Improving Fog Computing Security with Deep Learning
Received: 10 July 2025 | Revised: 26 July 2025, 20 August 2025, and 23 August 2025 | Accepted: 26 August 2025 | Online: 6 October 2025
Corresponding author: Ali-Alridha Khalil
Abstract
The rapid growth of the Internet of Things (IoT) has introduced new security challenges in distributed and resource-limited environments, most notably at the fog layer. Moreover, traditional Intrusion Detection Systems (IDS), which typically rely on cloud-based architectures and signature-based detection, are inadequate for meeting the latency, bandwidth, and adaptability requirements of Industrial IoT (IIoT) systems. In this research, we propose a hybrid Convolutional Neural Network–Long Short-Term Memory (CNN-LSTM) model tailored for fog-layer deployment. The model employs CNNs to extract local spatial features from network traffic and LSTMs to capture temporal dependencies associated with evolving threats. Evaluation is conducted using the Edge-IIoTset dataset, a comprehensive benchmark containing realistic IIoT traffic and 15 diverse attack types. Through extensive preprocessing, Chi-Squared (χ2)-based feature selection, and architectural fine-tuning, the model achieves 100% accuracy, precision, recall, and F1-score in binary classification, achieving high-fidelity detection with low false positives and minimal computational overhead. These results validate the proposed model as a robust and scalable security mechanism for fog-based IIoT environments.
Keywords:
internet of things, fog layer, intrusion detection system, convolutional neural network, long short-term memoryDownloads
References
A. Dauda, O. Flauzac, and F. Nolot, "A Survey on IoT Application Architectures," Sensors, vol. 24, no. 16, Aug. 2024, Art. no. 5320.
S. Altamimi, Q. A. Al-Haija, and M. Al-Fayoumi, "Fog computing security challenges and open issues: a short survey," IET Conference Proceedings, vol. 2023, no. 44, pp. 419–425, Feb. 2024.
A. A. Abd Al-Ameer and W. S. Bhaya, "Enhanced Intrusion Detection in Software-Defined Networks Through Federated Learning and Deep Learning," Ingénierie des systèmes d information, vol. 28, no. 5, pp. 1213–1220, Oct. 2023.
R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.
M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning," IEEE Access, vol. 10, pp. 40281–40306, 2022.
T. Al Nuaimi et al., "A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset," Intelligent Systems with Applications, vol. 20, Nov. 2023, Art. no. 200298.
E. K. Kareem and M. E. Manaa, "Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach," in Innovations of Intelligent Informatics, Networking, and Cybersecurity, vol. 2329, S. O. Al-Mamory, A. Al-Sherbaz, T. Kanakis, A. S. Albahri, W. S. Bhaya, E. S. Alshamery, A. A. Abdullah, A. Al-Ajeli, and S. Z. Alrashid, Eds. Cham: Springer Nature Switzerland, 2025, pp. 186–200.
M. E. Manaa, S. M. Hussain, S. A. Alasadi, and H. A. A. Al-Khamees, "DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments," Inteligencia Artificial, vol. 27, no. 74, pp. 152–165, Jul. 2024.
T. Hasan, A. Hossain, M. Q. Ansari, and T. H. Syed, "Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning." arXiv, Jan. 2025.
A. Z. Alrubayyi, A. A. Abd El-Aziz, and O. Ouda, "Real-Time Intrusion Detection For IIOT: Advancing Edge Computing Security with Machine Learning-Based Solutions," International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 21s, pp. 4176–4189, Mar. 2024.
O. Belarbi, T. Spyridopoulos, E. Anthi, I. Mavromatis, P. Carnelli, and A. Khan, "Federated Deep Learning for Intrusion Detection in IoT Networks." arXiv, Aug. 2023.
A. Gueriani, H. Kheddar, and A. C. Mazari, "Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models," in 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS), Djelfa, Algeria, Dec. 2024, pp. 1–6.
S. Kaushik et al., "Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection," Scientific Reports, vol. 15, no. 1, Feb. 2025, Art. no. 3970.
M. Al Shahriar and A. Dey, "A Hybrid Approach of CNN and LSTM to Detect Intrusion in Edge IoT Devices using CatBoost," in 2023 26th International Conference on Computer and Information Technology (ICCIT), Cox’s Bazar, Bangladesh, Dec. 2023, pp. 1–6.
P. Sinha, D. Sahu, S. Prakash, T. Yang, R. S. Rathore, and V. K. Pandey, "A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning," Scientific Reports, vol. 15, no. 1, Mar. 2025, Art. no. 9684.
A. Gueriani, H. Kheddar, and A. C. Mazari, "Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems." arXiv, May 2024.
A. I. A. Alzahrani, A. Al-Rasheed, A. Ksibi, M. Ayadi, M. M. Asiri, and M. Zakariah, "Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things," Electronics, vol. 11, no. 23, Dec. 2022, Art. no. 4017.
I. Sy, B. Diouf, A. K. Diop, C. Drocourt, and D. Durand, "Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection," in Mobile, Secure, and Programmable Networking, vol. 14482, S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, and É. Renault, Eds. Cham: Springer Nature Switzerland, 2024, pp. 87–99.
M. Jouhari and M. Guizani, "Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices," in 2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, May 2024, pp. 1558–1563.
M. L. McHugh, "The Chi-square test of independence," Biochemia Medica, pp. 143–149, 2013.
K. A. Nadhum, S. M. Sam, and S. Usman, "Prediction Model Using Deep Learning for Lung Illness Severity Among Covid-19 Patients in Iraq," in 2024 5th International Conference on Smart Sensors and Application (ICSSA), Penang, Malaysia, Sep. 2024, pp. 1–6.
K. Prasanna, "A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data," Journal of Information and Computational Science, vol. 10, no. 3, pp. 1362-1370, Mar. 2020.
P. Phalaagae, A. M. Zungeru, A. Yahya, B. Sigweni, and S. Rajalakshmi, "A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks," IEEE Access, vol. 13, pp. 57322–57341, 2025.
Downloads
How to Cite
License
Copyright (c) 2025 Ali-Alridha Khalil, Mehdi Ebady Manaa

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.