Skip to main content

ORIGINAL RESEARCH article

Front. Comput. Sci.
Sec. Computer Security
Volume 6 - 2024 | doi: 10.3389/fcomp.2024.1477501
This article is part of the Research Topic Cyber Security Prevention, Defenses Driven by AI, and Mathematical Modelling and Simulation Tools View all articles

Deep Learning Approaches for Protecting IoT Devices in Smart Homes from MitM Attacks

Provisionally accepted
  • 1 Carthage University, Tunis, Tunisia
  • 2 Oslo Metropolitan University, Oslo, Norway

The final, formatted version of the article will be published soon.

    The primary objective of this paper is to enhance the security of IoT devices in Software-Defined Networking (SDN) environments against Man-in-the-Middle (MitM) attacks in smart homes using Artificial Intelligence (AI) methods as part of an Intrusion Detection and Prevention System (IDPS) framework. This framework aims to authenticate communication parties, ensure overall system and network security within SDN environments, and foster trust among users and stakeholders.The experimental analysis focuses on machine learning (ML) and deep learning (DL) algorithms, particularly those employed in Intrusion Detection Systems (IDS), such as Naive Bayes (NB), k-Nearest Neighbors (kNN), Random Forest (RF), and Convolutional Neural Networks (CNN). The CNN algorithm demonstrates exceptional performance on the training dataset, achieving 99.96% accuracy with minimal training time. It also shows favorable results in terms of detection speed, requiring only 1 second, and maintains a low False Alarm Rate (FAR) of 0.02%. Subsequently, the proposed framework was deployed in a testbed SDN environment to evaluate its detection capabilities across diverse network topologies, showcasing its efficiency compared to existing approaches.

    Keywords: Man-in-the-Middle, ARP spoofing, Software Defined Networking, machine learning, Internet of Things, Smart home, cybersecurity, Intrusion detection system

    Received: 07 Aug 2024; Accepted: 07 Oct 2024.

    Copyright: © 2024 Karmous, Ben Dhiab, Ould-Elhassen Aoueileyine, Youssef, BOUALLEGUE and Yazidi. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence:
    Nader Karmous, Carthage University, Tunis, Tunisia
    Anis Yazidi, Oslo Metropolitan University, Oslo, 0130, Norway

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.