Privacy Preserving Model for Efficient Designing of Intrusion Detection Systems in IoT Environment

Designing of Intrusion Detection Systems in IoT Environment

Authors

  • Swetha Madireddy Vels Institute of Science, Technology & Advanced Studies, Department of Computer Science and Engineering, Pallavaram, Chennai, Tamil Nadu
  • Kalaivani Kathirvelu Vels Institute of Science, Technology & Advanced Studies, Department of Computer Science and Engineering, Pallavaram, Chennai, Tamil Nadu https://orcid.org/0000-0001-5384-6075

DOI:

https://doi.org/10.22399/ijcesen.2042

Keywords:

Privacy-preserving Intrusion Detection System (IDS), Internet of Things (IoT), Optimized GRU, Ladybug Beetle Optimization (LBO

Abstract

The swift advancement of the Internet of Things (IoT) has significantly transformed contemporary communication frameworks by facilitating effortless data transmission among a diverse network of interconnected smart devices. Nevertheless, the increased connectivity and resource-constrained nature of IoT nodes have made them prime targets for cyber-attacks, necessitating the development of intelligent and privacy-aware Intrusion Detection Systems (IDS). Traditional IDS approaches often fall short in addressing the dual challenges of real-time threat detection and preserving user data confidentiality. This research represents a Privacy-Preserving Model for Efficient Designing of IDS in IoT Environments by integrating a deep learning-driven detection framework with advanced optimization techniques. The core detection engine is built upon a Gated Recurrent Unit (GRU) network, chosen for its lightweight structure and strong temporal pattern recognition capabilities. To enhance model performance, hyperparameters are tuned using the novel Ladybug Beetle Optimization (LBO) algorithm, which mimics the intelligent foraging behaviour of ladybugs to achieve global optima efficiently. To ensure data privacy and reduce communication overhead, the model is integrated with federated learning, allowing distributed training across IoT devices without centralized data aggregation. Additionally, lightweight encryption techniques are employed to secure data transmission during training and inference phases. The proposed system was evaluated using standard benchmark datasets, achieving a detection accuracy of 98.9%, and the results demonstrate significant improvements in recall, precision and computational efficiency when examined to traditional approaches. This work contributes a scalable, intelligent, and privacy-respecting intrusion detection architecture suitable for real-world IoT scenarios, comprising smart homes, healthcare systems, and industrial automation.

References

[1] Debicha, I., Bauwens, R., Debatty, T., Dricot, J. M., Kenaza, T., & Mees, W. (2023). TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems. Future Generation Computer Systems, 138, 185–197.

[2] Heidari, A., Salami, A., Jamali, J., Bahrami, B., & Navimipour, N. J. (2020). Internet of things offloading: Ongoing issues, opportunities, and future challenges. International Journal of Communication Systems, 33(14), e4474.

[3] Rahman, S. A., Islam, M. M., Hussain, M., Almutairi, M., & Alelaiwi, A. (2020). Internet of things intrusion detection: Centralized, on-device, or federated learning? IEEE Network, 34(6), 310–317.

[4] Andoni, M., Robu, V., Flynn, D., Abram, S., Geach, D., Jenkins, D., McCallum, P., & Peacock, A. (2019). Blockchain technology in the energy sector: A systematic review of challenges and opportunities. Renewable and Sustainable Energy Reviews, 100, 143–174.

[5] Heidari, A., & Navimipour, N. J. (2022). A privacy-aware method for COVID-19 detection in chest CT images using lightweight deep conventional neural network and blockchain. Computers in Biology and Medicine, 105461.

[6] Heidari, A., & Navimipour, N. J. (2021). Service discovery mechanisms in cloud computing: A comprehensive and systematic literature review. Kybernetes.

[7] Gendreau, A. A., & Moorman, M. (2016). Survey of intrusion detection systems towards an end to end secure internet of things. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud) (pp. 84–90). IEEE.

[8] Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22–32.

[9] Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.

[10] Dutta, M., & Granjal, J. (2020). Towards a secure internet of things: A comprehensive study of second line defense mechanisms. IEEE Access, 8, 127272–127312.

[11] Čolaković, A., & Hadžialić, M. (2018). Internet of Things (IoT): A review of enabling technologies, challenges, and open research issues. Computer Networks, 144, 17–39.

[12] Almotairi, A., Atawneh, S., Khashan, O. A., & Khafajah, N. M. (2024). Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models. Systems Science & Control Engineering, 12(1). https://doi.org/10.1080/21642583.2024.2321381

[13] Qaddos, A., Yaseen, M. U., Al-Shamayleh, A. S., et al. (2024). A novel intrusion detection framework for optimizing IoT security. Scientific Reports, 14, 21789. https://doi.org/10.1038/s41598-024-72049-z

[14] Thabit, F., Can, O., Abdaljlil, S., & Alkhzaimi, H. A. (2024). Enhanced an intrusion detection system for IoT networks through machine learning techniques: An examination utilizing the AWID dataset. Cogent Engineering, 11(1). https://doi.org/10.1080/23311916.2024.2378603

[15] Rabie, O. B. J., Selvarajan, S., Hasanin, T., et al. (2024). A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models. Scientific Reports, 14, 386. https://doi.org/10.1038/s41598-024-51154-z

[16] Lee, H., Mudgerikar, A., Li, N., & Bertino, E. (2023). Intrusion detection systems for IoT. In IoT for Defense and National Security (pp. 237–258). IEEE. https://doi.org/10.1002/9781119892199.ch13

[17] Fatani, A., Dahou, A., Abd Elaziz, M., Al-qaness, M. A. A., Lu, S., Alfadhli, S. A., & Alresheedi, S. S. (2023). Enhancing intrusion detection systems for IoT and cloud environments using a growth optimizer algorithm and conventional neural networks. Sensors, 23, 4430. https://doi.org/10.3390/s23094430

[18] Fraihat, S., Makhadmeh, S., Awad, M., Al-Betar, M. A., & Al-Redhaei, A. (2023). Intrusion detection system for large-scale IoT NetFlow networks using machine learning with modified arithmetic optimization algorithm. Internet of Things, 22, 100819. https://doi.org/10.1016/j.iot.2023.100819

[19] Elnakib, O., Shaaban, E., Mahmoud, M., et al. (2023). EIDM: Deep learning model for IoT intrusion detection systems. Journal of Supercomputing, 79, 13241–13261. https://doi.org/10.1007/s11227-023-05197-0

[20] Alosaimi, S., & Almutairi, S. M. (2023). An intrusion detection system using BoT-IoT. Applied Sciences, 13, 5427. https://doi.org/10.3390/app13095427

[21] Gyamfi, E., & Jurcut, A. (2022). Intrusion detection in Internet of Things systems: A review on design approaches leveraging multi-access edge computing, machine learning, and datasets. Sensors, 22(10), 3744. https://doi.org/10.3390/s22103744

[22] King, J., & Awad, A. I. (2016). A distributed security mechanism for resource-constrained IoT devices. Informatica, 40(1).

[23] Mahmud, S. A., Islam, N., Islam, Z., Rahman, Z., & Mehedi, S. T. (2024). Privacy-Preserving Federated Learning-Based Intrusion Detection Technique for Cyber-Physical Systems. Mathematics, 12(20), 3194. https://doi.org/10.3390/math12203194.

[24] Jamali, J., Bahrami, B., Heidari, A., Allahverdizadeh, P., & Norouzi, F. (2020). The IoT landscape. In Towards the Internet of Things. EAI/Springer Innovations in Communication and Computing.

[25] Venkatraman, S., & Surendiran, B. (2020). Adaptive hybrid intrusion detection system for crowdsourced multimedia internet of things systems. Multimedia Tools and Applications, 79(5), 3993–4010.

[26] Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2012). A novel framework for intrusion detection in cloud. In Proceedings of the Fifth International Conference on Security of Information and Networks.

[27] Wei, J., Zhang, Z., Wang, Y., & Jin, H. (2020). An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing. Concurrency and Computation: Practice and Experience, 32(24), e5922.

[28] Schueller, Q., Di Mauro, M., Hérault, T., & Kermarrec, A. M. (2018). A hierarchical intrusion detection system using support vector machine for SDN network in cloud data center. In 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1–6). IEEE.

[29] Lata, S., & Singh, D. (2022). Intrusion detection system in cloud environment: Literature survey & future research directions. International Journal of Information Management Data Insights, 2(2), 100134.

[30] Vailshery, L. S. (2021). Global IoT and non-IoT connections 2010–2025. Statista – The Statistics Portal. https://www.statista.com/statistics/1101442/iot-number-of-connected-devices-worldwide/

[31] Zhang, Z.-K., Cho, M. C. Y., Wang, C.-W., Hsu, C.-W., Chen, C.-K., & Shieh, S. (2014). IoT security: Ongoing challenges and research opportunities. In 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (pp. 230–234). https://doi.org/10.1109/SOCA.2014.58

Downloads

Published

2025-05-14

How to Cite

Swetha Madireddy, & Kalaivani Kathirvelu. (2025). Privacy Preserving Model for Efficient Designing of Intrusion Detection Systems in IoT Environment: Designing of Intrusion Detection Systems in IoT Environment. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.2042

Issue

Section

Research Article