Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms
Keywords:
IoT Security, Artificial Intelligence, Metaheuristic Algorithms, Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Anomaly Detection, Intrusion Prevention, AI Optimization, Smart Networks, Adaptive Security, Cybersecurity in IoT, Resource-Constrained Devices, Secure Communication, Intelligent Protocols.Abstract
The exponential growth of Internet of Things (IoT) networks has introduced unprecedented challenges in securing heterogeneous and resource-constrained devices against evolving cyber threats. This research proposes a novel framework that integrates Artificial Intelligence (AI)-driven security protocols with metaheuristic optimization techniques to enhance the resilience and efficiency of IoT networks. The AI models, including lightweight neural networks and anomaly detection systems, are designed to identify intrusion patterns and unauthorized behavior in real time. To improve the adaptability and performance of these models, metaheuristic algorithms—such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), and Grey Wolf Optimizer (GWO)—are employed to optimize hyperparameters, rule sets, and decision thresholds within the security protocols. The multi-objective optimization process considers key factors such as detection accuracy, energy consumption, latency, and false positive rate. Experimental results on standard IoT benchmark datasets demonstrate that the optimized AI-security protocol framework significantly outperforms traditional approaches in both detection speed and resource efficiency. This work contributes a robust, scalable, and intelligent defense mechanism for next-generation IoT infrastructures.
Downloads
References
Aldwairi, T., & Al-Khamaiseh, M. (2018). Deep learning and genetic algorithm for intrusion detection in IoT networks. Procedia Computer Science, 140, 246–252.
Sahu, S.S., & Panda, M. (2018). A hybrid IDS using fuzzy SVM and probabilistic GA-based feature selection. Neural Computing and Applications, 30, 1129–1147.
Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey Wolf Optimizer. Advances in Engineering Software, 69, 46–61.
Zhang, Y., Wang, S., & Phillips, P. (2014). Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Systems with Applications, 38(10), 13971–13981.
Kumar, R., & Patel, D.R. (2014). A survey on Internet of Things: Security and privacy issues. International Journal of Computer Applications, 90(11), 20–26.
Patel, K., & Patel, H. (2015). An optimized secure routing protocol using genetic algorithm for WSN. International Journal of Computer Applications, 116(17), 35–39.
Aydin, M.A., Zaim, A.H., & Aydin, M. (2009). A hybrid intrusion detection system design for computer network security. Computers & Electrical Engineering, 35(3), 517–526.
Almomani, A. (2017). Genetic algorithm-based IDS for intrusion detection in IoT. Journal of Intelligent Systems, 26(3), 481–493.
Gogoi, P., Bhattacharyya, D. K., & Kalita, J. K. (2011). A survey of outlier detection methods in network anomaly identification. The Computer Journal, 54(4), 570–588.
Yang, X. S. (2010). Nature-Inspired Metaheuristic Algorithms. Luniver Press.
Zhang, J., & Zulkernine, M. (2006). Anomaly based network intrusion detection with unsupervised outlier detection. IEEE International Conference on Communications, 2388–2393.
Rajeswari, P., & Pitchai, R. (2017). Energy-efficient secure routing protocol for IoT using NSGA-II. International Journal of Pure and Applied Mathematics, 114(7), 379–391.
Kennedy, J., & Eberhart, R. (1995). Particle Swarm Optimization. Proceedings of ICNN, 1942–1948.
Liu, Y., Yang, X., & Ni, J. (2017). Application of ant colony algorithm in routing optimization for Internet of Things. Sensors & Transducers, 215(8), 70–77.
Cai, H., Xu, B., Jiang, L., & Vasilakos, A. V. (2017). IoT-based big data storage systems in cloud computing: Perspectives and challenges. IEEE Internet of Things Journal, 4(1), 75–87.
Sfar, A. R., Natalizio, E., Challal, Y., & Chtourou, Z. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 4(2), 118–137.
Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of Internet-of-Things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586–602.
Mohammadi, M., Al-Fuqaha, A., Sorour, S., & Guizani, M. (2018). Deep learning for IoT big data and streaming analytics: A survey. IEEE Communications Surveys & Tutorials, 20(4), 2923–2960.
Tsai, C. F., Hsu, Y. F., Lin, C. Y., & Lin, W. Y. (2009). Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10), 11994–12000.
Abraham, A., & Nath, B. (2001). A neuro-fuzzy approach for modeling electricity demand in Victoria. Applied Soft Computing, 1(2), 127–138.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.