Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection

Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Peer-to-peer networking and applications 2024-09, Vol.17 (5), p.2737-2757
Hauptverfasser: Kaliappan, Chandra Prabha, Palaniappan, Kanmani, Ananthavadivel, Devipriya, Subramanian, Ushasukhanya
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2757
container_issue 5
container_start_page 2737
container_title Peer-to-peer networking and applications
container_volume 17
creator Kaliappan, Chandra Prabha
Palaniappan, Kanmani
Ananthavadivel, Devipriya
Subramanian, Ushasukhanya
description Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.
doi_str_mv 10.1007/s12083-024-01684-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3112676308</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3112676308</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</originalsourceid><addsrcrecordid>eNp9kE9Lw0AQxRdRsFa_gKcFz9HZ2WSTeivFP4WClwrels3upKbabN1NKv32pkb05mXmMbz3Bn6MXQq4FgD5TRQIhUwA0wSEKvp5xEZiIlWi0gyOf3WKp-wsxjWAEjLDEXuZup1pbN2s-NwveSTbhbrd33LDrd9sA71SE-sd8ek8KU0kx9vQxZZXwWzo04c3XvnA6-ZwrX3DHbVk216ds5PKvEe6-Nlj9nx_t5w9Jounh_lsukgsArRJhqXN00xMlKWsoNzJTAFiYWxlnFKIZUqTUmZladPKAVYglVWSkGQusHByzK6G3m3wHx3FVq99F5r-pZZCoMqV7MmMGQ4uG3yMgSq9DfXGhL0WoA8E9UBQ9wT1N0ENfUgOodibmxWFv-p_Ul9RunPs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3112676308</pqid></control><display><type>article</type><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><source>SpringerNature Journals</source><creator>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</creator><creatorcontrib>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</creatorcontrib><description>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-024-01684-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Accuracy ; Adaptability ; Algorithms ; Anomalies ; Artificial neural networks ; Bayesian analysis ; Behavior ; Communications Engineering ; Computer Communication Networks ; Cutting equipment ; Cybersecurity ; Engineering ; Information Systems and Communication Service ; Information technology ; Internet of Things ; Intrusion detection systems ; Machine learning ; Networks ; Peer to peer computing ; Real time ; Science ; Signal,Image and Speech Processing ; Trust ; Trustworthiness</subject><ispartof>Peer-to-peer networking and applications, 2024-09, Vol.17 (5), p.2737-2757</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-024-01684-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-024-01684-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kaliappan, Chandra Prabha</creatorcontrib><creatorcontrib>Palaniappan, Kanmani</creatorcontrib><creatorcontrib>Ananthavadivel, Devipriya</creatorcontrib><creatorcontrib>Subramanian, Ushasukhanya</creatorcontrib><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</description><subject>Accuracy</subject><subject>Adaptability</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial neural networks</subject><subject>Bayesian analysis</subject><subject>Behavior</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cutting equipment</subject><subject>Cybersecurity</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Information technology</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Peer to peer computing</subject><subject>Real time</subject><subject>Science</subject><subject>Signal,Image and Speech Processing</subject><subject>Trust</subject><subject>Trustworthiness</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kE9Lw0AQxRdRsFa_gKcFz9HZ2WSTeivFP4WClwrels3upKbabN1NKv32pkb05mXmMbz3Bn6MXQq4FgD5TRQIhUwA0wSEKvp5xEZiIlWi0gyOf3WKp-wsxjWAEjLDEXuZup1pbN2s-NwveSTbhbrd33LDrd9sA71SE-sd8ek8KU0kx9vQxZZXwWzo04c3XvnA6-ZwrX3DHbVk216ds5PKvEe6-Nlj9nx_t5w9Jounh_lsukgsArRJhqXN00xMlKWsoNzJTAFiYWxlnFKIZUqTUmZladPKAVYglVWSkGQusHByzK6G3m3wHx3FVq99F5r-pZZCoMqV7MmMGQ4uG3yMgSq9DfXGhL0WoA8E9UBQ9wT1N0ENfUgOodibmxWFv-p_Ul9RunPs</recordid><startdate>20240901</startdate><enddate>20240901</enddate><creator>Kaliappan, Chandra Prabha</creator><creator>Palaniappan, Kanmani</creator><creator>Ananthavadivel, Devipriya</creator><creator>Subramanian, Ushasukhanya</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240901</creationdate><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><author>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Adaptability</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial neural networks</topic><topic>Bayesian analysis</topic><topic>Behavior</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cutting equipment</topic><topic>Cybersecurity</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Information technology</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Peer to peer computing</topic><topic>Real time</topic><topic>Science</topic><topic>Signal,Image and Speech Processing</topic><topic>Trust</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kaliappan, Chandra Prabha</creatorcontrib><creatorcontrib>Palaniappan, Kanmani</creatorcontrib><creatorcontrib>Ananthavadivel, Devipriya</creatorcontrib><creatorcontrib>Subramanian, Ushasukhanya</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kaliappan, Chandra Prabha</au><au>Palaniappan, Kanmani</au><au>Ananthavadivel, Devipriya</au><au>Subramanian, Ushasukhanya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2024-09-01</date><risdate>2024</risdate><volume>17</volume><issue>5</issue><spage>2737</spage><epage>2757</epage><pages>2737-2757</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-024-01684-0</doi><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1936-6442
ispartof Peer-to-peer networking and applications, 2024-09, Vol.17 (5), p.2737-2757
issn 1936-6442
1936-6450
language eng
recordid cdi_proquest_journals_3112676308
source SpringerNature Journals
subjects Accuracy
Adaptability
Algorithms
Anomalies
Artificial neural networks
Bayesian analysis
Behavior
Communications Engineering
Computer Communication Networks
Cutting equipment
Cybersecurity
Engineering
Information Systems and Communication Service
Information technology
Internet of Things
Intrusion detection systems
Machine learning
Networks
Peer to peer computing
Real time
Science
Signal,Image and Speech Processing
Trust
Trustworthiness
title Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T21%3A34%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Advancing%20IoT%20security:%20a%20comprehensive%20AI-based%20trust%20framework%20for%20intrusion%20detection&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Kaliappan,%20Chandra%20Prabha&rft.date=2024-09-01&rft.volume=17&rft.issue=5&rft.spage=2737&rft.epage=2757&rft.pages=2737-2757&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-024-01684-0&rft_dat=%3Cproquest_cross%3E3112676308%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3112676308&rft_id=info:pmid/&rfr_iscdi=true