Abstract
In an increasingly digital world, cybersecurity threats have grown in frequency, complexity, and scale, challenging the adequacy of traditional rule-based defense systems. This study proposes a unified AI-driven cybersecurity framework to detect anomalies, verify data integrity, automate incident response, and ensure long-term cryptographic resilience. The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. The system was evaluated in a simulated IoT network environment, where it demonstrated high accuracy in identifying anomalies, effectively distinguishing between original and tampered data, and adaptively responding to different levels of cyber threats. The integration of these components allows the framework to operate autonomously and contextually, improving scalability and responsiveness in resource-constrained digital infrastructures. This study concludes that the proposed framework addresses key limitations of existing methods by offering a scalable, adaptive, and future-proof cybersecurity solution. The results support its potential for deployment in real-world settings such as smart cities, healthcare systems, and critical infrastructure, with future work aimed at improving real-time adaptability and validating performance in live, heterogeneous environments.
| Original language | English |
|---|---|
| Pages (from-to) | 104027-104036 |
| Number of pages | 10 |
| Journal | IEEE Access |
| Volume | 13 |
| DOIs | |
| State | Published - 2025 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
-
SDG 11 Sustainable Cities and Communities
Keywords
- AI-driven cybersecurity
- IoT security
- LSTM networks
- Q-learning
- anomaly detection
- data integrity
- homomorphic hashing
- lattice-based encryption
- post-quantum cryptography
- reinforcement learning
Fingerprint
Dive into the research topics of 'An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver