Nadhem Ebrahim , Mourad Elloumi , Abdullah Mohammed Alharthi , Fahad S. Altuwaijri , Mohammed Alsaadi
{"title":"Offloading-verified framework for adversary detection and mitigation in IoT","authors":"Nadhem Ebrahim , Mourad Elloumi , Abdullah Mohammed Alharthi , Fahad S. Altuwaijri , Mohammed Alsaadi","doi":"10.1016/j.asoc.2025.113312","DOIUrl":null,"url":null,"abstract":"<div><div>Cyber-physical systems (CPSs) designed for the Internet of Things (IoT) enhanced security and resource infrastructures to support various applications and services, undetected adversaries in the temporarily connected IoT network impose different user and data privacy threats, this research introduces an Offloading-verified Adversary Detection and Mitigation Scheme (OADMS), this proposed scheme coexists with the IoT communication and CPS security infrastructure for adversary detection, conventional behavior-based adversary detection with partial order adversarial network training validates the infrastructure security support against cyber-attacks. The behavior is analyzed for independent and offloaded service exchanges, reducing communication failures and is recurrently analyzed in the detection process until the service termination, communication metrics of the infrastructure units are used to verify adversary and user channel behavior. The learning process recommendations are exploited to validate the channel's reliability through IoT-sharing platforms, and the performance of the proposed system is assessed using communication latency, failure rate, response ratio, and detection factor. The model achieved an excellent detection accuracy rate of 96.8 %.</div></div>","PeriodicalId":50737,"journal":{"name":"Applied Soft Computing","volume":"177 ","pages":"Article 113312"},"PeriodicalIF":7.2000,"publicationDate":"2025-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Soft Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1568494625006234","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Cyber-physical systems (CPSs) designed for the Internet of Things (IoT) enhanced security and resource infrastructures to support various applications and services, undetected adversaries in the temporarily connected IoT network impose different user and data privacy threats, this research introduces an Offloading-verified Adversary Detection and Mitigation Scheme (OADMS), this proposed scheme coexists with the IoT communication and CPS security infrastructure for adversary detection, conventional behavior-based adversary detection with partial order adversarial network training validates the infrastructure security support against cyber-attacks. The behavior is analyzed for independent and offloaded service exchanges, reducing communication failures and is recurrently analyzed in the detection process until the service termination, communication metrics of the infrastructure units are used to verify adversary and user channel behavior. The learning process recommendations are exploited to validate the channel's reliability through IoT-sharing platforms, and the performance of the proposed system is assessed using communication latency, failure rate, response ratio, and detection factor. The model achieved an excellent detection accuracy rate of 96.8 %.
期刊介绍:
Applied Soft Computing is an international journal promoting an integrated view of soft computing to solve real life problems.The focus is to publish the highest quality research in application and convergence of the areas of Fuzzy Logic, Neural Networks, Evolutionary Computing, Rough Sets and other similar techniques to address real world complexities.
Applied Soft Computing is a rolling publication: articles are published as soon as the editor-in-chief has accepted them. Therefore, the web site will continuously be updated with new articles and the publication time will be short.