Matecconf Icmed2024 01103
Matecconf Icmed2024 01103
Matecconf Icmed2024 01103
1051/matecconf/202439201103
ICMED 2024
Management, India
4Associate Professor, Department of Computer Science & Engineering, Vaasireddy Venkatadri
© The Authors, published by EDP Sciences. This is an open access article distributed under the terms of the Creative
Commons Attribution License 4.0 (https://creativecommons.org/licenses/by/4.0/).
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
2 Research background
2
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
A fog computing-based IDS architecture for IoT networks was proposed by Labiod et al.
(2022). The approach they propose utilizes fog computing to strengthen network security by
identifying and preventing intrusions [9]. Enhancement of network resilience against cyber
hazards is a component of the output. De Souza et al. (2022) undertook a systematic literature
review concerning IDS and prevention in fog-based IoT environments. This review
contributes to the body of work by Labiod et al. by examining different intrusion detection
techniques, thereby enhancing the proposed architecture.
De Souza et al. [10] conducted a systematic literature review to examine established
methodologies employed in fog-based IoT environments for an IDS. In contrast to Labiod et
al., who concentrate on presenting a particular architectural proposal, De Souza et al. offer a
more comprehensive outlook by examining diverse methodologies. This review facilitates
the identification of research gaps and establishes a foundation for subsequent developments
in the field.
SIMAD, a secure, intelligent method for detecting assaults in IoT-fog environments [11],
was proposed by Daoud and Mahfoudhi (2022). Expanding upon the lamentation of De
Souza et al. regarding the necessity for more advanced IDS, Daoud and Mahfoudhi propose
a rational strategy to reinforce network security. Their proposed approach seeks to enhance
network security and threat detection capabilities, thus filling in some of the deficiencies
identified in the literature review.
Lawal et al. introduced a fog computing-based DDoS attack mitigation framework for
IoT networks. In IoT-fog environments, this framework extends the research of Daoud and
Mahfoudhi [12] by addressing particular threats, such as DDoS attacks. In line with
bolstering network security, their framework endeavors to boost network resilience against
DDoS assaults by distributing detection and mitigation responsibilities across fog nodes.
A fuzzy logic and fog-based secure architecture for the IoT was proposed by Zahra and
Chishti (2020). The security of fog computing environments is improved by incorporating
fuzzy logic-based decision-making mechanisms into this architecture [13]. In contrast to the
narrow concentration of Lawal et al. on particular threats such as DDoS attacks, Zahra and
Chishti propose a security architecture encompassing a wider range of challenges in IoT
systems, including intrusion detection.
A secure integrated framework for fog-assisted IoT systems was introduced by Junejo et
al. By integrating fog computing capabilities with conventional security mechanisms, their
framework [14] effectively tackles the security challenges in IoT systems. Expanding on the
research conducted by Zahra and Chishti, this framework offers a comprehensive perspective
on IoT security that incorporates conventional and fog-based security protocols.
Using fuzzy logic and a fog-based approach, Zahra and Chishti (2022) proposed a lightweight
and generic security mechanism for detecting malicious behavior in uncertain IoT [15].
Constraints permitting, Zahra and Chishti persist in investigating the security implications of
fuzzy logic in IoT environments. Supplementing the more comprehensive security
framework by Junejo et al., their lightweight security mechanism seeks to tackle the
difficulties associated with identifying malicious activity in indeterminate IoT environments.
Samy et al. (2020) introduced a DL-based fog-based attack detection framework designed
for the IoT. DL techniques for attack detection and prevention in IoT environments are
introduced in this framework [16]. In contrast to Zahra and Chishti, who center their attention
on fuzzy logic-based methodologies, Samy et al. investigate using DL to improve security in
environments engulfed in IoT fog. Their framework presents an alternative approach to
attack detection and prevention, enhancing the current literature corpus. An analysis of these
papers collectively reveals a development in research endeavors focused on boosting security
measures within environments engulfed in IoT fog environments. Each work expands upon
prior research by tackling distinct obstacles and presenting innovative methods to enhance
the security of networks.
3
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
Fig. 1. Methodology for securing IoT network through DL-based intrusion detection
The chosen DL model significantly influences the accuracy and efficacy of the projected
framework's detection capabilities. Quality-wise, the DL prototypical should mirror the
quality of the training data. This phase aims to identify the most effective DL model and train
it using IoT information in the cloud layer (CL) to detect a wider range of attacks. As
previously stated, a clever IoT gateway processes all IoT communications routed to higher
layers (fog and cloud) or transferred between IoT devices. A "tcpdp" is a packet analyzer and
network snoop utilized to gather packets sent or received at the network's interface. Executed
on the intelligent IoT gateway, tcpdp gathers unprocessed data packets from the IoT network
as a Pcap file. The unprocessed network data is converted to CSV format using a network
traffic flow analyzer that includes over seventy-five network traffic characteristics.
4
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
This phase comprises multiple stages, initially of which entails learning the GRU
framework using the accessible IoT database obtained in the preceding stage. The GRU
model is trained in the CL to increase its execution speed. We then execute the GRU model
to evaluate and build the model. For binary class categorization, we employ the sigmoid
initiation function; for multiple categorizations, we utilize softmax. "Adam" is a variable
training method employed as an optimizer. It rapidly obtains excellent results by calculating
unique training rates for each parameter. Following this, the hyperparameters influencing the
DL model's efficacy are adjusted. The partitioning procedure is employed to utilize distinct
training and testing datasets. The datasets were divided into two distinct components: training
and testing. 75% of the dataset is allocated to the training set, while the residual 25% is
designated for testing purposes. When the valuation outcome is unsatisfactory, either the
hyperparameters are adjusted, or the GRU model is nested in depth until optimal
performance is attained.
In the second phase of the proposed structure, fog nodes are utilized to execute the
architecture. The structure of the suggested framework, which includes the CL, Fog level
(FL), and boundary levels, is depicted in Fig. 2. The edge layer includes various IoT devices,
such as security cameras, sensors, and detectors, with limited resources. These devices
produce enormous quantities of unorganized information that are challenging to analyse at
the periphery. The edge layer comprises smart residences, hydrocarbon platforms, smart
electricity infrastructure, smart vehicles, and smart industry. Employing an intelligent IoT
gateway, peripheral layer devices' data is directed toward the fog layer (FL), business
information center, and cloud. The FL, which comprises thousands of routing devices,
servers, and processors under the ownership of an Internet service provider, constitutes the
second layer. Edge devices are weaker than these devices. Operations requiring substantial
amounts of memory, processing capacity, storage, and power can be executed on fog devices.
In addition, fog nodes are disseminated across various topographical areas, including service
provider networks and areas nearer to the periphery layer than the CL. Multiple ports and
services facilitate communication with applications and standards. At the FL, dispersed data
analytics enables data analysis before its transmission to the cloud. Furthermore, it lowers
delay and bandwidth, swiftly responds to crucial decisions, and contributes to the system's
flexibility. The most advanced level is the CL, which furnishes cloud operators with
adaptable, reliable, and flexible assets while delivering computing services via the Internet.
Cloud computing enables data storage, analysis, and transmission via the Internet. The
Internet of Things encounters significant latency when transferring or analyzing data in the
cloud, particularly regarding real-time applications like autonomous vehicles.
5
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
Fig. 2. Fog-based framework for malicious device detection to secure IoT networks
As depicted in Fig. 2, it has been presumed that a clustering algorithm is employed to
organize fog nodes into clusters to implement the suggested architecture in IoT networks; the
FL is subdivided into N clusters. This clustering technique aims to recognize clusters of
wireless devices in a distributed manner by utilizing physical network layout characteristics.
This clustering algorithm applies to the framework because it operates without requiring data
regarding the anticipated number of clusters and implies that participating nodes have zero
or minimal movement. Clusters are identified by considering various parameters, including
the node connections, the density of the network graph, and the preferred connection. Fog
nodes are clustered to improve network scaling, equalize network burden, and protect traffic
exchanged between clusters and the cloud. Data from various IoT peripheral networks can
be managed, processed, and analyzed by a single cluster; for example, cluster1 in Fig. 2
processes and evaluates data from a smart home network and a WSN.
Intelligent gateways capture and forward network traffic to the closest fog node in the
capacity of sink nodes. Fog nodes acquire and retain network traffic relayed by multiple IoT
smart gateways in distinct files. On fog nodes, a service in the background is responsible for
reading and processing data from files. The information processing consists of gathering the
characteristics of each network traffic packet and feeding them to the GRU classifier to
identify attacks.
6
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
from CHs for a network manager to utilize in assessing and revising the efficacy of the
IDS and formulating suitable courses of action.
100
98
96
94
92
90
88
Accuracy Precision Recall (%) F1 score (%)
(%) (%)
Fig. 3. Performance comparison of various DL methods used to detect malicious devices in IoT
network
A comparison of the performance of different DL techniques employed for the
identification of malicious devices in IoT networks is displayed in Fig. 3. Accuracy is
attained by the Convolutional Neural Network (CNN), which also attains F1 score values of
95%, 93%, and 93%, respectively, for precision, recall, and accuracy. Concerning precision,
recall, and F1 score, the Deep Neural Network (DNN) attains a marginally superior accuracy
of 97.5%. Its corresponding values are 93.4%, 94.8%, and 95.6%. The efficacy of the Long
Short-Term Memory (LSTM) network is enhanced, as evidenced by its 99.01% accuracy,
97.31% recall, 95.72% precision, and 96.07% F1 score, respectively. In line with the
abovementioned models, the GRU achieves superior performance, attaining an accuracy of
99.45%. It also demonstrates precision, recall, and F1 score values of 96.52%, 98.27%, and
97.62%, respectively. The findings of this study indicate that LSTM and GRU networks
demonstrate enhanced capabilities in detecting malicious devices within IoT networks,
thereby underscoring their potential to bolster security measures in IoT environments.
7
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024
Fig. 4. Resource utilization (%) of IoT devices against time frame with IDS, without IDS, and the
proposed IoT-MDD system
Fig. 4 shows the resource consumption percentages of IoT devices across different
periods in three scenarios: with IDS, without IDS, and with the proposed IoT-MDD system.
The resource consumption starts at 40% and subsequently climbs to peak at 92% without any
initial security measures. On the other hand, using IDS shows a regulated resource use trend,
gradually increasing over time, which suggests the additional load caused by security
protocols. The IoT-MDD system successfully manages resource use below acceptable
bounds and consistently maintains resource utilization levels between 30% and 82% across
different time frames, substantially reducing possible hazards. This shows that the suggested
method effectively ensures IoT device security without significantly impacting resource use,
making it a feasible option for real-world implementation.
5 Conclusion
DL is very efficient in the fields of extensive data and cyber-security. Deploying a GRU on
IoT devices with limited resources is impractical since it requires significant computing
power and reliable storage capabilities. This paper presents an IoT-MDD system that uses
deep learning to detect a wide range of IoT cyber-attacks effectively. The system is
disseminated, strong, and boasts a high detection rate. The proposed system includes an
IDS on fog nodes because of their decentralized nature, significant processing capabilities,
and proximity to edge devices. GRU achieved superior performance, attaining an accuracy
of 99.45%. It also demonstrates precision, recall, and F1 score values of 96.52%, 98.27%,
and 97.62%, respectively. The IoT-MDD system successfully manages resource use below
acceptable bounds and consistently maintains resource utilization levels between 30% and
82% across different time frames.
References
1. J. Pacheco, S. Hariri. Anomaly behavior analysis for IoT sensors. Trans. Emerg.
Telecommun. Technol., 29, 4, (2018)
2. M.A. Khan, K. Salah. IoT security: Review, blockchain solutions, and open challenges.
Future Gener. Comput. Syst., 82, 395-411, (2018)
3. M.A. Lawal, R.A. Shaikh, S.R. Hassan. An anomaly mitigation framework for iot using
fog computing. Electronics, 9, 10, (2020)
8
MATEC Web of Conferences 392, 01103 (2024) https://doi.org/10.1051/matecconf/202439201103
ICMED 2024