Leveraging Standards and Deep Learning Approaches to Secure Internet of Things (IoT) Devices from Cyber Attack

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2026 | Volume : 13 | 01 | Page :
    By

    Bhagyashri N Chaudhari,

  • Sayaram N Shingote,

  • Snehal B. Phatangare,

  • Santosh S.Kale,

  1. Assistant Professor, Computer Engineering Dept. AVCOE, Sangamner, Maharashtra, India
  2. Assistant Professor, Computer Engineering Dept. AVCOE, Sangamner, Maharashtra, India
  3. Assistant Professor, Computer Engineering Dept. AVCOE, Sangamner, Maharashtra, India
  4. Assistant Professor, Computer Engineering Dept. AVCOE, Sangamner, Maharashtra, India

Abstract

The widespread adoption of Internet of Things (IoT) devices between 2019 and 2024 has significantly grows in various sectors in Japan, including healthcare, manufacturing, and the development of smart cities. Although this growth offers many advantages, it also makes these devices more vulnerable to cyber threats. High-profile security breaches in Japan have sparked discussions about the requirement for enhanced security measures to protect the rapidly evolving IoT technologies. This study seeks to assess the level of security of IoT devices in Japan during this period, focusing on the integration of advanced standards and deep learning techniques. In addition, a survey of industry professionals is conducted to gauge their perspectives on the evolving security landscape, their preparedness for AI-based solutions, and the emerging trends in IoT security. Methodology: The research utilizes both survey and technical address to detect the challenges associated with IoT security in Japan. Experts in IoT security and key influencers were consulted to evaluate the status of IoT devices from 2019 to 2024. This includes reviewing standards such as IEEE 802.15.11 for high-power wireless networks and examining the physical layer specifications for Wi-Fi networks. In addition, deep learning-based Intrusion Detection Systems (IDS), such as Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, are employed for network security analysis. This mechanism specifically analyzes IoT network data from sectors like healthcare and smart cities, examining how these technologies confronted emerging cyber risks during the defined period.

Keywords: IoT Security, Convolutional Neural Networks, Long Short-Term Memory, AI Driven Security, DDoS Attacks, Intrusion Detection Systems, Smart Cities

How to cite this article:
Bhagyashri N Chaudhari, Sayaram N Shingote, Snehal B. Phatangare, Santosh S.Kale. Leveraging Standards and Deep Learning Approaches to Secure Internet of Things (IoT) Devices from Cyber Attack. Journal of Artificial Intelligence Research & Advances. 2026; 13(01):-.
How to cite this URL:
Bhagyashri N Chaudhari, Sayaram N Shingote, Snehal B. Phatangare, Santosh S.Kale. Leveraging Standards and Deep Learning Approaches to Secure Internet of Things (IoT) Devices from Cyber Attack. Journal of Artificial Intelligence Research & Advances. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joaira/article=2026/view=237210


References

  1. Ahmed E, Sadiq I. Secure Communication Protocols for IoT: A Deep Learning Approach. Journal of Network and Computer Applications. 2020;157:102-15.
  2. Ahmed M, Mahmood AN. A Survey of Deep Learning Approaches for Cybersecurity. ACM Computing Surveys. 2020;53(4):1-35.
  3. Fernandes Jr G, Rodrigues JJ, Carvalho LF, Al-Muhtadi JF, Proença Jr ML. A comprehensive survey on network anomaly detection. Telecommunication Systems. 2019 Mar 15;70(3):447-89.
  4. Alshahrani M, Khedher L. GANs for Cybersecurity: A Survey of the State-of-the-Art. IEEE Access. 2021;9:40528-47.
  5. Bahdanau D, Cho K, Bengio Y. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473. 2014 Sep 1.
  6. Tariq U, Ahmed I, Bashir AK, Khan MA. Securing the evolving IoT with deep learning: a comprehensive review. Kurdish Studies. 2024 Jan 1;12(1):3426-54.
  7. Chen T, Zhang W. AI-Driven Threat Detection in IoT: Strategies and Applications. Journal of Cybersecurity and Privacy. 2022;2(3):134-50.
  8. Choo KK. The cyber threat landscape: Challenges and future research directions. Computers & security. 2011 Nov 1;30(8):719-31.
  9. Halbouni A, Gunawan TS, Habaebi MH, Halbouni M, Kartiwi M, Ahmad R. CNN-LSTM: hybrid deep neural network for network intrusion detection system. IEEE Access. 2022 Sep 14;10:99837-49.
  10. Ouarda L, Malika B, Yousfi NE, Brahim B. Improving the efficiency of intrusion detection in information systems. Journal of Intelligent Systems. 2022 Jun 30;31(1):835-54.

Ahead of Print Subscription Review Article
Volume 13
01
Received 25/03/2025
Accepted 21/07/2025
Published 19/02/2026
Publication Time 331 Days


Login


My IP

PlumX Metrics