| 
 Proceedings of International Conference on Applied Innovation in IT
 2025/07/26, Volume 13, Issue 3, pp.65-71
 
 Privacy-Aware Machine Learning Techniques for Secure Internet of Things Systems
 Ali Bnilam, Murtadha Ahmed Jawad and Hasan AbedAbstract: The rapid expansion of the Internet of Things (IoT) has enabled numerous industries to benefit from enhanced connectivity and automation. Despite these advancements, IoT devices pose serious privacy and security challenges due to the vast amounts of sensitive data they generate and transmit. The distributed and dynamic nature of IoT environments necessitates more sophisticated security measures. This paper proposes a privacy-aware machine learning (ML) approach for securing IoT systems, aiming to detect and prevent malicious activities without compromising user privacy. By employing privacy-preserving ML techniques such as federated learning and differential privacy, the method supports efficient and adaptive threat detection while ensuring data confidentiality. Comparative results clearly indicate that the proposed approach significantly outperforms existing solutions in terms of both overall performance and privacy protection, thereby offering a more robust and secure framework for safeguarding IoT networks under diverse and sophisticated attack scenarios. This research focuses on developing advanced, privacy-preserving machine learning methods tailored specifically for enhancing IoT security. By strategically combining federated learning techniques with lightweight encryption methods, the framework effectively protects sensitive data at the edge-device level, preventing unauthorized access or misuse. Experimental evaluations demonstrate that our proposed model achieves approximately 12% higher accuracy compared to conventional differential privacy methods, all while maintaining rigorous confidentiality standards and minimal computational overhead. These outcomes suggest promising potential for broad real-world applicability in secure IoT deployments.
 
 Keywords: Privacy-Aware Machine Learning (Ml), Federated Learning, Differential Privacy, IoT Security, Internet of Things (IoT).
 
 DOI: Under Indexing
 
 Download: PDF
 
 
 References:
B. Bhola et al., “Quality‐enabled decentralized dynamic IoT platform with scalable resources integration,” IET Commun., 2022.
P. Rani, S. Verma, S. P. Yadav, B. K. Rai, M. S. Naruka, and D. Kumar, “Simulation of the lightweight blockchain technique based on privacy and security for healthcare data for the cloud system,” Int. J. E-Health Med. Commun. IJEHMC, vol. 13, no. 4, pp. 1-15, 2022.
P. Rani, P. N. Singh, S. Verma, N. Ali, P. K. Shukla, and M. Alhassan, “An implementation of modified blowfish technique with honey bee behavior optimization for load balancing in cloud system environment,” Wirel. Commun. Mob. Comput., vol. 2022, pp. 1-14, 2022.
M. Mamdouh, M. A. I. Elrukhsi, and A. Khattab, “Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey,” in 2018 International Conference on Computer and Applications (ICCA), Beirut: IEEE, Aug. 2018, pp. 215-218, doi: 10.1109/COMAPP.2018.8460440.
P. Rani and M. H. Falaah, “Real-Time Congestion Control and Load Optimization in Cloud-MANETs Using Predictive Algorithms,” NJF Intell. Eng. J., vol. 1, no. 1, pp. 66-76, 2024.
S. I. Manzoor, S. Jain, Y. Singh, and H. Singh, “Federated Learning Based Privacy Ensured Sensor Communication in IoT Networks: A Taxonomy, Threats and Attacks,” IEEE Access, vol. 11, pp. 42248-42275, 2023, doi: 10.1109/ACCESS.2023.3269880.
G. Abbas, A. Mehmood, M. Carsten, G. Epiphaniou, and J. Lloret, “Safety, Security and Privacy in Machine Learning Based Internet of Things,” J. Sens. Actuator Netw., vol. 11, no. 3, p. 38, Jul. 2022, doi: 10.3390/jsan11030038.
P. Rani, D. S. Mohan, S. P. Yadav, G. K. Rajput, and M. A. Farouni, “Sentiment Analysis and Emotional Recognition: Enhancing Therapeutic Interventions,” in Demystifying the Role of Natural Language Processing (NLP) in Mental Health, A. Mishra, S. P. Yadav, M. Kumar, S. M. Biju, and G. C. Deka, Eds., IGI Global, 2025, pp. 283-302, doi: 10.4018/979-8-3693-4203-9.ch015.
Y. Zhang, B. Suleiman, M. J. Alibasa, and F. Farid, “Privacy-Aware Anomaly Detection in IoT Environments using FedGroup: A Group-Based Federated Learning Approach,” J. Netw. Syst. Manag., vol. 32, no. 1, p. 20, Jan. 2024, doi: 10.1007/s10922-023-09782-9.
S. R. Borra, S. Khond, and D. Srivalli, “Security and Privacy Aware Programming Model for IoT Applications in Cloud Environment,” Int. J. Cloud Comput. Serv. Archit., vol. 13, no. 1, pp. 01-12, Feb. 2023, doi: 10.5121/ijccsa.2023.13101.
K. Kaur, A. Kaur, Y. Gulzar, and V. Gandhi, “Unveiling the core of IoT: comprehensive review on data security challenges and mitigation strategies,” Front. Comput. Sci., vol. 6, p. 1420680, Jun. 2024, doi: 10.3389/fcomp.2024.1420680.
H. A. S. Ali and V. R. J, “Machine Learning for Internet of Things (IoT) Security: A Comprehensive Survey,” Int. J. Comput. Netw. Appl., vol. 11, no. 5, pp. 617-659, Oct. 2024, doi: 10.22247/ijcna/2024/40.
P. Rani and R. Sharma, “IMFOCA-IOV: Intelligent Moth Flame Optimization based Clustering Algorithm for Internet of Vehicle,” in 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, 2023, pp. 1-6.
A. Sagu, N. S. Gill, P. Gulia, D. Rani, and A. Chahal, “Comparative Analysis of Machine Learning Algorithms for Securing IoT Enabled Environment,” in 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), Greater Noida, India: IEEE, Nov. 2022, pp. 24-29, doi: 10.1109/ICCCIS56430.2022.10037688.
P. Rani et al., “Federated Learning-Based Misbehavior Detection for the 5G-Enabled Internet of Vehicles,” IEEE Trans. Consum. Electron., vol. 70, no. 2, pp. 4656-4664, May 2024, doi: 10.1109/TCE.2023.3328020.
O. B. Sezer, E. Dogdu, and A. M. Ozbayoglu, “Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey,” IEEE Internet Things J., vol. 5, no. 1, pp. 1-27, Feb. 2018, doi: 10.1109/JIOT.2017.2773600.
H. Ren, H. Li, Y. Dai, K. Yang, and X. Lin, “Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities,” IEEE Netw., vol. 32, no. 6, pp. 144-151, Nov. 2018, doi: 10.1109/MNET.2018.1700374.
C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Theory of Cryptography, S. Halevi and T. Rabin, Eds., Lecture Notes in Computer Science, vol. 3876. Berlin, Heidelberg: Springer, 2006, pp. 265–284. doi: 10.1007/11681878_14.
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial intelligence and statistics, PMLR, 2017, pp. 1273-1282, Accessed: Feb. 13, 2025, [Online]. Available: https://proceedings.mlr.press/v54/mcmahan17a?ref=https://githubhelp.com.
M. Hostetter, A. Ahmadzadeh, B. Aydin, M. K. Georgoulis, D. J. Kempton, and R. A. Angryk, “Understanding the Impact of Statistical Time Series Features for Flare Prediction Analysis,” in 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA: IEEE, Dec. 2019, pp. 4960-4966, doi: 10.1109/BigData47090.2019.9006116.
H. Hong et al., “When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks,” in 2017 IEEE European Symposium on Security and Privacy (EuroS&P), Paris: IEEE, Apr. 2017, pp. 595-609, doi: 10.1109/EuroSP.2017.34.
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Commun. Surv. Tutor., vol. 17, no. 4, pp. 2347-2376, 2015.
W. Yan and L. Yu, “On Accurate and Reliable Anomaly Detection for Gas Turbine Combustors: A Deep Learning Approach,” Aug. 25, 2019, arXiv: arXiv:1908.09238, doi: 10.48550/arXiv.1908.09238.
X. Sun, P. Zhang, J. K. Liu, J. Yu, and W. Xie, “Private machine learning classification based on fully homomorphic encryption,” IEEE Trans. Emerg. Top. Comput., pp. 1-1, 2018, doi: 10.1109/TETC.2018.2794611.
D. M. W. Powers, “Evaluation: From precision, recall and F-measure to ROC, informedness, markedness and correlation,” J. Mach. Learn. Technol., vol. 2, pp. 37–63, 2011, doi: 10.9735/2229-3981. |  
	
		|  
  
			    HOME 
			- Conference - Journal
 - Paper Submission to Journal
 - Paper Submission to Conference
 - For Authors
 - For Reviewers
 - Important Dates
 - Conference Committee
 - Editorial Board
 - Reviewers
 - Last Proceedings
 
			-
            Volume 13, Issue 3 (ICAIIT 2025) PROCEEDINGS
 -
            Volume 13, Issue 2 (ICAIIT 2025)
 -
            Volume 13, Issue 1 (ICAIIT 2025)
 -
            Volume 12, Issue 2 (ICAIIT 2024)
 -
            Volume 12, Issue 1 (ICAIIT 2024)
 -
            Volume 11, Issue 2 (ICAIIT 2023)
 -
            Volume 11, Issue 1 (ICAIIT 2023)
 -
            Volume 10, Issue 1 (ICAIIT 2022)
 -
            Volume 9, Issue 1 (ICAIIT 2021)
 -
            Volume 8, Issue 1 (ICAIIT 2020)
 -
            Volume 7, Issue 1 (ICAIIT 2019)
 -
            Volume 7, Issue 2 (ICAIIT 2019)
 -
            Volume 6, Issue 1 (ICAIIT 2018)
 -
            Volume 5, Issue 1 (ICAIIT 2017)
 -
            Volume 4, Issue 1 (ICAIIT 2016)
 -
			Volume 3, Issue 1 (ICAIIT 2015)
 -
			Volume 2, Issue 1 (ICAIIT 2014)
 -
			Volume 1, Issue 1 (ICAIIT 2013)
 
			ICAIIT 2025 PAST CONFERENCES
 -
			Photos
 -
			Reports
 
 ICAIIT 2024
 -
			Photos
 -
			Reports
 
 ICAIIT 2023
 -
			Photos
 -
			Reports
 
 ICAIIT 2021
 -
			Photos
 -
			Reports
 
 ICAIIT 2020
 -
			Photos
 -
			Reports
 
 ICAIIT 2019
 -
			Photos
 -
			Reports
 
 ICAIIT 2018
 -
			Photos
 -
			Reports
   
			    ETHICS IN PUBLICATIONS
 ACCOMODATION
   
			    CONTACT US   |  |