INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 2 2024
DOI: 10.56201/ijcsmt.v10.no2.2024.pg141.156
Davies, I. N, and Taylor, O. E., Anireh V.I.E., Bennett E.O.
The advent of the Internet-of-Things (IoT) has revolutionized the realm of contemporary computing and networking. IoT-enabled devices which include smart home appliances and industrial sensors, have become extremely common, allowing for effortless connection and data sharing across different fields. However, in recent years, the rapid proliferation of IoT devices has created significant security challenges, necessitating robust and efficient intrusion detection and prevention systems. This study proposes a novel Distributed Intrusion Detection System (DIDS) for IoT-enabled networks and devices using a hybrid technique. The system integrates Case-Based Reasoning (CBR) as the primary detection engine with a Neuro-Fuzzy Inference System (NFIS) for tuning unknown traffic analysis, forming a Hybrid Case-Based Neuro-Fuzzy System (HCBNFS). Additionally, the system incorporates Elliptic Curve Cryptography (ECC) for device authentication and privacy preservation. The DIDS model was designed using the Object-Oriented Design Approach and evaluated using the CIC-IoT2022 dataset and a synthetic smart home dataset. The system achieved high performance metrics, including 99% accuracy and 99.5% precision, recall, and F1-score. This research contributes to enhancing cybersecurity in IoT environments by addressing the unique challenges posed by their distributed and heterogeneous nature, offering improved scalability, fault tolerance, and adaptability compared to traditional centralized intrusion detection systems.
Case-based Reasoning (CBR); Neuro-Fuzzy Inference System (NFIS); Elliptic Curve
[1]. Almseidin, M., Al-Sawwa, J., & Alkasassbeh, M. (2021). Anomaly-based Intrusion Detection
System using Fuzzy Logic. Paper presented at the 2021 International Conference on Information
Technology (ICIT).
[2]. Bensaid, R., Labraoui, N., Abba Ari, A. A., Maglaras, L., Saidi, H., Abdu Lwahhab, A. M., et
al. (2024). Toward a Real?Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro?Fuzzy
Classifier and SDN Assistance in Fog Computing. Security and Communication Networks,
2024(1), 6651584.
[3]. Cook, J., Rehman, S. U., & Khan, M. A. (2023). Security and Privacy for Low Power IoT
Devices on 5G and Beyond Networks: Challenges and Future Directions. IEEE Access, 11, 39295-
[4]. Davies, I., Taylor, O., Anireh, V., & Bennett, E. (2024). Adaptive Hybrid Case-Based Neuro-
Fuzzy Model for Intrusion Detection and Prevention for Smart Home Network. 12(5), 01-10.
[5]. Gad, A. R., Haggag, M., Nashat, A. A., & Barakat, T. M. (2022). A Distributed Intrusion
Detection System using Machine Learning for IoT based on ToN-IoT Dataset. International
Journal of Advance Computer Science and Applications, 13(6), 548-563.
[6]. Gokhale, P., Bhat, O., & Bhat, S. (2018). Introduction to IoT. International Advanced Research
Journal in Science, Engineering and Technology, 5(1), 41-44.
[7]. Hammi, B., Fayad, A., Khatoun, R., Zeadally, S., & Begriche, Y. (2020). A Lightweight ECC-
based Authentication Scheme for Internet of Things (IoT). IEEE Systems Journal, 14(3), 3440-
[8]. Hendaoui, F., Eltaief, H., & Youssef, H. (2017). FID: Fuzzy based Intrusion Detection for
Distributed Smart Devices. Paper presented at the 2017 IEEE/ACS 14th International Conference
on Computer Systems and Applications (AICCSA).
[9]. Johannesson, P., & Perjons, E. (2021). An Introduction to Design Science (2nd ed.).
Switzerland: Springer.
[10]. Jurcut, A. D., Ranaweera, P., & Xu, L. (2020). Introduction to IoT Security. IoT security:
advances in authentication, 27-64.
[11]. Kapetanakis, S., Filippoupolitis, A., Loukas, G., & Al Murayziq, T. S. (2014). Profiling Cyber
Attackers using Case-based Reasoning.
[12]. Nyangaresi, V. O. (2021). ECC based Authentication Scheme for Smart Homes. Paper
presented at the 63rd International Symposium ELMAR, Zadar, Croatia.
[13]. Rani, D., Gill, N. S., Gulia, P., Arena, F., & Pau, G. (2023). Design of an Intrusion Detection
Model for IoT-enabled Smart Home. IEEE Access, 11, 52509-52526.
[14]. Schoenborn, J. M., & Althoff, K.-D. (2023). A Multi-agent Case-Based Reasoning Intrusion
Detection System Prototype. Paper presented at the International Conference on Case-Based
Reasoning, Aberdeen, UK.
[15]. Velliangiri, S., Manoharn, R., Ramachandran, S., Venkatesan, K., Rajasekar, V., Karthikeyan,
P., et al. (2021). An Efficient Lightweight Privacy-Preserving Mechanism for Industry 4.0 Based
on Elliptic Curve Cryptography. IEEE Transactions on Industrial Informatics, 18(9), 6494-6502.
[16]. Wenming, S. (2021). Navigation Safety Early Warning Method Based on CBR and Millimeter
Wave Radar. Paper presented at the 2021 Fifth International Conference on I-SMAC (IoT in Social,
Mobile, Analytics and Cloud)(I-SMAC).
[17]. Zadeh, L. A. (1988). Fuzzy logic. Computer, 21(4), 83-93.