AI-Enabled Security Protocols for Safeguarding Wireless Communications and IOT Devices

Authors

Keywords:

IoT, Data, Security, Privacy, Crypto graphical Algorithms, Authentication, Encryption, Compatibility, Connectivity

Abstract

The rapid growth of Internet of Things (IoT) devices and wireless communication technologies has introduced significant security challenges. Traditional security protocols are often inadequate to address the dynamic and complex nature of modern cyber threats. This paper explores the integration of Artificial Intelligence (AI) into security protocols to enhance the protection of wireless communications and IoT devices. We discuss the limitations of conventional methods, the role of AI in detecting and mitigating threats, and the development of AI-enabled security frameworks. Case studies and experimental results demonstrate the effectiveness of AI-driven approaches in safeguarding IoT ecosystems. The paper concludes with recommendations for future research and implementation strategies.

Downloads

Download data is not yet available.

Author Biography

Dr Pritam Gajkumar Shah, Chair SISTMR Australia

I earned my PhD in Information Sciences and Engineering from the University of Canberra, Australia, in 2011. During my doctoral studies, I was honored to receive three prestigious scholarships: the University President Scholarship, the Auckland University of Technology Scholarship, and the Australian Postgraduate Award. With over 31 years of teaching experience across Australia, India, and New Zealand, I have taught at both postgraduate and graduate levels. I served as a lecturer at the Canberra Institute of Technology in Bruce, Australia, teaching associate degree students affiliated with the Australian National University. In India, I held the position of   a Professor in Computer Sciences and Engineering at Dayananda Sagar University, Bangalore.

My academic contributions include 24 Scopus-indexed publications, 10 Australian patents, and 3 books on wireless sensor network security based on elliptical curve cryptography. My expertise lies in Wireless Networks Security.

Downloads

Published

2025-02-11

How to Cite

Shah, P. G. (2025). AI-Enabled Security Protocols for Safeguarding Wireless Communications and IOT Devices. Australian Journal of Wireless Technologies, Mobility and Security, 1(1). Retrieved from https://ausjournal.com/index.php/j/article/view/48