Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

NAIDS4IoT: A Novel Artificial Intelligence-Based Intrusion Detection Architecture for the Internet of Things

View through CrossRef
Internet of Things (IoT) has brought unprecedented opportunities across various sectors, including healthcare, transportation, industrial automation, and smart cities. However, this expansion has also introduced significant security vulnerabilities due to the heterogeneous nature, limited computational capabilities, and large-scale deployment of IoT devices. Detecting anomalies, which often signify security breaches or system malfunctions, is crucial to maintaining the integrity and reliability of IoT systems. Traditional anomaly detection methods, typically rule based or signature driven, struggle to adapt to evolving threats and diverse data patterns in IoT networks. This paper proposes a novel architecture named NAIIDS4IoT (Novel Artificial Intelligence-based Intrusion Detection System architecture for IoT), designed to provide efficient, accurate, and scalable anomaly detection using Artificial Intelligence. The core of NAIIDS4IoT lies in the integration of federated learning with deep autoencoders, enabling decentralized model training across edge devices without sharing raw data, thereby preserving user privacy and reducing communication overhead. Each edge node independently learns patterns of normal behavior and identifies anomalies based on reconstruction errors. A global model is continuously refined through collaborative learning across nodes. Furthermore, NAIIDS4IoT incorporates lightweight encryption and blockchain based model integrity verification to enhance security and trust in the detection process. Experimental validation using real-world IoT datasets demonstrates that NAIIDS4IoT achieves high detection accuracy, low false positive rates, and strong adaptability to dynamic environments, significantly outperforming conventional centralized and shallow learning based solutions. This architecture represents a significant step toward intelligent, autonomous, and privacy-preserving anomaly detection in next generation IoT ecosystems.
IBERAMIA: Sociedad Iberoamericana de Inteligencia Artificial
Title: NAIDS4IoT: A Novel Artificial Intelligence-Based Intrusion Detection Architecture for the Internet of Things
Description:
Internet of Things (IoT) has brought unprecedented opportunities across various sectors, including healthcare, transportation, industrial automation, and smart cities.
However, this expansion has also introduced significant security vulnerabilities due to the heterogeneous nature, limited computational capabilities, and large-scale deployment of IoT devices.
Detecting anomalies, which often signify security breaches or system malfunctions, is crucial to maintaining the integrity and reliability of IoT systems.
Traditional anomaly detection methods, typically rule based or signature driven, struggle to adapt to evolving threats and diverse data patterns in IoT networks.
This paper proposes a novel architecture named NAIIDS4IoT (Novel Artificial Intelligence-based Intrusion Detection System architecture for IoT), designed to provide efficient, accurate, and scalable anomaly detection using Artificial Intelligence.
The core of NAIIDS4IoT lies in the integration of federated learning with deep autoencoders, enabling decentralized model training across edge devices without sharing raw data, thereby preserving user privacy and reducing communication overhead.
Each edge node independently learns patterns of normal behavior and identifies anomalies based on reconstruction errors.
A global model is continuously refined through collaborative learning across nodes.
Furthermore, NAIIDS4IoT incorporates lightweight encryption and blockchain based model integrity verification to enhance security and trust in the detection process.
Experimental validation using real-world IoT datasets demonstrates that NAIIDS4IoT achieves high detection accuracy, low false positive rates, and strong adaptability to dynamic environments, significantly outperforming conventional centralized and shallow learning based solutions.
This architecture represents a significant step toward intelligent, autonomous, and privacy-preserving anomaly detection in next generation IoT ecosystems.

Related Results

The architecture of differences
The architecture of differences
Following in the footsteps of the protagonists of the Italian architectural debate is a mark of culture and proactivity. The synthesis deriving from the artistic-humanistic factors...
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
Network intrusion detection method based on IEHO-SVM
Network intrusion detection method based on IEHO-SVM
As the growth of network technology, the network intrusion has become increasingly serious. An elephant herding optimization algorithm and support vector machine-based network intr...
Architecture between heteronomy and self-generation
Architecture between heteronomy and self-generation
Introduction «I have never worked in the technocratic exaltation, solving a constructive problem and that’s it. I’ve always tried to interpret the space of human life» (Vitto...
An information security analysis method of Internet of things based on balanced double SVM
An information security analysis method of Internet of things based on balanced double SVM
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems e...
Depth-aware salient object segmentation
Depth-aware salient object segmentation
Object segmentation is an important task which is widely employed in many computer vision applications such as object detection, tracking, recognition, and ret...

Back to Top