A Fuzzy-Based Deep Kronecker Stacked Autoencoder for Attack Detection in Social IoT

Authors

  • Divya S. Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bengaluru, India
  • R. Tanuja Department of Computer Science and Engineering, University Visvesvaraya College of Engineering, Bangalore University, Bengaluru, India
Volume: 15 | Issue: 5 | Pages: 26189-26193 | October 2025 | https://doi.org/10.48084/etasr.11510

Abstract

The Social Internet of Things (SIoT) combines the IoT and social networks. This paper introduces the Fuzzy Deep Kronecker Stacked Autoencoder (Fuzzy-DKSA), an innovative attack detection model tailored to security issues in the SIoT. The model employs Z-score normalization for consistent data scaling, followed by feature fusion using a Deep Neural Network (DNN) enhanced by the Gower similarity measure. The detection phase utilizes the strengths of the Deep Kronecker Network (DKN) and the Deep Stacked Autoencoder (DSA), incorporating fuzzy logic to dynamically adapt to various attack patterns and network conditions. The Fuzzy-DKSA model demonstrates impressive performance, achieving 92% accuracy, 91% F-score, and 91% precision, outperforming existing models such as GAN, MH-CNN-AM, TM-MLA, and HAD in attack detection capabilities, showcasing the potential of fuzzy logic in enhancing security solutions for SIoT.

Keywords:

deep learning, Social Internet of Things (SIoT), malicious attacks, Deep Kronecker Network (DKN), intrusion detection

Downloads

Download data is not yet available.

References

R. Latif, "ConTrust: A Novel Context-Dependent Trust Management Model in Social Internet of Things," IEEE Access, vol. 10, pp. 46526–46537, 2022.

S. Divya, R. Tanuja, S. H. Manjula, and K. R. Venugopal, "Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing," in Proceedings of 4th International Conference on Frontiers in Computing and Systems, 2024, pp. 103–113.

S. Divya and R. Tanuja, "Enhancing SIoT Security Through Advanced Machine Learning Techniques for Intrusion Detection," in Communication and Intelligent Systems, 2024, pp. 105–116.

M. Rahouti, M. Ayyash, S. K. Jagatheesaperumal, and D. Oliveira, "Incremental Learning Implementations and Vision for Cyber Risk Detection in IoT," IEEE Internet of Things Magazine, vol. 4, no. 3, pp. 114–119, Sep. 2021.

M. A. Alqarni and S. H. Chauhdary, "A Security Scheme for Statistical Anomaly Detection and the Mitigation of Rank Attacks in RPL Networks (IoT Environment)," Engineering, Technology & Applied Science Research, vol. 13, no. 6, pp. 12409–12414, Dec. 2023.

T. Al-Shurbaji et al., "Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review," IEEE Access, vol. 13, pp. 11792–11822, 2025.

R. M.s., S. Pattar, R. Buyya, V. K.r., S. S. Iyengar, and L. M. Patnaik, "Social Internet of Things (SIoT): Foundations, thrust areas, systematic review and future directions," Computer Communications, vol. 139, pp. 32–57, May 2019.

L. Nie et al., "Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: A Generative Adversarial Network-Based Approach," IEEE Transactions on Computational Social Systems, vol. 9, no. 1, pp. 134–145, Oct. 2022.

R. M. Das et al., "A novel deep learning-based approach for detecting attacks in social IoT," Soft Computing, May 2023.

C. Marche and M. Nitti, "Trust-Related Attacks and Their Detection: A Trust Management Model for the Social IoT," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3297–3308, Sep. 2021.

G. H. C. de Oliveira, A. de Souza Batista, M. Nogueira, and A. L. dos Santos, "An access control for IoT based on network community perception and social trust against Sybil attacks," International Journal of Network Management, vol. 32, no. 1, 2022, Art. no. e2181.

P. Hankare, S. Babar, and P. Mahalle, "Trust Management Approach for Detection of Malicious Devices in SIoT," Tehnički glasnik, vol. 15, no. 1, pp. 43–50, Mar. 2021.

M. S. Mekala, G. Srivastava, J. H. Park, and H. Y. Jung, "An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT," Digital Communications and Networks, vol. 8, no. 6, pp. 900–910, Dec. 2022.

M. Ramesh Babu and K. N. Veena, "Optimal DBN-based distributed attack detection model for Internet of Things," International Journal of Communication Systems, vol. 33, no. 17, 2020, Art. no. e4595.

A. A. Diro and N. Chilamkurti, "Distributed attack detection scheme using deep learning approach for Internet of Things," Future Generation Computer Systems, vol. 82, pp. 761–768, May 2018.

M. Z. Al-Faiz, A. A. Ibrahim, and S. M. Hadi, "The effect of Z-Score standardization (normalization) on binary input due the speed of learning in back-propagation neural network," Iraqi Journal of Information and Communication Technology, vol. 1, no. 3, pp. 42–48, 2018.

H. Mohsen, E. S. A. El-Dahshan, E. S. M. El-Horbaty, and A. B. M. Salem, "Classification using deep learning neural networks for brain tumors," Future Computing and Informatics Journal, vol. 3, no. 1, pp. 68–71, Jun. 2018.

S. H. Cha, "Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions," International Journal of Mathematical models and Methods in Applied Sciences, vol. 1, no. 4, pp. 300–307, 2007.

L. Feng and G. Yang, "Deep Kronecker network," Biometrika, vol. 111, no. 2, pp. 707–714, Jun. 2024.

A. Dairi, F. Harrou, Y. Sun, and M. Senouci, "Obstacle Detection for Intelligent Transportation Systems Using Deep Stacked Autoencoder and k-Nearest Neighbor Scheme," IEEE Sensors Journal, vol. 18, no. 12, pp. 5122–5132, Jun. 2018.

Y. Meidan et al., "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders," IEEE Pervasive Computing, vol. 17, no. 3, pp. 12–22, Apr. 2018.

"N-BaIoT Dataset to Detect IoT Botnet Attacks." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/mkashifn/nbaiot-dataset.

Downloads

How to Cite

[1]
D. S. and R. Tanuja, “A Fuzzy-Based Deep Kronecker Stacked Autoencoder for Attack Detection in Social IoT”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 26189–26193, Oct. 2025.

Metrics

Abstract Views: 131
PDF Downloads: 86

Metrics Information