A Fuzzy-Based Deep Kronecker Stacked Autoencoder for Attack Detection in Social IoT
Received: 15 April 2025 | Revised: 29 April 2025, 22 May 2025, and 3 June 2025 | Accepted: 6 June 2025 | Online: 29 July 2025
Corresponding author: Divya S.
Abstract
The Social Internet of Things (SIoT) combines the IoT and social networks. This paper introduces the Fuzzy Deep Kronecker Stacked Autoencoder (Fuzzy-DKSA), an innovative attack detection model tailored to security issues in the SIoT. The model employs Z-score normalization for consistent data scaling, followed by feature fusion using a Deep Neural Network (DNN) enhanced by the Gower similarity measure. The detection phase utilizes the strengths of the Deep Kronecker Network (DKN) and the Deep Stacked Autoencoder (DSA), incorporating fuzzy logic to dynamically adapt to various attack patterns and network conditions. The Fuzzy-DKSA model demonstrates impressive performance, achieving 92% accuracy, 91% F-score, and 91% precision, outperforming existing models such as GAN, MH-CNN-AM, TM-MLA, and HAD in attack detection capabilities, showcasing the potential of fuzzy logic in enhancing security solutions for SIoT.
Keywords:
deep learning, Social Internet of Things (SIoT), malicious attacks, Deep Kronecker Network (DKN), intrusion detectionDownloads
References
R. Latif, "ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things," IEEE Access, vol. 10, pp. 46526–46537, 2022.
S. Divya, R. Tanuja, S. H. Manjula, and K. R. Venugopal, "Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing," in Proceedings of 4th International Conference on Frontiers in Computing and Systems, 2024, pp. 103–113.
S. Divya and R. Tanuja, "Enhancing SIoT Security Through Advanced Machine Learning Techniques for Intrusion Detection," in Communication and Intelligent Systems, 2024, pp. 105–116.
M. Rahouti, M. Ayyash, S. K. Jagatheesaperumal, and D. Oliveira, "Incremental Learning Implementations and Vision for Cyber Risk Detection in IoT," IEEE Internet of Things Magazine, vol. 4, no. 3, pp. 114–119, Sep. 2021.
M. A. Alqarni and S. H. Chauhdary, "A Security Scheme for Statistical Anomaly Detection and the Mitigation of Rank Attacks in RPL Networks (IoT Environment)," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12409–12414, Dec. 2023.
T. Al-Shurbaji et al., "Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review," IEEE Access, vol. 13, pp. 11792–11822, 2025.
R. M.s., S. Pattar, R. Buyya, V. K.r., S. S. Iyengar, and L. M. Patnaik, "Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions," Computer Communications, vol. 139, pp. 32–57, May 2019.
L. Nie et al., "Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach," IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 134–145, Oct. 2022.
R. M. Das et al., "A novel deep learning-based approach for detecting attacks in social IoT," Soft Computing, May 2023.
C. Marche and M. Nitti, "Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3297–3308, Sep. 2021.
G. H. C. de Oliveira, A. de Souza Batista, M. Nogueira, and A. L. dos Santos, "An access control for IoT based on network community perception and social trust against Sybil attacks," International Journal of Network Management, vol. 32, no. 1, 2022, Art. no. e2181.
P. Hankare, S. Babar, and P. Mahalle, "Trust Management Approach for Detection of Malicious Devices in SIoT," Tehnički glasnik, vol. 15, no. 1, pp. 43–50, Mar. 2021.
M. S. Mekala, G. Srivastava, J. H. Park, and H. Y. Jung, "An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT," Digital Communications and Networks, vol. 8, no. 6, pp. 900–910, Dec. 2022.
M. Ramesh Babu and K. N. Veena, "Optimal DBN-based distributed attack detection model for Internet of Things," International Journal of Communication Systems, vol. 33, no. 17, 2020, Art. no. e4595.
A. A. Diro and N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, vol. 82, pp. 761–768, May 2018.
M. Z. Al-Faiz, A. A. Ibrahim, and S. M. Hadi, "The effect of Z-Score standardization (normalization) on binary input due the speed of learning in back-propagation neural network," Iraqi Journal of Information and Communication Technology, vol. 1, no. 3, pp. 42–48, 2018.
H. Mohsen, E. S. A. El-Dahshan, E. S. M. El-Horbaty, and A. B. M. Salem, "Classification using deep learning neural networks for brain tumors," Future Computing and Informatics Journal, vol. 3, no. 1, pp. 68–71, Jun. 2018.
S. H. Cha, "Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions," International Journal of Mathematical models and Methods in Applied Sciences, vol. 1, no. 4, pp. 300–307, 2007.
L. Feng and G. Yang, "Deep Kronecker network," Biometrika, vol. 111, no. 2, pp. 707–714, Jun. 2024.
A. Dairi, F. Harrou, Y. Sun, and M. Senouci, "Obstacle Detection for Intelligent Transportation Systems Using Deep Stacked Autoencoder and k-Nearest Neighbor Scheme," IEEE Sensors Journal, vol. 18, no. 12, pp. 5122–5132, Jun. 2018.
Y. Meidan et al., "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Apr. 2018.
"N-BaIoT Dataset to Detect IoT Botnet Attacks." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/mkashifn/nbaiot-dataset.
Downloads
How to Cite
License
Copyright (c) 2025 S. Divya, R. Tanuja

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.