Smart City Gnosys

Smart city article details

Title Understanding The Impact Of Iot Security Patterns On Cpu Usage And Energy Consumption: A Dynamic Approach For Selecting Patterns With Deep Reinforcement Learning
ID_Doc 59527
Authors Jamshidi S.; Nikanjam A.; Nafi K.W.; Khomh F.
Year 2025
Published International Journal of Information Security, 24, 2
DOI http://dx.doi.org/10.1007/s10207-025-01011-5
Abstract The Internet of Things (IoT) introduces numerous security challenges that require effective solutions. IoT security patterns provide a practical approach to address recurring security issues, yet their impact on edge gateway metrics, e.g., energy consumption, CPU usage, and load, remains largely unexplored. This study empirically evaluates six IoT security patterns (Personal Zone Hub, trusted communication partner, outbound-only connection, blacklist, whitelist, and secure sensor node) in three IoT-edge applications: smart home, smart city, and healthcare. We evaluated the patterns individually and in combination, subjecting them to cyber threats. Subsequently, we analyzed their impact on energy consumption, CPU usage, and load. To address observed resource trade-offs, we also propose a deep reinforcement learning-based intrusion detection system that dynamically selects security patterns based on real-time conditions. Tested against threats (for example, DoS Hulk, Slowloris, DDoS, and GoldenEye), this adaptive approach optimizes security and resource efficiency, selecting the most suitable patterns for each scenario. The findings show that pattern selection significantly impacts resource metrics and that the DRL-based system maintains robust security while minimizing energy and CPU overheads. Based on these findings, we provide guidelines for developers to improve IoT-edge security by optimizing resource consumption. © The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2025.
Author Keywords CPU usage; Deep reinforcement learning; Energy consumption; Intrusion detection system; IoT security patterns; Security


Similar Articles


Id Similarity Authors Title Published
36064 View0.893Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
36080 View0.892Ahanger T.A.; Ullah I.; Algamdi S.A.; Tariq U.Machine Learning-Inspired Intrusion Detection System For Iot: Security Issues And Future ChallengesComputers and Electrical Engineering, 123 (2025)
6670 View0.878Zhukabayeva T.; Benkhelifa E.; Satybaldina D.; Rehman A.U.Advancing Iot Security: A Review Of Intrusion Detection Systems Challenges And Emerging Solutions2024 11th International Conference on Software Defined Systems, SDS 2024 (2024)
32899 View0.878Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
9199 View0.876Mazhar T.; Talpur D.B.; Shloul T.A.; Ghadi Y.Y.; Haq I.; Ullah I.; Ouahada K.; Hamam H.Analysis Of Iot Security Challenges And Its Solutions Using Artificial IntelligenceBrain Sciences, 13, 4 (2023)
40833 View0.872Abdulqader A.F.; Salih M.M.M.; Shaker N.H.; Sajid W.A.; Qasem W.; Gajewska A.; Khlaponin D.Optimizing Iot Performance Through Edge Computing: Reducing Latency, Enhancing Bandwidth Efficiency, And Strengthening Security For 2025 ApplicationsConference of Open Innovation Association, FRUCT (2024)
6593 View0.872Rao G.S.; Yuvaraj S.A.; Kondapi N.R.; Kumari A.R.; Palepu N.R.; Bharathi C.R.; Arulananth T.S.; Ebinezer M.J.D.Advancements In Machine Learning For Iot: Ai-Driven Optimization And SecurityJournal of Information Systems Engineering and Management, 10, 17 (2025)
46071 View0.871Cui X.Resource Allocation In Iot Edge Computing Networks Based On Reinforcement LearningAdvances in Transdisciplinary Engineering, 70 (2025)
3095 View0.871Rafrafi M.; Ghazel C.; Saidane L.A New Model For Enhancing Iot Security Through Hybrid Optimization Of Intrusion Detection2024 13th IFIP/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks, PEMWN 2024 (2024)
30732 View0.87Amine M.S.; Nada F.A.; Hosny K.M.Improved Model For Intrusion Detection In The Internet Of ThingsScientific Reports, 15, 1 (2025)