Malmö University Publications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 44) Show all publications
Oacheșu, A., Adewole, K. S., Jacobsson, A. & Davidsson, P. (2026). Enhancing IoT Security with Generative AI: Threat Detection and Countermeasure Design. Electronics, 15(1), Article ID 92.
Open this publication in new window or tab >>Enhancing IoT Security with Generative AI: Threat Detection and Countermeasure Design
2026 (English)In: Electronics, E-ISSN 2079-9292, Vol. 15, no 1, article id 92Article in journal (Refereed) Published
Abstract [en]

The rapid proliferation of Internet of Things (IoT) devices has increased the attack surface for cyber threats. Traditional intrusion detection systems often struggle to keep pace with novel or evolving threats. This study proposes an end-to-end generative AI-based intrusion detection and response pipeline designed for automated threat mitigation in smart home IoT environments. It leverages a Variational Autoencoder (VAE) trained on benign traffic to flag anomalies, a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) model to classify anomalies into five attack categories (C&C, DDoS, Okiru, PortScan, and benign), and Grok3—a large language model—to generate tailored countermeasure recommendations. Using the Aposemat IoT-23 dataset, the VAE model achieves a recall of 0.999 and a precision of 0.961 for anomaly detection. The BERT model achieves an overall accuracy of 99.90% with per-class F1 scores exceeding 0.99. End-to-end prototype simulation involving 10,000 network traffic samples demonstrate a 98% accuracy in identifying cyber attacks and generating countermeasures to mitigate them. The pipeline integrates generative models for improved detection and automated security policy formulation in IoT settings, enhancing detection and enabling quicker and actionable security responses to mitigate cyber threats targeting smart home environments.

Place, publisher, year, edition, pages
MDPI AG, 2026
Keywords
IoT security, generative AI: anomaly detection, variational autoencoder, BERT, LLM, threat mitigation
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-81564 (URN)10.3390/electronics15010092 (DOI)
Available from: 2026-01-12 Created: 2026-01-12 Last updated: 2026-01-12Bibliographically approved
Spalazzese, R., Sanctis, M. D., Jacobsson, A., Alkhabbas, F. & Davidsson, P. (2025). A Conceptual Model for Trustworthiness in Intelligent IoT Systems. In: 7th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT: SERP4IoT. Paper presented at Ottawa, Ontario, Canada 27 April 2025 (pp. 9-16). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>A Conceptual Model for Trustworthiness in Intelligent IoT Systems
Show others...
2025 (English)In: 7th IEEE/ACM International Workshop on Software Engineering Research and Practices for the IoT: SERP4IoT, Institute of Electrical and Electronics Engineers (IEEE), 2025, p. 9-16Conference paper, Published paper (Refereed)
Abstract [en]

A number of challenging aspects have to be considered, when the Internet of Things (IoT) and Artificial Intelligence (AI) are combined into intelligent IoT systems. A key aspect that demands high attention is trustworthiness. As part of the investigations we conduct in this area in collaboration with partner companies, the need of a holistic view for trustworthiness in Intelligent IoT systems has emerged. To address such need, and to identify suitable support for it, we analyzed existing ISO standards and literature and we found out that they lack a holistic view for trustworthiness in intelligent IoT systems.To bridge this gap, we propose a conceptual model for trustworthiness in intelligent IoT systems that includes stakeholders, systems, and primary concerns, and is built upon existing standards and literature. Our model can support the design, development, operations, evolution of and communication about intelligent IoT systems. We received positive confirmation of the validity of the conceptual model from industrial practitioners working in four companies in the intelligent IoT systems area. Together with our partner companies, we plan to develop and operate approaches leveraging the conceptual model as next step.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
AI, Conceptual Model, Intelligent IoT Systems, IoT, Trustworthiness
National Category
Computer Systems
Identifiers
urn:nbn:se:mau:diva-78840 (URN)10.1109/SERP4IoT66600.2025.00006 (DOI)001548123700002 ()2-s2.0-105009594554 (Scopus ID)9798331502270 (ISBN)
Conference
Ottawa, Ontario, Canada 27 April 2025
Available from: 2025-08-11 Created: 2025-08-11 Last updated: 2025-09-18Bibliographically approved
Adewole, K. S., Persson, J. A., Jacobsson, A., Akin, E., Shokrollahi, A., Malekian, R., . . . Valtonen Örnhag, M. (2025). A Systematic Literature Review of Privacy Related to Sensing in Smart Buildings. IEEE Access, 13, 164358-164394
Open this publication in new window or tab >>A Systematic Literature Review of Privacy Related to Sensing in Smart Buildings
Show others...
2025 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 13, p. 164358-164394Article, review/survey (Refereed) Published
Abstract [en]

The concept of smart building is based on the deployment of Internet of Things (IoT) technologies to develop various building applications and services. Aided by the proliferation of smart devices, research in building automation has grown significantly. Nevertheless, these smart devices are integrated with sensors that can collect and share sensitive data and private information related to the building occupants, exposing them to a variety of privacy threats. Although research efforts to promote the development of privacy-aware solutions for smart buildings have been on the rise, a comprehensive review that summarizes these studies is lacking in the literature. This paper provides an extensive review of the studies related to sensing in smart buildings. It highlights privacy issues connected to sensing in smart buildings, provides mitigation strategies that can be deployed to minimize occupants’ privacy invasions, and discusses future research directions towards realising privacy-aware smart buildings. To fulfill the aim of this study, five research questions are formulated, which enable systematic navigation through existing studies related to the topic. These research questions are directed to providing answers to privacy related to data leakage, privacy connected to sensor types, privacy related to different applications, privacy concerns with sensor deployment locations and building types, privacy issues with data processing methods, and to highlight mitigation strategies for reducing privacy invasion. It further discusses the technical approaches, general principles, and design choices for privacy-aware applications which are relevant for guiding relevant stakeholders.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
deep learning, intrusive sensing, machine learning, non-intrusive sensing, privacy, privacy mitigation, semi-intrusive, sensing, sensor fusion, sensors, Smart building
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-79873 (URN)10.1109/ACCESS.2025.3611344 (DOI)001579050200033 ()2-s2.0-105016526471 (Scopus ID)
Available from: 2025-10-02 Created: 2025-10-02 Last updated: 2025-10-27Bibliographically approved
Adewole, K. S., Jacobsson, A. & Davidsson, P. (2025). Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation. Sensors, 25(6), 1845-1845
Open this publication in new window or tab >>Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
2025 (English)In: Sensors, E-ISSN 1424-8220, Vol. 25, no 6, p. 1845-1845Article in journal (Refereed) Published
Abstract [en]

As the proliferation of Internet of Things (IoT) devices grows, challenges in security, privacy, and interoperability become increasingly significant. IoT devices often have resource constraints, such as limited computational power, energy efficiency, bandwidth, and storage, making it difficult to implement advanced security measures. Additionally, the diversity of IoT devices creates vulnerabilities and threats that attackers can exploit, including spoofing, routing, man-in-the-middle, and denial-of-service. To address these evolving threats, Intrusion Detection Systems (IDSs) have become a vital solution. IDS actively monitors network traffic, analyzing incoming and outgoing data to detect potential security breaches, ensuring IoT systems remain safeguarded against malicious activity. This study introduces an IDS framework that integrates ensemble learning with rule induction for enhanced model explainability. We study the performance of five ensemble algorithms (Random Forest, AdaBoost, XGBoost, LightGBM, and CatBoost) for developing effective IDS for IoT. The results show that XGBoost outperformed the other ensemble algorithms on two publicly available datasets for intrusion detection. XGBoost achieved 99.91% accuracy and 99.88% AUC-ROC on the CIC-IDS2017 dataset, as well as 98.54% accuracy and 93.06% AUC-ROC on the CICIoT2023 dataset, respectively. We integrate model explainability to provide transparent IDS system using a rule induction method. The experimental results confirm the efficacy of the proposed approach for providing a lightweight, transparent, and trustworthy IDS system that supports security analysts, end-users, and different stakeholders when making decisions regarding intrusion and non-intrusion events.

Place, publisher, year, edition, pages
MDPI AG, 2025
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-75262 (URN)10.3390/s25061845 (DOI)001453862400001 ()40292992 (PubMedID)2-s2.0-105000873094 (Scopus ID)
Available from: 2025-04-08 Created: 2025-04-08 Last updated: 2025-04-29Bibliographically approved
Adewole, K. S., Jacobsson, A. & Davidsson, P. (2025). RAM-IoT: Risk Assessment Model for IoT-Based Critical Assets. In: Proceedings of the International Conference on Internet of Things, Big Data and Security IoTBDS: . Paper presented at 10th International Conference on Internet of Things, Big Data and Security, IoTBDS 2025, 6 - 8 April 2025, Porto, Portugal. (pp. 191-198). Science and Technology Publications, Lda, 1
Open this publication in new window or tab >>RAM-IoT: Risk Assessment Model for IoT-Based Critical Assets
2025 (English)In: Proceedings of the International Conference on Internet of Things, Big Data and Security IoTBDS, Science and Technology Publications, Lda , 2025, Vol. 1, p. 191-198Conference paper, Published paper (Refereed)
Abstract [en]

As the number of Internet of Things (IoT) devices continues to grow, understanding and mitigating potential vulnerabilities and threats is crucial. With IoT devices becoming ubiquitous in critical sectors like healthcare, transportation, energy, and industrial automation, identifying and addressing risks is increasingly important. A comprehensive risk management approach enables IoT stakeholders to safeguard user data and privacy, as well as system integrity. Existing risk assessment frameworks focus on qualitative risk analysis methodologies, such as operationally critical threat, asset, and vulnerability evaluation (OCTAVE). However, security risk assessment, particularly for IoT ecosystem, demands both qualitative and quantitative risk assessment. This paper proposes RAM-IoT, a risk assessment model for IoT-based critical assets that integrates qualitative and quantitative risk assessment approaches. A multi-criteria decision making (MCDM) approach based on fuzzy Analytic Hierarchy Process (fuzzy AHP) is proposed to address the subjective assessment of the IoT risk analysts and their corresponding stakeholders. The applicability of the proposed model is illustrated through a use case connected to service delivery in the IoT. The proposed model provides a guideline to researchers and practitioners on how to quantify the risks targeting assets in IoT, thereby providing adequate support for protecting IoT ecosystems.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2025
Series
Proceedings of the International Conference on Internet of Things, Big Data and Security - IoTBDS, E-ISSN 2184-4976
Keywords
Fuzzy AHP, Internet of Things, Privacy, Risk Assessment, Security, Threat, Vulnerability
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-75828 (URN)10.5220/0013200800003944 (DOI)2-s2.0-105003728712 (Scopus ID)9789897587504 (ISBN)
Conference
10th International Conference on Internet of Things, Big Data and Security, IoTBDS 2025, 6 - 8 April 2025, Porto, Portugal.
Available from: 2025-05-12 Created: 2025-05-12 Last updated: 2025-10-10Bibliographically approved
Bugeja, J., Jacobsson, A. & Davidsson, P. (2025). Smart Connected Homes. In: Qusay F. Hassan (Ed.), Internet of Things A to Z: Technologies and Applications (pp. 419-437). Wiley
Open this publication in new window or tab >>Smart Connected Homes
2025 (English)In: Internet of Things A to Z: Technologies and Applications / [ed] Qusay F. Hassan, Wiley , 2025, p. 419-437Chapter in book (Refereed)
Abstract [en]

Nowadays, a growing interest from industry has caused the smart home to evolve from a place that was focused on automation of home appliances to an intelligent Internet‐connected environment. This environment features sensors, actuators, and systems implementing services that enhance the comfort and convenience as well as contribute to a more energy‐efficient and safe society. The modern home has become a complex information system with huge potential gains, but also in need of a broad scientific approach. This chapter introduces smart connected homes, describing their underlying technologies, architectures, and offered services that surround this domain. Based on the idea of the smart connected home as a system of systems, a discussion of ongoing and emerging research challenges with respect to security and privacy, interoperability support, reliability, and usability, is also provided.

Place, publisher, year, edition, pages
Wiley, 2025
Keywords
Interoperability, IoT, Privacy, Reliability, Security, Smart connected home, Smart home services, System architectures, Usability
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-81476 (URN)10.1002/9781394280490.ch17 (DOI)2-s2.0-105025601762 (Scopus ID)9781394280476 (ISBN)9781394280490 (ISBN)
Available from: 2026-01-07 Created: 2026-01-07 Last updated: 2026-01-07Bibliographically approved
Bagheri, S. & Jacobsson, A. (2025). The Role of Ethics in Smart Homes – A Workshop-Based Approach. In: IFIP Advances in Information and Communication Technology: . Paper presented at 7th IFIP WG 5.5 International Cross-Domain Conference on Internet of Things, IFIPIoT 2024, 06 Nov-08 Nov 2024, Nice, France (pp. 226-242). Springer, 737 IFIPAICT
Open this publication in new window or tab >>The Role of Ethics in Smart Homes – A Workshop-Based Approach
2025 (English)In: IFIP Advances in Information and Communication Technology, Springer, 2025, Vol. 737 IFIPAICT, p. 226-242Conference paper, Published paper (Refereed)
Abstract [en]

Smart homes are increasingly popular and offer users multiple benefits, such as increased security, entertainment, health, and energy efficiency. But smart homes also raise ethical challenges. Analyzing ethical risks in smart homes requires an approach that can reveal and analyze the complex consequences of unethical IoT use. Such an analysis, however, is cumbersome and requires including many aspects and stakeholder perspectives. There is a lack of methods to analyze smart homes ethically and document such research results for continual evaluation over time as the smart home and our understanding of its ethics inevitably evolve and change. This work aims to design a workshop methodology to support systematic ethical analyses of smart homes. It builds on previous work considering smart homes as digital ecosystems to contextually examine ethical risks and challenges. A group of research participants were asked to undergo the workshop to evaluate its usefulness in supporting ethical discussions and documenting insights systematically. The results show the feasibility of the workshop design in conducting ethical analyses and eliciting system requirements for smart homes. Several unethical use cases are discussed, such as IoT gaslighting and surveillance concerns related to child users.

Place, publisher, year, edition, pages
Springer, 2025
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X
Keywords
Digital Ecosystems, Ethics, IoT, Smart Homes, Workshops
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:mau:diva-74092 (URN)10.1007/978-3-031-81900-1_14 (DOI)001446575700014 ()2-s2.0-85215274659 (Scopus ID)9783031818998 (ISBN)9783031819001 (ISBN)
Conference
7th IFIP WG 5.5 International Cross-Domain Conference on Internet of Things, IFIPIoT 2024, 06 Nov-08 Nov 2024, Nice, France
Available from: 2025-02-19 Created: 2025-02-19 Last updated: 2025-04-15Bibliographically approved
Adewole, K. S., Jacobsson, A. & Davidsson, P. (2024). ARAM: Assets-based Risk Assessment Model for Connected Smart Homes. In: 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud): . Paper presented at 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 19-21 August 2024. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>ARAM: Assets-based Risk Assessment Model for Connected Smart Homes
2024 (English)In: 2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), Institute of Electrical and Electronics Engineers (IEEE), 2024Conference paper, Published paper (Refereed)
Abstract [en]

Connected smart homes (CSH) have benefited immensely from emerging Internet of Things (IoT) technology. CSH is intended to support everyday life in the private seclusion of the home, and typically covers the integration of smart devices such as smart meters, heating, ventilation, and air conditioning (HVAC), intelligent lightening, and voice-activated assistants among others. Nevertheless, the risks associated with CSH assets are often of high concern. For instance, energy consumption monitoring through smart meters can reveal sensitive information that may pose a privacy risk to home occupants if not properly managed. Existing risk assessment approaches for CSH tend to focus on qualitative risk assessment methodologies, such as operationally critical threat, asset, and vulnerability evaluation (OCTAVE). However, security risk assessment, particularly for IoT environments, demands both qualitative and quantitative risk assessment. This paper proposes assets-based risk assessment model that integrates both qualitative and quantitative risk assessment to determine the risk related to assets in CSH when a specific service is used. We apply fuzzy Analytic Hierarchy Process (fuzzy AHP) to address the subjective assessment of the IoT risk analysts and stakeholders. The applicability of the proposed model is illustrated through a use case that constitutes a scenario connected to service delivery in CSH. The proposed model provides a guideline to researchers and practitioners on how to quantify the risks targeting assets in CSH.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
International Conference on Future Internet of Things and Cloud, ISSN 2996-1009, E-ISSN 2996-1017
Keywords
Internet of Things, connected smart home, threat and vulnerability, risk assessment, fuzzy AHP, security and privacy
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-72735 (URN)10.1109/FiCloud62933.2024.00016 (DOI)001423331500008 ()2-s2.0-85211238528 (Scopus ID)979-8-3315-2719-8 (ISBN)979-8-3315-2720-4 (ISBN)
Conference
2024 11th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Austria, 19-21 August 2024
Available from: 2024-12-13 Created: 2024-12-13 Last updated: 2025-03-19Bibliographically approved
Kobusinska, A., Jacobsson, A. & Chang, V. (2024). Foreword. In: IoTBDS 2024 Final Program and Book of Abstracts: The 9th International Conference on Internet of Things, Big Data and Security. Paper presented at The 9th International Conference on Internet of Things, Big Data and Security, Angers, France, April 28-30 2024 (pp. 5-6). Portugal: SciTePress
Open this publication in new window or tab >>Foreword
2024 (English)In: IoTBDS 2024 Final Program and Book of Abstracts: The 9th International Conference on Internet of Things, Big Data and Security, Portugal: SciTePress, 2024, , p. 43p. 5-6Conference paper, Published paper (Other academic)
Abstract [en]

N/A.

Place, publisher, year, edition, pages
Portugal: SciTePress, 2024. p. 43
Series
IoTBDS, E-ISSN 2184-4976
National Category
Computer Systems
Identifiers
urn:nbn:se:mau:diva-67031 (URN)
Conference
The 9th International Conference on Internet of Things, Big Data and Security, Angers, France, April 28-30 2024
Available from: 2024-05-01 Created: 2024-05-01 Last updated: 2024-11-29Bibliographically approved
Bugeja, J. & Jacobsson, A. (2024). Guidelines for Responsible Smart Home Development. In: 2024 IEEE 10th World Forum on Internet of Things, WF-IoT 2024: . Paper presented at 10th IEEE World Forum on Internet of Things, WF-IoT 2024, 10 Nov-13 Nov 2024, Ottawa, Canada (pp. 550-555). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Guidelines for Responsible Smart Home Development
2024 (English)In: 2024 IEEE 10th World Forum on Internet of Things, WF-IoT 2024, Institute of Electrical and Electronics Engineers (IEEE), 2024, p. 550-555Conference paper, Published paper (Refereed)
Abstract [en]

The proliferation of smart home technology has the potential to enhance the quality of life for individuals and families, as well as for mitigating larger societal challenges, such as those of sustainability, safety, and energy efficiency. However, it also raises concerns about potential risks and unintended consequences, primarily those that pertain to security and privacy. Despite ongoing discussions by experts and the wider research community, there is a lack of consensus and expertise on addressing these issues in an efficient, unanimous, and foremost responsible way. This paper takes its starting point from the center of the issue, i.e., the ethics that underlie the provision of the products and services intended for smart homes. It subsequently proposes guidelines for the responsible development of smart home technologies. These guidelines offer specific considerations tailored to the unique characteristics of the smart home, providing developers and businesses with a foundation to prioritize responsible technology usage in the ever so personal and private home environment. By adhering to these guidelines, stakeholders can establish a solid foundation for ethical deci-sion-making and ensure the responsible integration of technology in smart homes.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
IEEE World Forum on Internet of Things, ISSN 2769-4003, E-ISSN 2768-1734
Keywords
ethics, guidelines, Internet of Things, responsible development, smart home
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-74091 (URN)10.1109/WF-IoT62078.2024.10811342 (DOI)2-s2.0-85216539244 (Scopus ID)9798350373011 (ISBN)9798350373028 (ISBN)
Conference
10th IEEE World Forum on Internet of Things, WF-IoT 2024, 10 Nov-13 Nov 2024, Ottawa, Canada
Available from: 2025-02-20 Created: 2025-02-20 Last updated: 2025-02-20Bibliographically approved
Projects
Internet of Things and People Research Profile; Malmö University; Publications
Banda, L., Mjumo, M. & Mekuria, F. (2022). Business Models for 5G and Future Mobile Network Operators. In: 2022 IEEE Future Networks World Forum (FNWF): . Paper presented at IEEE Future Networks World Forum FNWF 2022, Montreal, QC, Canada, 10-14 October 2022. IEEE, Article ID M17754.
Securing IOT Devices in a Dynamic Environment: The Case of Drones; Malmö University, Internet of Things and People (IOTAP) (Closed down 2024-12-31)Internet of Things Master's Program; Malmö University
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-8512-2976

Search in DiVA

Show all publications