{"id":"https://openalex.org/W4416513247","doi":"https://doi.org/10.1109/tce.2025.3635619","title":"Proactive Zero-Trust Intrusion Detection for Consumer IoT Applications Using Lightweight Ensemble Learning With Anomaly Analysis","display_name":"Proactive Zero-Trust Intrusion Detection for Consumer IoT Applications Using Lightweight Ensemble Learning With Anomaly Analysis","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416513247","doi":"https://doi.org/10.1109/tce.2025.3635619"},"language":null,"primary_location":{"id":"doi:10.1109/tce.2025.3635619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3635619","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061057525","display_name":"Bipasha Guha Roy","orcid":"https://orcid.org/0000-0002-7480-3020"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bipasha Guha Roy","raw_affiliation_strings":["Department of CSE (AIML), IEM Centre of Excellence for Cloud Computing and IoT, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","Department of CSE (AIML), Institute of Engineering and Management, IEM Centre of Excellence for Cloud Computing and IoT, University of Engineering and Management, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE (AIML), IEM Centre of Excellence for Cloud Computing and IoT, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]},{"raw_affiliation_string":"Department of CSE (AIML), Institute of Engineering and Management, IEM Centre of Excellence for Cloud Computing and IoT, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025235639","display_name":"Deepsubhra Guha Roy","orcid":"https://orcid.org/0000-0001-7194-6950"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Deepsubhra Guha Roy","raw_affiliation_strings":["Department of CSE (AIML), IEM Centre of Excellence for Cloud Computing and IoT, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","Department of CSE (AIML), Institute of Engineering and Management, IEM Centre of Excellence for Cloud Computing and IoT, University of Engineering and Management, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE (AIML), IEM Centre of Excellence for Cloud Computing and IoT, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]},{"raw_affiliation_string":"Department of CSE (AIML), Institute of Engineering and Management, IEM Centre of Excellence for Cloud Computing and IoT, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103199411","display_name":"Piyali Datta","orcid":"https://orcid.org/0000-0002-9470-736X"},"institutions":[{"id":"https://openalex.org/I1296725772","display_name":"University of Engineering & Management","ror":"https://ror.org/02decng19","country_code":"IN","type":"education","lineage":["https://openalex.org/I1296725772"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Piyali Datta","raw_affiliation_strings":["Department of CSE (AIML), IEM-IIT Mandi Centre for Joint Research on Human Computer Interaction, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","Department of CSE(AIML), Institute of Engineering and Management, IEM-IIT Mandi Centre for Joint Research on Human Computer Interaction, University of Engineering and Management, Kolkata, India"],"affiliations":[{"raw_affiliation_string":"Department of CSE (AIML), IEM-IIT Mandi Centre for Joint Research on Human Computer Interaction, Institute of Engineering and Management, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]},{"raw_affiliation_string":"Department of CSE(AIML), Institute of Engineering and Management, IEM-IIT Mandi Centre for Joint Research on Human Computer Interaction, University of Engineering and Management, Kolkata, India","institution_ids":["https://openalex.org/I1296725772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015205527","display_name":"Surbhi Bhatia","orcid":"https://orcid.org/0000-0003-3097-6568"},"institutions":[{"id":"https://openalex.org/I54459138","display_name":"University of Salford","ror":"https://ror.org/01tmqtf75","country_code":"GB","type":"education","lineage":["https://openalex.org/I54459138"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Surbhi Bhatia Khan","raw_affiliation_strings":["School of Science, Engineering and Environment, University of Salford, Manchester, U.K","Department of Data Science, University of Salford, Manchester, U.K"],"affiliations":[{"raw_affiliation_string":"School of Science, Engineering and Environment, University of Salford, Manchester, U.K","institution_ids":["https://openalex.org/I54459138"]},{"raw_affiliation_string":"Department of Data Science, University of Salford, Manchester, U.K","institution_ids":["https://openalex.org/I54459138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056520942","display_name":"Asma Alshuhail","orcid":"https://orcid.org/0000-0002-4110-9657"},"institutions":[{"id":"https://openalex.org/I4626487","display_name":"King Faisal University","ror":"https://ror.org/00dn43547","country_code":"SA","type":"education","lineage":["https://openalex.org/I4626487"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Asma Alshuhail","raw_affiliation_strings":["Department of Information Systems, College of Computer Science and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia","Department of Information Systems, King Faisal University, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer Science and Information Technology, King Faisal University, Al-Ahsa, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]},{"raw_affiliation_string":"Department of Information Systems, King Faisal University, Saudi Arabia","institution_ids":["https://openalex.org/I4626487"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059667465","display_name":"Oumaima Saidani","orcid":"https://orcid.org/0000-0001-9520-3174"},"institutions":[{"id":"https://openalex.org/I106778892","display_name":"Princess Nourah bint Abdulrahman University","ror":"https://ror.org/05b0cyh02","country_code":"SA","type":"education","lineage":["https://openalex.org/I106778892"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Oumaima Saidani","raw_affiliation_strings":["Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I106778892"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5061057525"],"corresponding_institution_ids":["https://openalex.org/I1296725772"],"apc_list":null,"apc_paid":null,"fwci":4.4837,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.95212317,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"72","issue":"1","first_page":"2007","last_page":"2015"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.669700026512146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.669700026512146,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.09149999916553497,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.03420000150799751,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6740999817848206},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6730999946594238},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.598800003528595},{"id":"https://openalex.org/keywords/dbscan","display_name":"DBSCAN","score":0.5163999795913696},{"id":"https://openalex.org/keywords/ensemble-learning","display_name":"Ensemble learning","score":0.484499990940094},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.45179998874664307},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4065000116825104},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.40639999508857727},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.3840000033378601}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7472000122070312},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6740999817848206},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6730999946594238},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.598800003528595},{"id":"https://openalex.org/C46576248","wikidata":"https://www.wikidata.org/wiki/Q1114630","display_name":"DBSCAN","level":5,"score":0.5163999795913696},{"id":"https://openalex.org/C45942800","wikidata":"https://www.wikidata.org/wiki/Q245652","display_name":"Ensemble learning","level":2,"score":0.484499990940094},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.45179998874664307},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4077000021934509},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4065000116825104},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.40639999508857727},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3840000033378601},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3828999996185303},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.37720000743865967},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36480000615119934},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.3610999882221222},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.3310999870300293},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.3151000142097473},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.31470000743865967},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3093999922275543},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.29739999771118164},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2854999899864197},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.271699994802475},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.2689000070095062},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.2603999972343445},{"id":"https://openalex.org/C119898033","wikidata":"https://www.wikidata.org/wiki/Q3433888","display_name":"Ensemble forecasting","level":2,"score":0.2587999999523163},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3635619","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3635619","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"proliferation":[2],"of":[3,80],"consumer":[4,42,54,155],"IoT":[5,156],"devices":[6],"from":[7],"smart":[8],"home":[9],"hubs":[10],"to":[11,69,86,109,153],"wearables":[12],"has":[13],"expanded":[14],"the":[15,103,116,124],"attack":[16],"surface,":[17],"introducing":[18],"new":[19],"security":[20],"and":[21,34,73,99,143],"privacy":[22],"challenges.":[23],"Traditional":[24],"Intrusion":[25],"Detection":[26],"Systems":[27],"(IDS)":[28],"often":[29],"rely":[30],"on":[31,115,134],"implicit":[32],"trust":[33],"heavyweight":[35],"computation,":[36],"making":[37],"them":[38],"unsuitable":[39],"for":[40,53],"resource-constrained":[41],"electronics.":[43],"This":[44],"paper":[45],"presents":[46],"a":[47,60,92],"proactive,":[48,149],"lightweight":[49],"zero-trust":[50],"IDS":[51],"tailored":[52],"applications.":[55,157],"Our":[56],"two-layer":[57],"architecture":[58],"integrates":[59],"supervised":[61],"stacked":[62],"ensemble":[63],"classifier":[64],"(Random":[65],"Forest,":[66],"XGBoost,":[67],"Light-GBM)":[68],"detect":[70],"known":[71],"threats":[72],"an":[74],"unsupervised":[75],"DBSCAN":[76],"(Density-Based":[77],"Spatial":[78],"Clustering":[79],"Applications":[81],"with":[82],"Noise)-based":[83],"anomaly":[84],"detector":[85],"identify":[87],"zero-day":[88],"attacks.":[89],"We":[90],"introduce":[91],"feature":[93,104],"reduction":[94],"pipeline":[95],"driven":[96],"by":[97,106],"correlation":[98],"variance":[100],"analysis,":[101],"reducing":[102],"set":[105],"over":[107],"50%":[108],"fit":[110],"edge":[111],"hardware":[112],"constraints.":[113],"Evaluated":[114],"CICIDS":[117],"collection":[118],"dataset":[119],"(over":[120],"9":[121],"million":[122],"flows),":[123],"framework":[125],"achieves":[126],"98.48%":[127],"accuracy":[128],"while":[129],"maintaining":[130],"real-time":[131],"processing":[132],"capability":[133],"Raspberry":[135],"Pi-class":[136],"hardware.":[137],"By":[138],"continuously":[139],"scrutinizing":[140],"both":[141],"malicious":[142],"benign":[144],"traffic,":[145],"our":[146],"system":[147],"delivers":[148],"trust-enhancing":[150],"defense":[151],"critical":[152],"modern":[154]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-11-23T00:00:00"}
