Deep Learning Techniques for Enhancing Cybersecurity in IoT ‎Networks

  • Authors

    • Bhavuk Samrat Chitkara Center for Research and Development, Chitkara University, Himachal Pradesh, India
    • Dr. Trapty Agarwal Associate Professor, Maharishi School of Engineering & Technology, Maharishi University of Information Technology, Uttar Pradesh, ‎India
    • Shashikant Deepak Assistant Professor, uGDX, ATLAS SkillTech University, Mumbai, India
    • Dr. Bharat Jyoti Ranjan Sahu Associate Professor, Center for Cyber Security, Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, Odisha, India
    • Dr. S. Emalda Roslin Professor, Department of Electronics and Communication Engineering, Sathyabama Institute of Science and Technology, Chennai, Tamil ‎Nadu, India
    • G. N. Mamatha Assistant Professor, Department of Electronics and Communication Engineering, Faculty of Engineering and Technology, JAIN ‎‎(Deemed-to-be University), Ramnagar District, Karnataka, India
    • Bhanu Juneja Center of Research Impact and Outcome, Chitkara University, Rajpura, Punjab, India
    https://doi.org/10.14419/h2qnce11

    Received date: May 2, 2025

    Accepted date: May 31, 2025

    Published date: October 31, 2025

  • Cyber Security; ML; DL and Risk; Security
  • Abstract

    The progression of internet technologies, such as Industry 4.0, IoT (Internet of Things), Industrial IoT, Medical of Things (MoI), and Web ‎‎3.0, has led to a continual increase in cybersecurity issues. These technologies improve users' lives by making devices accessible online. ‎This is sometimes referred to as the Internet of Everything, or IoE. With the rise in internet users and connected gadgets, fraudsters might ‎take advantage of susceptible hosts. The networked gadgets display specific weaknesses that enable their exploitation. Malicious software ‎such as malware, botnets, and intrusions can be utilized to compromise these devices. The ability of fileless malware to infiltrate a system ‎without leaving evidence of exploitation has been utilized by astute, systematic, and targeted hackers. The malicious software exploits the ‎system's vulnerabilities. As per OWASP (Open Web Application Security Project ¹, the ten most exploited vulnerabilities in 2021 ‎encompass server-side request forgery, injection, insecure design, compromised authentication, software and data integrity failure, security ‎misconfiguration, broken access control, and inadequate logging and monitoring. Machine learning and deep learning methodologies exhibit ‎promise in identifying the substantial cybersecurity dangers mentioned above. As a result, deep learning models were developed to identify ‎and categorize these risks.

  • References

    1. Maghrabi, L. A., Shabanah, S., Althaqafi, T., Alsalman, D., Algarni, S., Al-Malaise Al-Ghamdi, A., & Ragab, M. (2024). Enhancing cybersecurity in the internet of things environment using bald eagle search optimization with hybrid deep learning. IEEE Access, 12, 8337–8345. https://doi.org/10.1109/ACCESS.2024.3352568.
    2. Ferrag, M. A., Friha, O., Maglaras, L., Janicke, H., & Shu, L. (2021). Federated deep learning for cyber security in the internet of things: Concepts, applications, and experimental analysis. IEEE Access, 9, 138509–138542. https://doi.org/10.1109/ACCESS.2021.3118642.
    3. Robles, T., Alcarria, R., De Andrés, D. M., De la Cruz, M. N., Calero, R., Iglesias, S., & Lopez, M. (2015). An IoT based reference architecture for smart water management processes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6(1), 4–23.
    4. Ullah, F., Naeem, H., Jabbar, S., Khalid, S., Latif, M. A., Al-Turjman, F., &Mostarda, L. (2019). Cyber security threats detection in internet of things using deep learning approach. IEEE Access, 7, 124379–124389. https://doi.org/10.1109/ACCESS.2019.2937347.
    5. Pinto, L., Brito, C., Marinho, V., & Pinto, P. (2022). Assessing the relevance of cybersecurity training and policies to prevent and mitigate the impact of phishing attacks. Journal of Internet Services and Information Security, 12(4), 23–38. https://doi.org/10.58346/JISIS.2022.I4.002.
    6. Alkhudaydi, O. A., Krichen, M., & Alghamdi, A. D. (2023). A deep learning methodology for predicting cybersecurity attacks on the internet of things. Information, 14(10), 550. https://doi.org/10.3390/info14100550.
    7. Senthil, T., Rajan, C., & Deepika, J. (2021). An improved optimization technique using deep neural networks for digit recognition. Soft Computing, 21, 1647–1658. https://doi.org/10.1007/s00500-020-05262-3.
    8. Ghillani, D. (2022). Deep learning and artificial intelligence framework to improve the cyber security. Authorea Preprints. https://doi.org/10.22541/au.166379475.54266021/v1.
    9. Salman, R. H., & Alomari, E. S. (2023). Survey: Homomorphic encryption-based deep learning that preserves privacy. International Academic Jour-nal of Science and Engineering, 10(2), 153–163. https://doi.org/10.9756/IAJSE/V10I2/IAJSE1019.
    10. Roopak, M., Tian, G. Y., & Chambers, J. (2019). Deep learning models for cyber security in IoT networks. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 452–457). IEEE. https://doi.org/10.1109/CCWC.2019.8666588.
    11. Bharath, K. C. P., Udayakumar, R., Chaya, J., Mohanraj, B., & Vimal, V. R. (2024). An efficient intrusion detection solution for cloud computing en-vironments using integrated machine learning methodologies. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applica-tions.
    12. Perera, M., & Murshid, N. (2023). Payment for Ecosystem Services (PES) in Forest Management: A Pathway to Sustainable Climate Financ-ing. National Journal of Forest Sustainability and Climate Change, 1(1), 9-16.
    13. Havalam, N. K., & Bosco, R. M. (2025). High-efficiency solar-piezo hybrid energy harvester for long-term autonomous operation of smart agriculture sensor nodes. Progress in Electronics and Communication Engineering, 3(2), 36–43.*
    14. Ahmad, M., & Cide, F. (2025). AI-driven anomaly detection framework for industrial IoT using edge-enabled wireless sensor networks. Journal of Wireless Sensor Networks and IoT, 3(1), 33–39.
    15. Charabi, Y., & Wei, B. L. (2025). Scalable reconfigurable architectures for quantum-inspired computing: Design, challenges, and opportunities. SCCTS Transactions on Reconfigurable Computing, 3(2), 11–20.
    16. Hugh, Q., & Soria, F. (2025). Spatiotemporal transformer networks for real-time video-based anomaly detection in smart city surveillance. National Journal of Signal and Image Processing, 1(4).
    17. Barhoumia, E. M., & Caddwine, H. (2025). Reliability analysis and hardware fault injection for safety-critical embedded applications. Journal of Inte-grated VLSI, Embedded and Computing Technologies, 2(3), 63–72.
    18. Soria, F., & Metachew, K. (2025). Hybrid beamforming and physical layer security techniques for 6G massive MIMO communication systems. Na-tional Journal of RF Circuits and Wireless Systems, 3(1), 1–7.
    19. Zengeni, T. G., & Bates, M. P. (2025). Transformer-based end-to-end speech recognition for noisy real-world environments. National Journal of Speech and Audio Processing, 1(4), 1–8.
    20. Pavalam, S. M., & Babylatha, M. (2025). Smart sensor node design with energy harvesting for industrial IoT applications. National Journal of Electri-cal Electronics and Automation Technologies, 1(3), 10–18.
    21. Flammini, F., & Trasnea, G. (2025). Battery powered embedded system in IoT applications: Low power design techniques. SCCTS Journal of Em-bedded Systems Design and Applications, 2(2), 39–46.
    22. Alvarez, R. (2023). Integrating Precision Livestock Farming Technologies for Early Detection of Zoonotic Disease Outbreaks. National Journal of Animal Health and Sustainable Livestock, 1(1), 17-24.
    23. Abid, N. (2023). Enhanced IoT network security with machine learning techniques for anomaly detection and classification. International Journal of Current Engineering and Technology, 13(6), 536–544.
    24. Sadaram, G., Sakuru, M., Karaka, L. M., Reddy, M. S., Bodepudi, V., Boppana, S. B., & Maka, S. R. (2022). Internet of Things (IoT) cybersecurity enhancement through artificial intelligence: A study on intrusion detection systems. Universal Library of Engineering Technology, 2022. https://doi.org/10.70315/uloap.ulete.2022.001.
    25. Bhuvaneshwari, A. J., &Kaythry, P. (2023). A review of deep learning strategies for enhancing cybersecurity in networks: Deep learning strategies for enhancing cybersecurity. Journal of Scientific & Industrial Research (JSIR), 82(12), 1316–1330. https://doi.org/10.56042/jsir.v82i12.1702.
    26. Gonaygunta, H., Nadella, G. S., Pawar, P. P., & Kumar, D. (2024). Enhancing cybersecurity: The development of a flexible deep learning model for enhanced anomaly detection. In 2024 Systems and Information Engineering Design Symposium (SIEDS) (pp. 79–84). IEEE. https://doi.org/10.1109/SIEDS61124.2024.10534661.
    27. Kimbugwe, N., Pei, T., &Kyebambe, M. N. (2021). Application of deep learning for quality of service enhancement in internet of things: A re-view. Energies, 14(19), 6384. https://doi.org/10.3390/en14196384.
    28. Rashid, M. M., Kamruzzaman, J., Hassan, M. M., Imam, T., & Gordon, S. (2020). Cyberattacks detection in iot-based smart city applications using machine learning techniques. International Journal of environmental research and public health, 17(24), 9347. https://doi.org/10.3390/ijerph17249347.
    29. Bukhari, S. M. S., Zafar, M. H., Abou Houran, M., Qadir, Z., Moosavi, S. K. R., & Sanfilippo, F. (2024). Enhancing cybersecurity in Edge IIoT net-works: An asynchronous federated learning approach with a deep hybrid detection model. Internet of Things, 27, 101252. https://doi.org/10.1016/j.iot.2024.101252.
    30. Dutta, V., Choraś, M., Pawlicki, M., & Kozik, R. (2020). A deep learning ensemble for network anomaly and cyber-attack detection. Sensors, 20(16), 4583. https://doi.org/10.3390/s20164583.
    31. Soliman, S., Oudah, W., &Aljuhani, A. (2023). Deep learning-based intrusion detection approach for securing industrial Internet of Things. Alexandria Engineering Journal, 81, 371-383. https://doi.org/10.1016/j.aej.2023.09.023.
    32. Dixit, P., &Silakari, S. (2021). Deep learning algorithms for cybersecurity applications: A technological and status review. Computer science re-view, 39, 100317. https://doi.org/10.1016/j.cosrev.2020.100317.
  • Downloads

  • How to Cite

    Samrat , B. ., Agarwal , D. T. ., Deepak , S. ., Sahu , D. B. J. R. ., Roslin , D. S. E. ., Mamatha , G. N. ., & Juneja , B. . (2025). Deep Learning Techniques for Enhancing Cybersecurity in IoT ‎Networks. International Journal of Basic and Applied Sciences, 14(SI-1), 319-324. https://doi.org/10.14419/h2qnce11