A Lightweight WDGP-1DCSP Model for High-Precision Intrusion Detection in Resource-Constrained IoT Edge Devices

Authors

  • Hani Iwidat Department of Data Science, Al-Istiqlal University, Jericho, Palestine

DOI:

https://doi.org/10.54536/ajise.v5i1.7204

Keywords:

Convolutional Neural Network, Cross-Stage Partial (CSP) Networks, Generative Adversarial Networks (GANs), Internet of Things (IoT), Intrusion Detection System (IDS), Lightweight Deep Learning

Abstract

As technology advances, network intrusion techniques are diversifying, presenting significant security challenges for resource-constrained edge devices in IoT environments. Addressing the generally poor detection performance and unsuitability of traditional intrusion detection models for edge devices in the current IoT environment, which suffer from limited resources and low computing power, this paper proposes a lightweight model based on Generative Adversarial Networks (GANs) and Convolutional Neural Networks (CNNs) for detecting intrusion behavior in the IoT environment. Firstly, GAN technology is used to solve the data imbalance problem. Secondly, a lightweight CNN with a cross-stage local structure is used to extract traffic features, and H-swish is selected as the activation function to reduce computational load and improve computational efficiency. Finally, Softmax is used to classify the traffic data. Experimental results on the TON_IOT and CICIDS2018 datasets demonstrate the model’s exceptional performance. The proposed model achieved accuracy rates of 99.52% and 99.53%, precision rates of 99.41% and 99.28%, recall rates of 99.57% and 99.52%, and F1-scores of 99.44% and 99.37% on the TON_IOT and CICIDS2018 datasets, respectively.  The model size is limited to 21-32 KB. These results demonstrate that the proposed model, while maintaining intrusion detection accuracy, reduces model size and computational load, thereby meeting the high-precision intrusion detection requirements of demanding IoT environments.

Downloads

Download data is not yet available.

References

Akpaku, E., Chen, J., Ahmed, M., Sosu, R., Agbenyegah, F. K., & Louis, D. K. (2025). eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. Journal of Computer Security, 33. https://doi.org/10.1177/0926227X251326282

Akpaku, E., Chen, J., Ahmed, M., Sosu, R. N. A., Agbenyegah, F. K., & Louis, D. K. (2025). eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. Journal of Computer Security. https://doi.org/10.1177/0926227X251326282

Arjovsky, M., Chintala, S., & Bottou, L. (2017). Wasserstein generative adversarial networks. Sydney, NSW, Australia.

Booij, T. M., Chiscop, I., Meeuwissen, E., Moustafa, N., & den Hartog, F. T. H. (2022). ToN_IoT: The role of heterogeneity and the need for standardization of features and attack types in IoT network intrusion data sets. IEEE Internet of Things Journal, 9(1), 485-496. https://doi.org/10.1109/JIOT.2021.3082844

Chen, Z., Liu, J., Shen, Y., Simsek, M., Kantarci, B., Mouftah, H. T., & Djukic, P. (2022). Machine learning-enabled iot security: Open issues and challenges under advanced persistent threats. ACM Computing Surveys, 55(5), 1-35. https://doi.org/10.1145/3530812

Freitas de Araujo-Filho, P., Kaddoum, G., Campelo, D. R., Gondim Santos, A., Macedo, D., & Zerguine, A. (2021). Intrusion detection for cyber-physical systems using generative adversarial networks in fog environment. IEEE Internet of Things Journal, 8(8), 6247-6256. https://doi.org/10.1109/JIOT.2020.3028439

Goodfellow, I., Pouget-Abadie, J., & Mirza, M. (2014). Generative adversarial nets. Montreal, QC, Canada.

Gulrajani, I., Ahmed, F., & Arjovsky, M. (2017). Improved training of Wasserstein GANs. Long Beach, CA, USA.

Hadem, P., Saikia, D. K., & Moulik, S. (2021). An SDN-based intrusion detection system using SVM with selective logging for IP traceback. Computer Networks, 191, 108015. https://doi.org/10.1016/j.comnet.2021.108015

Hamidou, S. T., & Mehdi, A. (2025). Enhancing IDS performance through a comparative analysis of Random Forest, XGBoost, and Deep Neural Networks. Machine Learning with Applications, 22, 100738. https://doi.org/10.1016/j.mlwa.2025.100738

Hnamte, V., Hussain, J., & Saikia, L. C. (2025). A lightweight intrusion detection system using deep convolutional neural network. Computers & Electrical Engineering, 120, 109662. https://doi.org/10.1016/j.compeleceng.2025.109662

Howard, A., Sandler, M., & Chen, B. (2019). Searching for MobileNetV3. Seoul, South Korea.

Jiménez-López, D., Rodríguez-Barroso, N., Luzón, M. V., Del Ser, J., & Herrera, F. (2025). Membership inference attacks fueled by few-shot learning to detect privacy leakage and address data integrity. Machine Learning and Knowledge Extraction, 7(2), 43. https://doi.org/10.3390/make7020043

Khan, I. A., Moustafa, N., Pi, D., Sallam, K. M., Zomaya, A. A., & Li, Y. (2022). A new explainable deep learning framework for cyber threat discovery in industrial IoT networks. IEEE Internet of Things Journal, 9(13), 11604-11613. https://doi.org/10.1109/JIOT.2021.3124956

Kilincer, I. F., Ertam, F., & Sengur, A. (2021). Machine learning methods for cyber security intrusion detection: Datasets and comparative study. Computer Networks, 188, 107840. https://doi.org/10.1016/j.comnet.2021.107840

Li, Y. X., Zuo, Y., & Song, H. B. (2022). Deep learning in security of internet of things. IEEE Internet of Things Journal, 9(22), 22133-22146.

Misrak, S. F., & Ayele, T. W. (2025). Lightweight intrusion detection system for IoT with improved feature engineering and advanced dynamic quantization. Discover Internet of Things, 5(1), 1-25. https://doi.org/10.1007/s43926-025-00203-8

Muhammad, Z. (2026). Zero Trust Architecture (ZTA) Design and Implementation, A Comprehensive Review. American Journal of Innovation in Science and Engineering, 5, 18-25. https://doi.org/10.54536/ajise.v5i1.5905

Radford, A., Metz, L., & Chintala, S. (2016). Unsupervised representation learning with deep convolutional generative adversarial networks. San Juan, Puerto Rico.

Sarhan, M., Layeghy, S., Moustafa, N., & Gallagher, M. (2024). Feature extraction for machine learning-based intrusion detection in IoT networks. Digital Communications and Networks, 10(2), 456-467. https://doi.org/10.1016/j.dcan.2022.07.003

Tolba, A., Nabil, N., & Sallam, K. (2024). Hybrid Deep Learning-Based Model for Intrusion Detection. Artificial Intelligence in Cybersecurity, (1) 2024. https://doi.org/10.61356/j.aics.2024.1198

Wang, C. Y., Liao, H. Y. M., & Wu, Y. H. (2020). CSPNet: A new backbone that can enhance learning capability of CNN. Seattle, WA, USA.

Wisanwanichthan, T., Thammarat, S., & Netisopakul, P. (2025). A Lightweight Intrusion Detection System for IoT and UAV Using Deep Neural Networks with Knowledge Distillation. Computers, 14(7), 291. https://doi.org/10.3390/computers14070291

Xiao, Y., Xing, C., Zhang, T., & Zhao, Z. (2019). An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access, 7, 42210-42219. https://doi.org/10.1109/ACCESS.2019.2904620

Zhang, H., Huang, L., Wu, C. Q., & Li, Z. (2020). An effective convolutional neural network based on SMOTE and Gaussian mixture model for intrusion detection in imbalanced dataset. Computer Networks, 177, 107315. https://doi.org/10.1016/j.comnet.2020.107315

Zhao, R., Gui, G., Xue, Z., Yin, J., Ohtsuki, T., Adebisi, B., & Gacanin, H. (2021). A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things. IEEE Internet of Things Journal, 1-1. https://doi.org/10.1109/JIOT.2021.3119055

Zhao, Z., Li, Z., Jiang, J., Yu, F., Zhang, F., Xu, C., Zhao, X., Zhang, R., & Guo, S. (2023). ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena. IEEE Transactions on Dependable and Secure Computing, 20(1), 1-15. https://doi.org/10.1109/TDSC.2022.3223603

Downloads

Published

2026-03-18

How to Cite

Iwidat, H. . (2026). A Lightweight WDGP-1DCSP Model for High-Precision Intrusion Detection in Resource-Constrained IoT Edge Devices. American Journal of Innovation in Science and Engineering , 5(1), 74-85. https://doi.org/10.54536/ajise.v5i1.7204

Similar Articles

1-10 of 44

You may also start an advanced similarity search for this article.