CFP last date
28 November 2025
Call for Paper
December Edition
CAE solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 28 November 2025

Submit your paper
Know more
Random Articles
Reseach Article

Secure and Resilient Intrusion Detection Framework for IoT Networks Performance

by Eman Gaber
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 1
Year of Publication: 2025
Authors: Eman Gaber
10.5120/cae2025652916

Eman Gaber . Secure and Resilient Intrusion Detection Framework for IoT Networks Performance. Communications on Applied Electronics. 8, 1 ( Nov 2025), 42-52. DOI=10.5120/cae2025652916

@article{ 10.5120/cae2025652916,
author = { Eman Gaber },
title = { Secure and Resilient Intrusion Detection Framework for IoT Networks Performance },
journal = { Communications on Applied Electronics },
issue_date = { Nov 2025 },
volume = { 8 },
number = { 1 },
month = { Nov },
year = { 2025 },
issn = { 2394-4714 },
pages = { 42-52 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume8/number1/secure-and-resilient-intrusion-detection-framework-for-iot-networks-performance/ },
doi = { 10.5120/cae2025652916 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2025-11-25T01:09:03.675011+05:30
%A Eman Gaber
%T Secure and Resilient Intrusion Detection Framework for IoT Networks Performance
%J Communications on Applied Electronics
%@ 2394-4714
%V 8
%N 1
%P 42-52
%D 2025
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential growth of IoT demands scalable and adaptive security frameworks to counter emerging cyber threats. This paper presents a MATLAB-based evaluation of a lightweight intrusion detection framework for IoT networks. Performance analysis under varying traffic loads (25–1000 messages) shows a consistent 90% attack detection rate, reduced detection time (from 2.14s to 1.44s), and improved legitimate message rate (73%–80.7%). These results confirm the framework’s scalability, resilience, and efficiency, demonstrating its capability to ensure secure and reliable IoT communications while minimizing false positives and maintaining strong intrusion detection accuracy.

References
  1. Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici, “Detection of unauthorized IoT devices using machine learning techniques,” Computers & Security, vol. 89, pp. 1–17, 2020.
  2. R. Doshi, N. Apthorpe, and N. Feamster, “Machine learning DDoS detection for consumer Internet of Things devices,” in Proc. IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 2018, pp. 29–35.
  3. A. R. Sfar, E. Natalizio, Y. Challal, and Z. Chtourou, “A roadmap for security challenges in the Internet of Things,” Digital Communications and Networks, vol. 4, no. 2, pp. 118–137, 2018.
  4. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019.
  5. X. Liu, Y. Yang, X. Zhang, and C. Li, “Research on intrusion detection technology for IoT based on improved clustering algorithm,” IEEE Access, vol. 7, pp. 42163–42171, 2019.
  6. B. A. Zarpelão, R. S. Miani, C. T. Kawakani, and S. C. de Alvarenga, “A survey of intrusion detection in Internet of Things,” Journal of Network and Computer Applications, vol. 84, pp. 25–37, 2017.
  7. S. Anand, A. Sharma, and P. K. Jana, “An efficient architecture for intrusion detection in IoT,” Procedia Computer Science, vol. 132, pp. 688–693, 2018.
  8. H. Habibi Gharakheili, A. Sivanathan, H. C. Ma, and V. Sivaraman, “Identifying IoT devices in encrypted traffic using machine learning classification,” in Proc. IEEE Int. Conf. on Internet of Things (iThings), Halifax, Canada, 2018, pp. 1–6.
  9. A. Chatterjee and B. S. Ahmed, “IoT anomaly detection methods and applications: A survey,” Internet of Things, vol. 20 p. 100606, 2022,.
  10. R. Khondoker, M. S. Iqbal, and R. H. Khan, “A survey on intrusion detection system in IoT networks,” Array, vol. 21, p. 100291, 2024.
  11. S. Gupta and A. Kumar, “Intrusion detection systems in IoT based on machine learning,” Procedia Computer Science, vol. 229, pp. 320–327, 2024.
  12. L. Zhang, Y. Chen, and H. Wu, “L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks,” in Proc. ACM AsiaCCS, Melbourne, Australia, 2023, pp. 1483–1495.
  13. M. Elhoseny, A. El-Sappagh, and H. El-Miniawy, “Improved model for intrusion detection in the Internet of Things,” Scientific Reports, vol. 15, no. 1, Article 92852, Jan. 2025.
  14. A. Rahman and F. Anwar, “Implementing lightweight intrusion detection system on resource-constrained devices,” International Journal of Computer Applications, vol. 186, no. 34, pp. 10–16, 2024.
  15. Z. Li, X. Wang, and P. Zhao, “Deep reinforcement learning for intrusion detection in IoT: A survey,” arXiv preprint arXiv:2405.20038, 2024.
  16. J. Sun, Y. Zhou, and K. Xu, “FLARE: Feature-based lightweight aggregation for robust evaluation of IoT intrusion detection,” arXiv preprint arXiv:2504.15375, 2025.
  17. A. Mukherjee, D. Gupta, and S. Kumar, “Federated learning-based intrusion detection system for IoT networks,” IEEE Internet of Things Journal, vol. 11, no. 4, pp. 6543–6554, 2024.
  18. P. Mishra, V. Varadharajan, U. Tupakula, and E. S. Pilli, “A comprehensive survey on security threats, intrusion detection techniques, and datasets for IoT,” Computer Networks, vol. 151, pp. 215–249, 2019.
  19. R. Alotaibi and M. Elleithy, “An intrusion detection system for IoT based on network traffic using deep learning,” IEEE Access, vol. 9, pp. 143814–143825, 2021.
  20. S. Tyagi, N. Kumar, and N. Chilamkurti, “Intrusion detection in cloud-based IoT: Challenges and solutions,” Computers & Electrical Engineering, vol. 67, pp. 208–222, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT); Intrusion Detection System (IDS); Scalability; MATLAB Simulation; Detection Time; Attack Detection Rate; Legitimate Message Rate; False Positives