Journal of Cyber Security and Risk Auditing

ISSN: 3079-5354 (Online)

Publishing model:

: Open access
open accessOpen Access

Article

Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges

by 

Omar Gheni Abdulateef ;

Atheer Joudah ;

Muna Ghazi Abdulsahib ;

Hussein Alrammahi

PDF logoPDF

Published: 2025

Abstract

This research develops a machine learning framework for protecting data as it is transmitted in Internet of Things (IoT) configurations. The main objective of the proposed framework to address the major security issues using two intelligent machine learning methods are Random Forest and Support Vector Machine (SVM). They are applied to detect strange behaviour and potential threats within IoT data. The system was evaluated based on accuracy, precision, recall, and F1-score to determine how successful it was. Performance indicated Random Forest performed very well with 93.5% accuracy, slightly higher than SVM 91.2%. The system was also quite good at detecting cyber-attacks such as DDoS and malware, and did not raise many false alerts. This indicates that the system can actually contribute to making IoT much safer, building on what we have in this field. This study implies that incorporating machine learning into IoT security can assist in developing improved defenses against emerging cyber-attacks. In the long term, this research can assist in subsequent studies in order to improve security systems for various uses of IoT, address existing problems, and utilize more data.

Keywords

Internet of ThingsMachine LearningData TransmissionSecurity FrameworkRandom ForestAnomaly DetectionCyber Threats

How to Cite the Article

Abdulateef, O. G., Joudah, A., Abdulsahib, M. G., & Alrammahi, H. (2025). Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges. Journal of Cyber Security and Risk Auditing, 2025(4), 266–275.https://doi.org/10.63180/jcsra.thestap.2025.4.6

References

  1. Ghaffari, A., Jelodari, N., Pouralish, S., Derakhshanfard, N., & Arasteh, B. (2024). Securing internet of things using machine and deep learning methods: A survey. Cluster Computing, 27(7), 9065–9089. https://doi.org/10.1007/s10586-024-04509-0
  2. Priyadarshi, R. (2024). Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: A comprehensive review. Wireless Networks, 30(4), 2647–2673. https://doi.org/10.1007/s11276-024-03697-2
  3. Humayun, M., Tariq, N., Alfayad, M., Zakwan, M., Alwakid, G., & Assiri, M. (2024). Securing the Internet of Things in Artificial Intelligence era: A comprehensive survey. IEEE Access, 12, 25469–25490. https://doi.org/10.1109/ACCESS.2024.3365634
  4. Alsadie, D. (2024). Artificial intelligence techniques for securing fog computing environments: Trends, challenges, and future directions. IEEE Access, 12, 151598–151648. https://doi.org/10.1109/ACCESS.2024.3463791
  5. Outchakoucht, A., Abou, A., Es-Samaali, H., & Benhadou, S. (2020). Machine learning-based access control framework for the Internet of Things. International Journal of Advanced Computer Science and Applications, 11(2). https://doi.org/10.14569/IJACSA.2020.0110243
  6. Alalwany, E., & Mahgoub, I. (2024). Security and trust management in the Internet of Vehicles (IoV): Challenges and machine learning solutions. Sensors, 24(2), 368. https://doi.org/10.3390/s24020368
  7. Adam, M., Hammoudeh, M., Alrawashdeh, R., & Alsulaimy, B. (2024). A survey on security, privacy, trust, and architectural challenges in IoT systems. IEEE Access, 12, 57128–57149. https://doi.org/10.1109/ACCESS.2024.3382709
  8. Hanafi, A. V., Ghaffari, A., Rezaei, H., Valipour, A., & Arasteh, B. (2023). Intrusion detection in Internet of Things using improved binary golden jackal optimization algorithm and LSTM. Cluster Computing, 27(3), 2673–2690. https://doi.org/10.1007/s10586-023-04102-x
  9. Hamarsheh, A. (2024). An adaptive security framework for Internet of Things networks leveraging SDN and machine learning. Applied Sciences, 14(11), 4530. https://doi.org/10.3390/app1411453
  10. Farooq, U., Tariq, N., Asim, M., Baker, T., & Al-Shamma’a, A. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing, 162, 89–104. https://doi.org/10.1016/j.jpdc.2022.01.015
  11. Reyes-Acosta, R., Dominguez-Baez, C., Mendoza-Gonzalez, R., & Vargas Martin, M. (2024). Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: A multivocal state of knowledge review. International Journal of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00935-8
  12. Rahu, M. A., Chandio, A. F., Aurangzeb, K., Karim, S., Alhussein, M., & Anwar, M. S. (2023). Toward design of Internet of Things and machine learning-enabled frameworks for analysis and prediction of water quality. IEEE Access, 11, 101055–101086. https://doi.org/10.1109/ACCESS.2023.3315649
  13. Gaidhani, A. R., & Potgantwar, A. D. (2024). A review of machine learning-based routing protocols for wireless sensor network lifetime. In Proceedings of RAiSE-2023 (p. 231). https://doi.org/10.3390/engproc2023059231
  14. Waqas, S. M., Zakwan, M., Ashraf, M., AlWakid, G. N., & Humayun, M. (2025). A survey on approximate hardware accelerator for error-tolerant applications. In Securing the Digital Realm (pp. 115–125). CRC Press. https://doi.org/10.1201/9781003497851-11
  15. Usmani, U. A., Usmani, A. Y., & Usmani, M. U. (2023). Ensuring trustworthy machine learning: Ethical foundations, robust algorithms, and responsible applications. In 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 576–583). IEEE. https://doi.org/10.1109/ICCCIS60361.2023.10425285
  16. Li, Y., Zuo, Y., Song, H., & Lv, Z. (2022). Deep learning in security of Internet of Things. IEEE Internet of Things Journal, 9(22), 22133–22146. https://doi.org/10.1109/JIOT.2021.3106898
  17. Outchakoucht, A., Es-Samaali, H., & Philippe, J. (2017). Dynamic access control policy based on blockchain and machine learning for the Internet of Things. International Journal of Advanced Computer Science and Applications, 8(7). https://doi.org/10.14569/IJACSA.2017.080757
  18. Alnami, H., Mahgoub, I., Al-Najada, H., & Alalwany, E. (2025). A distributed machine learning-based scheme for real-time highway traffic flow prediction in Internet of Vehicles. Future Internet, 17(3), 131. https://doi.org/10.3390/fi17030131
  19. Ahmed, K. I., Tahir, M., Habaebi, M. H., Lau, S. L., & Ahad, A. (2021). Machine learning for authentication and authorization in IoT: Taxonomy, challenges and future research direction. Sensors, 21(15), 5122. https://doi.org/10.3390/s21155122
  20. Bagaa, M., Taleb, T., Bernabe, J. B., & Skarmeta, A. (2020). A machine learning security framework for IoT systems. IEEE Access, 8, 114066–114077. https://doi.org/10.1109/ACCESS.2020.2996214
  21. Gupta, C., Johri, I., Srinivasan, K., Hu, Y.-C., Qaisar, S. M., & Huang, K.-Y. (2022). A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017. https://doi.org/10.3390/s22052017
  22. Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Communications Surveys & Tutorials, 22(3), 1646–1685. https://doi.org/10.1109/COMST.2020.2988293
  23. Latif, S., et al. (2021). Deep learning for the Industrial Internet of Things (IIoT): A comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors, 21(22), 7518. https://doi.org/10.3390/s21227518
  24. Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning. ACM Transactions on Intelligent Systems and Technology, 10(2), 1–19. https://doi.org/10.1145/3298981
  25. Das, S. R., Jhanjhi, N. Z., Asirvatham, D., Ashfaq, F., Javed, D., & Gururaj, H. L. (2024). Blockchain-driven splitfed learning for data protection in IoT setting. In Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies (pp. 27–45). IET. https://doi.org/10.1049/pbse025e_ch3.