Deep Learning–Driven Anomaly Detection for IoT-Enabled Smart Engineering Systems

Authors

  • Godfrey Perfectson Oise Wellspring University, Nigeria
  • Kevin Chinedu Pius Wellspring University, Nigeria
  • Felix Oshiorenoya Uloko Veritas University, Nigeria
  • Immunhierokene Clinton Obrorindo Petroleum Training Institute, Nigeria
  • Roli Lydia Oshasha Petroleum Training Institute, Nigeria

DOI:

https://doi.org/10.64539/sjer.v2i3.2026.432

Keywords:

Anomaly detection, IoT-enabled engineering systems, CNN–LSTM autoencoder, Cyber–physical systems, Time-series analysis

Abstract

The rapid adoption of Internet of Things (IoT) technologies in smart engineering systems has increased the need for reliable anomaly detection mechanisms capable of identifying cyberattacks, operational faults, and abnormal system behaviors in complex cyber–physical environments. Existing rule-based and conventional machine learning approaches often struggle to effectively model the non-linear, high-dimensional, and highly imbalanced nature of IoT-generated multivariate time-series data, thereby limiting their capability to detect subtle and previously unseen anomalies. To address these challenges, this study proposes a deep learning–driven anomaly detection framework based on a hybrid CNN–LSTM autoencoder architecture for modeling spatiotemporal system behavior in IoT-enabled engineering environments. The proposed framework integrates convolutional neural networks for spatial feature extraction with long short-term memory networks for temporal dependency learning, while anomaly detection is performed using reconstruction error analysis and adaptive thresholding under unsupervised learning conditions. Experimental evaluation was conducted using the BATADAL-A dataset, which represents a realistic cyber–physical water distribution system. The results demonstrate stable convergence and strong generalization performance, with closely aligned training and validation losses throughout the learning process. The proposed framework achieved 90% overall accuracy, anomaly precision of 0.83, anomaly recall of 0.22, and an AUC of 0.677, indicating effective modeling of normal operational behavior but limited sensitivity to rare anomalous events. These findings demonstrate that the proposed CNN–LSTM autoencoder provides reliable low–false alarm monitoring for IoT-enabled smart engineering systems while highlighting the need for future improvements to enhance anomaly sensitivity and robustness in safety-critical applications.

References

[1] N. Omer, A. H. Samak, A. I. Taloba, and R. M. Abd El-Aziz, “A novel optimized probabilistic neural network approach for intrusion detection and categorization,” Alexandria Engineering Journal, vol. 72, pp. 351–361, Jun. 2023. https://doi.org/10.1016/j.aej.2023.03.093.

[2] I. Martins, J. S. Resende, P. R. Sousa, S. Silva, L. Antunes, and J. Gama, “Host-based IDS: A review and open issues of an anomaly detection system in IoT,” Future Generation Computer Systems, vol. 133, pp. 95–113, Aug. 2022. https://doi.org/10.1016/j.future.2022.03.001.

[3] A. Abusitta, G. H. S. de Carvalho, O. A. Wahab, T. Halabi, B. C. M. Fung, and S. Al Mamoori, “Deep learning-enabled anomaly detection for IoT systems,” Internet of Things, vol. 21, p. 100656, Apr. 2023. https://doi.org/10.1016/J.IOT.2022.100656.

[4] S. H. Rafique, A. Abdallah, N. S. Musa, and T. Murugan, “Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends,” Sensors, vol. 24, no. 6, Mar. 2024. https://doi.org/10.3390/S24061968.

[5] J. Nayak, B. Naik, P. B. Dash, S. Vimal, and S. Kadry, “Hybrid Bayesian optimization hypertuned catboost approach for malicious access and anomaly detection in IoT nomalyframework,” Sustainable Computing: Informatics and Systems, vol. 36, Dec. 2022. https://doi.org/10.1016/j.suscom.2022.100805.

[6] G. P. Oise et al., “Decentralized Deep Learning in Healthcare: Addressing Data Privacy with Federated Learning,” FUDMA Journal or Sciences, vol. 9, no. 6, pp. 19–26, Jun. 2025. https://doi.org/10.33003/fjs-2025-0906-3714.

[7] S. A. Oyedotun, G. P. Oise, and C. E. Ozobialu, “Towards Intelligent Cybersecurity in SCADA and DCS Environments: Anomaly Detection Using Multimodal Deep Learning and Explainable AI,” Journal of Science Research and Reviews, vol. 2, no. 3, pp. 20–31, Jul. 2025. https://doi.org/10.70882/josrar.2025.v2i3.76.

[8] G. P. Oise, O. C. Nwabuokei, O. J. Akpowehbve, B. A. Eyitemi, and N. B. Unuigbokhai, “Towards Smarter Cyber Defense: Leveraging Deep Learning for Threat Identification and Prevention,” FUDMA Journal or Sciences, vol. 9, no. 3, pp. 122–128, Mar. 2025. https://doi.org/10.33003/fjs-2025-0903-3264.

[9] Y. Kayode Saheed, O. Harazeem Abdulganiyu, and T. Ait Tchakoucht, “A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart city infrastructures,” Journal of King Saud University - Computer and Information Sciences, vol. 35, no. 5, May 2023. https://doi.org/10.1016/j.jksuci.2023.03.010.

[10] S. M. Rajagopal, M. Supriya, and R. Buyya, “FedSDM: Federated learning based smart decision making module for ECG data in IoT integrated Edge–Fog–Cloud computing environments,” Internet of Things (Netherlands), vol. 22, Jul. 2023. https://doi.org/10.1016/j.iot.2023.100784.

[11] M. M. Inuwa and R. Das, “A comparative analysis of various machine learning methods for anomaly detection in cyber attacks on IoT networks,” Internet of Things (Netherlands), vol. 26, Jul. 2024. https://doi.org/10.1016/j.iot.2024.101162.

[12] S. A. Bakhsh, M. A. Khan, F. Ahmed, M. S. Alshehri, H. Ali, and J. Ahmad, “Enhancing IoT network security through deep learning-powered Intrusion Detection System,” Internet of Things (Netherlands), vol. 24, Dec. 2023. https://doi.org/10.1016/j.iot.2023.100936.

[13] G. Oise and S. Konyeha, “Environmental impacts in e-waste management using deep learning,” Discover Artificial Intelligence, vol. 5, no. 1, p. 210, Aug. 2025. https://doi.org/10.1007/s44163-025-00376-9.

[14] A. Abusitta, M. Q. Li, and B. C. M. Fung, “Malware classification and composition analysis: A survey of recent developments,” Journal of Information Security and Applications, vol. 59, Jun. 2021. https://doi.org/10.1016/j.jisa.2021.102828.

[15] M. Shafiq, Z. Tian, A. K. Bashir, X. Du, and M. Guizani, “IoT malicious traffic identification using wrapper-based feature selection mechanisms,” Comput. Secur., vol. 94, Jul. 2020. https://doi.org/10.1016/j.cose.2020.101863.

[16] E. Tsogbaatar et al., “DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT,” Internet of Things (Netherlands), vol. 14, Jun. 2021. https://doi.org/10.1016/j.iot.2021.100391.

[17] J. Jiang et al., “A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams,” Comput. Commun., vol. 194, pp. 250–257, Oct. 2022. https://doi.org/10.1016/j.comcom.2022.07.034.

[18] M. Shafiq, Z. Tian, Y. Sun, X. Du, and M. Guizani, “Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city,” Future Generation Computer Systems, vol. 107, pp. 433–442, Jun. 2020. https://doi.org/10.1016/j.future.2020.02.017.

[19] H. Nandanwar and R. Katarya, “Deep learning enabled intrusion detection system for Industrial IOT environment,” Expert Syst. Appl., vol. 249, Sep. 2024. https://doi.org/10.1016/j.eswa.2024.123808.

[20] F. Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. Tihanyi, “Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models,” Internet of Things and Cyber-Physical Systems, vol. 4, pp. 167–185, Jan. 2024. https://doi.org/10.1016/j.iotcps.2023.12.003.

[21] Minh T. Nguyen, “BATADAL: Cyber Attacks Detection in Water Systems,” 2023, https://www.kaggle.com/datasets/minhbtnguyen/batadal-a-dataset-for-cyber-attack-detection/data.

[22] T. C. Doan, Q. T. Duong, T. H. H. Nguyen, and V. D. Pham, “AI-Driven Anomaly Detection in IoT Systems: Techniques and Applications,” in Innovations and Challenges in Computing, Games, and Data Science, IGI Global Scientific Publishing, 2025, pp. 29–44. https://doi.org/10.4018/979-8-3373-2647-4.ch002.

[23] G. P. Oise, “E-ViTNet: A lightweight vision transformer with oppositional cat swarm optimization for automated E-Waste sorting,” Next Research, vol. 6, p. 101373, Apr. 2026. https://doi.org/10.1016/j.nexres.2026.101373.

[24] R. Atassi, “Anomaly Detection in IoT Networks: Machine Learning Approaches for Intrusion Detection,” Fusion: Practice and Applications, vol. 13, no. 1, pp. 126–134, 2023. https://doi.org/10.54216/FPA.130110.

[25] M. A. Alsoufi et al., “Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review,” Applied Sciences, vol. 11, no. 18, p. 8383, Sep. 2021. https://doi.org/10.3390/app11188383.

[26] A. Abusitta, T. Halabi, A. S. Bataineh, and M. Zulkernine, “Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments,” in ICC 2024 - IEEE International Conference on Communications, IEEE, Jun. 2024, pp. 4644–4649. https://doi.org/10.1109/ICC51166.2024.10622882.

Downloads

Published

2026-05-22

How to Cite

Oise, G. P., Pius, K. C., Uloko, F. O., Obrorindo, I. C., & Oshasha, R. L. (2026). Deep Learning–Driven Anomaly Detection for IoT-Enabled Smart Engineering Systems. Scientific Journal of Engineering Research, 2(3), 399–408. https://doi.org/10.64539/sjer.v2i3.2026.432

Similar Articles

<< < 1 2 3 4 5 

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)