CYBER SEC IOT MOBILE-DEEP SECURE: A UNIFIED CYBERSECURITY FRAMEWORK UTILIZING DEEP LEARNING FOR ENHANCED PROTECTION OF MOBILE AND IOT NETWORKS
Keywords:
Cybersecurity, IoT Security, Mobile Networks, Deep Learning, Machine Learning, CyberSecIoTMobile-DeepSecure, Threat Detection, Network SecurityAbstract
The growing interconnectivity between mobile devices and Internet of Things (IoT) networks has exposed significant cybersecurity vulnerabilities, necessitating a more advanced and unified approach to threat management. CyberSecIoTMobile-DeepSecure is a comprehensive security framework designed to address these challenges by combining deep learning techniques, including convolutional neural networks (CNNs) and long short-term memory (LSTM) models, for enhanced threat detection and response across both mobile and IoT ecosystems. The framework preprocesses network traffic data to remove noise and standardize inputs, improving the accuracy of the deep learning models. By leveraging behavioral analytics and real-time anomaly detection, CyberSecIoTMobile-DeepSecure achieves a 96.8% accuracy in identifying sophisticated threats, such as zero-day exploits and network intrusions. The intelligent response mechanism dynamically adjusts security measures based on the threat's severity, helping to minimize system downtime and enhance overall resilience. Experimental results show that CyberSecIoTMobile-DeepSecure reduces detection latency by 28% and lowers packet loss during attacks by 51% compared to traditional machine learning approaches, ensuring rapid and precise defense. Additionally, the framework demonstrates a 36% decrease in energy consumption, making it suitable for resource-constrained IoT devices. By offering seamless integration, adaptive threat management, and robust protection, CyberSecIoTMobile-DeepSecure provides a scalable solution for securing interconnected mobile and IoT networks in diverse and challenging environments.
References
Akter R, Golam M, Doan VS, Lee JM, Kim DS. Iomt-net: Blockchain-integrated unauthorized uav localization using lightweight convolution neural network for internet of military things. IEEE Internet of Things Journal. 2022 May 19;10(8):6634-51.
Pasdar A, Koroniotis N, Keshk M, Moustafa N, Tari Z. Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems. IEEE Transactions on Sustainable Computing. 2024 Aug 14.
Stocchero JM, Silva CA, de Souza Silva L, Lawisch MA, dos Anjos JC, de Freitas EP. Secure command and control for internet of battle things using novel network paradigms. IEEE Communications Magazine. 2022 Aug 1;61(5):166-72.
Xu H, Wu J, Pan Q, Guan X, Guizani M. A survey on digital twin for industrial internet of things: Applications, technologies and tools. IEEE Communications Surveys & Tutorials. 2023 Jul 20.
Williams MD, Douglass R. Ensuring the security of defense iot through automatic code generation. IoT for Defense and National Security. 2022 Dec 28:307-23.
Bierbrauer DA, De Lucia M, Reddy K, Maxwell P, Bastian ND. Transfer learning for raw network traffic detection. Expert Systems with Applications. 2022;211(118641):1.
Alkanjr B, Alshammari T. Iobt intrusion detection system using machine learning. In2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) 2023 Mar 8 (pp. 0886-0892). IEEE.
Qadri YA, Nauman A, Zikria YB, Vasilakos AV, Kim SW. The future of healthcare internet of things: a survey of emerging technologies. IEEE Communications Surveys & Tutorials. 2020 Feb 11;22(2):1121-67.
Meng Y, Xu J, He J, Tao S, Gupta D, Moreira C, Tiwari P, Guo C. A cluster UAV inspired honeycomb defense system to confront military IoT: A dynamic game approach. Soft Computing. 2023 Jan;27(2):1033-43.
Deebak BD, Hwang SO. Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era. Computer Networks. 2023 Apr 1;225:109664.
Liu D, Abdelzaher T, Wang T, Hu Y, Li J, Liu S, Caesar M, Kalasapura D, Bhattacharyya J, Srour N, Kim J. Iobt-os: Optimizing the sensing-to-decision loop for the internet of battlefield things. In2022 International Conference on Computer Communications and Networks (ICCCN) 2022 Jul 25 (pp. 1-10). IEEE.
Kumar S, Kumar S, Lobiyal DK. MWLP‐DP: Mobile war‐fighters location prediction for dark phase in Internet of Battlefield Things. Transactions on Emerging Telecommunications Technologies. 2022 Apr;33(4):e4397.
Rivera AO, White EM, Acosta JC, Tosh D. Enabling Device Trustworthiness for SDN-Enabled Internet-of-Battlefield Things. In2022 IEEE Conference on Dependable and Secure Computing (DSC) 2022 Jun 22 (pp. 1-7). IEEE.
Bera B, Das AK, Garg S, Piran MJ, Hossain MS. Access control protocol for battlefield surveillance in drone-assisted IoT environment. IEEE Internet of Things Journal. 2021 Jan 4;9(4):2708-21.
Abdulla H. Anomaly detection for IoT networks using machine learning (Doctoral dissertation, Brunel University London).
Zanella A, Mason F, Pluchino P, Cisotto G, Orso V, Gamberini L. Internet of things for elderly and fragile people. arXiv preprint arXiv:2006.05709. 2020 Jun 10.
Mettouris C, Yeratziotis A, Fixl L, Parker S, Starosta-Sztuczka J, Clarke V, Rosenauer G, Daxberger W, Koumou S, Panayides M, Zampa G. eSticky: An Advanced Remote Reminder System for People with Early Dementia. Sn Computer Science. 2023 Apr 15;4(4):334.
Kulbacki, M., Chaczko, Z., Barton, S., Wajs-Chaczko, P., Nikodem, J., Rozenblit, J.W., Klempous, R., Ito, A. and Kulbacki, M., 2024, May. A Review of the Weaponization of IoT: Security Threats and Countermeasures. In 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI) (pp. 000279-000284). IEEE.
Gong Y, Cui S, Liu S, Jiang B, Dong C, Lu Z. Graph-based insider threat detection: A survey. Computer Networks. 2024 Aug 31:110757.
Malik S, Rana A. Cloud Computing Environment for Big Data Analytics. In Advancement of Data Processing Methods for Artificial and Computing Intelligence 2024 Apr 26 (pp. 121-148). River Publishers.
Tan J, Liang YC, Luong NC, Niyato D. Toward smart security enhancement of federated learning networks. IEEE Network. 2020 Oct 12;35(1):340-7.
Ferrag MA, Shu L. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet of Things Journal. 2021 May 6;8(24):17236-60.
Xia G, Chen J, Yu C, Ma J. Poisoning attacks in federated learning: A survey. IEEE Access. 2023 Jan 23;11:10708-22.
Jabbari A, Mohasefi JB. Improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Personal Communications. 2021 Feb;116(3):2565-91.
Ntshangase S, Ndhlovu N, Myakka S, Mahlasela O, Siphambili N, Mthethwa S. An Evaluation of DL T Governance Models. In2024 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) 2024 Aug 1 (pp. 1-7). IEEE.
Watkins ME. Designing an Effective Organizational Culture to Guard Against the Cyber Risks of Emerging Technologies. Journal of Healthcare Management. 2023 Jul 1;68(4):239-50.
Hare F, Diehl W. Noisy Operations on the Silent Battlefield. The Cyber Defense Review. 2020 Apr 1;5(1):153-68.
Suri N, Tortonesi M, Michaelis J, Budulas P, Benincasa G, Russell S, Stefanelli C, Winkler R. Analyzing the applicability of internet of things to the battlefield environment. In2016 international conference on military communications and information systems (ICMCIS) 2016 May 23 (pp. 1-8). IEEE.
Kott A. Challenges and characteristics of intelligent autonomy for internet of battle things in highly adversarial environments. arXiv preprint arXiv:1803.11256. 2018 Mar 20.
Lin K, Xia F, Li C, Wang D, Humar I. Emotion-aware system design for the battlefield environment. Information Fusion. 2019 May 1;47:102-10.
Almashhadani M, Almashhadani HA. The Impact of Board Size and Managerial Ownership on Firm Profitability. International Journal of Scientific and Management Research. 2023;6(09):210-27.
Al Zoubi FM, Bussières A, Chan HW, Leung KY, Ng YY, Lau KC, Ngai SP, Tsang SM, Wong AY, Thomas A. Refining and adapting the measurement properties of evidence-based practice measures for physiotherapy students. Plos one. 2024 Mar 7;19(3):e0298611.
Hu X, Zhou Z, Li H, Hu Y, Gu F, Kersten J, Fan H, Klan F. Location reference recognition from texts: A survey and comparison. ACM Computing Surveys. 2023 Nov 27;56(5):1-37.
Mahalle PN, Anggorojati B, Prasad NR, Prasad R. Identity authentication and capability-based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility. 2013 Mar 10;1(4):309-48.
Roman R, Zhou J, Lopez J. On the features and challenges of security and privacy in distributed internet of things. Computer networks. 2013 Jul 5;57(10):2266-79.
Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in Internet of Things: The road ahead. Computer networks. 2015 Jan 15;76:146-64.
Zhang S, Li Y, Ge W, Shen X. Military application of blockchain technology for future battlefield operations. International conference on cloud computing, Internet of Things, and computer applications (CICA 2022) 2022 Jul 28 (Vol. 12303, pp. 352-362). SPIE.
Pasdar A, Koroniotis N, Keshk M, Moustafa N, Tari Z. Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems. IEEE Transactions on Sustainable Computing. 2024 Aug 14.
Smith JF. Gospel Doctrine Selections from The Sermons And Writings Of Joseph F. Smith. BoD–Books on Demand; 2023 Dec 1.
Lee JJ, Kang KA, Wang MP, Zhao SZ, Wong JY, O'Connor S, Yang SC, Shin S. Associations between COVID-19 misinformation exposure and belief with COVID-19 knowledge and preventive behaviors: cross-sectional online study. Journal of medical Internet research. 2020 Nov 13;22(11):e22205.
Gupta C, Johri I, Srinivasan K, Hu YC, Qaisar SM, Huang KY. A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors. 2022 Mar 4;22(5):2017.
Sah DK, Cengiz K, Alshehri Y, Alnazzawi N, Ivković N. Early alert for sleep deprivation using mobile sensor data fusion. Computers and Electrical Engineering. 2022 Sep 1;102:108228.
Taylor CR, Monga N, Johnson C, Hawley JR, Patel M. Artificial intelligence applications in breast imaging: status and future directions. Diagnostics. 2023 Jun 13;13(12):2041.
Yang Q, Huang A, Fan L, Chan CS, Lim JH, Ng KW, Ong DS, Li B. Federated Learning with Privacy-preserving and Model IP-right-protection. Machine Intelligence Research. 2023 Feb;20(1):19-37.
Srinivas K, Sagar K. Secure key management techniques in IoT-enabled wireless sensor networks. Ina IP Conference Proceedings 2024 Jun 5 (Vol. 2971, No. 1). AIP Publishing.
Chen W, He W, Shen J, Tian X, Wang X. Systematic analysis of artificial intelligence in the era of industry 4.0. Journal of Management Analytics. 2023 Jan 2;10(1):89-108.
Fahmy HM. Cross-Layer Protocols for WSNs. In Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks 2023 Feb 14 (pp. 345-412). Cham: Springer Nature Switzerland.
Kotenko I, Izrailov K, Buinevich M. The method and software tool for identification of the machine code architecture in hyperphysical devices. Journal of Sensor and Actuator Networks. 2023 Jan 29;12(1):11.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Diwakar Reddy Peddinti, Pranay Airan, Sriram Santosh Aripirala (Author)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.