CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity

Authors

  • Srikanth Reddy Vutukuru Research Scholar, Department of Computer Science and Engineering, GITAM University, Visakhapatnam, Andhra Pradesh, India
  • Srinivasa Chakravarthi Lade Assistant Professor, Department of Computer Science and Engineering, GITAM University, Visakhapatnam, Andhra Pradesh, India.

DOI:

https://doi.org/10.22399/ijcesen.825

Keywords:

IoT, IoT Cybersecurity, CoralMatrix Security Framework, Machine Learning Algorithms, AdaptiNet Intelligence Model, N-BaIoT Dataset

Abstract

In the current age of digital transformation, the Internet of Things (IoT) has revolutionized everyday objects, and IoT gateways play a critical role in managing the data flow within these networks. However, the dynamic and extensive nature of IoT networks presents significant cybersecurity challenges that necessitate the development of adaptive security systems to protect against evolving threats. This paper proposes the CoralMatrix Security framework, a novel approach to IoT cybersecurity that employs advanced machine learning algorithms. This framework incorporates the AdaptiNet Intelligence Model, which integrates deep learning and reinforcement learning for effective real-time threat detection and response. To comprehensively evaluate the performance of the framework, this study utilized the N-BaIoT dataset, facilitating a quantitative analysis that provided valuable insights into the model's capabilities. The results of the analysis demonstrate the robustness of the CoralMatrix Security framework across various dimensions of IoT cybersecurity. Notably, the framework achieved a high detection accuracy rate of approximately 83.33%, highlighting its effectiveness in identifying and responding to cybersecurity threats in real-time. Additionally, the research examined the framework's scalability, adaptability, resource efficiency, and robustness against diverse cyber-attack types, all of which were quantitatively assessed to provide a comprehensive understanding of its capabilities. This study suggests future work to optimize the framework for larger IoT networks and adapt continuously to emerging threats, aiming to expand its application across diverse IoT scenarios. With its proposed algorithms, the CoralMatrix Security framework has emerged as a promising, efficient, effective, and scalable solution for the dynamic challenges of IoT Cyber Security.

References

Djenna, A., Saidouni, D. E., & Abada, W. (2020). A Pragmatic Cybersecurity Strategies for Combating IoT-Cyberattacks. 2020 International Symposium on Networks, Computers and Communications (ISNCC), 1–6. https://doi.org/10.1109/isncc49221.2020.9297251

Priyadarshini, I. (2024). Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. Big Data and Cognitive Computing, 8(3), 21. https://doi.org/10.3390/bdcc8030021

G, P., Dunna, N. R., & Kaipa , C. S. (2023). Enhancing Cloud-Based IoT Security: Integrating AI and Cyber security Measures. International Journal of Computer Engineering in Research Trends, 10(5), 26–32. https://doi.org/10.22362/ijcert/2023/v10/i05/v10i0504

Rayikanti Anasurya. (2022). Internet of Things (IoT) in Mining: Security Challenges and Best Practices. International Journal of Computer Engineering in Research Trends, 9(5), 93–98. Retrieved from https://www.ijcert.org/index.php/ijcert/article/view/671

K. Lakshmi, Garlapadu Jayanthi, & Jallu Hima Bindu. (2024). EdgeMeld: An Adaptive Machine Learning Framework for Real-Time Anomaly Detection and Optimization in Industrial IoT Networks. International Journal of Computer Engineering in Research Trends, 11(4), 20–31. https://doi.org/10.22362/ijcert/2024/v11/i4/v11i403

G, P., T, S., & S, R. (2023). Deep Learning Approaches for Ensuring Secure Task Scheduling in IoT Systems. International Journal of Computer Engineering in Research Trends, 8(5), 102–110. Retrieved from https://www.ijcert.org/index.php/ijcert/article/view/40

Plabon Bhandari Abhi, Kristelle Ann R. Torres, Tao Yusoff, & K.Samunnisa. (2023). A Novel Lightweight Cryptographic Protocol for Securing IoT Devices . International Journal of Computer Engineering in Research Trends, 10(10), 24–30.

M.Bhavsingh, K.Samunnisa, & B.Pannalal. (2023). A Blockchain-based Approach for Securing Network Communications in IoT Environments . International Journal of Computer Engineering in Research Trends, 10(10), 37–43.

Arora, A., Kaur, A., Bhushan, B., & Saini, H. (2019, July). Security concerns and future trends of internet of things. In 2019 2nd international conference on intelligent computing, instrumentation and control technologies (ICICICT) (Vol. 1, pp. 891-896). IEEE.

Salunkhe, S. S., Tandon, A., Arun, M., Shaik, N., Nandikolla, S., Ramkumar, D., & Narayanan, S. L. (2023). An incremental learning on cloud computed decentralised IoT devices. International Journal of Engineering Systems Modelling and Simulation, 14(1), 1-7.

Karmous, N., Aoueileyine, M. O. E., Abdelkader, M., & Youssef, N. (2022, November). IoT real-time attacks classification framework using machine learning. In 2022 IEEE Ninth International Conference on Communications and Networking (ComNet) (pp. 1-5). IEEE.

Zheng, Z., Webb, A., Reddy, A. N., & Bettati, R. (2018, July). IoTAegis: A scalable framework to secure the Internet of Things. In 2018 27th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-9). IEEE.

Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2019). LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. Journal of Parallel and Distributed Computing, 134, 180-197.

Bagaa, M., Taleb, T., Bernabe, J. B., & Skarmeta, A. (2020). A machine learning security framework for iot systems. IEEE Access, 8, 114066-114077.

Srikanth Reddy Vutukuru, E. al. (2023). SecureIoT: Novel Machine Learning Algorithms for Detecting and Preventing Attacks on IoT Devices. Journal of Electrical Systems, 19(4), 315–335.

Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25-37.

Xiao, L., Wan, X., Lu, X., Zhang, Y., & Wu, D. (2018). IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?. IEEE Signal Processing Magazine, 35(5), 41-49.

Garg, S., Kaur, K., Batra, S., Kaddoum, G., Kumar, N., & Boukerche, A. (2020). A multi-stage anomaly detection scheme for augmenting the security in IoT-enabled applications. Future Generation Computer Systems, 104, 105-118.

Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., & Faruki, P. (2019). Network intrusion detection for IoT security based on learning techniques. IEEE Communications Surveys & Tutorials, 21(3), 2671-2701.

Parashar, A. (2023). Cybersecurity Threats In The Internet Of Things (Iot). IOSR Journal of Computer Engineering (IOSR-JCE), 1-8.

Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: an overview from machine learning perspective. Journal of Big data, 7, 1-29.

Davis, J. J., & Clark, A. J. (2011). Data preprocessing for anomaly based network intrusion detection: A review. computers & security, 30(6-7), 353-375.

Castro, T. O., Caitité, V. G., Macedo, D. F., & dos Santos, A. L. (2019). CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users. International Journal of Network Management, 29(5), e2084.

Rai, H. M., Shukla, K. K., Tightiz, L., & Padmanaban, S. (2024). Enhancing data security and privacy in energy applications: Integrating IoT and blockchain technologies. Heliyon, 10(19).

Mehta, S., Khurana, M., Dogra, A., & Hariharan, S. (2024, June). Advancing IoT Security through Federated Learning: A Comprehensive Approach. In 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC) (pp. 561-566). IEEE.

Raut, A., Shivhare, A., Chaurasiya, V. K., & Kumar, M. (2023). AEDS-IoT: adaptive clustering-based event detection scheme for IoT data streams. Internet of Things, 22, 100704.

Koski, A., & Juhola, M. (1996). Segmentation of digital signals based on estimated compression ratio. IEEE transactions on Biomedical Engineering, 43(9), 928-938.

Ab Kadir, M. Z. A., Algrnaodi, M., & Al-Masri, A. N. A. (2021). Optimal algorithm for shared network communication bandwidth in IoT applications. International journal of wireless and ad hoc communication, 2(1), 33-48.

Trihinas, D., Pallis, G., & Dikaiakos, M. D. (2015, October). AdaM: An adaptive monitoring framework for sampling and filtering on IoT devices. In 2015 IEEE International Conference on Big Data (Big Data) (pp. 717-726). IEEE.

Stolpe, M. (2016). The internet of things: Opportunities and challenges for distributed data analysis. Acm Sigkdd Explorations Newsletter, 18(1), 15-34.

Villegas-Ch, W., Gutierrez, R., Sánchez-Salazar, I., & Mera-Navarrete, A. (2024). Adaptive Security Framework for the Internet of Things: Improving Threat Detection and Energy Optimization in Distributed Environments. IEEE Access. Doi:10.1109/ACCESS.2024.3486983

Pasha, M. J., Pingili, M., Sreenivasulu, K., Bhavsingh, M., Saheb, S. I., & Saleh, A. (2022). Bug2 algorithm-based data fusion using mobile element for IoT-enabled wireless sensor networks. Measurement: Sensors, 24, 100548.

SumanPrakash, P., Ramana, K. S., CosmePecho, R. D., Janardhan, M., Arellano, M. T. C., Mahalakshmi, J., ... & Samunnisa, K. (2024). Learning-driven Continuous Diagnostics and Mitigation program for secure edge management through Zero-Trust Architecture. Computer Communications, 220, 94-107.

Sanjay Vijay Mhaskey. (2024). SCM 4.0: Navigating the Impact of Industry 4.0 on Supply Chain Management through Digitalization and Technology Integration. International Journal of Computer Engineering in Research Trends, 11(10), 1–12. https://doi.org/10.22362/ijcert/2024/v11/i10/v11i1001

Jyothi, E. V. N., Rao, G. S., Mani, D. S., Anusha, C., Harshini, M., Bhavsingh, M., & Lavanya, A. (2023). A Graph Neural Networkbased Traffic Flow Prediction System with Enhanced Accuracy and Urban Efficiency. Journal of Electrical Systems, 19(4).

Bhavsingh, M., Samunnisa, K., & Mallareddy, A. (2024). Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management. Emerging Technologies and Engineering Journal, 1(1), 43-56.

Abd-Elkawy, A., & Bhavsingh, M. (2024). SensorFusionNet: A Novel Approach for Dynamic Traffic Sign Interpretation Using Multi-Sensor Data. Synthesis: A Multidisciplinary Research Journal, 2(1), 1-9.

Elena Petrova, & Ahmed El-Sayed. (2024). Multi-Objective Optimization for Link Stability in IoT-Fog-Cloud Architectures. International Journal of Computer Engineering in Research Trends, 11(10), 13–23. https://doi.org/10.22362/ijcert/2024/v11/i10/v11i1002

Dasari, K., Ali, M. A., Shankara, N. B., Reddy, K. D., Bhavsingh, M., & Samunnisa, K. (2024, October). A Novel IoT-Driven Model for Real-Time Urban Wildlife Health and Safety Monitoring in Smart Cities. In 2024 8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 122-129). IEEE.

Pathan, H. B., Preeth, S., & Bhavsingh, M. (2023). Revolutionizing PTSD Detection and Emotion Recognition through Novel Speech-Based Machine and Deep Learning Algorithms. Frontiers in Collaborative Research, 1(1), 35-44.

Ramesh, B., Changala, R., Kalangi, P. K., & Bhavsingh, M. (2024). Optimizing 6G Network Slicing with the EvoNetSlice Model for Dynamic Resource Allocation and Real-Time QoS Management. International Research Journal of Multidisciplinary Technovation, 6(3), 325-340.

Loomis, R. S., Rockström, J., & Bhavsingh, M. (2023). Synergistic Approaches in Aquatic and Agricultural Modeling for Sustainable Farming. Synthesis: A Multidisciplinary Research Journal, 1(1), 32-41.

J Scott. (2024). Pegasus Spyware: Omar Radi Critical Review. International Journal of Computer Engineering in Research Trends, 11(11), 1–16. https://doi.org/10.22362/ijcert/2024/v11/i11/v11i1101

Poreddy Ishika Reddy, Lekkala Raja Sai Rohit Reddy, Ritish Reddy Tandra, & K Venkatesh Sharma. (2024). Automated Plant Disease Detection Using Convolutional Neural Networks: Enhancing Accuracy and Scalability for Sustainable Agriculture. International Journal of Computer Engineering in Research Trends, 11(9), 1–10. https://doi.org/10.22362/ijcert/2024/v11/i9/v11i901

Abou Bakary Ballo, & Diarra Mamadou. (2023). A Comprehensive Study of IoT Security Issues and Protocols . International Journal of Computer Engineering in Research Trends, 10(7), 8–14. https://doi.org/10.22362/ijcert/2023/v10/i07/v10i0702

Hussain, F., Hussain, R., Hassan, S. A., & Hossain, E. (2020). Machine learning in IoT security: Current solutions and future challenges. IEEE Communications Surveys & Tutorials, 22(3), 1686-1721.

Sarker, I. H. (2021). Machine learning: Algorithms, real-world applications and research directions. SN computer science, 2(3), 160.

http://archive.ics.uci.edu/ml/datasets/detection_of_ IoT_botnet_attacks_N_BaIoT (last accessed on: 6 February 2024; 23:00 GMT)

Radhi, M., & Tahseen, I. (2024). An Enhancement for Wireless Body Area Network Using Adaptive Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3);388-396. https://doi.org/10.22399/ijcesen.409

Nagalapuram, J., & S. Samundeeswari. (2024). Genetic-Based Neural Network for Enhanced Soil Texture Analysis: Integrating Soil Sensor Data for Optimized Agricultural Management. International Journal of Computational and Experimental Science and Engineering, 10(4);962-970. https://doi.org/10.22399/ijcesen.572

D, jayasutha. (2024). Remote Monitoring and Early Detection of Labor Progress Using IoT-Enabled Smart Health Systems for Rural Healthcare Accessibility. International Journal of Computational and Experimental Science and Engineering, 10(4);1149-1157. https://doi.org/10.22399/ijcesen.672

M. Devika, & S. Maflin Shaby. (2024). Optimizing Wireless Sensor Networks: A Deep Reinforcement Learning-Assisted Butterfly Optimization Algorithm in MOD-LEACH Routing for Enhanced Energy Efficiency. International Journal of Computational and Experimental Science and Engineering, 10(4);1329-1336. https://doi.org/10.22399/ijcesen.708

SOYSAL, E. N., GURKAN, H., & YAVSAN, E. (2023). IoT Band: A Wearable Sensor System to Track Vital Data and Location of Missing or Earthquake Victims. International Journal of Computational and Experimental Science and Engineering, 9(3), 213–218. Retrieved from https://www.ijcesen.com/index.php/ijcesen/article/view/257

S, P., & A, P. (2024). Secured Fog-Body-Torrent : A Hybrid Symmetric Cryptography with Multi-layer Feed Forward Networks Tuned Chaotic Maps for Physiological Data Transmission in Fog-BAN Environment. International Journal of Computational and Experimental Science and Engineering, 10(4);671-681. https://doi.org/10.22399/ijcesen.490

M, P., B, J., B, B., G, S., & S, P. (2024). Energy-efficient and location-aware IoT and WSN-based precision agricultural frameworks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.480

Ponugoti Kalpana, L. Smitha, Dasari Madhavi, Shaik Abdul Nabi, G. Kalpana, & Kodati , S. (2024). A Smart Irrigation System Using the IoT and Advanced Machine Learning Model: A Systematic Literature Review. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.526

J. Anandraj. (2024). Transforming Education with Industry 6.0: A Human-Centric Approach . International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.732

S, P. S., N. R., W. B., R, R. K., & S, K. (2024). Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms. International Journal of Computational and Experimental Science and Engineering, 10(3). https://doi.org/10.22399/ijcesen.395

Achuthankutty, S., M, P., K, D., P, K., & R, prathipa. (2024). Deep Learning Empowered Water Quality Assessment: Leveraging IoT Sensor Data with LSTM Models and Interpretability Techniques. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.512

N. Vidhya, & C. Meenakshi. (2025). Blockchain-Enabled Secure Data Aggregation Routing (BSDAR) Protocol for IoT-Integrated Next-Generation Sensor Networks for Enhanced Security. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.722

Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417

P. Jagdish Kumar, & S. Neduncheliyan. (2024). A novel optimized deep learning based intrusion detection framework for an IoT networks. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.597

Downloads

Published

2025-01-07

How to Cite

Vutukuru, S. R., & Srinivasa Chakravarthi Lade. (2025). CoralMatrix: A Scalable and Robust Secure Framework for Enhancing IoT Cybersecurity. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.825

Issue

Section

Research Article