Smart City Gnosys

Smart city article details

Title Hybrid Fusion Of Lightweight Security Frameworks Using Data Mining Approach In Iot
ID_Doc 29749
Authors Kumar A.; Goyal S.J.; Kumar S.; Sharma H.K.
Year 2024
Published Fusion: Practice and Applications, 14, 2
DOI http://dx.doi.org/10.54216/FPA.140220
Abstract The rapid adoption of the Internet of Things throughout healthcare and smart city construction has led to a rise in networked devices and security issues. This work suggests new techniques to improve IoT safety and maximise computing resources. We develop a complete security architecture integrating lightweight cryptography, blockchain, machine learning anomaly detection, and federated learning. We did so because we know that traditional security measures are inadequate for the Internet of Things. The lightweight cryptographic algorithm (LCA) provides efficient encryption and decryption, making it ideal for low-resource Internet of Things devices. Twenty processes comprise the LCA design. These operations include key generation, data encryption, digital signatures, and integrity checking. These procedures secure IoT data transfers. ADML detects anomalies in encrypted Internet of Things data using machine learning. This approach may identify security issues better. To keep up with data trends, this method extracts features, trains models, and updates them. Blockchain-based data integrity (BDI) is the third element. Blockchain ensures that Internet of Things data is reliable and full. BDI developed an immutable ledger solution to increase IoT data security and dependability. This data integrity system generates blocks, hashes, confirms blocks, and updates the blockchain. Fourth, FLIoT (Federated Learning for the Internet of Things) emphasises data privacy and collaborative model training across IoT devices. Foundation for the Internet of Things (FIoT) protocols and standards aim to increase IoT devices' collective intelligence while safeguarding users' privacy. It includes local model training, model aggregation, and the latest global model distribution. Our work also uses Secure Multi-party Computation (SMC) to analyse data more thoroughly and continuously, addressing online transaction cybersecurity issues. The framework outperforms the current state of the art in memory use, energy consumption, anomaly detection accuracy and precision, and encryption and decryption time. The "Hybrid Fusion Framework" combines lightweight cryptographic algorithms with federated learning, machine learning, blockchain technology, and other similar technologies to provide an effective, adaptable, and affordable IoT security solution. © 2024, American Scientific Publishing Group (ASPG). All rights reserved.
Author Keywords Blockchain Technology; Data Integrity; Edge Computing; Encryption/Decryption; Federated Learning, IoT Security; Lightweight Cryptographic Algorithms; Scalability; Zero Trust Architecture


Similar Articles


Id Similarity Authors Title Published
40871 View0.887Villegas-Ch W.; Govea J.; Gutierrez R.; Mera-Navarrete A.Optimizing Security In Iot Ecosystems Using Hybrid Artificial Intelligence And Blockchain Models: A Scalable And Efficient Approach For Threat DetectionIEEE Access, 13 (2025)
25609 View0.884Aga D.T.; Chintanippu R.; Mowri R.A.; Siddula M.Exploring Secure And Private Data Aggregation Techniques For The Internet Of Things: A Comprehensive ReviewDiscover Internet of Things, 4, 1 (2024)
17023 View0.884Sefati S.S.; Craciunescu R.; Arasteh B.; Halunga S.; Fratu O.; Tal I.Cybersecurity In A Scalable Smart City Framework Using Blockchain And Federated Learning For Internet Of Things (Iot)Smart Cities, 7, 5 (2024)
12702 View0.883Oh T.Blockchain-Enabled Security Enhancement For Iot Networks: Integrating Leach Algorithm And Distributed Ledger TechnologyJournal of Machine and Computing, 5, 1 (2025)
47699 View0.88Thamaraiselvi K.; Pushpalatha A.; Chidambarathanu K.; Wankhede J.P.; Alagumuthukrishnan S.; Sarveshwaran V.Securechainai: Integrating Blockchain And Artificial Intelligence For Enhanced Security In Iot EnvironmentsProceedings of the 5th International Conference on Smart Electronics and Communication, ICOSEC 2024 (2024)
17620 View0.879Jagdish B.V.; Induraj A.; Vikas M.N.; Akshay M.; Naik C.Decentralised Iot Authentication Using Blockchain And Machine Learning: The Trust Circle FrameworkProceedings of 8th International Conference on Inventive Computation Technologies, ICICT 2025 (2025)
2317 View0.878Raj R.; Ghosh M.A Lightweight Blockchain Framework For Secure Transaction In Resource Constrained Iot DevicesProceedings of the 5th International Conference on Recent Advances in Information Technology, RAIT 2023 (2023)
36064 View0.877Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
47934 View0.877Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
12379 View0.876Mudhar J.K.; Malhotra J.; Singh A.K.; Anand M.Blockchain And Machine Learning Security For The Internet Of Things: A Bibliometric AnalysisProceedings - 2023 3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023 (2023)