  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/3018</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Trustworthy-Based Authentication Model with Intrusion Detection for IoT-Enabled Networks with Deep Learning Algorithm</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">Professor, Department of Computer science and Engineering QIS College of Engineering And Technology, Ongole, Andhra Pradesh .523272, India</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>M.</given_name>
    <surname>M.</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Assistant professor Mohamed sathak A.J College of engineering, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jayanthi </given_name>
    <surname>.E</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of ECE, Panimalar Engineering College, Chennai, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Suganthi </given_name>
    <surname>.R</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of ECE, M.Kumarasamy College of Engineering (Autonomous)  Thalavapalayam, Karur, 639113, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>M.  Jamuna</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Associate Professor, Department of ECE, M.Kumarasamy College of Engineering (Autonomous)  Thalavapalayam, Karur, 639113, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>S.</given_name>
    <surname>Vimalnath</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>In the burgeoning field of the Internet of Things (IoT), ensuring secure and trustworthy communication between devices is paramount. This paper proposes a novel Trustworthy-Based Authentication Model (TBAM) integrated with Intrusion Detection Systems (IDS) leveraging deep learning algorithms to secure IoT-enabled networks. The proposed model addresses the dual challenges of authenticating legitimate devices and detecting malicious intrusions. Specifically, we employ a Convolutional Neural Network (CNN) to analyse network traffic patterns for intrusion detection, leveraging its prowess in feature extraction and classification. Additionally, a Long Short-Term Memory (LSTM) network is utilized for continuous monitoring and anomaly detection, capturing temporal dependencies in data flows that are indicative of potential security threats. The authentication mechanism integrates a trust evaluation system that assigns trust scores to devices based on their behaviour, enhancing the model's capability to distinguish between trusted and malicious entities. Our extensive experiments on real-world IoT datasets demonstrate that the TBAM significantly outperforms traditional security models in terms of detection accuracy, false-positive rate, and computational efficiency. Specifically, our model achieves a detection accuracy of 98.7%, a false-positive rate of 1.2%, and a processing time reduction of 30% compared to baseline models. This work contributes a robust, scalable, and efficient solution to the pressing security concerns in IoT networks, paving the way for more secure and reliable IoT applications.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>198</first_page>
   <last_page>213</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.140214</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/3018</resource>
  </doi_data>
 </journal_article>
</journal>
