Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection
Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an a...
Gespeichert in:
Veröffentlicht in: | Peer-to-peer networking and applications 2024-09, Vol.17 (5), p.2737-2757 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2757 |
---|---|
container_issue | 5 |
container_start_page | 2737 |
container_title | Peer-to-peer networking and applications |
container_volume | 17 |
creator | Kaliappan, Chandra Prabha Palaniappan, Kanmani Ananthavadivel, Devipriya Subramanian, Ushasukhanya |
description | Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems. |
doi_str_mv | 10.1007/s12083-024-01684-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3112676308</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3112676308</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</originalsourceid><addsrcrecordid>eNp9kE9Lw0AQxRdRsFa_gKcFz9HZ2WSTeivFP4WClwrels3upKbabN1NKv32pkb05mXmMbz3Bn6MXQq4FgD5TRQIhUwA0wSEKvp5xEZiIlWi0gyOf3WKp-wsxjWAEjLDEXuZup1pbN2s-NwveSTbhbrd33LDrd9sA71SE-sd8ek8KU0kx9vQxZZXwWzo04c3XvnA6-ZwrX3DHbVk216ds5PKvEe6-Nlj9nx_t5w9Jounh_lsukgsArRJhqXN00xMlKWsoNzJTAFiYWxlnFKIZUqTUmZladPKAVYglVWSkGQusHByzK6G3m3wHx3FVq99F5r-pZZCoMqV7MmMGQ4uG3yMgSq9DfXGhL0WoA8E9UBQ9wT1N0ENfUgOodibmxWFv-p_Ul9RunPs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3112676308</pqid></control><display><type>article</type><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><source>SpringerNature Journals</source><creator>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</creator><creatorcontrib>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</creatorcontrib><description>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</description><identifier>ISSN: 1936-6442</identifier><identifier>EISSN: 1936-6450</identifier><identifier>DOI: 10.1007/s12083-024-01684-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Accuracy ; Adaptability ; Algorithms ; Anomalies ; Artificial neural networks ; Bayesian analysis ; Behavior ; Communications Engineering ; Computer Communication Networks ; Cutting equipment ; Cybersecurity ; Engineering ; Information Systems and Communication Service ; Information technology ; Internet of Things ; Intrusion detection systems ; Machine learning ; Networks ; Peer to peer computing ; Real time ; Science ; Signal,Image and Speech Processing ; Trust ; Trustworthiness</subject><ispartof>Peer-to-peer networking and applications, 2024-09, Vol.17 (5), p.2737-2757</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12083-024-01684-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s12083-024-01684-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Kaliappan, Chandra Prabha</creatorcontrib><creatorcontrib>Palaniappan, Kanmani</creatorcontrib><creatorcontrib>Ananthavadivel, Devipriya</creatorcontrib><creatorcontrib>Subramanian, Ushasukhanya</creatorcontrib><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><title>Peer-to-peer networking and applications</title><addtitle>Peer-to-Peer Netw. Appl</addtitle><description>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</description><subject>Accuracy</subject><subject>Adaptability</subject><subject>Algorithms</subject><subject>Anomalies</subject><subject>Artificial neural networks</subject><subject>Bayesian analysis</subject><subject>Behavior</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Cutting equipment</subject><subject>Cybersecurity</subject><subject>Engineering</subject><subject>Information Systems and Communication Service</subject><subject>Information technology</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Peer to peer computing</subject><subject>Real time</subject><subject>Science</subject><subject>Signal,Image and Speech Processing</subject><subject>Trust</subject><subject>Trustworthiness</subject><issn>1936-6442</issn><issn>1936-6450</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kE9Lw0AQxRdRsFa_gKcFz9HZ2WSTeivFP4WClwrels3upKbabN1NKv32pkb05mXmMbz3Bn6MXQq4FgD5TRQIhUwA0wSEKvp5xEZiIlWi0gyOf3WKp-wsxjWAEjLDEXuZup1pbN2s-NwveSTbhbrd33LDrd9sA71SE-sd8ek8KU0kx9vQxZZXwWzo04c3XvnA6-ZwrX3DHbVk216ds5PKvEe6-Nlj9nx_t5w9Jounh_lsukgsArRJhqXN00xMlKWsoNzJTAFiYWxlnFKIZUqTUmZladPKAVYglVWSkGQusHByzK6G3m3wHx3FVq99F5r-pZZCoMqV7MmMGQ4uG3yMgSq9DfXGhL0WoA8E9UBQ9wT1N0ENfUgOodibmxWFv-p_Ul9RunPs</recordid><startdate>20240901</startdate><enddate>20240901</enddate><creator>Kaliappan, Chandra Prabha</creator><creator>Palaniappan, Kanmani</creator><creator>Ananthavadivel, Devipriya</creator><creator>Subramanian, Ushasukhanya</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20240901</creationdate><title>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</title><author>Kaliappan, Chandra Prabha ; Palaniappan, Kanmani ; Ananthavadivel, Devipriya ; Subramanian, Ushasukhanya</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-52bc745196ce58e7d3560228acfad6622b4e9b35bbc4fd02f036c63e2e37128d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Adaptability</topic><topic>Algorithms</topic><topic>Anomalies</topic><topic>Artificial neural networks</topic><topic>Bayesian analysis</topic><topic>Behavior</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Cutting equipment</topic><topic>Cybersecurity</topic><topic>Engineering</topic><topic>Information Systems and Communication Service</topic><topic>Information technology</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Peer to peer computing</topic><topic>Real time</topic><topic>Science</topic><topic>Signal,Image and Speech Processing</topic><topic>Trust</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kaliappan, Chandra Prabha</creatorcontrib><creatorcontrib>Palaniappan, Kanmani</creatorcontrib><creatorcontrib>Ananthavadivel, Devipriya</creatorcontrib><creatorcontrib>Subramanian, Ushasukhanya</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Peer-to-peer networking and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kaliappan, Chandra Prabha</au><au>Palaniappan, Kanmani</au><au>Ananthavadivel, Devipriya</au><au>Subramanian, Ushasukhanya</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection</atitle><jtitle>Peer-to-peer networking and applications</jtitle><stitle>Peer-to-Peer Netw. Appl</stitle><date>2024-09-01</date><risdate>2024</risdate><volume>17</volume><issue>5</issue><spage>2737</spage><epage>2757</epage><pages>2737-2757</pages><issn>1936-6442</issn><eissn>1936-6450</eissn><abstract>Over the years, the Internet of Things (IoT) devices have shown rapid proliferation and development in various domains. However, the widespread adoption of smart devices significantly ameliorates the possibility of several security challenges. To address these challenges, this research presents an advanced AI-enhanced trust framework for IoT Intrusion detection to safeguard IoT environments from any potential intrusion attempts. The proposed framework integrates cutting-edge AI techniques for intrusion detection which identifies the anomalies based on the device behavior and responds dynamically to emerging threats. Initially, a robust Intrusion Detection System (IDS) is developed based on an Isolation Forest (IF) algorithm and Autoencoders (AE) to promptly identify anomalies in real-time. Then, behavioral Modeling is performed by employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) for precise behavioral understanding of IoT devices. Additionally, the Bayesian Network is used to perform adaptive trust assessment and the Reinforcement Learning based Proximal Policy Optimization (PPO) for providing dynamic responses to the detected anomalies. The proposed framework is practically implemented and evaluated using IoTID20 and N-BaIoT datasets, and compared with baseline intrusion detection methods including, CNN-TSODE, cuLSTMGRU, ELETL-IDS, Fed-Inforce-Fusion, and Conv-LSTM. The results demonstrate that the proposed framework achieves high efficiency and outperformed other baseline methods by obtaining a detection accuracy of 98.25%, recall of 96.8%, and precision of 97.45%. Overall, the proposed AI-Enhanced Trust Framework offers a promising solution by identifying the intrusion endeavors effectively and contributing toward the attainment of secure and trustworthy IoT ecosystems.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s12083-024-01684-0</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1936-6442 |
ispartof | Peer-to-peer networking and applications, 2024-09, Vol.17 (5), p.2737-2757 |
issn | 1936-6442 1936-6450 |
language | eng |
recordid | cdi_proquest_journals_3112676308 |
source | SpringerNature Journals |
subjects | Accuracy Adaptability Algorithms Anomalies Artificial neural networks Bayesian analysis Behavior Communications Engineering Computer Communication Networks Cutting equipment Cybersecurity Engineering Information Systems and Communication Service Information technology Internet of Things Intrusion detection systems Machine learning Networks Peer to peer computing Real time Science Signal,Image and Speech Processing Trust Trustworthiness |
title | Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T21%3A34%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Advancing%20IoT%20security:%20a%20comprehensive%20AI-based%20trust%20framework%20for%20intrusion%20detection&rft.jtitle=Peer-to-peer%20networking%20and%20applications&rft.au=Kaliappan,%20Chandra%20Prabha&rft.date=2024-09-01&rft.volume=17&rft.issue=5&rft.spage=2737&rft.epage=2757&rft.pages=2737-2757&rft.issn=1936-6442&rft.eissn=1936-6450&rft_id=info:doi/10.1007/s12083-024-01684-0&rft_dat=%3Cproquest_cross%3E3112676308%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3112676308&rft_id=info:pmid/&rfr_iscdi=true |