Smart City Gnosys

Smart city article details

Title Modified Genetic Algorithm And Fine-Tuned Long Short-Term Memory Network For Intrusion Detection In The Internet Of Things Networks With Edge Capabilities
ID_Doc 37777
Authors Saheed Y.K.; Abdulganiyu O.H.; Tchakoucht T.A.
Year 2024
Published Applied Soft Computing, 155
DOI http://dx.doi.org/10.1016/j.asoc.2024.111434
Abstract The emergence of smart cities is an example of how new technologies, such as the Internet of Things (IoT), have facilitated the creation of extensive interconnected and intelligent ecosystems. The widespread deployment of IoT devices has enabled the provision of constant environmental feedback, thereby facilitating the automated adaptation of associated systems. This has brought about a fundamental transformation in the way contemporary society functions. The security of emerging technologies such as IoT has become a significant challenge due to the added complexities, misconfigurations, and conflicts between modern and legacy systems. This challenge has a notable impact on the reliability and accessibility of existing infrastructure. Edge computing (EC) is a collaborative computing system that brings data processing and analysis closer to the edge of the network, where the data is generated, rather than in a centralized cloud environment. The utilization of the IoT has become more prevalent in both everyday life and the manufacturing sector, with a particular emphasis on critical infrastructure. The IoT is presently being utilized across diverse domains, including but not limited to industrial, agricultural, healthcare, and logistical sectors. The security of IoT networks has implications for the safety of individuals, the security of the nation, and economic development. Notwithstanding, conventional intrusion detection techniques that rely on centralized cloud-based systems that have been suggested in previous studies for IoT network security are insufficient to meet the requirements for data confidentiality, network capacity, and prompt responsiveness. In addition, the integration of IoT applications into smart devices has been shown to augment their functionalities. However, it is important to note that this integration also brings about potential security vulnerabilities. Furthermore, a significant number of contemporary IoT devices exhibit restricted security capabilities, rendering them vulnerable to intricate attacks and impeding the extensive integration of IoT technologies. Also, a lot of IoT network devices have been put in place that don't have hardware security measures. This means that traditional intrusion detection systems (IDS) aren't enough to protect the IoT network ecosystem. To address these issues, this research suggests the IoT-Defender framework, which combines a Modified Genetic Algorithm (MGA) model with a deep Long Short-Term Memory (LSTM) network to find cyberattacks in IoT networks. This research represents a pioneering attempt to employ the MGA for feature selection and the GA for fine-tuning the LSTM parameters within an EC framework. The parameters of the LSTM model were fine-tuned through the manipulation of the number of hidden layers, utilizing the GA fitness function. The customization of the MGA aimed to enhance its performance in selecting relevant features, optimizing the use of limited resources on IoT devices and edge nodes. The fine-tuning process involved optimizing hyperparameters, architecture, and training strategies to maximize the LSTM network's effectiveness in learning and detecting patterns in IoT network traffic. The synergy between the MGA and LSTM aimed at creating a comprehensive and efficient IDS. The feature selection by the MGA contributes to improving the LSTM's performance by providing it with more relevant and discriminating features. In order to solve the issue of class imbalance, we utilize the focal loss function, which provides greater weights to minority classes, hence improving the model's capacity to learn from those particular classes. The performance of the IoT-Defender model was assessed on the BoT-IoT, UNSW-NB15, and N-BaIoT datasets utilizing a Raspberry Pi IoT device. The results of our study show that the IoT-Defender model works better than other methods. This is shown by its accuracy score of 99.41%, detection rate of 99.78%, precision score of 98.50%, false alarm rate of 2.56%, mean intersection over union (mIoU) of 0.68, and training time of 81.3 seconds on BoT-IoT. The proposed IoT model is designed to be lightweight and can be installed on edge servers to detect cyber-attacks in real-time, specifically in the context of IoT security. © 2024 Elsevier B.V.
Author Keywords BoT-IoT; Class imbalance; Edge computing; Focal loss function; Genetic algorithm; Internet of things; Intrusion detection system; Long short-term memory; Modified genetic algorithm; N-BaIoT; UNSW-NB15


Similar Articles


Id Similarity Authors Title Published
941 View0.88Kaura S.; Bhardwaj D.A Comprehensive Review On Intrusion Detection In Edge-Based Iot Using Machine LearningLecture Notes on Data Engineering and Communications Technologies, 131 (2023)
6670 View0.878Zhukabayeva T.; Benkhelifa E.; Satybaldina D.; Rehman A.U.Advancing Iot Security: A Review Of Intrusion Detection Systems Challenges And Emerging Solutions2024 11th International Conference on Software Defined Systems, SDS 2024 (2024)
36080 View0.875Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
21217 View0.874Alotaibi N.S.; Ahmed H.I.; Kamel S.O.M.Dynamic Adaptation Attack Detection Model For A Distributed Multi-Access Edge Computing Smart CitySensors, 23, 16 (2023)
2510 View0.873Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R.A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And OptimizationCommunications on Applied Nonlinear Analysis, 32, 2 (2025)
36064 View0.871Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
3095 View0.87Rafrafi M.; Ghazel C.; Saidane L.A New Model For Enhancing Iot Security Through Hybrid Optimization Of Intrusion Detection2024 13th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, PEMWN 2024 (2024)
47782 View0.869Ahmed Y.; Beyioku K.; Yousefi M.Securing Smart Cities Through Machine Learning: A Honeypot-Driven Approach To Attack Detection In Internet Of Things EcosystemsIET Smart Cities, 6, 3 (2024)
14994 View0.868El Zegil F.; Nanda P.; Mohanty M.; Alzahrani M.Comparative Analysis Of Intrusion Detection Schemes In Internet Of Things(Iot) Based Applications2024 17th International Conference on Security of Information and Networks, SIN 2024 (2024)
46467 View0.867Chiba Z.; Abghour N.; Moussaid K.; Lifandali O.; Kinta R.Review Of Recent Intrusion Detection Systems And Intrusion Prevention Systems In Iot Networks2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)