AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things


With the increasing use of the Internet of things (IoT) in diverse domains, security concerns and IoT threats are constantly rising. The computational and memory limitations of IoT devices have resulted in emerging vulnerabilities in most IoT-run environments. Due to the low processing ability, IoT devices are often not capable of running complex defensive mechanisms. Lack of an architecture for a safer IoT environment is referred to as the most important barrier in developing a secure IoT system. In this paper, we propose a secure architecture for IoT edge layer infrastructure, called AI4SAFE-IoT. This architecture is built upon AI-powered security modules at the edge layer for protecting IoT infrastructure. Cyber threat attribution, intelligent web application firewall, cyber threat hunting, and cyber threat intelligence are the main modules proposed in our architecture. The proposed modules detect, attribute, and further identify the stage of an attack life cycle based on the Cyber Kill Chain model. In the proposed architecture, we define each security module and show its functionality against different threats in real-world applications. Moreover, due to the integration of AI security modules in a different layer of AI4SAFE-IoT, each threat in the edge layer will be handled by its corresponding security module delivered by a service. We compared the proposed architecture with the existing models and discussed our architecture independence of the underlying IoT layer and its comparatively low overhead according to delivering security as service for the edge layer of IoT architecture instead of embed implementation. Overall, we evaluated our proposed architecture based on the IoT service management score. The proposed architecture obtained 84.7 out of 100 which is the highest score among peer IoT edge layer security architectures.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9


  1. 1.

    Zhu Q, Wang R, Chen Q, Liu Y, Qin W (2010) Iot gateway: bridgingwireless sensor networks into Internet of Things. In: 2010 IEEE/IFIP international conference on embedded and ubiquitous computing. IEEE, pp 347–352

  2. 2.

    Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864

    Google Scholar 

  3. 3.

    Conti M, Dehghantanha A, Franke K, Watson S (2018) Internet of Things security and forensics: challenges and opportunities. Elsevier, Amsterdam

    Google Scholar 

  4. 4.

    Sakhnini J, Karimipour H, Dehghantanha A, Parizi RM, Srivastava G (2019) Security aspects of Internet of Things aided smart grids: a bibliometric survey. Internet Things.

    Article  Google Scholar 

  5. 5.

    Darabian H, Dehghantanha A, Hashemi S, Taheri M, Azmoodeh A, Homayoun S, Choo K-KR, Parizi RM (2020) A multiview learning method for malware threat hunting: windows, IoT and android as case studies. World Wide Web.

  6. 6.

    Domingo MC (2012) An overview of the Internet of Things for people with disabilities. J Netw Comput Appl 35(2):584–596

    Google Scholar 

  7. 7.

    Jia X, Feng Q, Fan T, Lei Q (2012) RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International conference on consumer electronics, communications and networks (CECNet). IEEE, pp 1282–1285

  8. 8.

    Wang L, Da Xu L, Bi Z, Xu Y (2013) Data cleaning for RFID and WSN integration. IEEE Trans Ind Inf 10(1):408–418

    Google Scholar 

  9. 9.

    Liu CH, Yang B, Liu T (2014) Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw 18:85–101

    Google Scholar 

  10. 10.

    HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2019) A survey on Internet of Things security: requirements, challenges, and solutions. Internet Things.

    Article  Google Scholar 

  11. 11.

    Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094

    Google Scholar 

  12. 12.

    Binti N, Kamaludeen A, Lee SP, Parizi RM (2019) Guideline-based approach for IoT home application development. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 929–936

  13. 13.

    Yun M, Yuxin B (2010) Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International conference on advances in energy engineering. IEEE, pp 69–72

  14. 14.

    Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2019) Residual energy-based cluster-head selection in wsns for IoT application. IEEE Internet Things J 6:5132–5139

    Google Scholar 

  15. 15.

    Catarinucci L, De Donno D, Mainetti L, Palano L, Patrono L, Stefanizzi ML, Tarricone L (2015) An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J 2(6):515–526

    Google Scholar 

  16. 16.

    He W, Yan G, Da Xu L (2014) Developing vehicular data cloud services in the IoT environment. IEEE Trans Ind Inf 10(2):1587–1595

    Google Scholar 

  17. 17.

    Behera TM, Mohapatra SK, Samal UC, Khan MS, Daneshmand M, Gandomi AH (2020) I-sep: an improved routing protocol for heterogeneous WSN for IoT-based environmental monitoring. IEEE Internet Things J 7(1):710–717

    Google Scholar 

  18. 18.

    Paranjothi A, Tanik U, Wang Y, Khan MS (2019) Hybrid-vehfog: a robust approach for reliable dissemination of critical messages in connected vehicles. Trans Emerg Telecommun Technol 30(6):e3595 (e3595 ETT-18-0175.R3)

    Google Scholar 

  19. 19.

    Gardašević G, Veletić M, Maletić N, Vasiljević D, Radusinović I, Tomović S, Radonjić M (2017) The IoT architectural framework, design issues and application domains. Wirel Pers Commun 92(1):127–148

    Google Scholar 

  20. 20.

    Karanki SS, Khan MS (2017) SMMV: secure multimedia delivery in vehicles using roadside infrastructure. Veh Commun 7:40–50

    Google Scholar 

  21. 21.

    Ngu AH, Gutierrez M, Metsis V, Nepal S, Sheng QZ (2016) IoT middleware: a survey on issues and enabling technologies. IEEE Internet Things J 4(1):1–20

    Google Scholar 

  22. 22.

    Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853

    Google Scholar 

  23. 23.

    Giuliano R, Mazzenga F, Neri A, Vegni AM (2016) Security access protocols in IoT capillary networks. IEEE Internet Things J 4(3):645–657

    Google Scholar 

  24. 24.

    Zhang Y, Raychadhuri D, Ravindran R, Wang G (2013) ICN based architecture for IoT. IRTF Contribution

  25. 25.

    Chang K-H (2014) Bluetooth: a viable solution for IoT?[Industry perspectives]. IEEE Wirel Commun 21(6):6–7

    Google Scholar 

  26. 26.

    Santos J, Rodrigues JJ, Silva BM, Casal J, Saleem K, Denisov V (2016) An IoT-based mobile gateway for intelligent personal assistants on mobile health environments. J Netw Comput Appl 71:194–204

    Google Scholar 

  27. 27.

    Behera TM, Khan MS, Mohapatra SK, Samail UC, Bhuiyan MZA (2019) Energy-efficient routing for greenhouse monitoring using heterogeneous sensor networks. In: 2019 International conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData), pp 953–958

  28. 28.

    Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: a scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105

    Google Scholar 

  29. 29.

    HaddadPajouh H, Dehghantanha A, Khayami R, Choo K-KR (2018) A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting. Future Gener Comput Syst 85:88–96

    Google Scholar 

  30. 30.

    Baccelli E, Gündoğan C, Hahm O, Kietzmann P, Lenders MS, Petersen H, Schleiser K, Schmidt TC, Wählisch M (2018) RIOT: an open source operating system for low-end embedded devices in the IoT. IEEE Internet Things J 5(6):4428–4440

    Google Scholar 

  31. 31.

    Levis P et al (2005) TinyOS: an operating system for sensor networks. In: Weber W, Rabaey JM, Aarts E (eds) Ambient intelligence. Springer, Berlin, Heidelberg, pp 115–148

    Google Scholar 

  32. 32.

    Dovom EM, Azmoodeh A, Dehghantanha A, Newton DE, Parizi RM, Karimipour H (2019) Fuzzy pattern tree for edge malware detection and categorization in IoT. J Syst Architect 97:1–7

    Google Scholar 

  33. 33.

    Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of Things security: a survey. J Netw Comput Appl 88:10–28

    Google Scholar 

  34. 34.

    Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the Internet of Things: perspectives and challenges. Wireless Netw 20(8):2481–2501

    Google Scholar 

  35. 35.

    Kupreev O, Kupreev O, Badovskaya E, Gutnikov A. DDoS attacks in Q4 2018, Securelist english. [Online]. Accessed 21 Dec 2019

  36. 36.

    Patel P, Ali MI, Sheth A (2017) On using the intelligent edge for IoT analytics. IEEE Intell Syst 32(5):64–69

    Google Scholar 

  37. 37.

    Li H, Ota K, Dong M (2018) Learning IoT in edge: deep learning for the Internet of Things with edge computing. IEEE Netw 32(1):96–101

    Google Scholar 

  38. 38.

    Yazdinejad A, Parizi RM, Dehghantanha A, Zhang Q, Choo KR (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Trans Serv Comput.

    Article  Google Scholar 

  39. 39.

    Moosavi SR, Gia TN, Rahmani A-M, Nigussie E, Virtanen S, Isoaho J, Tenhunen H (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci 52:452–459

    Google Scholar 

  40. 40.

    Leusse PD, Dimitrakos T (2010) SOA-Based security governance middleware. In: 2010 fourth international conference on emerging security information, systems and technologies

  41. 41.

    Vučinić M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw 32:3–16

    Google Scholar 

  42. 42.

    Nawir M, Amir A, Yaakob N, Lynn OB (2016) Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International conference on electronic design (ICED). IEEE, pp 321–326

  43. 43.

    Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40–47

    Google Scholar 

  44. 44.

    Jang J, Kong S, Kim M, Kim D, Kang BB (2015) SeCReT: secure channel between rich execution environment and trusted execution environment. In: Proceedings 2015 network and distributed system security symposium

  45. 45.

    Dai W, Jin H, Zou D, Xu S, Zheng W, Shi L, Yang LT (2015) TEE: a virtual DRTM based execution environment for secure cloud-end computing. Future Gener Comput Syst 49:47–57

    Google Scholar 

  46. 46.

    Bormann C, Castellani AP, Shelby Z (2012) Coap: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 2:62–67

    Google Scholar 

  47. 47.

    Hunkeler U, Truong HL, Stanford-Clark A (2008) MQTT-S A publish/subscribe protocol for wireless sensor networks. In: 2008 3rd International conference on communication systems software and middleware and workshops (COMSWARE’08). IEEE, pp 791–798

  48. 48.

    Ito M, Iyatomi H (2018) Web application firewall using character-level convolutional neural network. In: 2018 IEEE 14th International colloquium on signal processing and its applications (CSPA). IEEE, pp 103–106

  49. 49.

    Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532–537

    Google Scholar 

  50. 50.

    Pajouh HH, Dastghaibyfard G, Hashemi S (2017) Two-tier network anomaly detection model: a machine learning approach. J Intell Inf Syst 48(1):61–74

    Google Scholar 

  51. 51.

    Pajouh HH, Javidan R, Khayami R, Dehghantanha A, Choo KR (2016) A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Trans Emerg Top Comput. 7(2):314–323

    Google Scholar 

  52. 52.

    Azmoodeh A, Dehghantanha A, Conti M et al (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9:1141–1152

    Google Scholar 

  53. 53.

    Al-Garadi MA, Mohamed A, Al-Ali A, Du X, Guizani M (2018) A survey of machine and deep learning methods for Internet of Things (IoT) security. arXiv:1807.11023

  54. 54.

    Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M (2017) Understanding the mirai botnet. In: 26th {USENIX} security symposium ({USENIX} Security 17), pp 1093–1110

  55. 55.

    Kolias C, Kambourakis G, Stavrou A, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80–84

    Google Scholar 

  56. 56.

    Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel Commun 24(3):10–16

    Google Scholar 

  57. 57.

    HosseiniNejad R, HaddadPajouh H, Dehghantanha A, Parizi RM (2019) A cyber kill chain based analysis of remote access trojans. In: Dehghantanha A, Choo KK (eds) Handbook of big data and iot security. Springer, Cham

    Google Scholar 

  58. 58.

    Taylor PJ, Dargahi T, Dehghantanha A (2019) Analysis of APT actors targeting iot and big data systems: shell_crew, nettraveler, projectsauron, copykittens, volatile cedar and transparent tribe as a case study. In: Handbook of big data and iot security, pp 257–272

  59. 59.

    Mwiki H, Dargahi T, Dehghantanha A, Choo KKR (2019) Analysis and triage of advanced hacking groups targeting western countries criticalnational infrastructure: APT28, RED October, and Regin. In: Gritzalis D, Theocharidou M, Stergiopoulos G (eds) Critical infrastructure security and resilience. Advanced sciences and technologies for security applications. Springer, Cham

    Google Scholar 

  60. 60.

    Bahrami PN, Dehghantanha A, Dargahi T, Parizi RM, Choo KK, Javadi HH (2019) Cyber kill chain-based taxonomy of advanced persistent threat actors: analogy of tactics. techniques, and procedures. J Inf Process Syst 15(4):865–889

    Google Scholar 

  61. 61.

    Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design

  62. 62.

    Bhuyan P, Ray A, Mohapatra DP (2015) A service-oriented architecture (SOA) framework component for verification of choreography. In: Jain L, Behera H, Mandal J, Mohapatra D (eds) Computational intelligence in data mining. Smart Innovation, Systems and Technologies, vol 3. Springer, New Delhi

  63. 63.

    Guan L, Liu P, Xing X, Ge X, Zhang S, Yu M, Jaeger T (2017) Trustshadow: secure execution of unmodified applications with arm trustzone. In: Proceedings of the 15th annual international conference on mobile systems, applications, and services. ACM, pp 488–501

  64. 64.

    Tiburski RT, Moratelli CR, Johann SF, Neves MV, de Matos E, Amaral LA, Hessel F (2019) Lightweight security architecture based on embedded virtualization and trust mechanisms for IoT edge devices. IEEE Commun Mag 57(2):67–73

    Google Scholar 

  65. 65.

    Ahmed AIA, Gani A, Hamid SHA, Abdelmaboud A, Syed HJ, Habeeb Mohamed RAA, Ali I (2019) Service management for IoT: requirements, taxonomy, recent advances and open research challenges. IEEE Access 7:155472–155488

    Google Scholar 

  66. 66.

    Woo MW, Lee J, Park K (2018) A reliable IoT system for personal healthcare devices. Future Gener Comput Syst 78:626–640

    Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Raouf Khayami.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

HaddadPajouh, H., Khayami, R., Dehghantanha, A. et al. AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things. Neural Comput & Applic 32, 16119–16133 (2020).

Download citation


  • Internet of things
  • IoT
  • Service-oriented architecture
  • Secure architecture
  • Artificial intelligence
  • Fog computing
  • Edge layer