Smart City Gnosys

Smart city article details

Title A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And Optimization
ID_Doc 2510
Authors Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R.
Year 2025
Published Communications on Applied Nonlinear Analysis, 32, 2
DOI http://dx.doi.org/10.52783/cana.v32.1706
Abstract The widespread adoption of Internet-of-Things (IoT) devices has heralded an explosion in potential attack surfaces with varying capabilities and a wide variety of vulnerabilities. Because of this, IoT networks have become a favorable choice for many cyber-attacks due to the difficulty and complexity that traditional cybersecurity approaches face in managing these types of networks with large numbers up to millions of users leading these attacks to pose significant risks from anomalous behavior. Current approaches such as rule-based intrusion detection system (IDS) and signature-based models are inadequate to be utilised in the dynamic IoT enclaves where they tend to generate too many false positives and may miss unknown threats. In this study, motivated by hybrid methods utilizing machine learningbased anomaly detection wrapped around optimization algorithms, we suggest a full-fledged mathematical model applying these possible solutions for cybersecurity in IoT networks. This model uses a variety of unsupervised learning techniques in order to detect and remediate new threats dynamically at run time. The models learn the optimal thresholds for detection and resource allocation to perform the fastest possible response under low resources constraints, by leveraging optimization algorithms like genetic algorithm or particle swarm optimization. It shows a significant enhancement in anomaly detection accuracy and reduction of false positives compared to conventional methods. Nevertheless, problems in measurement overhead, model scalability and management of big IoT environments characterized by low-computation resources are still being faced. Nevertheless, the proposed model is promising for large-scale applications (e.g., smart cities, industrial IoT, and healthcare applications) in a critical context where cyber threats should be detected on time to help guarantees integrity of operation. Our results indicate that a machine learning-based intrusion detection system in conjunction with optimization techniques can be developed into solid and adaptable cybersecurity infrastructure to safeguard the expanding IoT world. © 2025, International Publications. All rights reserved.
Author Keywords adoption; algorithm; allocation; anomaly; detection; intrusion; model; networks; optimization; scalability; techniques


Similar Articles


Id Similarity Authors Title Published
9646 View0.908Maniriho P.; Niyigaba E.; Bizimana Z.; Twiringiyimana V.; Mahoro L.J.; Ahmad T.Anomaly-Based Intrusion Detection Approach For Iot Networks Using Machine LearningCENIM 2020 - Proceeding: International Conference on Computer Engineering, Network, and Intelligent Multimedia 2020 (2020)
3095 View0.908Rafrafi M.; Ghazel C.; Saidane L.A New Model For Enhancing Iot Security Through Hybrid Optimization Of Intrusion Detection2024 13th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, PEMWN 2024 (2024)
47766 View0.907Plazas Olaya M.K.; Vergara Tejada J.A.; Aedo Cobo J.E.Securing Microservices-Based Iot Networks: Real-Time Anomaly Detection Using Machine LearningJournal of Computer Networks and Communications, 2024 (2024)
41565 View0.906Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D.Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless NetworksIEEE Access, 13 (2025)
36913 View0.904Girubagari N.; Ravi T.N.Methods Of Anomaly Detection For The Prevention And Detection Of Cyber AttacksInternational Journal of Intelligent Engineering Informatics, 11, 4 (2024)
36064 View0.9Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
33346 View0.899Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
6519 View0.897Mishra D.; Naik B.; Bhoi G.Advanced Machine Learning Approach For Designing Intelligent System For Iot Security FrameworkStudies in Computational Intelligence, 1167 (2024)
33343 View0.895Reddy D.K.K.; Nayak J.; Mishra M.Intrusion Detection System In Iot Smart City Environment Using Tree-Based Approach With Swarm-Based Optimization For Multi-Step Cyber-Attack Dataset2023 1st International Conference on Circuits, Power, and Intelligent Systems, CCPIS 2023 (2023)
32898 View0.895Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)