AI-Driven Anomaly Detection for IoT Devices in Smart Homes using Android-Based Mobile Applications
Keywords:
IoT Security, Smart Homes, Anomaly Detection, Artificial Intelligence, Mobile Application, Android.Abstract
The increasing adoption of Internet of Things (IoT) devices in smart homes has transformed daily living through enhanced automation, remote access, and energy optimization. However, these devices introduce vulnerabilities due to limited computational resources, heterogeneous communication protocols, and weak authentication mechanisms. Traditional security approaches, including signature-based intrusion detection systems, are insufficient to address modern cyber threats such as zero-day attacks, botnet infiltration, and data exfiltration. This paper proposes an AI-driven anomaly detection framework that leverages a hybrid Long Short-Term Memory (LSTM) and Random Forest (RF) model for real-time anomaly detection in IoT ecosystems. The framework is integrated into an Android-based mobile application that provides end-users with anomaly alerts, visualization dashboards, and device isolation controls. The system is evaluated using the TON_IoT dataset, achieving an accuracy of 96.8%, precision of 95.2%, and recall of 94.6%, outperforming traditional machine learning baselines. A usability study with 30 participants confirmed high user satisfaction, scoring an average of 4.6/5 in usability. This work demonstrates the feasibility of combining advanced AI models with mobile interfaces to enhance smart home IoT security, while addressing issues of latency, accessibility, and user experience.
Downloads
References
Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the Internet of Things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.
Banos, O., Damas, M., Pomares, H., Rojas, I., Delgado-Marquez, B., & Valenzuela, O. (2014). Human activity recognition based on a sensor weighting hierarchical classifier. Soft Computing, 17(2), 333–343.
Bhuyan, M. H., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network anomaly detection: Methods, systems and tools. IEEE Communications Surveys & Tutorials, 16(1), 303–336.
Chen, J., & Chen, Y. (2018). Smart home security: Challenges and solutions. IEEE Communications Magazine, 56(1), 28–34.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.
Doshi, R., Apthorpe, N., & Feamster, N. (2018). Machine learning DDoS detection for consumer Internet of Things devices. IEEE Security and Privacy Workshops, 29–35.
Dua, S., & Du, X. (Eds.) (2016). Data Mining and Machine Learning in Cybersecurity. Boca Raton, FL: CRC Press.
Jiang, J., Chen, J., Yu, H., Liu, Y., & Liu, R. (2017). Anomaly detection for IoT time-series data based on deep learning. IEEE International Conference on Data Mining Workshops (ICDMW).
Khan, M. A., Salah, K., & Rehman, M. H. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.
Liu, H., Lang, B., Liu, M., & Yan, H. (2016). CNN and RNN based payload classification methods for attack detection. Knowledge-Based Systems, 108, 56–66.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


