INTELLIGENT METHOD OF CONTINUOUS SECURITY MONITORING IN IEEE 802.15.4 NETWORKS BASED ON ADAPTIVE ANOMALY ANALYSIS
https://doi.org/10.53360/2788-7995-2025-3(19)-14
Abstract
Securing IEEE 802.15.4 wireless networks is one of the key challenges in the development of the Internet of Things (IoT). Given the limited computational resources of IoT devices, traditional attack detection methods based on cryptographic mechanisms and deterministic thresholds do not always provide a sufficient level of protection. In this paper, we propose a novel method for adaptive network traffic monitoring that combines a modified Z-score with sample size consideration and an adaptive Bayesian classifier with dynamic attack probability adjustment. Experimental testing on data generated in an NS-3 environment shows that the proposed method outperforms traditional approaches in terms of attack detection accuracy, reducing the false positive rate from 10.9% to 3.8%. The hybrid model provides 94.7% classification accuracy and 91.8% attack detection completeness, which is 6.3% higher than the standard Bayesian classifier. The obtained results demonstrate the promising use of the proposed method in real-time systems for monitoring the security of IoT networks. The developed approach allows adapting to the changing network environment, reducing the influence of random fluctuations, which makes it an effective solution for protecting low-power networks.
About the Authors
N. BazhayevKazakhstan
Nurzhan Bazhayev – postdoctoral fellow
010000, Republic of Kazakhstan, Satbayev Street, Astana
010000, Republic of Kazakhstan, Astana, Mangilik El Avenue, 55 В
A. Shaikhanova
Kazakhstan
Aigul Shaikhanova – PhD, Professor of the Information Security Department
010000, Republic of Kazakhstan, Satbayev Street, Astana
D. Satybaldina
Kazakhstan
Dina Satybaldina – Candidate of Physical and Mathematical Sciences, Associate Professor
010000, Republic of Kazakhstan, Satbayev Street, Astana
K. Bakenova
Kazakhstan
Kamila Bakenova – PhD student of the Information Security Department
010000, Republic of Kazakhstan, Satbayev Street, Astana
References
1. Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges / Т. Gebremichael et al // IEEE Access. – 2020. – Vol. 8. – P. 152351-152366.
2. Sadikin F. ZigBee IoT Intrusion Detection System: A Hybrid Approach with Rule-based and Machine Learning Anomaly Detection / F. Sadikin, S. Kumar // Proc. of Int. Conf. on Security. – 2020. – P. 57-68.
3. Choudhary S. Internet of Things: Protocols, Applications and Security Issues / S. Choudhary, G. Meena // Procedia Computer Science. – 2022.
4. Kampourakis V. A systematic literature review on wireless security testbeds in the cyberphysical realm / V. Kampourakis, V. Gkioulos, S. Katsikas // Computers & Security. – 2023. – URL: https://www.sciencedirect.com/science/article/pii/S0167404823002936.
5. Ullah I. A two-level flow-based anomalous activity detection system for IoT networks / I. Ullah, Q.H. Mahmoud // Electronics. – 2020. – Vol. 9, № 3. – URL: https://www.mdpi.com/2079-9292/9/3/530.
6. Murugesan K.V.N. Comprehensive Security Analysis and DoS Attack Mitigation in Thread Networks / K.V.N. Murugesan, T. Master // Proc. IEEE WCNC. – 2025. – P. 1-7.
7. Morillo Fuetala D.G. Detecting targeted interference in the Internet of Things / D.G. Morillo Fuetala. – University College Cork, 2024.
8. Aljohani R. AI-Based Intrusion Detection for a Secure Internet of Things (IoT) / R. Aljohani, A. Bushnag, A. Alessa // Journal of Network and Systems Management. – 2024. – Vol. 32. – Art. 56.
9. A Survey on IoT Ground Sensing Systems for Early Wildfire Detection / C.C. Chan et al // IEEE Access. – 2024. – Vol. 12. – P. 172785-172819.
10. Kumari T.A. Tachyon: Enhancing stacked models using Bayesian optimization for intrusion detection / T.A. Kumari, S. Mishra // Egyptian Informatics Journal. – 2024. – Vol. 27. – Art. 100520.
11. Khayyat M.M. Improved bacterial foraging optimization with deep learning based anomaly detection in smart cities / M.M. Khayyat // Alexandria Engineering Journal. – 2023. – Vol. 75. – P. 407-417.
12. Sorostinean R. Anomaly Detection in Smart Industrial Machinery Through Hidden Markov Models and Autoencoders / R. Sorostinean, Z. Burghelea, A. Gellert // IEEE Access. – 2024. – P. 1-1.
13. Isong B. Insights into Modern Intrusion Detection Strategies for IoT Ecosystems / B. Isong, O. Kgote, A. Abu-Mahfouz // Electronics. – 2024. – Vol. 13. – Art. 2370.
14. Energy-aware and self-adaptive anomaly detection scheme based on network tomography / W. Wang et al // Information Sciences. – 2013. – Vol. 220. – P. 580-602.
15. Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis / V. Korzhuk et al // Journal of Wireless and Ubiquitous Computing. – 2019. – Vol. 10, № 2. – P. 1-21.
Review
For citations:
Bazhayev N., Shaikhanova A., Satybaldina D., Bakenova K. INTELLIGENT METHOD OF CONTINUOUS SECURITY MONITORING IN IEEE 802.15.4 NETWORKS BASED ON ADAPTIVE ANOMALY ANALYSIS. Bulletin of Shakarim University. Technical Sciences. 2025;(3(19)):127-134. (In Kazakh) https://doi.org/10.53360/2788-7995-2025-3(19)-14
JATS XML















