR, N. Somu, and A. P. Mathur, “A multilayer perceptron model for anomaly detection in water treatment plants,” Int. J. Crit. Infrastruct. Prot., vol. 31, p. 100393, 2020, doi: 10.1016/j.ijcip.2020.100393.
[17] M. Alazab, R. Abu Khurma, P. A. Castillo, B. Abu-Salih, A. Martín, and D. Camacho, “An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron,” Egypt. Informatics J., vol. 25, no. December 2023, p. 100423, 2024, doi: 10.1016/j.eij.2023.100423.
[18] P. B. Udas, M. E. Karim, and K. S. Roy, “SPIDER: A shallow PCA based network intrusion detection system with enhanced recurrent neural networks,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 10, pp. 10246–10272, 2022, doi: 10.1016/j.jksuci.2022.10.019.
[19] M. Keshk, N. Koroniotis, N. Pham, N. Moustafa, B. Turnbull, and A. Y. Zomaya, “An explainable deep learning-enabled intrusion detection framework in IoT networks,” Inf. Sci. (Ny)., vol. 639, no. October 2021, p. 119000, 2023, doi: 10.1016/j.ins.2023.119000.
[20] P. TS and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Glob. Transitions Proc., vol. 2, no. 2, pp. 448–454, 2021, doi: 10.1016/j.gltp.2021.08.017.
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 EAI Endorsed Transactions on Internet of Things
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.