{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:37:11Z","timestamp":1774600631766,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:00:00Z","timestamp":1758844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.mdpi.com"],"crossmark-restriction":true},"short-container-title":["Computation"],"abstract":"<jats:p>The Internet of Things (IoT) has surfaced as a revolutionary technology, enabling ubiquitous connectivity between devices and revolutionizing traditional lifestyles through smart automation. As IoT systems proliferate, securing device-to-device communication and server\u2013client data exchange has become crucial. This paper presents a novel security framework that integrates elliptic curve cryptography (ECC) with artificial neural networks (ANNs) to enhance the Message Queuing Telemetry Transport (MQTT) protocol. Our study evaluated multiple machine learning algorithms, with ANN demonstrating superior performance in anomaly detection and classification. The hybrid approach not only encrypts communications but also employs the optimized ANN model to detect and classify anomalous traffic patterns. The proposed model demonstrates robust security features, successfully identifying and categorizing various attack types with 90.38% accuracy while maintaining message confidentiality through ECC encryption. Notably, this framework retains the lightweight characteristics essential for IoT devices, making it especially relevant for environments where resources are constrained. To our knowledge, this represents the first implementation of an integrated ECC-ANN approach for securing MQTT-based IoT communications, offering a promising solution for next-generation IoT security requirements.<\/jats:p>","DOI":"10.3390\/computation13100227","type":"journal-article","created":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T10:39:37Z","timestamp":1758883177000},"page":"227","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning-Assisted Cryptographic Security: A Novel ECC-ANN Framework for MQTT-Based IoT Device Communication"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3458-8673","authenticated-orcid":false,"given":"Kalimu","family":"Karimunda","sequence":"first","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2937-9769","authenticated-orcid":false,"given":"Jean de Dieu Marcel","family":"Ufitikirezi","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2501-6570","authenticated-orcid":false,"given":"Roman","family":"Bumb\u00e1lek","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8432-1095","authenticated-orcid":false,"given":"Tom\u00e1\u0161","family":"Zoubek","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"given":"Petr","family":"Barto\u0161","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"given":"Radim","family":"Kune\u0161","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"given":"Sandra Nicole","family":"Umurungi","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"given":"Anozie","family":"Chukwunyere","sequence":"additional","affiliation":[{"name":"Department of Technology and Cybernetics, Faculty of Agriculture and Technology, University of South Bohemia in Ceske Budejovice, Studentska 1668, 37005 Ceske Budejovice, Czech Republic"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4949-0878","authenticated-orcid":false,"given":"Mutagisha","family":"Norbelt","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District, Beijing 100191, China"}]},{"given":"Gao","family":"Bo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Jiaotong University, 3 Shangyuancun, Haidian District, Beijing 100044, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,9,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1016\/j.jksuci.2016.10.003","article-title":"A Survey on Internet of Things Architectures","volume":"30","author":"Ray","year":"2018","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Hussein, A.H. (2019). Internet of Things (IOT): Research Challenges and Future Applications. Int. J. Adv. Comput. Sci. Appl., 10.","DOI":"10.14569\/IJACSA.2019.0100611"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Sadhu, P.K., Yanambaka, V.P., and Abdelgawad, A. (2022). Internet of Things: Security and Solutions Survey. Sensors, 22.","DOI":"10.3390\/s22197433"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Khan, R., Khan, S.U., Zaheer, R., and Khan, S. (2012, January 17\u201319). Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges. Proceedings of the 2012 10th International Conference on Frontiers of Information Technology, Islamabad, Pakistan.","DOI":"10.1109\/FIT.2012.53"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Andy, S., Rahardjo, B., and Hanindhito, B. (2017, January 19\u201321). Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System. Proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia.","DOI":"10.1109\/EECSI.2017.8239179"},{"key":"ref_6","unstructured":"IoT Security Foundation (2025, March 25). The State of Vulnerability Disclosure Policy (VDP) Usage in Global Consumer IoT in 2024. Available online: https:\/\/iotsecurityfoundation.org\/wp-content\/uploads\/2024\/11\/The-State-of-Vulnerability-Disclosure-Usage-in-Global-Consumer-IoT-in-2024.pdf."},{"key":"ref_7","unstructured":"Palo Alto Networks (2025, March 25). 2020 Unit 42 IoT Threat Report. Available online: https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Naik, N. (2017, January 11\u201313). Choice of Effective Messaging Protocols for IoT Systems: MQTT, CoAP, AMQP and HTTP. Proceedings of the 2017 IEEE International Systems Engineering Symposium (ISSE), Vienna, Austria.","DOI":"10.1109\/SysEng.2017.8088251"},{"key":"ref_9","first-page":"8","article-title":"Internet of Things: A Survey on the Security of IoT Frameworks","volume":"38","author":"Ammar","year":"2018","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"4431","DOI":"10.1109\/JSYST.2021.3057047","article-title":"Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones","volume":"15","author":"Hussain","year":"2021","journal-title":"IEEE Syst. J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT Security: Review, Blockchain Solutions, and Open Challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1646","DOI":"10.1109\/COMST.2020.2988293","article-title":"A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security","volume":"22","author":"Mohamed","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","unstructured":"Roy, N.R., Tanwar, S., and Batra, U. Hybrid Lightweight Cryptography Using AES and ECC for IoT Security. Proceedings of the Cyber Security and Digital Forensics."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"155","DOI":"10.4236\/cn.2020.124008","article-title":"A Hybrid IoT Security Model of MQTT and UMA","volume":"12","author":"Aloufi","year":"2020","journal-title":"Commun. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/COMST.2024.3430368","article-title":"A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions","volume":"27","author":"Aouedi","year":"2025","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Szymoniak, S., and Kesar, S. (2023). Key Agreement and Authentication Protocols in the Internet of Things: A Survey. Appl. Sci., 13.","DOI":"10.3390\/app13010404"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"108338","DOI":"10.1016\/j.comnet.2021.108338","article-title":"Performance Evaluation of CoAP and MQTT with Security Support for IoT Environments","volume":"197","author":"Seoane","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Al-Ani, A., Shen, W.K., Al-Ani, A.K., Laghari, S.A., and Elejla, O.E. (2023, January 24\u201327). Evaluating Security of MQTT Protocol in Internet of Things. Proceedings of the 2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Regina, SK, Canada.","DOI":"10.1109\/CCECE58730.2023.10288857"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/s42979-021-00592-x","article-title":"Machine Learning: Algorithms, Real-World Applications and Research Directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"6969","DOI":"10.1007\/s10115-025-02429-y","article-title":"Artificial Intelligence and Machine Learning in Cybersecurity: A Deep Dive into State-of-the-Art Techniques and Future Paradigms","volume":"67","author":"Mohamed","year":"2025","journal-title":"Knowl. Inf. Syst."},{"key":"ref_21","unstructured":"Hannoon, A., and Mahmood, A. (2023). A Comprehensive Review of Machine Learning-Based Intrusion Detection Techniques for IoT Networks. Artificial Intelligence, Internet of Things, and Society 5.0, Springer Nature."},{"key":"ref_22","first-page":"1","article-title":"Classification and Regression Trees: The Use and Significance of Trees in Analytics","volume":"5","author":"Sharma","year":"2022","journal-title":"J. Recent Innov. Cloud Comput. Virtualiz. Web Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"245","DOI":"10.21786\/bbrc\/13.14\/57","article-title":"A Detailed Review on Decision Tree and Random Forest","volume":"13","author":"Talekar","year":"2020","journal-title":"Biosci. Biotechnol. Res. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.22214\/ijraset.2023.54192","article-title":"Predicting Online Customer Purchase Using Gradient Boost Classifier","volume":"11","author":"Sreekumar","year":"2023","journal-title":"Int. J. Res. Appl. Sci. Eng. Technol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.20884\/1.jutif.2022.3.5.328","article-title":"Prediction of the English Premier League Champion Team for the 2021\/2022 Season Using the Na\u00efve Bayes Method","volume":"3","author":"Yudistira","year":"2022","journal-title":"J. Tek. Inform. (Jutif)"},{"key":"ref_26","unstructured":"Yu, J., Yang, L., Xu, N., Yang, J., and Huang, T.S. (2018). Slimmable Neural Networks. arXiv."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"426","DOI":"10.33395\/sinkron.v9i1.13202","article-title":"Multilayer Perceptron Performance Analysis in Liver Disease Classification","volume":"8","author":"Pradipta","year":"2024","journal-title":"SinkrOn"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., and Cambiaso, E. (2020). MQTTset, a New Dataset for Machine Learning Techniques on MQTT. Sensors, 20.","DOI":"10.3390\/s20226578"},{"key":"ref_29","first-page":"9053","article-title":"RSA and ECC: A Comparative Analysis","volume":"12","author":"Mahto","year":"2017","journal-title":"Int. J. Appl. Eng. Res."}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/10\/227\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T10:55:53Z","timestamp":1758884153000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/10\/227"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,26]]},"references-count":29,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2025,10]]}},"alternative-id":["computation13100227"],"URL":"https:\/\/doi.org\/10.3390\/computation13100227","relation":{},"ISSN":["2079-3197"],"issn-type":[{"value":"2079-3197","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,26]]}}}