{"title":"Deep Shallow network with LSTM for detecting attacks in IoT networks and preserving privacy based on Adaptive hybrid encryption algorithm","authors":"Deepak Dilip Mahajan , A. Jeyasekar","doi":"10.1016/j.eswa.2025.128050","DOIUrl":null,"url":null,"abstract":"<div><div>In this article, a new attack detection and privacy preservation framework is implemented to identify the attacks present in IoT networks and preserve the information from various attacks during transmission. Initially, the optimal features are selected from the garnered data by using the Adaptive Random Index-based Sea Lion Optimization Algorithm (ARI-SLOA). Consequently, the resultant features are given to a Deep Shallow Network with Long Short-Term Memory (DSN-LSTM) for attack identification. The attacks present in the IoT are mitigated during data transmission, and thus the data is highly secured. The designed encryption scheme is implemented for preserving the privacy of the information, where Adaptive Hybrid Attribute-based Encryption with an Advanced Encryption System (AHABE-AES) is utilized for privacy preservation. Here, the parameters of the AHABE-AES are optimized by the ARI-SLOA. The developed framework’s performance is examined with other existing approaches. From the results, the suggested framework obtained 95% accuracy, 8% FDR and 4% FNR rates. The outcomes obtained from the developed system ensure that this designed strategy is more robust and effective than other related models.</div></div>","PeriodicalId":50461,"journal":{"name":"Expert Systems with Applications","volume":"288 ","pages":"Article 128050"},"PeriodicalIF":7.5000,"publicationDate":"2025-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Expert Systems with Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0957417425016719","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
In this article, a new attack detection and privacy preservation framework is implemented to identify the attacks present in IoT networks and preserve the information from various attacks during transmission. Initially, the optimal features are selected from the garnered data by using the Adaptive Random Index-based Sea Lion Optimization Algorithm (ARI-SLOA). Consequently, the resultant features are given to a Deep Shallow Network with Long Short-Term Memory (DSN-LSTM) for attack identification. The attacks present in the IoT are mitigated during data transmission, and thus the data is highly secured. The designed encryption scheme is implemented for preserving the privacy of the information, where Adaptive Hybrid Attribute-based Encryption with an Advanced Encryption System (AHABE-AES) is utilized for privacy preservation. Here, the parameters of the AHABE-AES are optimized by the ARI-SLOA. The developed framework’s performance is examined with other existing approaches. From the results, the suggested framework obtained 95% accuracy, 8% FDR and 4% FNR rates. The outcomes obtained from the developed system ensure that this designed strategy is more robust and effective than other related models.
期刊介绍:
Expert Systems With Applications is an international journal dedicated to the exchange of information on expert and intelligent systems used globally in industry, government, and universities. The journal emphasizes original papers covering the design, development, testing, implementation, and management of these systems, offering practical guidelines. It spans various sectors such as finance, engineering, marketing, law, project management, information management, medicine, and more. The journal also welcomes papers on multi-agent systems, knowledge management, neural networks, knowledge discovery, data mining, and other related areas, excluding applications to military/defense systems.