Smart City Gnosys

Smart city article details

Title An Ai-Driven Cybersecurity Framework For Iot: Integrating Lstm-Based Anomaly Detection, Reinforcement Learning, And Post-Quantum Encryption
ID_Doc 7453
Authors Saeed M.M.
Year 2025
Published IEEE Access, 13
DOI http://dx.doi.org/10.1109/ACCESS.2025.3576506
Abstract In an increasingly digital world, cybersecurity threats have grown in frequency, complexity, and scale, challenging the adequacy of traditional rule-based defense systems. This study proposes a unified AI-driven cybersecurity framework to detect anomalies, verify data integrity, automate incident response, and ensure long-term cryptographic resilience. The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. The system was evaluated in a simulated IoT network environment, where it demonstrated high accuracy in identifying anomalies, effectively distinguishing between original and tampered data, and adaptively responding to different levels of cyber threats. The integration of these components allows the framework to operate autonomously and contextually, improving scalability and responsiveness in resource-constrained digital infrastructures. This study concludes that the proposed framework addresses key limitations of existing methods by offering a scalable, adaptive, and future-proof cybersecurity solution. The results support its potential for deployment in real-world settings such as smart cities, healthcare systems, and critical infrastructure, with future work aimed at improving real-time adaptability and validating performance in live, heterogeneous environments. © 2013 IEEE.
Author Keywords AI-driven cybersecurity; anomaly detection; data integrity; homomorphic hashing; IoT security; lattice-based encryption; LSTM networks; post-quantum cryptography; Q-learning; reinforcement learning


Similar Articles


Id Similarity Authors Title Published
44005 View0.902Mujlid H.M.; Alshahrani R.Quantum-Driven Security Evolution In Iot: Ai-Powered Cryptography And Anomaly DetectionJournal of Supercomputing, 81, 9 (2025)
2510 View0.893Florrence J.M.; Antoinette A.; Buvaneswari S.; Wanare A.L.; Vashistha A.; Mulpuri M.; Rambabu R.A Mathematical Model For Enhancing Cybersecurity In Iot Networks Using Lstm-Based Anomaly Detection And OptimizationCommunications on Applied Nonlinear Analysis, 32, 2 (2025)
7014 View0.879Reis M.J.C.S.Ai-Driven Anomaly Detection For Securing Iot Devices In 5G-Enabled Smart CitiesElectronics (Switzerland), 14, 12 (2025)
41565 View0.869Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D.Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless NetworksIEEE Access, 13 (2025)
2219 View0.866Alotaibi J.A Hybrid Software-Defined Networking Approach For Enhancing Iot Cybersecurity With Deep Learning And Blockchain In Smart CitiesPeer-to-Peer Networking and Applications, 18, 3 (2025)
36064 View0.865Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
39223 View0.861Kumari S.Next-Gen Iot Security Using Polar Codes-Based Cryptography For Malware Defence Through Quantum Self-Attention Neural NetworkKnowledge-Based Systems, 321 (2025)
15385 View0.857Khan S.A.; Faisal M.; Alharbe N.; Kumar R.; Khan R.A.Computational Intelligence Applications In Cyber SecurityComputational Intelligence Applications in Cyber Security (2024)
40871 View0.856Villegas-Ch W.; Govea J.; Gutierrez R.; Mera-Navarrete A.Optimizing Security In Iot Ecosystems Using Hybrid Artificial Intelligence And Blockchain Models: A Scalable And Efficient Approach For Threat DetectionIEEE Access, 13 (2025)
1610 View0.854Alghofaili Y.; Rassam M.A.A Dynamic Trust-Related Attack Detection Model For Iot Devices And Services Based On The Deep Long Short-Term Memory TechniqueSensors, 23, 8 (2023)