Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges
Omar Gheni Abdulateef ;
Atheer Joudah ;
Muna Ghazi Abdulsahib ;
Hussein Alrammahi
Published: 2025
Abstract
This research develops a machine learning framework for protecting data as it is transmitted in Internet of Things (IoT) configurations. The main objective of the proposed framework to address the major security issues using two intelligent machine learning methods are Random Forest and Support Vector Machine (SVM). They are applied to detect strange behaviour and potential threats within IoT data. The system was evaluated based on accuracy, precision, recall, and F1-score to determine how successful it was. Performance indicated Random Forest performed very well with 93.5% accuracy, slightly higher than SVM 91.2%. The system was also quite good at detecting cyber-attacks such as DDoS and malware, and did not raise many false alerts. This indicates that the system can actually contribute to making IoT much safer, building on what we have in this field. This study implies that incorporating machine learning into IoT security can assist in developing improved defenses against emerging cyber-attacks. In the long term, this research can assist in subsequent studies in order to improve security systems for various uses of IoT, address existing problems, and utilize more data.
Keywords
How to Cite the Article
Abdulateef, O. G., Joudah, A., Abdulsahib, M. G., & Alrammahi, H. (2025). Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges. Journal of Cyber Security and Risk Auditing, 2025(4), 266–275.https://doi.org/10.63180/jcsra.thestap.2025.4.6
Designing a Robust Machine Learning-Based Framework for Secure Data Transmission in Internet of Things (IoT) Environments: A Multifaceted Approach to Security Challenges is licensed under CC BY 4.0
References
- Ghaffari, A., Jelodari, N., Pouralish, S., Derakhshanfard, N., & Arasteh, B. (2024). Securing internet of things using machine and deep learning methods: A survey. Cluster Computing, 27(7), 9065–9089. https://doi.org/10.1007/s10586-024-04509-0
- Priyadarshi, R. (2024). Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: A comprehensive review. Wireless Networks, 30(4), 2647–2673. https://doi.org/10.1007/s11276-024-03697-2
- Humayun, M., Tariq, N., Alfayad, M., Zakwan, M., Alwakid, G., & Assiri, M. (2024). Securing the Internet of Things in Artificial Intelligence era: A comprehensive survey. IEEE Access, 12, 25469–25490. https://doi.org/10.1109/ACCESS.2024.3365634
- Alsadie, D. (2024). Artificial intelligence techniques for securing fog computing environments: Trends, challenges, and future directions. IEEE Access, 12, 151598–151648. https://doi.org/10.1109/ACCESS.2024.3463791
- Outchakoucht, A., Abou, A., Es-Samaali, H., & Benhadou, S. (2020). Machine learning-based access control framework for the Internet of Things. International Journal of Advanced Computer Science and Applications, 11(2). https://doi.org/10.14569/IJACSA.2020.0110243
- Alalwany, E., & Mahgoub, I. (2024). Security and trust management in the Internet of Vehicles (IoV): Challenges and machine learning solutions. Sensors, 24(2), 368. https://doi.org/10.3390/s24020368
- Adam, M., Hammoudeh, M., Alrawashdeh, R., & Alsulaimy, B. (2024). A survey on security, privacy, trust, and architectural challenges in IoT systems. IEEE Access, 12, 57128–57149. https://doi.org/10.1109/ACCESS.2024.3382709
- Hanafi, A. V., Ghaffari, A., Rezaei, H., Valipour, A., & Arasteh, B. (2023). Intrusion detection in Internet of Things using improved binary golden jackal optimization algorithm and LSTM. Cluster Computing, 27(3), 2673–2690. https://doi.org/10.1007/s10586-023-04102-x
- Hamarsheh, A. (2024). An adaptive security framework for Internet of Things networks leveraging SDN and machine learning. Applied Sciences, 14(11), 4530. https://doi.org/10.3390/app1411453
- Farooq, U., Tariq, N., Asim, M., Baker, T., & Al-Shamma’a, A. (2022). Machine learning and the Internet of Things security: Solutions and open challenges. Journal of Parallel and Distributed Computing, 162, 89–104. https://doi.org/10.1016/j.jpdc.2022.01.015
- Reyes-Acosta, R., Dominguez-Baez, C., Mendoza-Gonzalez, R., & Vargas Martin, M. (2024). Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: A multivocal state of knowledge review. International Journal of Information Security, 24(1). https://doi.org/10.1007/s10207-024-00935-8
- Rahu, M. A., Chandio, A. F., Aurangzeb, K., Karim, S., Alhussein, M., & Anwar, M. S. (2023). Toward design of Internet of Things and machine learning-enabled frameworks for analysis and prediction of water quality. IEEE Access, 11, 101055–101086. https://doi.org/10.1109/ACCESS.2023.3315649
- Gaidhani, A. R., & Potgantwar, A. D. (2024). A review of machine learning-based routing protocols for wireless sensor network lifetime. In Proceedings of RAiSE-2023 (p. 231). https://doi.org/10.3390/engproc2023059231
- Waqas, S. M., Zakwan, M., Ashraf, M., AlWakid, G. N., & Humayun, M. (2025). A survey on approximate hardware accelerator for error-tolerant applications. In Securing the Digital Realm (pp. 115–125). CRC Press. https://doi.org/10.1201/9781003497851-11
- Usmani, U. A., Usmani, A. Y., & Usmani, M. U. (2023). Ensuring trustworthy machine learning: Ethical foundations, robust algorithms, and responsible applications. In 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) (pp. 576–583). IEEE. https://doi.org/10.1109/ICCCIS60361.2023.10425285
- Li, Y., Zuo, Y., Song, H., & Lv, Z. (2022). Deep learning in security of Internet of Things. IEEE Internet of Things Journal, 9(22), 22133–22146. https://doi.org/10.1109/JIOT.2021.3106898
- Outchakoucht, A., Es-Samaali, H., & Philippe, J. (2017). Dynamic access control policy based on blockchain and machine learning for the Internet of Things. International Journal of Advanced Computer Science and Applications, 8(7). https://doi.org/10.14569/IJACSA.2017.080757
- Alnami, H., Mahgoub, I., Al-Najada, H., & Alalwany, E. (2025). A distributed machine learning-based scheme for real-time highway traffic flow prediction in Internet of Vehicles. Future Internet, 17(3), 131. https://doi.org/10.3390/fi17030131
- Ahmed, K. I., Tahir, M., Habaebi, M. H., Lau, S. L., & Ahad, A. (2021). Machine learning for authentication and authorization in IoT: Taxonomy, challenges and future research direction. Sensors, 21(15), 5122. https://doi.org/10.3390/s21155122
- Bagaa, M., Taleb, T., Bernabe, J. B., & Skarmeta, A. (2020). A machine learning security framework for IoT systems. IEEE Access, 8, 114066–114077. https://doi.org/10.1109/ACCESS.2020.2996214
- Gupta, C., Johri, I., Srinivasan, K., Hu, Y.-C., Qaisar, S. M., & Huang, K.-Y. (2022). A systematic review on machine learning and deep learning models for electronic information security in mobile networks. Sensors, 22(5), 2017. https://doi.org/10.3390/s22052017
- Al-Garadi, M. A., Mohamed, A., Al-Ali, A. K., Du, X., Ali, I., & Guizani, M. (2020). A survey of machine and deep learning methods for Internet of Things (IoT) security. IEEE Communications Surveys & Tutorials, 22(3), 1646–1685. https://doi.org/10.1109/COMST.2020.2988293
- Latif, S., et al. (2021). Deep learning for the Industrial Internet of Things (IIoT): A comprehensive survey of techniques, implementation frameworks, potential applications, and future directions. Sensors, 21(22), 7518. https://doi.org/10.3390/s21227518
- Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning. ACM Transactions on Intelligent Systems and Technology, 10(2), 1–19. https://doi.org/10.1145/3298981
- Das, S. R., Jhanjhi, N. Z., Asirvatham, D., Ashfaq, F., Javed, D., & Gururaj, H. L. (2024). Blockchain-driven splitfed learning for data protection in IoT setting. In Split Federated Learning for Secure IoT Applications: Concepts, frameworks, applications and case studies (pp. 27–45). IET. https://doi.org/10.1049/pbse025e_ch3.