A Proactive Défense Mechanism for IoT using AI Agents | IJCT Volume 13 – Issue 2 | IJCT-V13I2P45

International Journal of Computer Techniques
ISSN 2394-2231
Volume 13, Issue 2  |  Published: March – April 2026

Author

Aarti Singh

Abstract

This work introduces an autonomous and secure communication framework for IoT environments driven by AI agents. While IoT is grabbing strong roots in our lives with more and more smart devices being used around us, the security of data collected and the devices as well remains a critical concern. Without robust security measures, these devices can be compromised and are vulnerable for DDOS attacks without the owner’s knowledge. While, AI agents have already proved their potential in web-based applications but the potential of these autonomous entities remains untapped in an IoT based environment. especially, for providing security in resource constrained devices.

Keywords

IoT, IoE, Software Agents, intelligent Agents, IoT Security, DDOS Attack.

Conclusion

This work proposed an intelligent agent-based proactive defense framework for secure communication in IoT. Agent technology is well established and widely deployed in internet-based applications, thus it can surely be deployed in IoT scenario. Further, agents may be developed on Java based open-source platform such as JADE which make them suitable for constrained device. This work uniquely contributes by ensuring agent communication through contract net trust establishment protocol which ensures trustworthy and reliable communication among agents in a multi agent system. The security of HMA while migrating on a public network is worth addressing in future.

References

[1]J.S.Kumar& D.R. Patel , A Survey on Internet of Things: Security and Privacy Issues. Published in International Journal of Computer Applications, Vol. 90, No. 11, March 2014, pp.20-26, ISSN: 0975 – 8887. [2]K.T. Nguyen, M.Laurent, N.Oualha, Survey on Secure Communication Protocols for the Internet of Things. Published in Elsevier Journal of Ad Hoc Networks, Volume 32,2015,Pp 17-31,ISSN 1570- 8705.https://doi.org/10.1016/j.adhoc.2015.01.006. [3]K. Shaukat, T. M.Alam, I. A. Hameed, W.A.Khan, N.Abbas,S.Luo, A Review on Security Challenges in Internet of Things (IoT), Published in Proceedings of the 26th International Conference on Automation & Computing, University of Portsmouth, Portsmouth, UK, 2-4 September 2021. [4]D.Miorandi, S. Sicari, F.D. Pellegrini, I.Chlamtac, Internet of things: Vision, Applications and Research Challenges, Published in Elsevier Journal of Ad Hoc Networks, Vol 10, 2012, pp. 1497-1516. [5]Y. Yang, L. W.G. Yin, L.Li, H. Zhao, A Survey on Security and Privacy Issues in Internet of Things. Published in IEEE Internet of Things Journal, Vol. 4, Issue 5, pp.1250-1258, October 2017. [6]D. Juneja, A. Singh, R.Singh, S. Mukherjee, A Thorough Insight into Theoretical and Practical Developments in MultiAgent Systems. Published in International Journal of Ambient Computing and Intelligence,Volume 8, Issue 1, January-March 2017, pp. 23-49. [7]A. Singh, D.Juneja, A.K.Sharma, Agent Development Toolkits. Published in International Journal of Advancements in Technology, Vol.2, No.1, January 2011, pp.158-164. [8]A. Singh, D.Juneja, A.K.Sharma, Introducing Trust Establishment Protocol in Contract Net Protocol. Published in proceedings of IEEE International Conference on Advances in Computer Engineering (2010), pp. 59-63. [9]Article on Common Cyber-Attacks in the IoT by Globalsign by GMO .Avaliable online at https://www.globalsign.com/en/blog/common-cyber-attacks-in-the- iot. Accessed on March 13,2026. [10]http://www.jade.tilab.com [11]http://www. fipa.org [12]H. De La Iglesia, D., Villarrubia González, G., Sales Mendes, A., Jiménez-Bravo, D. M., & L. Barriuso, A. (2019). Architecture to Embed Software Agents in Resource Constrained Internet of Things Devices. Sensors, 19(1), Article No. 100. https://doi.org/10.3390/s19010100 . [13]I. Nakagawa &S. Shimojo (2017, July), IoT agent platform mechanism with transparent cloud computing framework for improving IoT security. In 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Vol. 2, pp. 684-689. IEEE. [14]C.Hewitt, P. Bishop & R. Steiger (1973 August). A Universal Modular Actor Formalism for Artificial Intelligence. Proceedings of the 3rd international joint conference on Artificial intelligence (pp. 235-245). Morgan KaufmannPublishers Inc. [15]Franziska Klügl, Applications of Software Agents. Journal of Künstliche Intell. 18(2): 5-10 (2004). [16]Alibhai Z., What is Contract Net Interaction Protocol? .IRMS Lab, SFU, Jul. 2003. Wu J., Contract Net Protocol for Coordination in Multi-Agent System. Proc. of 2nd Intnl. Symposium on Intelligent Information Technology Application, pp. 1052-1058, 2008.

How to Cite This Paper

Aarti Singh (2026). A Proactive Défense Mechanism for IoT using AI Agents. International Journal of Computer Techniques, 13(2). ISSN: 2394-2231.

© 2026 International Journal of Computer Techniques (IJCT). All rights reserved.

Submit Your Paper