Improving Fog Computing Security with Deep Learning

Authors

  • Ali-Alridha Khalil Department of Information Networks, College of Information Technology, University of Babylon, Babil, Iraq
  • Mehdi Ebady Manaa Intelligent Medical Systems Department, College of Sciences, Al-Mustaqbal University, Babil, Iraq | Department of Information Networks, College of Information Technology, University of Babylon, Babil, Iraq
Volume: 15 | Issue: 5 | Pages: 28337-28342 | October 2025 | https://doi.org/10.48084/etasr.13299

Abstract

The rapid growth of the Internet of Things (IoT) has introduced new security challenges in distributed and resource-limited environments, most notably at the fog layer. Moreover, traditional Intrusion Detection Systems (IDS), which typically rely on cloud-based architectures and signature-based detection, are inadequate for meeting the latency, bandwidth, and adaptability requirements of Industrial IoT (IIoT) systems. In this research, we propose a hybrid Convolutional Neural Network–Long Short-Term Memory (CNN-LSTM) model tailored for fog-layer deployment. The model employs CNNs to extract local spatial features from network traffic and LSTMs to capture temporal dependencies associated with evolving threats. Evaluation is conducted using the Edge-IIoTset dataset, a comprehensive benchmark containing realistic IIoT traffic and 15 diverse attack types. Through extensive preprocessing, Chi-Squared (χ2)-based feature selection, and architectural fine-tuning, the model achieves 100% accuracy, precision, recall, and F1-score in binary classification, achieving high-fidelity detection with low false positives and minimal computational overhead. These results validate the proposed model as a robust and scalable security mechanism for fog-based IIoT environments.

Keywords:

internet of things, fog layer, intrusion detection system, convolutional neural network, long short-term memory

Downloads

Download data is not yet available.

References

A. Dauda, O. Flauzac, and F. Nolot, "A Survey on IoT Application Architectures," Sensors, vol. 24, no. 16, Aug. 2024, Art. no. 5320.

S. Altamimi, Q. A. Al-Haija, and M. Al-Fayoumi, "Fog computing security challenges and open issues: a short survey," IET Conference Proceedings, vol. 2023, no. 44, pp. 419–425, Feb. 2024.

A. A. Abd Al-Ameer and W. S. Bhaya, "Enhanced Intrusion Detection in Software-Defined Networks Through Federated Learning and Deep Learning," Ingénierie des systèmes d information, vol. 28, no. 5, pp. 1213–1220, Oct. 2023.

R. H. Altaie and H. K. Hoomod, "An Intrusion Detection System using a Hybrid Lightweight Deep Learning Algorithm," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16740–16743, Oct. 2024.

M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning," IEEE Access, vol. 10, pp. 40281–40306, 2022.

T. Al Nuaimi et al., "A comparative evaluation of intrusion detection systems on the edge-IIoT-2022 dataset," Intelligent Systems with Applications, vol. 20, Nov. 2023, Art. no. 200298.

E. K. Kareem and M. E. Manaa, "Classification of Internet of Things Cybersecurity Attacks Using a Hybrid Deep Learning Approach," in Innovations of Intelligent Informatics, Networking, and Cybersecurity, vol. 2329, S. O. Al-Mamory, A. Al-Sherbaz, T. Kanakis, A. S. Albahri, W. S. Bhaya, E. S. Alshamery, A. A. Abdullah, A. Al-Ajeli, and S. Z. Alrashid, Eds. Cham: Springer Nature Switzerland, 2025, pp. 186–200.

M. E. Manaa, S. M. Hussain, S. A. Alasadi, and H. A. A. Al-Khamees, "DDoS Attacks Detection based on Machine Learning Algorithms in IoT Environments," Inteligencia Artificial, vol. 27, no. 74, pp. 152–165, Jul. 2024.

T. Hasan, A. Hossain, M. Q. Ansari, and T. H. Syed, "Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning." arXiv, Jan. 2025.

A. Z. Alrubayyi, A. A. Abd El-Aziz, and O. Ouda, "Real-Time Intrusion Detection For IIOT: Advancing Edge Computing Security with Machine Learning-Based Solutions," International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 21s, pp. 4176–4189, Mar. 2024.

O. Belarbi, T. Spyridopoulos, E. Anthi, I. Mavromatis, P. Carnelli, and A. Khan, "Federated Deep Learning for Intrusion Detection in IoT Networks." arXiv, Aug. 2023.

A. Gueriani, H. Kheddar, and A. C. Mazari, "Adaptive Cyber-Attack Detection in IIoT Using Attention-Based LSTM-CNN Models," in 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS), Djelfa, Algeria, Dec. 2024, pp. 1–6.

S. Kaushik et al., "Robust machine learning based Intrusion detection system using simple statistical techniques in feature selection," Scientific Reports, vol. 15, no. 1, Feb. 2025, Art. no. 3970.

M. Al Shahriar and A. Dey, "A Hybrid Approach of CNN and LSTM to Detect Intrusion in Edge IoT Devices using CatBoost," in 2023 26th International Conference on Computer and Information Technology (ICCIT), Cox’s Bazar, Bangladesh, Dec. 2023, pp. 1–6.

P. Sinha, D. Sahu, S. Prakash, T. Yang, R. S. Rathore, and V. K. Pandey, "A high performance hybrid LSTM CNN secure architecture for IoT environments using deep learning," Scientific Reports, vol. 15, no. 1, Mar. 2025, Art. no. 9684.

A. Gueriani, H. Kheddar, and A. C. Mazari, "Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems." arXiv, May 2024.

A. I. A. Alzahrani, A. Al-Rasheed, A. Ksibi, M. Ayadi, M. M. Asiri, and M. Zakariah, "Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things," Electronics, vol. 11, no. 23, Dec. 2022, Art. no. 4017.

I. Sy, B. Diouf, A. K. Diop, C. Drocourt, and D. Durand, "Enhancing Security in Connected Medical IoT Networks Through Deep Learning-Based Anomaly Detection," in Mobile, Secure, and Programmable Networking, vol. 14482, S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, and É. Renault, Eds. Cham: Springer Nature Switzerland, 2024, pp. 87–99.

M. Jouhari and M. Guizani, "Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices," in 2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, May 2024, pp. 1558–1563.

M. L. McHugh, "The Chi-square test of independence," Biochemia Medica, pp. 143–149, 2013.

K. A. Nadhum, S. M. Sam, and S. Usman, "Prediction Model Using Deep Learning for Lung Illness Severity Among Covid-19 Patients in Iraq," in 2024 5th International Conference on Smart Sensors and Application (ICSSA), Penang, Malaysia, Sep. 2024, pp. 1–6.

K. Prasanna, "A CNN-LSTM Model for Intrusion Detection System from High Dimensional Data," Journal of Information and Computational Science, vol. 10, no. 3, pp. 1362-1370, Mar. 2020.

P. Phalaagae, A. M. Zungeru, A. Yahya, B. Sigweni, and S. Rajalakshmi, "A Hybrid CNN-LSTM Model With Attention Mechanism for Improved Intrusion Detection in Wireless IoT Sensor Networks," IEEE Access, vol. 13, pp. 57322–57341, 2025.

Downloads

How to Cite

[1]
A.-A. Khalil and M. E. Manaa, “Improving Fog Computing Security with Deep Learning”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 5, pp. 28337–28342, Oct. 2025.

Metrics

Abstract Views: 5
PDF Downloads: 3

Metrics Information