Elevating IoT Security: Integrating LSTM with Symmetric Key Protocols in Distributed Environments

Authors

  • Manju Suchdeo Department of Computer Science and Engineering, Research Scholar, Dr. A. P. J. Abdul Kalam University, Indore
  • Nisarg Gandhewar Department of Computer Science and Engineering, Research Supervisor, Dr. A. P. J. Abdul Kalam University, Indore

Keywords:

Long Short-Term Memory, Enhanced Elliptic Curve Cryptography, IoT, Symmetric Key, Encryption, Decryption

Abstract

A research integrated Long Short-Term Memory (LSTM) networks with symmetric key encryption techniques in remote situations to improve IoT device security. The research evaluates machine learning algorithms, including the innovative Proposed Deep LSTM model, and compares them on accuracy, precision, recall, specificity, FPR, FNR, and NPV. The Proposed Deep LSTM model surpasses its competitors with 98% accuracy, 98% precision, and 97% recall. It has the best specificity and NPV of 97% and the lowest FPR and FNR of 2% and 8%. These data show the Proposed Deep LSTM's strong prediction skills and its significant advantage over standard models like Radial Basis Function Networks (RBFN), which have an 81% specificity and 83% NPV score. The research compares encryption techniques' encryption and decryption speeds and processing efficiency across file sizes. IoT situations where fast data processing are needed may benefit from Enhanced Elliptic Curve Cryptography (EECC), the fastest technique for encryption and decryption. Blowfish encryption takes longer to complete, making it less efficient for time-sensitive applications. These detailed studies help choose models and algorithms that optimise IoT security, including accuracy, efficiency, and performance scalability. This study leads the application of advanced deep learning models and encryption strategies to secure IoT networks.

Downloads

Download data is not yet available.

References

Yadav, M., Singh, K., Pandey, A. S., Kumar, A., & Kumar, R. (2022). Smart communication and security by key distribution in multicast environment. Wireless Communications and Mobile Computing, 2022.

Yadav, C. S., Singh, J., Yadav, A., Pattanayak, H. S., Kumar, R., Khan, A. A., ... & Alharby, S. (2022). Malware analysis in iot & android systems with defensive mechanism. Electronics, 11(15), 2354.

Dubey, H. A. R. S. H. I. T., Kumar, S. U. D. H. A. K. A. R., & Chhabra, A. N. U. R. E. E. T. (2022). Cyber Security Model to Secure Data Transmission using Cloud Cryptography. Cyber Secur. Insights Mag, 2, 9-12.

Hasan, M. K., Ghazal, T. M., Saeed, R. A., Pandey, B., Gohel, H., Eshmawi, A. A., ... & Alkhassawneh, H. M. (2022). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5), 421-432.

Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., ... & Doody, P. (2022). Internet of things strategic research roadmap. In Internet of things-global technological and societal trends from smart environments and spaces to green ICT (pp. 9-52). River Publishers.

Velayudhan, N. K., Pradeep, P., Rao, S. N., Devidas, A. R., & Ramesh, M. V. (2022). IoT-enabled water distribution systems-a comparative technological review. IEEE Access.

Khadidos, A. O., Shitharth, S., Manoharan, H., Yafoz, A., Khadidos, A. O., & Alyoubi, K. H. (2022). An intelligent security framework based on collaborative mutual authentication model for smart city networks. IEEE Access, 10, 85289-85304.

Das, S., & Namasudra, S. (2023). MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure. International journal of network management, 33(3), e2200.

Alavikia, Z., & Shabro, M. (2022). A comprehensive layered approach for implementing internet of things-enabled smart grid: A survey. Digital Communications and Networks, 8(3), 388-410.

Kaushal, R. K., Bhardwaj, R., Kumar, N., Aljohani, A. A., Gupta, S. K., Singh, P., & Purohit, N. (2022). Using mobile computing to provide a smart and secure Internet of Things (IoT) framework for medical applications. Wireless Communications and Mobile Computing, 2022, 1-13.

Gao, Z., Zhang, D., Zhang, J., Liu, Z., Liu, H., & Zhao, M. (2022). BC-AKA: Blockchain based asymmetric authentication and key agreement protocol for distributed 5G core network. China Communications, 19(6), 66-76.

Saheed, Y. K., Abiodun, A. I., Misra, S., Holone, M. K., & Colomo-Palacios, R. (2022). A machine learning-based intrusion detection for detecting internet of things network attacks. Alexandria Engineering Journal, 61(12), 9395-9409.

Fatima, S., Hussain, S., Shahzadi, N., ul Din, B., Sajjad, W., Saleem, Y., & Aun, M. (2022, December). A Secure Framework for IoT Healthcare Data Using Hybrid Encryption. In 2022 International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE) (pp. 1-7). IEEE.

Saqib, M., & Moon, A. H. (2023). A systematic security assessment and review of internet of things in the context of authentication. Computers & Security, 125, 103053.

Das, S., & Namasudra, S. (2022). A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Computers and Electrical Engineering, 101, 107991.

Ahanger, T. A., Aljumah, A., & Atiquzzaman, M. (2022). State-of-the-art survey of artificial intelligent techniques for IoT security. Computer Networks, 206, 108771.

Zhang, G., & Navimipour, N. J. (2022). A comprehensive and systematic review of the IoT-based medical management systems: Applications, techniques, trends and open issues. Sustainable Cities and Society, 82, 103914.

Poongodi, M., Bourouis, S., Ahmed, A. N., Vijayaragavan, M., Venkatesan, K. G. S., Alhakami, W., & Hamdi, M. (2022). A novel secured multi-access edge computing based vanet with neuro fuzzy systems based blockchain framework. Computer Communications, 192, 48-56.

Yadav, M., Singh, K., Pandey, A. S., Kumar, A., & Kumar, R. (2022). Smart communication and security by key distribution in multicast environment. Wireless Communications and Mobile Computing, 2022.

Ashraf, Z., Sohail, A., & Yousaf, M. (2023). Robust and lightweight symmetric key exchange algorithm for next-generation IoE. Internet of Things, 22, 100703.

Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex & Intelligent Systems, 8(4), 3559-3591.

Trivedi, C., & Rao, U. P. (2023). Secrecy aware key management scheme for Internet of Healthcare Things. The Journal of Supercomputing, 1-31.

Harbi, Y., Aliouat, Z., Refoufi, A., Harous, S., & Bentaleb, A. (2019). Enhanced authentication and key management scheme for securing data transmission in the internet of things. Ad Hoc Networks, 94, 101948.

Alzahrani, B. A., Barnawi, A., Albarakati, A., Irshad, A., Khan, M. A., & Chaudhry, S. A. (2022). SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes. Wireless Communications and Mobile Computing, 2022.

Meiran, G., & Dj, B. Z. (2022). PROTOCOLS FOR SYMMETRIC SECRET KEY ESTABLISHMENT MODERN APPROACH. Vojnotehnički glasnik, 70(3), 604-635.

Alshahrani, M., & Traore, I. (2019). Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain. Journal of information security and applications, 45, 156-175.

Ahmad, S., Mehfuz, S., & Beg, J. (2023). Hybrid cryptographic approach to enhance the mode of key management system in cloud environment. The Journal of Supercomputing, 79(7), 7377-7413.

Mirsaraei, A. G., Barati, A., & Barati, H. (2022). A secure three-factor authentication scheme for IoT environments. Journal of Parallel and Distributed Computing, 169, 87-105.

S. Jha, D. Prashar, H.V. Long, D. Taniar, (2020) . Recurrent neural network for detecting malware, Comput. Secur. 99 ,102037.

A. Pinhero, M.L. Anupama, P. Vinod, C.A. Visaggio, N. Aneesh, S. Abhijith, S. AnanthaKrishnan, (2021) . Malware detection employed by visualization and deep neural network, Comput. Secur. 105 ,102247

D. Saif, S.M. El-Gokhy, E. Sallam, (2018) . Deep belief networks-based framework for malware detection in android systems, Alex. Eng. J. 57 , 4049–4057.

S.K. Smmarwar, G.P. Gupta, S. Kumar,(2022). A hybrid feature selection approach based android malware detection framework using machine learning techniques, in: Cyber Security, Privacy and Networking, 347–356, Singapore,2022.

Downloads

Published

24.03.2024

How to Cite

Suchdeo, M. ., & Gandhewar, N. . (2024). Elevating IoT Security: Integrating LSTM with Symmetric Key Protocols in Distributed Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(19s), 252–275. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5063

Issue

Section

Research Article

Most read articles by the same author(s)