Skip to main content
Log in

Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies

  • Research
  • Published:
Save article
View saved research
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The accelerated growth of Internet of Things (IoT) devices and their convergence with Mobile Edge Computing (MEC) networks has transformed healthcare, smart cities, and industrial automation among other sectors. Nonetheless, this development presents notable security vulnerabilities, including Distributed Denial of Service (DDoS) and zero-day attacks against resource-limited edge nodes. This work puts forward a new hybrid deep learning model combining Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks to improve real-time anomaly detection in MEC-based IoT deployments. The proposed model can capture both the spatial and temporal features in network traffic patterns and allow accurate malicious pattern classification. Experiments are conducted using the publicly released IoT-23 dataset, which contains real-world traffic samples from compromised and benign IoT devices. The data was preprocessed with information and ratio-based feature selection techniques. It was implemented in Python with TensorFlow libraries to support scalable and efficient training of the model. The suggested model exhibited a remarkable improvement in detection performance in terms of classification accuracy, achieved an accuracy of 99%, outperforming conventional 1D CNN and gradient boosting models in terms of detection performance. Experimental outcomes indicate that the CNN-LSTM model is capable of accurately identifying DDoS attacks with fewer false positives and higher recall, rendering it ideal for real-time deployment in edge computing contexts. The model’s versatility with lightweight processing enables it to be a resilient security solution for IoT systems of the future.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (India)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Nagajayanthi B (2022) Decades of internet of things towards twenty-first century: a research-based introspective. Wireless Pers Commun 123(4):3661–3697

    Article  Google Scholar 

  2. Chataut R, Phoummalayvane A, Akl R (2023) Unleashing the power of IoT: a comprehensive review of IoT applications and prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors (Basel) 23(16):7194

    Article  Google Scholar 

  3. Allioui H, Mourdi Y (2023) Exploring the full potentials of IoT for better financial growth and stability: a comprehensive survey. Sensors 23(19):8015

    Article  Google Scholar 

  4. Islam MM, Nooruddin S, Karray F, Muhammad G (2022) Internet of things: device capabilities, architectures, protocols, and smart applications in healthcare domain. IEEE Internet Things J 10(4):3611–3641

    Article  Google Scholar 

  5. Hazra A, Rana P, Adhikari M, Amgoth T (2023) Fog computing for next-generation internet of things: fundamental, state-of-the-art and research challenges. Comput Sci Rev 48:100549

    Article  Google Scholar 

  6. Saovapakhiran B, Naruephiphat W, Charnsripinyo C, Baydere S, Özdemir S (2022) Qoe-driven IoT architecture: a comprehensive review on system and resource management. IEEE Access 10:84579–84621

    Article  Google Scholar 

  7. Haibeh LA, Yagoub MC, Jarray A (2022) A survey on mobile edge computing infrastructure: design, resource management, and optimization approaches. IEEE Access 10:27591–27610

    Article  Google Scholar 

  8. Yang J, Shah AA, Pezaros D (2023) A survey of energy optimization approaches for computational task offloading and resource allocation in MEC networks. Electronics 12(17):3548

    Article  Google Scholar 

  9. Mohiuddin K, Fatima H, Khan MA, Khaleel MA, Nasr OA, Shahwar S (2022) Mobile learning evolution and emerging computing paradigms: an edge-based cloud architecture for reduced latencies and quick response time. Array 16:100259

    Article  Google Scholar 

  10. Gür G et al (2022) Integration of ICN and MEC in 5G and beyond networks: mutual benefits, use cases, challenges, standardization, and future research. IEEE Open J Commun Soc 3:1382–1412

    Article  Google Scholar 

  11. Zhukabayeva T, Zholshiyeva L, Karabayev N, Khan S, Alnazzawi N (2025) Cybersecurity solutions for industrial internet of things–edge computing integration: challenges, threats, and future directions. Sensors 25(1):213

    Article  Google Scholar 

  12. Ali MH et al (2022) Threat analysis and distributed denial of service (DDoS) attack recognition in the internet of things (IoT). Electronics 11(3):494

    Article  Google Scholar 

  13. Shah Z, Ullah I, Li H, Levula A, Khurshid K (2022) Blockchain-based solutions to mitigate distributed denial of service (DDoS) attacks in the internet of things (IoT): a survey. Sensors 22(3):1094

    Article  Google Scholar 

  14. Singh S, Sharma PK, Moon SY, Park JH (2024) Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J Ambient Intell Humaniz Comput, pp. 1–18

  15. Garg S, Kaur K, Kaddoum G, Garigipati P, Aujla GS (2021) Security in IoT-driven mobile edge computing: new paradigms, challenges, and opportunities. IEEE Netw 35(5):298–305. https://doi.org/10.1109/MNET.211.2000526

    Article  Google Scholar 

  16. Bhat SA, Sofi IB, Chi C-Y (2020) Edge computing and its convergence with blockchain in 5G and beyond: security, challenges, and opportunities. IEEE Access 8:205340–205373. https://doi.org/10.1109/ACCESS.2020.3037108

    Article  Google Scholar 

  17. Moudoud H, Khoukhi L, Cherkaoui S (2021) Prediction and detection of FDIA and DDoS attacks in 5G enabled IoT. IEEE Netw 35(2):194–201. https://doi.org/10.1109/MNET.011.2000449

    Article  Google Scholar 

  18. Wu Y, Dai H-N, Wang H (2021) Convergence of blockchain and edge computing for secure and scalable IIoT critical infrastructures in industry 4.0. IEEE Internet Things J 8(4):2300–2317. https://doi.org/10.1109/JIOT.2020.3025916

    Article  Google Scholar 

  19. Zhang L, Peng M, Wang W, Jin Z, Su Y, Chen H (2021) Secure and efficient data storage and sharing scheme for blockchain-based mobile‐edge computing. Trans Emerging Tel Tech 32(10):e4315. https://doi.org/10.1002/ett.4315

  20. Li J, Wu J, Chen L, Li J, Lam S-K (2023) Blockchain-based secure key management for mobile edge computing. IEEE Trans Mobile Comput 22(1):100–114. https://doi.org/10.1109/TMC.2021.3068717

    Article  Google Scholar 

  21. Hanif S, Ilyas T, Zeeshan M Intrusion detection in IoT using artificial neural networks on UNSW-15 dataset, in (2019) IEEE 16th International Conference on Smart Cities: Improving Quality of Life using ICT & IoT and AI (HONET-ICT), IEEE, 2019, pp. 152–156

  22. Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146–154

    Article  Google Scholar 

  23. Osamor F, Wellman B (2022) Deep Learning-based hybrid model for efficient anomaly detection. Int J Adv Comput Sci Appl, 13, 4

  24. Taha AA, Malebary SJ (2020) An intelligent approach to credit card fraud detection using an optimised light gradient boosting machine. IEEE Access 8:25579–25587

    Article  Google Scholar 

  25. Trivedi NK, Simaiya S, Lilhore UK, Sharma SK (2020) An efficient credit card fraud detection model based on machine learning methods. Int J Adv Sci Technol 29(5):3414–3424

    Google Scholar 

  26. Azizjon M, Jumabek A, Kim W (2020) 1D CNN-based network intrusion detection with normalization on imbalanced data, in 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), IEEE, pp. 218–224

Download references

Acknowledgements

During the manuscript’s conception methodology design and drafting Suguna Krishnamoorhty contributed. Additionally, data interpretation and analysis were done. • Lekhavani and Suguna Krishnamoorthy carried out the experiments and gathered the data. helped with the manuscript’s revision and analysis. • Ramalakshmi Subbarayalu oversaw the research process evaluated the final draft and offered crucial insights during the study design. • Lack of resources for funding acquisition and project management in general. helped with the manuscripts’ proofreading and approval.

Funding

This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Contributions

During the manuscript’s conception methodology design and drafting Suguna Krishnamoorhty contributed. Additionally, data interpretation and analysis were done. • Lekhavani and Suguna Krishnamoorthy carried out the experiments and gathered the data. helped with the manuscript’s revision and analysis. • Ramalakshmi Subbarayalu oversaw the research process evaluated the final draft and offered crucial insights during the study design. Viyat Varun Upadhyay and N. Naga Bhooshanam were responsible for data curation. Sathish Kannan and Seeniappan Kaliappan contributed to reviewing and editing the manuscript.Yogendra Thakur was responsible for visualization • Lack of resources for funding acquisition and project management in general. helped with the manuscripts’ proofreading and approval.

Corresponding author

Correspondence to Suguna Krishnamoorthy.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishnamoorthy, S., Ramesh, L., Subbarayalu, R. et al. Navigating the complex terrain of security challenges and crafting robust solutions in Mec-enabled IOT ecosystems for future societies. Peer-to-Peer Netw. Appl. 18, 296 (2025). https://doi.org/10.1007/s12083-025-02124-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Version of record:

  • DOI: https://doi.org/10.1007/s12083-025-02124-3

Keywords

Profiles

  1. Lekhavani Ramesh