首页 > 最新文献

Internet of Things最新文献

英文 中文
Data security for cloud-fog-assisted Industrial Internet of Things (IIoT) in future Industry 5.0 未来工业5.0中云雾辅助工业物联网(IIoT)的数据安全
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101765
Haowen Tan , Max Hashem Eiza , Sangman Moh , Kouichi Sakurai
Cloud–Fog assisted Industrial Internet of Things (IIoT) has emerged as a core enabling technology for Industry 5.0, driving innovations in smart manufacturing by facilitating real-time interactions among industrial devices, fog nodes, and cloud platforms. However, inherent limitations in computational power and adaptability of IIoT terminals pose significant challenges to data security protection. This special issue focuses on addressing critical data security issues in Cloud–Fog IIoT systems.
云雾辅助工业物联网(IIoT)已成为工业5.0的核心使能技术,通过促进工业设备、雾节点和云平台之间的实时交互,推动智能制造的创新。然而,工业物联网终端在计算能力和适应性方面的固有局限性给数据安全保护带来了重大挑战。本特刊着重于解决云雾工业物联网系统中的关键数据安全问题。
{"title":"Data security for cloud-fog-assisted Industrial Internet of Things (IIoT) in future Industry 5.0","authors":"Haowen Tan ,&nbsp;Max Hashem Eiza ,&nbsp;Sangman Moh ,&nbsp;Kouichi Sakurai","doi":"10.1016/j.iot.2025.101765","DOIUrl":"10.1016/j.iot.2025.101765","url":null,"abstract":"<div><div>Cloud–Fog assisted Industrial Internet of Things (IIoT) has emerged as a core enabling technology for Industry 5.0, driving innovations in smart manufacturing by facilitating real-time interactions among industrial devices, fog nodes, and cloud platforms. However, inherent limitations in computational power and adaptability of IIoT terminals pose significant challenges to data security protection. This special issue focuses on addressing critical data security issues in Cloud–Fog IIoT systems.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101765"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145680989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart-contract-based blockchain-enabled decentralized scheme for improving smart-grid security 基于智能合约的区块链去中心化方案,用于提高智能电网的安全性
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101811
Bhabendu Kumar Mohanta , Ali Ismail Awad , Tarek Elsaka , Hamza Kheddar , Ezedin Baraka
Intelligent devices with embedded technology have proliferated dramatically over the past decade. The Internet of Things (IoT) has emerged as a transformational force, advancing traditional systems to previously unattainable levels of intelligence. Smart cities, transportation, healthcare, supply-chain management, agriculture, water management, and smart grid (SG) systems are among the industries where the IoT has found applications. These developments are demonstrated by the integration of IoT systems into SG networks, offering significant improvements in sustainability, dependability, and efficiency. Such systems use various IoT devices to continuously monitor the environment and transmit data for processing and analysis. Nonetheless, the growth of the IoT has introduced security vulnerabilities, including concerns about user identification, data integrity, and trust, especially in SG applications. This study aims to resolve several security challenges in IoT-enabled SG applications to support sustainability. The proposed scheme effectively tackles critical security requirements such as data integrity, user anonymity, distributed storage, trust management, and decentralized architecture. The security concerns addressed by blockchain technology include preserving data integrity, fostering trust, providing secure communication, and enabling effective monitoring. Smart contracts automate system processes and are effective in maintaining user trust. The experimental findings support the viability of the proposed system, demonstrating a computational cost of 3.150 ms and a communication overhead of 992 bits, both representing improvements over various existing solutions. Additionally, the deployment cost for the smart contract is found to be 5.64 USD with a writing cost of 2.89 USD, both of which are lower than the costs associated with comparable approaches.
具有嵌入式技术的智能设备在过去十年中急剧增加。物联网(IoT)已经成为一股变革力量,将传统系统推进到以前无法实现的智能水平。智慧城市、交通、医疗、供应链管理、农业、水管理和智能电网(SG)系统是物联网应用的行业之一。这些发展通过将物联网系统集成到SG网络中来证明,在可持续性、可靠性和效率方面提供了显着改进。此类系统使用各种物联网设备持续监控环境并传输数据以进行处理和分析。尽管如此,物联网的发展也带来了安全漏洞,包括对用户身份、数据完整性和信任的担忧,尤其是在SG应用中。本研究旨在解决物联网SG应用中的几个安全挑战,以支持可持续性。该方案有效地解决了数据完整性、用户匿名性、分布式存储、信任管理和分散架构等关键安全需求。区块链技术解决的安全问题包括保持数据完整性、促进信任、提供安全通信和支持有效监视。智能合约使系统流程自动化,并能有效地维护用户信任。实验结果支持了该系统的可行性,表明该系统的计算成本为3.150 ms,通信开销为992比特,都比现有的各种解决方案有所改进。此外,智能合约的部署成本为5.64美元,编写成本为2.89美元,两者都低于与可比方法相关的成本。
{"title":"Smart-contract-based blockchain-enabled decentralized scheme for improving smart-grid security","authors":"Bhabendu Kumar Mohanta ,&nbsp;Ali Ismail Awad ,&nbsp;Tarek Elsaka ,&nbsp;Hamza Kheddar ,&nbsp;Ezedin Baraka","doi":"10.1016/j.iot.2025.101811","DOIUrl":"10.1016/j.iot.2025.101811","url":null,"abstract":"<div><div>Intelligent devices with embedded technology have proliferated dramatically over the past decade. The Internet of Things (IoT) has emerged as a transformational force, advancing traditional systems to previously unattainable levels of intelligence. Smart cities, transportation, healthcare, supply-chain management, agriculture, water management, and smart grid (SG) systems are among the industries where the IoT has found applications. These developments are demonstrated by the integration of IoT systems into SG networks, offering significant improvements in sustainability, dependability, and efficiency. Such systems use various IoT devices to continuously monitor the environment and transmit data for processing and analysis. Nonetheless, the growth of the IoT has introduced security vulnerabilities, including concerns about user identification, data integrity, and trust, especially in SG applications. This study aims to resolve several security challenges in IoT-enabled SG applications to support sustainability. The proposed scheme effectively tackles critical security requirements such as data integrity, user anonymity, distributed storage, trust management, and decentralized architecture. The security concerns addressed by blockchain technology include preserving data integrity, fostering trust, providing secure communication, and enabling effective monitoring. Smart contracts automate system processes and are effective in maintaining user trust. The experimental findings support the viability of the proposed system, demonstrating a computational cost of 3.150 ms and a communication overhead of 992 bits, both representing improvements over various existing solutions. Additionally, the deployment cost for the smart contract is found to be 5.64 USD with a writing cost of 2.89 USD, both of which are lower than the costs associated with comparable approaches.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101811"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Routing optimization and adaptive defense system for vehicular networks (ROADS-VN) 车辆网络路由优化与自适应防御系统(ROADS-VN)
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101816
Sofiane Hamrioui , Angela Voinea Ciocan , Redouane Djelouah , Camil Adam Mohamed Hamrioui , Pascal Lorenz
The rapid proliferation of connected vehicles has transformed modern transportation, while introducing critical security and performance challenges in dynamic vehicular networks. To address sophisticated threats such as DDoS, Sybil, and routing manipulation attacks-without compromising operational efficiency-we propose ROADS-VN, a novel Routing Optimization and Adaptive Defense System for Vehicular Networks. ROADS-VN integrates machine learning-based anomaly detection, mobility-aware route adaptation, and historical threat intelligence into a modular, context-aware mechanism enabling real-time, adaptive decision-making under dynamic vehicular conditions. The architecture of ROADS-VN is designed to be compatible with federated learning, but federated learning is not implemented in the current experiments, to avoid any misinterpretation regarding deployment. Extensive simulations demonstrate that ROADS-VN achieves a Packet Delivery Ratio (PDR) of 98.5% in low-mobility, low-traffic scenarios and 94.0% PDR under high-mobility, high-traffic conditions, while maintaining average communication latency as low as 45 ms and detection accuracy up to 96.0%. The protocol exhibits strong scalability, energy efficiency, and resilience against evolving cyber threats. By seamlessly combining adaptive routing with proactive security mechanisms, ROADS-VN provides a robust foundation for secure, reliable, and intelligent vehicular communications in next-generation transportation ecosystems.
联网车辆的快速普及改变了现代交通,同时也给动态车辆网络带来了关键的安全和性能挑战。为了解决复杂的威胁,如DDoS、Sybil和路由操纵攻击,在不影响运营效率的情况下,我们提出了ROADS-VN,一种新型的车辆网络路由优化和自适应防御系统。ROADS-VN将基于机器学习的异常检测、移动感知路线适应和历史威胁情报集成到一个模块化的、上下文感知的机制中,在动态车辆条件下实现实时、自适应决策。ROADS-VN的体系结构被设计为与联邦学习兼容,但在当前的实验中没有实现联邦学习,以避免任何关于部署的误解。大量的仿真表明,ROADS-VN在低移动性、低流量场景下实现了98.5%的分组交付率(PDR),在高移动性、高流量条件下实现了94.0%的PDR,同时保持了平均通信延迟低至45 ms,检测准确率高达96.0%。该协议具有强大的可扩展性、能效和抵御不断变化的网络威胁的弹性。通过将自适应路由与主动安全机制无缝结合,ROADS-VN为下一代交通生态系统中安全、可靠和智能的车辆通信提供了坚实的基础。
{"title":"Routing optimization and adaptive defense system for vehicular networks (ROADS-VN)","authors":"Sofiane Hamrioui ,&nbsp;Angela Voinea Ciocan ,&nbsp;Redouane Djelouah ,&nbsp;Camil Adam Mohamed Hamrioui ,&nbsp;Pascal Lorenz","doi":"10.1016/j.iot.2025.101816","DOIUrl":"10.1016/j.iot.2025.101816","url":null,"abstract":"<div><div>The rapid proliferation of connected vehicles has transformed modern transportation, while introducing critical security and performance challenges in dynamic vehicular networks. To address sophisticated threats such as DDoS, Sybil, and routing manipulation attacks-without compromising operational efficiency-we propose ROADS-VN, a novel <em>Routing Optimization and Adaptive Defense System for Vehicular Networks</em>. ROADS-VN integrates machine learning-based anomaly detection, mobility-aware route adaptation, and historical threat intelligence into a modular, context-aware mechanism enabling real-time, adaptive decision-making under dynamic vehicular conditions. The architecture of ROADS-VN is designed to be compatible with federated learning, but federated learning is not implemented in the current experiments, to avoid any misinterpretation regarding deployment. Extensive simulations demonstrate that ROADS-VN achieves a Packet Delivery Ratio (PDR) of 98.5% in low-mobility, low-traffic scenarios and 94.0% PDR under high-mobility, high-traffic conditions, while maintaining average communication latency as low as 45 ms and detection accuracy up to 96.0%. The protocol exhibits strong scalability, energy efficiency, and resilience against evolving cyber threats. By seamlessly combining adaptive routing with proactive security mechanisms, ROADS-VN provides a robust foundation for secure, reliable, and intelligent vehicular communications in next-generation transportation ecosystems.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101816"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing IoT data privacy: AI-assisted consent mechanism in a PDS-based solution 增强物联网数据隐私:基于pds解决方案中的ai辅助同意机制
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101807
George P. Pinto , Nilson R. Sousa , Claudio N. Da Silva , Maycon L.M. Peixoto Jr. , Gustavo B. Figueiredo , Cássio V.S. Prazeres
The Internet of Things has amplified the pervasive and ubiquitous collection and processing of personal data, introducing significant challenges to data privacy. Existing architectures often lack mechanisms that enable users to control data sharing or anticipate privacy risks, such as profiling. This work introduces an AI-assisted consent mechanism integrated into a Personal Data Store-based privacy architecture to support users’ decision-making. The mechanism assesses the potential of profiling prior to data disclosure by applying clustering algorithms and computing a profiling risk metric using Silhouette, Davies-Bouldin, and Calinski-Harabasz indices. We evaluated the mechanism in a simulated smart building environment, analyzing clustering quality and computational performance. Results indicate that the approach is computationally efficient and capable of identifying meaningful profile patterns, thereby offering practical feasibility for mitigating profiling risks.
物联网放大了无处不在的个人数据收集和处理,给数据隐私带来了重大挑战。现有架构通常缺乏使用户能够控制数据共享或预测隐私风险的机制,例如分析。这项工作引入了一种人工智能辅助的同意机制,该机制集成到基于个人数据存储的隐私架构中,以支持用户的决策。该机制通过应用聚类算法和使用Silhouette、Davies-Bouldin和Calinski-Harabasz指数计算分析风险指标,在数据披露之前评估分析的潜力。我们在模拟智能建筑环境中评估了该机制,分析了聚类质量和计算性能。结果表明,该方法计算效率高,能够识别有意义的剖面模式,从而为降低剖面风险提供了实际可行性。
{"title":"Enhancing IoT data privacy: AI-assisted consent mechanism in a PDS-based solution","authors":"George P. Pinto ,&nbsp;Nilson R. Sousa ,&nbsp;Claudio N. Da Silva ,&nbsp;Maycon L.M. Peixoto Jr. ,&nbsp;Gustavo B. Figueiredo ,&nbsp;Cássio V.S. Prazeres","doi":"10.1016/j.iot.2025.101807","DOIUrl":"10.1016/j.iot.2025.101807","url":null,"abstract":"<div><div>The Internet of Things has amplified the pervasive and ubiquitous collection and processing of personal data, introducing significant challenges to data privacy. Existing architectures often lack mechanisms that enable users to control data sharing or anticipate privacy risks, such as profiling. This work introduces an AI-assisted consent mechanism integrated into a Personal Data Store-based privacy architecture to support users’ decision-making. The mechanism assesses the potential of profiling prior to data disclosure by applying clustering algorithms and computing a profiling risk metric using Silhouette, Davies-Bouldin, and Calinski-Harabasz indices. We evaluated the mechanism in a simulated smart building environment, analyzing clustering quality and computational performance. Results indicate that the approach is computationally efficient and capable of identifying meaningful profile patterns, thereby offering practical feasibility for mitigating profiling risks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101807"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145519940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ABS-TD3: Efficient IoT data submission in DAG-based DLTs for digital circular economy ABS-TD3:数字循环经济中基于dag的dlt的高效物联网数据提交
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101814
Konstantinos Voulgaridis , Dimitris Karampatzakis , Panagiotis Sarigiannidis , Thomas Lagkas
Distributed Ledger Technologies (DLTs) underpin Digital Circular Economy (DCE) systems that rely on efficient IoT data flows. Shimmer, a DAG-based DLT optimized for IoT, enables feeless transactions with parallel validation through its tip-selection mechanism. On such ledgers, message fragmentation induces a latency–throughput tradeoff as per-block cost rises with parallel validation. Such efficiency lowers energy and congestion, supporting DCE objectives. Yet, end-users cannot control payload size or network load, leading to unpredictable latency and high CPU use on submitting devices, increasing energy consumption. Existing approaches mostly modify ledger internals, overlooking adaptivity or end-user policies. We introduce ABS-TD3, an offline-to-online TD3 agent that receives the total message size and outputs the optimal per-block size for balancing latency and energy-efficient CPU utilization. The agent is pre-trained offline on real data with Retrieval Augmentation and adaptive weights for improved decision making, then transitioned online with prioritized replay and a novelty bonus, balancing exploitation-exploration, yielding stable adaptivity compared to standard RL approaches. ABS-TD3 is implemented on Shimmer and can integrate with future Tangle-based forks of pre-IOTA-Rebased frameworks, exposing the same client-side controls. ABS-TD3 is evaluated on Shimmer by submitting 8 message sizes ranging from 5KB to 100KB, under the 32 KB block-size limit, with 250 iterations per size via IOTA-SDK. Against max, min, random, and fixed-weight baselines, it reduces median latency by about 9 % to 12 % and median CPU utilization by about 12 % to 17 % versus max and random policies, enabling efficient IoT data submission for DCE platforms without altering DLT infrastructure.
分布式账本技术(dlt)支持依赖于高效物联网数据流的数字循环经济(DCE)系统。Shimmer是一种针对物联网优化的基于dag的DLT,通过其尖端选择机制实现并行验证的无感觉交易。在这样的分类账上,随着每个块的成本随着并行验证的增加而增加,消息碎片会导致延迟-吞吐量的权衡。这样的效率降低了能源和拥堵,支持了DCE的目标。然而,最终用户无法控制负载大小或网络负载,从而导致不可预测的延迟和提交设备上的高CPU使用,从而增加了能耗。现有的方法大多修改账本内部,忽略了适应性或最终用户策略。我们介绍ABS-TD3,这是一个离线到在线的TD3代理,它接收总消息大小并输出最佳的每个块大小,以平衡延迟和节能的CPU利用率。该智能体通过检索增强和自适应权重对真实数据进行离线预训练,以改进决策,然后通过优先重播和新颖性奖励过渡到在线,平衡开发-探索,与标准强化学习方法相比,产生稳定的适应性。ABS-TD3是在Shimmer上实现的,可以与未来基于tangle的pre-IOTA-Rebased框架的分支集成,暴露相同的客户端控件。ABS-TD3在Shimmer上进行评估,提交8个消息大小,范围从5KB到100KB,在32 KB块大小限制下,每个大小通过IOTA-SDK进行250次迭代。相对于最大、最小、随机和固定权重基准,与最大和随机策略相比,它将延迟中位数降低了约9%至12%,CPU利用率中位数降低了约12%至17%,从而在不改变DLT基础设施的情况下,为DCE平台提供了高效的物联网数据提交。
{"title":"ABS-TD3: Efficient IoT data submission in DAG-based DLTs for digital circular economy","authors":"Konstantinos Voulgaridis ,&nbsp;Dimitris Karampatzakis ,&nbsp;Panagiotis Sarigiannidis ,&nbsp;Thomas Lagkas","doi":"10.1016/j.iot.2025.101814","DOIUrl":"10.1016/j.iot.2025.101814","url":null,"abstract":"<div><div>Distributed Ledger Technologies (DLTs) underpin Digital Circular Economy (DCE) systems that rely on efficient IoT data flows. Shimmer, a DAG-based DLT optimized for IoT, enables feeless transactions with parallel validation through its tip-selection mechanism. On such ledgers, message fragmentation induces a latency–throughput tradeoff as per-block cost rises with parallel validation. Such efficiency lowers energy and congestion, supporting DCE objectives. Yet, end-users cannot control payload size or network load, leading to unpredictable latency and high CPU use on submitting devices, increasing energy consumption. Existing approaches mostly modify ledger internals, overlooking adaptivity or end-user policies. We introduce ABS-TD3, an offline-to-online TD3 agent that receives the total message size and outputs the optimal per-block size for balancing latency and energy-efficient CPU utilization. The agent is pre-trained offline on real data with Retrieval Augmentation and adaptive weights for improved decision making, then transitioned online with prioritized replay and a novelty bonus, balancing exploitation-exploration, yielding stable adaptivity compared to standard RL approaches. ABS-TD3 is implemented on Shimmer and can integrate with future Tangle-based forks of pre-IOTA-Rebased frameworks, exposing the same client-side controls. ABS-TD3 is evaluated on Shimmer by submitting 8 message sizes ranging from 5KB to 100KB, under the 32 KB block-size limit, with 250 iterations per size via IOTA-SDK. Against max, min, random, and fixed-weight baselines, it reduces median latency by about 9 % to 12 % and median CPU utilization by about 12 % to 17 % versus max and random policies, enabling efficient IoT data submission for DCE platforms without altering DLT infrastructure.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101814"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining epsilon-greedy reinforcement learning based gradient sparsification and siamese neural networks for few-shot federated tinyML intrusion detection in IoT 结合贪心强化学习的梯度稀疏化和连体神经网络在物联网中进行几次联合入侵检测
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101820
Pietro Fusco, Francesco Palmieri, Massimo Ficco
The rapid expansion of the Internet of Things (IoT) has introduced significant cybersecurity risks, implying the need for lightweight edge-level intrusion detection systems (IDS). On-device training and federated learning (FL) enable collaborative construction of unified models using field data, ensuring data privacy preservation. However, repetitive global model updates and parameter transmission, particularly over IoT architectures characterized by limited bandwidth or intermittent connectivity, can result in significant network latency, as well as in unsustainable energy consumption for the involved resource-constrained IoT-edge devices. Moreover, collecting a sufficient set of realistic attack samples in situ is often difficult, resulting in highly imbalanced datasets that limit distributed training. To overcome these limitations, we combined Siamese Neural Networks (SNNs) and gradient sparsification, enabling IoT-edge devices to support privacy-preserving few-shot FL and model compression needed to train a shared IDS model collaboratively by using very few samples and optimizing the communication overhead during model updates, respectively. The percentage of gradient sparsification is dynamically selected at each training round through an epsilon-greedy exploration-exploitation strategy, allowing the system to balance adaptively the trade-off between communication savings and detection performance. To accommodate a model sparsification few-shot learning strategy in IoT environments, a distributed IDS based on federated SNNs has been proposed and tested on constrained microcontroller units. It is validated using the CSE-CIC-IDS2018 dataset. It demonstrates that the SNN-based IDS, when augmented with FL and gradient sparsification, achieves high performance even under network bandwidth limitations, as well as reduced and unbalanced training data constraints, highlighting its potential for secure and privacy-aware IoT-edge applications.
物联网(IoT)的快速扩张带来了重大的网络安全风险,这意味着需要轻量级边缘级入侵检测系统(IDS)。设备上训练和联邦学习(FL)支持使用现场数据协作构建统一模型,确保数据隐私保护。然而,重复的全局模型更新和参数传输,特别是在带宽有限或间歇性连接的物联网架构上,可能导致严重的网络延迟,以及涉及资源受限的物联网边缘设备的不可持续的能源消耗。此外,在现场收集足够的真实攻击样本通常很困难,导致数据集高度不平衡,限制了分布式训练。为了克服这些限制,我们结合了Siamese神经网络(snn)和梯度稀疏化,使物联网边缘设备能够支持隐私保护的少镜头FL和模型压缩,通过使用很少的样本和优化模型更新期间的通信开销来协同训练共享IDS模型。梯度稀疏化的百分比通过epsilon贪婪的探索利用策略在每个训练轮中动态选择,允许系统自适应地平衡通信节省和检测性能之间的权衡。为了适应物联网环境中的模型稀疏化少次学习策略,提出了一种基于联合snn的分布式IDS,并在受限微控制器单元上进行了测试。使用CSE-CIC-IDS2018数据集进行验证。研究表明,基于snn的IDS在增强FL和梯度稀疏化后,即使在网络带宽限制以及减少和不平衡的训练数据约束下也能实现高性能,突出了其在安全和隐私敏感的物联网边缘应用中的潜力。
{"title":"Combining epsilon-greedy reinforcement learning based gradient sparsification and siamese neural networks for few-shot federated tinyML intrusion detection in IoT","authors":"Pietro Fusco,&nbsp;Francesco Palmieri,&nbsp;Massimo Ficco","doi":"10.1016/j.iot.2025.101820","DOIUrl":"10.1016/j.iot.2025.101820","url":null,"abstract":"<div><div>The rapid expansion of the Internet of Things (IoT) has introduced significant cybersecurity risks, implying the need for lightweight edge-level intrusion detection systems (IDS). On-device training and federated learning (FL) enable collaborative construction of unified models using field data, ensuring data privacy preservation. However, repetitive global model updates and parameter transmission, particularly over IoT architectures characterized by limited bandwidth or intermittent connectivity, can result in significant network latency, as well as in unsustainable energy consumption for the involved resource-constrained IoT-edge devices. Moreover, collecting a sufficient set of realistic attack samples in situ is often difficult, resulting in highly imbalanced datasets that limit distributed training. To overcome these limitations, we combined Siamese Neural Networks (SNNs) and gradient sparsification, enabling IoT-edge devices to support privacy-preserving few-shot FL and model compression needed to train a shared IDS model collaboratively by using very few samples and optimizing the communication overhead during model updates, respectively. The percentage of gradient sparsification is dynamically selected at each training round through an epsilon-greedy exploration-exploitation strategy, allowing the system to balance adaptively the trade-off between communication savings and detection performance. To accommodate a model sparsification few-shot learning strategy in IoT environments, a distributed IDS based on federated SNNs has been proposed and tested on constrained microcontroller units. It is validated using the CSE-CIC-IDS2018 dataset. It demonstrates that the SNN-based IDS, when augmented with FL and gradient sparsification, achieves high performance even under network bandwidth limitations, as well as reduced and unbalanced training data constraints, highlighting its potential for secure and privacy-aware IoT-edge applications.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101820"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145519943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing anomaly detection and energy efficiency in smart city IoT networks using hybrid deep learning and black hole algorithm 利用混合深度学习和黑洞算法平衡智能城市物联网网络的异常检测和能源效率
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101800
Ali Alssaiari , Maher Alharby , Qasim Jan , Shahid Hussain , Sana Ullah
Urbanisation and digital transformation have led to the development of smart city applications that rely on the efficiency of interconnected Internet of Things devices, which are often resource-constrained. This situation presents challenges in energy efficiency and cybersecurity. Although current AI-based solutions enhance cybersecurity, they may consume significant resources, potentially worsening energy efficiency. To address these challenges, there is a need for advanced mechanisms that balance resource utilisation and energy consumption while maintaining cybersecurity. This paper introduces an integrated approach of Deep Learning and the Black Hole Algorithm (BHA) to optimise energy use without compromising security within the smart city ecosystem. Our methodology employs Long Short-Term Memory networks for deep learning to capture IoT energy consumption patterns and incorporate contextual markers for effective anomaly detection. Simultaneously, BHA serves as a metaheuristic optimisation technique to find optimal control decisions. This dual strategy aims to reduce anomalies in IoT networks while improving energy efficiency, resulting in enhanced smart city applications. The effectiveness of this approach is demonstrated using an IoT-based smart city dataset, achieving anomaly detection with accuracy (99.60 %), precision (99.53 %), recall (99.40 %), and an F-measure (99.80 %). In addition, energy efficiency of 66.67 %, 71.43 %, 73.33 %, 77.78 %, and 63.64 % was achieved compared to the state-of-the-art methods in smart city applications.
城市化和数字化转型推动了智慧城市应用的发展,这些应用依赖于互联物联网设备的效率,而这些设备往往受到资源限制。这种情况对能源效率和网络安全提出了挑战。尽管目前基于人工智能的解决方案增强了网络安全,但它们可能会消耗大量资源,潜在地降低能源效率。为了应对这些挑战,需要先进的机制来平衡资源利用和能源消耗,同时保持网络安全。本文介绍了一种深度学习和黑洞算法(BHA)的集成方法,在不影响智能城市生态系统安全性的情况下优化能源使用。我们的方法采用长短期记忆网络进行深度学习,以捕获物联网能耗模式,并结合上下文标记进行有效的异常检测。同时,BHA作为一种元启发式优化技术来寻找最优控制决策。这一双重战略旨在减少物联网网络中的异常现象,同时提高能源效率,从而增强智慧城市应用。使用基于物联网的智慧城市数据集证明了该方法的有效性,实现了准确率(99.60%)、精度(99.53%)、召回率(99.40%)和F-measure(99.80%)的异常检测。此外,与智慧城市应用中最先进的方法相比,能源效率分别达到66.67%、71.43%、73.33%、77.78%和63.64%。
{"title":"Balancing anomaly detection and energy efficiency in smart city IoT networks using hybrid deep learning and black hole algorithm","authors":"Ali Alssaiari ,&nbsp;Maher Alharby ,&nbsp;Qasim Jan ,&nbsp;Shahid Hussain ,&nbsp;Sana Ullah","doi":"10.1016/j.iot.2025.101800","DOIUrl":"10.1016/j.iot.2025.101800","url":null,"abstract":"<div><div>Urbanisation and digital transformation have led to the development of smart city applications that rely on the efficiency of interconnected Internet of Things devices, which are often resource-constrained. This situation presents challenges in energy efficiency and cybersecurity. Although current AI-based solutions enhance cybersecurity, they may consume significant resources, potentially worsening energy efficiency. To address these challenges, there is a need for advanced mechanisms that balance resource utilisation and energy consumption while maintaining cybersecurity. This paper introduces an integrated approach of Deep Learning and the Black Hole Algorithm (BHA) to optimise energy use without compromising security within the smart city ecosystem. Our methodology employs Long Short-Term Memory networks for deep learning to capture IoT energy consumption patterns and incorporate contextual markers for effective anomaly detection. Simultaneously, BHA serves as a metaheuristic optimisation technique to find optimal control decisions. This dual strategy aims to reduce anomalies in IoT networks while improving energy efficiency, resulting in enhanced smart city applications. The effectiveness of this approach is demonstrated using an IoT-based smart city dataset, achieving anomaly detection with accuracy (99.60 %), precision (99.53 %), recall (99.40 %), and an F-measure (99.80 %). In addition, energy efficiency of 66.67 %, 71.43 %, 73.33 %, 77.78 %, and 63.64 % was achieved compared to the state-of-the-art methods in smart city applications.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101800"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models 可重新配置的智能表面,用于增强本地化:利用基于kan2的深度学习模型提高性能
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101813
Abdelghani Dahou , Syed Tariq Shah , Insaf Ullah , Tahira Mahboob , Ahmed Gamal Abdellatif , Mohamed Abd Elaziz , Ahmad Almogren , Mahmoud A. Shawky
Accurate localisation is a critical component in modern wireless communication systems, especially in complex environments with a very low signal-to-noise ratio (SNR). Reconfigurable intelligent surfaces (RIS) have emerged as a promising solution to enhance localisation accuracy by dynamically controlling signal reflection patterns. Motivated by the need for precise localisation solutions, this study introduces the RIS-enhanced hybrid localisation network (RHL-Net), a novel framework that integrates RIS with advanced deep learning techniques. RHL-Net employs long short-term memory (LSTM) networks for temporal data processing and Kolmogorov-Arnold networks (KAN) for spatial feature extraction. The key innovation of using KAN lies in its superior ability to learn complex spatial structures compared to traditional Multi-Layer Perceptrons (MLPs); KANs achieve higher accuracy with significantly fewer parameters and offer greater interpretability through their spline-based activation functions, which are learnable and adaptable. This makes KAN uniquely suited for distilling the intricate spatial fingerprints from the RIS-enhanced channel for precise location estimation. For performance evaluation, RHL-Net uses a dataset acquired from a dual-channel universal software radio peripheral (USRP) system, which records received signal strength (RSS) and channel phase response within a single-input multiple-output (SIMO) orthogonal frequency division multiplexing (OFDM) system. A dual-channel USRP with two antennas at the receiver (Rx) side is deployed at a grid of positions with an interspacing distance (x) to assess the RHL-Net localisation performance. Experimental results show that for x=0.5 metres with Directive and Monopole Rx antenna configurations, RHL-Net achieves average accuracies of 69.00% and 74.19%, respectively, with RIS activated, significantly outperforming the deactivated configuration. Similarly, for x=1 metre, Directive and Monopole setups achieve average accuracies of 85.58% and 73.88%, respectively, with RIS activation. These results demonstrate the effectiveness of RHL-Net in harnessing RIS technology and the advanced spatial modeling of KAN for precise localisation, outperforming state-of-the-art methods on the evaluated dataset.
准确定位是现代无线通信系统的关键组成部分,特别是在复杂的低信噪比环境中。可重构智能表面(RIS)已经成为一种很有前途的解决方案,通过动态控制信号反射模式来提高定位精度。由于需要精确的定位解决方案,本研究引入了RIS增强的混合定位网络(RHL-Net),这是一种将RIS与先进的深度学习技术集成在一起的新框架。RHL-Net使用长短期记忆(LSTM)网络进行时间数据处理,使用Kolmogorov-Arnold网络(KAN)进行空间特征提取。与传统的多层感知器(mlp)相比,使用KAN的关键创新在于它具有更好的学习复杂空间结构的能力;kan可以用更少的参数实现更高的精度,并通过基于样条的激活函数提供更高的可解释性,这些函数是可学习和自适应的。这使得KAN非常适合从ris增强通道中提取复杂的空间指纹,以进行精确的位置估计。为了进行性能评估,RHL-Net使用了从双通道通用软件无线电外设(USRP)系统获取的数据集,该数据集记录了单输入多输出(SIMO)正交频分复用(OFDM)系统中接收到的信号强度(RSS)和信道相位响应。在接收器(Rx)一侧有两个天线的双通道USRP部署在具有间隔距离(x)的位置网格上,以评估RHL-Net定位性能。实验结果表明,在x=0.5 m的指令和单极子Rx天线配置下,激活RIS时RHL-Net的平均精度分别为69.00%和74.19%,显著优于未激活RIS配置。同样,对于x=1米,指令和单极设置在RIS激活下分别达到85.58%和73.88%的平均精度。这些结果证明了RHL-Net在利用RIS技术和KAN的先进空间建模进行精确定位方面的有效性,在评估的数据集上优于最先进的方法。
{"title":"Reconfigurable intelligent surfaces for enhanced localisation: Advancing performance with KAN-based deep learning models","authors":"Abdelghani Dahou ,&nbsp;Syed Tariq Shah ,&nbsp;Insaf Ullah ,&nbsp;Tahira Mahboob ,&nbsp;Ahmed Gamal Abdellatif ,&nbsp;Mohamed Abd Elaziz ,&nbsp;Ahmad Almogren ,&nbsp;Mahmoud A. Shawky","doi":"10.1016/j.iot.2025.101813","DOIUrl":"10.1016/j.iot.2025.101813","url":null,"abstract":"<div><div>Accurate localisation is a critical component in modern wireless communication systems, especially in complex environments with a very low signal-to-noise ratio (SNR). Reconfigurable intelligent surfaces (RIS) have emerged as a promising solution to enhance localisation accuracy by dynamically controlling signal reflection patterns. Motivated by the need for precise localisation solutions, this study introduces the RIS-enhanced hybrid localisation network (RHL-Net), a novel framework that integrates RIS with advanced deep learning techniques. RHL-Net employs long short-term memory (LSTM) networks for temporal data processing and Kolmogorov-Arnold networks (KAN) for spatial feature extraction. The key innovation of using KAN lies in its superior ability to learn complex spatial structures compared to traditional Multi-Layer Perceptrons (MLPs); KANs achieve higher accuracy with significantly fewer parameters and offer greater interpretability through their spline-based activation functions, which are learnable and adaptable. This makes KAN uniquely suited for distilling the intricate spatial fingerprints from the RIS-enhanced channel for precise location estimation. For performance evaluation, RHL-Net uses a dataset acquired from a dual-channel universal software radio peripheral (USRP) system, which records received signal strength (RSS) and channel phase response within a single-input multiple-output (SIMO) orthogonal frequency division multiplexing (OFDM) system. A dual-channel USRP with two antennas at the receiver (<span><math><mrow><mi>R</mi><mi>x</mi></mrow></math></span>) side is deployed at a grid of positions with an interspacing distance (<span><math><mi>x</mi></math></span>) to assess the RHL-Net localisation performance. Experimental results show that for <span><math><mrow><mi>x</mi><mo>=</mo><mn>0.5</mn></mrow></math></span> metres with Directive and Monopole <span><math><mrow><mi>R</mi><mi>x</mi></mrow></math></span> antenna configurations, RHL-Net achieves average accuracies of <span><math><mrow><mn>69.00</mn><mspace></mspace><mo>%</mo></mrow></math></span> and <span><math><mrow><mn>74.19</mn><mspace></mspace><mo>%</mo></mrow></math></span>, respectively, with RIS activated, significantly outperforming the deactivated configuration. Similarly, for <span><math><mrow><mi>x</mi><mo>=</mo><mn>1</mn></mrow></math></span> metre, Directive and Monopole setups achieve average accuracies of <span><math><mrow><mn>85.58</mn><mspace></mspace><mo>%</mo></mrow></math></span> and <span><math><mrow><mn>73.88</mn><mspace></mspace><mo>%</mo></mrow></math></span>, respectively, with RIS activation. These results demonstrate the effectiveness of RHL-Net in harnessing RIS technology and the advanced spatial modeling of KAN for precise localisation, outperforming state-of-the-art methods on the evaluated dataset.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101813"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight edge-DL intrusion detection system for IoT sustainable smart-agriculture 面向物联网可持续智慧农业的轻量级边缘深度入侵检测系统
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101818
A. Villafranca, Maria-Dolores Cano
This paper delivers three core innovations for Internet of Things (IoT) intrusion detection in sustainable agriculture: (1) a unified preprocessing pipeline integrating StandardScaler, undersampling, SMOTE, Tomek Links, and 10-fold cross-validation, (2) a lightweight, dataset-agnostic DNN architecture (256–128–64–Softmax) achieving ≥97 % accuracy without per-dataset tuning, and (3) a curated benchmark of 18 IoT-IDS datasets including the Farm-Flow greenhouse trace with full metadata. Our model achieved 99.14 % average accuracy across 18 datasets, including 99.25 % precision on BoT-IoT, 99.99 % on CICIDS2017, and perfect 100 % scores on N-BaIoT, Car-Hacking, and CIC-IoT2022, demonstrating robust intrusion detection while maintaining only ∼1.2 M parameters for resource-constrained deployment. Experimental results demonstrate that our Deep Neural Network (DNN) model, through automatic hierarchical feature extraction, outperforms specialized architectures in heterogeneous scenarios while reducing reliance on manual feature engineering. Although Machine Learning (ML)-based methods and distributed approaches offer advantages in privacy and local processing, they face computational constraints and synchronization challenges that limit scalability. These findings confirm the effectiveness and adaptability of the proposed model, establishing it as a reliable and scalable solution for enhancing IoT network security in real-world deployments. Modern greenhouses, dairy farms, and cold-chain facilities, where cyber-attacks threaten water and energy efficiency gains, benefit from this edge-deployable approach that restores security and trustworthiness to smart-agriculture IoT networks.
本文为可持续农业中的物联网(IoT)入侵检测提供了三个核心创新:(1)集成StandardScaler,欠采样,SMOTE, Tomek Links和10倍交叉验证的统一预处理管道;(2)轻量级,数据集无关的DNN架构(256-128-64-Softmax),无需每个数据集调优即可实现≥97%的准确率;(3)18个IoT- ids数据集的精选基准,包括具有完整元数据的Farm-Flow温室跟踪。我们的模型在18个数据集上实现了99.14%的平均准确率,其中BoT-IoT的准确率为99.25%,CICIDS2017的准确率为99.99%,N-BaIoT、Car-Hacking和CIC-IoT2022的准确率为100%,展示了强大的入侵检测能力,同时在资源受限的部署中只保留了约1.2 M个参数。实验结果表明,我们的深度神经网络(DNN)模型通过自动分层特征提取,在异构场景下优于专业架构,同时减少了对人工特征工程的依赖。尽管基于机器学习(ML)的方法和分布式方法在隐私和本地处理方面具有优势,但它们面临计算约束和同步挑战,限制了可扩展性。这些发现证实了所提出模型的有效性和适应性,使其成为在实际部署中增强物联网网络安全性的可靠且可扩展的解决方案。网络攻击威胁到水和能源效率提高的现代温室、奶牛场和冷链设施都受益于这种可边缘部署的方法,这种方法可以恢复智能农业物联网的安全性和可信度。
{"title":"A lightweight edge-DL intrusion detection system for IoT sustainable smart-agriculture","authors":"A. Villafranca,&nbsp;Maria-Dolores Cano","doi":"10.1016/j.iot.2025.101818","DOIUrl":"10.1016/j.iot.2025.101818","url":null,"abstract":"<div><div>This paper delivers three core innovations for Internet of Things (IoT) intrusion detection in sustainable agriculture: (1) a unified preprocessing pipeline integrating StandardScaler, undersampling, SMOTE, Tomek Links, and 10-fold cross-validation, (2) a lightweight, dataset-agnostic DNN architecture (256–128–64–Softmax) achieving ≥97 % accuracy without per-dataset tuning, and (3) a curated benchmark of 18 IoT-IDS datasets including the Farm-Flow greenhouse trace with full metadata. Our model achieved 99.14 % average accuracy across 18 datasets, including 99.25 % precision on BoT-IoT, 99.99 % on CICIDS2017, and perfect 100 % scores on N-BaIoT, Car-Hacking, and CIC-IoT2022, demonstrating robust intrusion detection while maintaining only ∼1.2 M parameters for resource-constrained deployment. Experimental results demonstrate that our Deep Neural Network (DNN) model, through automatic hierarchical feature extraction, outperforms specialized architectures in heterogeneous scenarios while reducing reliance on manual feature engineering. Although Machine Learning (ML)-based methods and distributed approaches offer advantages in privacy and local processing, they face computational constraints and synchronization challenges that limit scalability. These findings confirm the effectiveness and adaptability of the proposed model, establishing it as a reliable and scalable solution for enhancing IoT network security in real-world deployments. Modern greenhouses, dairy farms, and cold-chain facilities, where cyber-attacks threaten water and energy efficiency gains, benefit from this edge-deployable approach that restores security and trustworthiness to smart-agriculture IoT networks.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101818"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145465303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection iPASecIoT:用于安全物联网设备识别和入侵检测的自动自适应特征提取的智能管道
IF 7.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-01 DOI: 10.1016/j.iot.2025.101802
Ogobuchi Daniel Okey , Sajjad Dadkhah , Heather Molyneaux , Demóstenes Zegarra Rodríguez , João Henrique Kleinschmidt
The widespread integration of Internet of Things (IoT) devices has enhanced the intelligence of homes, industries, and offices, yet it introduces critical security challenges due to their susceptibility to dynamic threats and behavioral heterogeneity, necessitating identification via communication patterns rather than mere physical recognition. This paper addresses the demand for a unified security framework in IoT ecosystems, where devices, limited by diverse protocols and constrained computational resources, face attacks such as DNS tunneling, MAC spoofing, and several other threats. Existing approaches, which rely on coarse-grained signatures or segregated machine learning for device identification and intrusion detection, exhibit limited resilience, increased operational overhead, poor cross-network adaptability, and scalability constraints in real-time dynamic settings. We propose iPASecIoT, a single-model framework that concurrently identifies IoT devices and detects intrusions using fine-grained behavioral fingerprints. Our methodology combines machine and deep learning algorithms with a modified firefly algorithm employing a kappa score-based voting mechanism for adaptive feature selection, yielding a lightweight, resource-efficient model by optimizing agreement beyond chance across network traffic, inter-arrival times, and protocol-specific features. Evaluated on the CICIoMT2024, CICIoT2023, and UNSW2019 datasets, iPASecIoT achieves mean F1 scores of 99.99 %, 99.88 %, and 98.35 % for device identification and 99.96 %, 99.38 %, and 98.79 % for threat classification across the CICIoMT2024, CICIoT2023, and UNSW2019 datasets, respectively. With a mean inference time of 0.0005 seconds per sample and a mean Hamming loss of 0.001, iPASecIoT provides a pioneering, efficient, and scalable solution to counter evolving security threats in heterogeneous IoT environment.
物联网(IoT)设备的广泛集成增强了家庭、工业和办公室的智能化,但由于它们对动态威胁和行为异质性的敏感性,它引入了关键的安全挑战,需要通过通信模式进行识别,而不仅仅是物理识别。本文解决了物联网生态系统中对统一安全框架的需求,在物联网生态系统中,设备受到各种协议和有限计算资源的限制,面临DNS隧道,MAC欺骗和其他几种威胁等攻击。现有的方法依赖于粗粒度签名或隔离机器学习进行设备识别和入侵检测,在实时动态设置中表现出有限的弹性、增加的操作开销、较差的跨网络适应性和可扩展性限制。我们提出了iPASecIoT,这是一个单模型框架,可以同时识别物联网设备并使用细粒度行为指纹检测入侵。我们的方法将机器和深度学习算法与改进的萤火虫算法相结合,该算法采用基于kappa分数的投票机制进行自适应特征选择,通过优化跨网络流量、间隔到达时间和协议特定特征的偶发性协议,产生轻量级、资源高效的模型。在CICIoMT2024、CICIoT2023和UNSW2019数据集上进行评估,iPASecIoT在设备识别方面的平均F1得分分别为99.99%、99.88%和98.35%,在CICIoMT2024、CICIoT2023和UNSW2019数据集上的威胁分类得分分别为99.96%、99.38%和98.79%。iPASecIoT每个样本的平均推断时间为0.0005秒,平均汉明损失为≈0.001,为应对异构物联网环境中不断变化的安全威胁提供了开创性、高效和可扩展的解决方案。
{"title":"iPASecIoT: An intelligent pipeline for automatic and adaptive feature extraction for secure IoT device identification and intrusion detection","authors":"Ogobuchi Daniel Okey ,&nbsp;Sajjad Dadkhah ,&nbsp;Heather Molyneaux ,&nbsp;Demóstenes Zegarra Rodríguez ,&nbsp;João Henrique Kleinschmidt","doi":"10.1016/j.iot.2025.101802","DOIUrl":"10.1016/j.iot.2025.101802","url":null,"abstract":"<div><div>The widespread integration of Internet of Things (IoT) devices has enhanced the intelligence of homes, industries, and offices, yet it introduces critical security challenges due to their susceptibility to dynamic threats and behavioral heterogeneity, necessitating identification via communication patterns rather than mere physical recognition. This paper addresses the demand for a unified security framework in IoT ecosystems, where devices, limited by diverse protocols and constrained computational resources, face attacks such as DNS tunneling, MAC spoofing, and several other threats. Existing approaches, which rely on coarse-grained signatures or segregated machine learning for device identification and intrusion detection, exhibit limited resilience, increased operational overhead, poor cross-network adaptability, and scalability constraints in real-time dynamic settings. We propose iPASecIoT, a single-model framework that concurrently identifies IoT devices and detects intrusions using fine-grained behavioral fingerprints. Our methodology combines machine and deep learning algorithms with a modified firefly algorithm employing a kappa score-based voting mechanism for adaptive feature selection, yielding a lightweight, resource-efficient model by optimizing agreement beyond chance across network traffic, inter-arrival times, and protocol-specific features. Evaluated on the CICIoMT2024, CICIoT2023, and UNSW2019 datasets, iPASecIoT achieves mean F1 scores of 99.99 %, 99.88 %, and 98.35 % for device identification and 99.96 %, 99.38 %, and 98.79 % for threat classification across the CICIoMT2024, CICIoT2023, and UNSW2019 datasets, respectively. With a mean inference time of 0.0005 seconds per sample and a mean Hamming loss of <span><math><mo>≈</mo></math></span> 0.001, iPASecIoT provides a pioneering, efficient, and scalable solution to counter evolving security threats in heterogeneous IoT environment.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"34 ","pages":"Article 101802"},"PeriodicalIF":7.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145415610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1