Enhanced IoT Security and Intrusion Detection Using Optimized Hybrid Deep Learning and Advanced Encryption Techniques

Authors

  • Yashraj Mishra
  • Sanjay Pal

Keywords:

Internet of Things (IoT), Intrusion Detection System (IDS), Hybrid Convolutional Neural Network (HCNN), Calibrated Random Forest, Feature Selection, Enhanced Harris Hawks Optimization Algorithm (EHOA), Network Security, KH-AES Encryption, Anomaly Detection, Deep Learning, Cybersecurity, K-Means Clustering, Data Preprocessing, Real-time Threat Detection, Imbalanced Data Classification.

Abstract

This study introduces a hybrid deep learning architecture intended to improve intrusion detection and data security on the Internet of Things (IoT) platform. The model integrates Hierarchical Convolutional Neural Networks (HCNN) with a Calibrated Random Forest (RF) classifier, leveraging the spatial feature extraction and structured decision-making power. For better accuracy and lower complexity, the Enhanced Harris Hawks Optimization Algorithm (EHOA) is employed for feature selection. The system handles IoT network traffic via K-Means Clustering, label encoding, and normalization for proper input preparation for model training. Evaluation is done through principal metrics such as accuracy, precision, recall, F1-score, ROC-AUC, and PR-AUC. The model attains an accuracy of 83.41%, a precision of 85.29%, a recall of 74.3%, and an F1-score of 79.42%, with a high capability for detection even on imbalanced datasets. Furthermore, a KH-AES (AES-128) encryption mechanism is incorporated to protect data transfer, transforming sensitive traffic into ciphertext encryption while maintaining confidentiality and integrity. The hybrid method provides real-time and scalable anomaly detection while keeping false positives at a low level. With the integration of sophisticated feature selection, deep learning, and encryption, the system provides an efficient solution for managing the intricate security issues found in contemporary IoT networks.

Downloads

Download data is not yet available.

Author Biographies

  • Yashraj Mishra

    M.Tech Scholar

    Department of Computer Science & Engineering

    Oriental Institute of Science and Technology Bhopal, Madhya Pradesh, India

  • Sanjay Pal

    Professor

    Department of Computer Science & Engineering

    Oriental Institute of Science and Technology Bhopal, Madhya Pradesh, India

References

Sun, P., Wan, Y., Wu, Z., Fang, Z., & Li, Q. (2025). A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions. Computers & Security, 148, 104097.

Mansoor, K., Afzal, M., Iqbal, W., & Abbas, Y. (2025). Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. Cluster Computing, 28(2), 93.

Popoola, O., Rodrigues, M., Marchang, J., Shenfield, A., Ikpehai, A., & Popoola, J. (2024). A critical literature review of security and privacy in smart home healthcare schemes adopting IoT & blockchain: problems, challenges and solutions. Blockchain: Research and Applications, 5(2), 100178.

Asonze, C. U., Ogungbemi, O. S., Ezeugwa, F. A., Olisa, A. O., Akinola, O. I., & Olaniyi, O. O. (2024). Evaluating the trade-offs between wireless security and performance in IoT networks: A case study of web applications in AI-driven home appliances. Available at SSRN 4927991.

Mangla, Monika & Ambarkar, Smita & Akhare, Rakhi & Deokar, Sanjivani & Mohanty, Sachi & Satpathy, Suneeta. (2022). A Proposed Framework to Achieve CIA in IoT Networks. 10.1007/978-981-16-8546-0_3.

Almutairi, R., Bergami, G., & Morgan, G. (2024). Advancements and Challenges in IoT Simulators: A Comprehensive Review. Sensors, 24(5), 1511.

Meziane, Hind & Ouerdi, Noura. (2023). A survey on performance evaluation of artificial intelligence algorithms for improving IoT security systems. Scientific Reports. 13. 10.1038/s41598-023-46640-9.

Nikfam, F. (2024). Security and Privacy in Artificial Intelligence.

Eswari, B. R., & Saritha, V. (2025). Cyber Hacking Breaches Prediction Using Machine Learning Techniques. GAMANAM: Global Advances in Multidisciplinary Applications in Next-Gen And Modern Technologies, 1(1), 23-31.

Downloads

Published

05/26/2025

Issue

Section

Articles

How to Cite

Enhanced IoT Security and Intrusion Detection Using Optimized Hybrid Deep Learning and Advanced Encryption Techniques. (2025). SMART MOVES JOURNAL IJOSCIENCE, 11(5), 8-20. https://ijoscience.com/index.php/ojsscience/article/view/556

Similar Articles

11-20 of 306

You may also start an advanced similarity search for this article.