TY - JOUR
T1 - An AI-Driven Cybersecurity Framework for IoT
T2 - Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption
AU - Saeed, Mozamel M.
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2025
Y1 - 2025
N2 - In an increasingly digital world, cybersecurity threats have grown in frequency, complexity, and scale, challenging the adequacy of traditional rule-based defense systems. This study proposes a unified AI-driven cybersecurity framework to detect anomalies, verify data integrity, automate incident response, and ensure long-term cryptographic resilience. The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. The system was evaluated in a simulated IoT network environment, where it demonstrated high accuracy in identifying anomalies, effectively distinguishing between original and tampered data, and adaptively responding to different levels of cyber threats. The integration of these components allows the framework to operate autonomously and contextually, improving scalability and responsiveness in resource-constrained digital infrastructures. This study concludes that the proposed framework addresses key limitations of existing methods by offering a scalable, adaptive, and future-proof cybersecurity solution. The results support its potential for deployment in real-world settings such as smart cities, healthcare systems, and critical infrastructure, with future work aimed at improving real-time adaptability and validating performance in live, heterogeneous environments.
AB - In an increasingly digital world, cybersecurity threats have grown in frequency, complexity, and scale, challenging the adequacy of traditional rule-based defense systems. This study proposes a unified AI-driven cybersecurity framework to detect anomalies, verify data integrity, automate incident response, and ensure long-term cryptographic resilience. The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. The system was evaluated in a simulated IoT network environment, where it demonstrated high accuracy in identifying anomalies, effectively distinguishing between original and tampered data, and adaptively responding to different levels of cyber threats. The integration of these components allows the framework to operate autonomously and contextually, improving scalability and responsiveness in resource-constrained digital infrastructures. This study concludes that the proposed framework addresses key limitations of existing methods by offering a scalable, adaptive, and future-proof cybersecurity solution. The results support its potential for deployment in real-world settings such as smart cities, healthcare systems, and critical infrastructure, with future work aimed at improving real-time adaptability and validating performance in live, heterogeneous environments.
KW - AI-driven cybersecurity
KW - anomaly detection
KW - data integrity
KW - homomorphic hashing
KW - IoT security
KW - lattice-based encryption
KW - LSTM networks
KW - post-quantum cryptography
KW - Q-learning
KW - reinforcement learning
UR - http://www.scopus.com/inward/record.url?scp=105007295667&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2025.3576506
DO - 10.1109/ACCESS.2025.3576506
M3 - Article
AN - SCOPUS:105007295667
SN - 2169-3536
VL - 13
SP - 104027
EP - 104036
JO - IEEE Access
JF - IEEE Access
ER -