{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T14:17:05Z","timestamp":1772115425103,"version":"3.50.1"},"reference-count":49,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T00:00:00Z","timestamp":1625616000000},"content-version":"vor","delay-in-days":187,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004686","name":"Deanship of Scientific Research, King Faisal University","doi-asserted-by":"publisher","award":["206068"],"award-info":[{"award-number":["206068"]}],"id":[{"id":"10.13039\/501100004686","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Smart grids, advanced information technology, have become the favored intrusion targets due to the Internet of Things (IoT) using sensor devices to collect data from a smart grid environment. These data are sent to the cloud, which is a huge network of super servers that provides different services to different smart infrastructures, such as smart homes and smart buildings. These can provide a large space for attackers to launch destructive cyberattacks. The novelty of this proposed research is the development of a robust framework system for detecting intrusions based on the IoT environment. An IoTID20 dataset attack was employed to develop the proposed system; it is a newly generated dataset from the IoT infrastructure. In this framework, three advanced deep learning algorithms were applied to classify the intrusion: a convolution neural network (CNN), a long short\u2010term memory (LSTM), and a hybrid convolution neural network with the long short\u2010term memory (CNN\u2010LSTM) model. The complexity of the network dataset was dimensionality reduced, and to improve the proposed system, the particle swarm optimization method (PSO) was used to select relevant features from the network dataset. The obtained features were processed using deep learning algorithms. The experimental results showed that the proposed systems achieved accuracy as follows: CNN\u2009=\u200996.60%, LSTM\u2009=\u200999.82%, and CNN\u2010LSTM\u2009=\u200998.80%. The proposed framework attained the desired performance on a new variable dataset, and the system will be implemented in our university IoT environment. The results of comparative predictions between the proposed framework and existing systems showed that the proposed system more efficiently and effectively enhanced the security of the IoT environment from attacks. The experimental results confirmed that the proposed framework based on deep learning algorithms for an intrusion detection system can effectively detect real\u2010world attacks and is capable of enhancing the security of the IoT environment.<\/jats:p>","DOI":"10.1155\/2021\/5579851","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T19:36:54Z","timestamp":1625686614000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":116,"title":["Intrusion Detection System to Advance Internet of Things Infrastructure\u2010Based Deep Learning Algorithms"],"prefix":"10.1155","volume":"2021","author":[{"given":"Hasan","family":"Alkahtani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1822-1357","authenticated-orcid":false,"given":"Theyazn H. H.","family":"Aldhyani","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,7]]},"reference":[{"key":"e_1_2_8_1_2","article-title":"Adaptive anomaly detection framework model objects in cyberspace","volume":"6660489","author":"Alkahtani H.","year":"2020","journal-title":"Applied Bionics and Biomechanics"},{"key":"e_1_2_8_2_2","first-page":"130","article-title":"Intelligent time series model to predict bandwidth utilization","volume":"14","author":"Aldhyani T.","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_2_8_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2723570"},{"key":"e_1_2_8_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3015584"},{"key":"e_1_2_8_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2954791"},{"key":"e_1_2_8_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3009169"},{"key":"e_1_2_8_7_2","volume-title":"Internet of Things by the Numbers: What New Surveys Found","author":"Press G.","year":"2018"},{"key":"e_1_2_8_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"e_1_2_8_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2020.100973"},{"key":"e_1_2_8_10_2","unstructured":"JoshiM.andHadiT. H. A Review of Network Traffic Analysis and Prediction Techniques 2015 https:\/\/arxiv.org\/abs\/1507.05722."},{"key":"e_1_2_8_11_2","first-page":"199","article-title":"Analysis of dimensionality reduction in intrusion detection","volume":"4","author":"Aldhyani T.","year":"2014","journal-title":"International Journal of Computational Intelligence and Informatics"},{"key":"e_1_2_8_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/1728303"},{"key":"e_1_2_8_13_2","first-page":"216","article-title":"Electricity theft detection in AMI using customers\u2019 consumption patterns","volume":"7","author":"Jokar P.","year":"2017","journal-title":"Institute of Electrical and Electronics Engineers Transactions on Smart Grid"},{"key":"e_1_2_8_14_2","doi-asserted-by":"crossref","unstructured":"AlseiariF. A. A.andAungZ. Real-time anomaly-based distributed intrusion detection systems for advanced Metering Infrastructure utilizing stream data mining Proceedings of the International Conference on Smart Grid & Clean Energy Technologies October 2015 Offenburg Germany.","DOI":"10.1109\/ICSGCE.2015.7454287"},{"key":"e_1_2_8_15_2","doi-asserted-by":"crossref","unstructured":"VijayanandR. DevarajD. andKannapiranB. Support vector machine based intrusion detection system with reduced input featuresfor advanced metering infrastructure of smart grid Proceedings of the 4th International Conference on Advanced Computing and Communication Systems January 2017 Coimbatore India.","DOI":"10.1109\/ICACCS.2017.8014590"},{"key":"e_1_2_8_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2016.2543145"},{"key":"e_1_2_8_17_2","doi-asserted-by":"crossref","unstructured":"BoumkheldN. GhoghoM. andKoutbiM. E. Intrusion detection system for the detection of blackhole attacks in a smart grid Proceedings of the 4th International Symposium on Computational and Business Intelligence September 2016 Olten Switzerland.","DOI":"10.1109\/ISCBI.2016.7743267"},{"key":"e_1_2_8_18_2","first-page":"1800","article-title":"Intrusion detection and prevention for ZigBee-based home area networks in smart grids","volume":"9","author":"Jokar P.","year":"2016","journal-title":"Institute of Electrical and Electronics Engineers Transactions on Smart Grid"},{"key":"e_1_2_8_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/en12173310"},{"key":"e_1_2_8_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2780250"},{"key":"e_1_2_8_21_2","doi-asserted-by":"crossref","unstructured":"VinayakumarR. SomanK. P. andPoornachandranP. Applying convolutional neural network for network intrusion detection Proceedings of the International Conference on Advances in Computing Communications and Informatics September 2017 Karnataka India.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"e_1_2_8_22_2","doi-asserted-by":"crossref","unstructured":"UllahA. JavaidN. andOmajiS. CNN and GRU based deep neural network for electricity theft detection to secure smart grid Proceedings of the 2020 International Wireless Communications and Mobile Computing June 2020 Limassol Cyprus.","DOI":"10.1109\/IWCMC48107.2020.9148314"},{"key":"e_1_2_8_23_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/4705982"},{"key":"e_1_2_8_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2904620"},{"key":"e_1_2_8_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2917299"},{"key":"e_1_2_8_26_2","doi-asserted-by":"crossref","unstructured":"ChakravarthiS. S.andVeluruS. A review on intrusion detection techniques and intrusion detection systems in MANETs Proceedings of the International Conference on Computational Intelligence and Communication Networks November 2014 Bhopal India.","DOI":"10.1109\/CICN.2014.159"},{"key":"e_1_2_8_27_2","doi-asserted-by":"crossref","unstructured":"SantosL. RabadaoC. andGoncalvesR. Intrusion detection systems in Internet of Things: a literature review Proceedings of the 13th Iberian Conference on Information Systems and Technologies (Cisti) June 2018 Caceres Spain.","DOI":"10.23919\/CISTI.2018.8399291"},{"key":"e_1_2_8_28_2","doi-asserted-by":"crossref","unstructured":"MohamedA. B. IdrisN. B. andShanmugumB. A brief introduction to intrusion detection system Proceedings of the Trends in Intelligent Robotics Automation and Manufacturing Proceedings of the IRAM 2012 November 2012 Kuala Lumpur Malaysia Communications in Computer and Information Science.","DOI":"10.1007\/978-3-642-35197-6_29"},{"key":"e_1_2_8_29_2","unstructured":"PonnambalamS. G. ParkkinenJ. andRamanathanK. C. Trends in intelligent robotics automation and manufacturing 330 Proceedings of the International Conference on Intelligent Robotics Automation and Manufacturing November 2012 Kuala Lumpur Malaysia Springer."},{"key":"e_1_2_8_30_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/1750637"},{"key":"e_1_2_8_31_2","doi-asserted-by":"crossref","unstructured":"KapitonovA. LonshakovS. KrupenkinA. andBermanI. Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs Proceedings of theWorkshop on Research Education and Development of Unmanned Aerial Systems (RED-UAS) October 2017 Linkoping Sweden 84\u201389 [CrossRef].","DOI":"10.1109\/RED-UAS.2017.8101648"},{"key":"e_1_2_8_32_2","doi-asserted-by":"crossref","unstructured":"LiangC. ShanmugamB. AzamS. JonkmanM. BoerF. D. andNarayansamyG. Intrusion detection system for internet of things based on a machine learning approach Proceedings of the International Conference on Vision towards Emerging Trends in Communication and Networking (ViTECoN) March 2019 Vellore India 1\u20136 [CrossRef].","DOI":"10.1109\/ViTECoN.2019.8899448"},{"key":"e_1_2_8_33_2","article-title":"Agent-based internet of things: state-of-the-art and research challenges","volume":"102","author":"Savaglio C.","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"e_1_2_8_34_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1128-z"},{"key":"e_1_2_8_35_2","doi-asserted-by":"crossref","unstructured":"KasinathanP. CostamagnaG. KhaleelH. PastroneC. andSpiritoM. A. DEMO: an IDS framework for internet of things empowered by 6LoWPAN Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security November 2013 Berlin Germany.","DOI":"10.1145\/2508859.2512494"},{"key":"e_1_2_8_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2752-6_49"},{"key":"e_1_2_8_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.01.023"},{"key":"e_1_2_8_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.043"},{"key":"e_1_2_8_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2796561"},{"key":"e_1_2_8_40_2","first-page":"88","article-title":"Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning","volume":"4","author":"Azmoodeh A.","year":"2018","journal-title":"Institute of Electrical and Electronics Engineers Transactions on Sustainable Computing"},{"key":"e_1_2_8_41_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21020656"},{"key":"e_1_2_8_42_2","doi-asserted-by":"crossref","unstructured":"KennedyJ.andEberhartR. C. Particle swarm optimization Proceedings of the IEEE Int. Conf. Neural Networks November 1995 Perth Australia 1942\u20131948.","DOI":"10.1109\/ICNN.1995.488968"},{"key":"e_1_2_8_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.04.020"},{"key":"e_1_2_8_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.06.019"},{"key":"e_1_2_8_45_2","doi-asserted-by":"crossref","unstructured":"McDermottC. D. MajdaniF. andPetrovskiA. V. Botnet detection in the internet of things using deep learning approaches Proceedings of the 2018 International Joint Conference on Neural Networks (IJCNN) July 2018 Rio de Janeiro Brazil 1\u20138 [CrossRef].","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"e_1_2_8_46_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/6659314"},{"key":"e_1_2_8_47_2","doi-asserted-by":"crossref","unstructured":"BasseyJ. AdesinaD. LiX. QianL. AvedA. andKroeckerT. Intrusion detection for IoT devices based on RF fingerprinting using deep learning Proceedings of the 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) June 2019 Rome Italy 98\u2013104 [CrossRef].","DOI":"10.1109\/FMEC.2019.8795319"},{"key":"e_1_2_8_48_2","doi-asserted-by":"publisher","DOI":"10.3390\/su12229322"},{"key":"e_1_2_8_49_2","volume-title":"Advances in Artificial Intelligence. Canadian AI 2020. Lecture Notes in Computer Science","author":"Ullah I.","year":"2020"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5579851.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2021\/5579851.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5579851","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T21:24:52Z","timestamp":1723238692000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5579851"}},"subtitle":[],"editor":[{"given":"M. Irfan","family":"Uddin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5579851"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5579851","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"value":"1076-2787","type":"print"},{"value":"1099-0526","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-02-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5579851"}}