Enhanced IoT Security and Intrusion Detection Using Optimized Hybrid Deep Learning and Advanced Encryption Techniques
Keywords:
Internet of Things (IoT), Intrusion Detection System (IDS), Hybrid Convolutional Neural Network (HCNN), Calibrated Random Forest, Feature Selection, Enhanced Harris Hawks Optimization Algorithm (EHOA), Network Security, KH-AES Encryption, Anomaly Detection, Deep Learning, Cybersecurity, K-Means Clustering, Data Preprocessing, Real-time Threat Detection, Imbalanced Data Classification.Abstract
This study introduces a hybrid deep learning architecture intended to improve intrusion detection and data security on the Internet of Things (IoT) platform. The model integrates Hierarchical Convolutional Neural Networks (HCNN) with a Calibrated Random Forest (RF) classifier, leveraging the spatial feature extraction and structured decision-making power. For better accuracy and lower complexity, the Enhanced Harris Hawks Optimization Algorithm (EHOA) is employed for feature selection. The system handles IoT network traffic via K-Means Clustering, label encoding, and normalization for proper input preparation for model training. Evaluation is done through principal metrics such as accuracy, precision, recall, F1-score, ROC-AUC, and PR-AUC. The model attains an accuracy of 83.41%, a precision of 85.29%, a recall of 74.3%, and an F1-score of 79.42%, with a high capability for detection even on imbalanced datasets. Furthermore, a KH-AES (AES-128) encryption mechanism is incorporated to protect data transfer, transforming sensitive traffic into ciphertext encryption while maintaining confidentiality and integrity. The hybrid method provides real-time and scalable anomaly detection while keeping false positives at a low level. With the integration of sophisticated feature selection, deep learning, and encryption, the system provides an efficient solution for managing the intricate security issues found in contemporary IoT networks.
Downloads
References
Sun, P., Wan, Y., Wu, Z., Fang, Z., & Li, Q. (2025). A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions. Computers & Security, 148, 104097.
Mansoor, K., Afzal, M., Iqbal, W., & Abbas, Y. (2025). Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. Cluster Computing, 28(2), 93.
Popoola, O., Rodrigues, M., Marchang, J., Shenfield, A., Ikpehai, A., & Popoola, J. (2024). A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions. Blockchain: Research and Applications, 5(2), 100178.
Asonze, C. U., Ogungbemi, O. S., Ezeugwa, F. A., Olisa, A. O., Akinola, O. I., & Olaniyi, O. O. (2024). Evaluating the trade-offs between wireless security and performance in IoT networks: A case study of web applications in AI-driven home appliances. Available at SSRN 4927991.
Mangla, Monika & Ambarkar, Smita & Akhare, Rakhi & Deokar, Sanjivani & Mohanty, Sachi & Satpathy, Suneeta. (2022). A Proposed Framework to Achieve CIA in IoT Networks. 10.1007/978-981-16-8546-0_3.
Almutairi, R., Bergami, G., & Morgan, G. (2024). Advancements and Challenges in IoT Simulators: A Comprehensive Review. Sensors, 24(5), 1511.
Meziane, Hind & Ouerdi, Noura. (2023). A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems. Scientific Reports. 13. 10.1038/s41598-023-46640-9.
Nikfam, F. (2024). Security and Privacy in Artificial Intelligence.
Eswari, B. R., & Saritha, V. (2025). Cyber Hacking Breaches Prediction Using Machine Learning Techniques. GAMANAM: Global Advances in Multidisciplinary Applications in Next-Gen And Modern Technologies, 1(1), 23-31.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Yashraj Mishra, Sanjay Pal

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.