International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Multilayered Framework for Enhancing Data Confidentiality, Integrity, and Threat Detection through Blockchain, Advanced Cryptography, and Machine Learning

Author NameAuthor Details

Rami Baazeem

Rami Baazeem[1]

[1]Department of Management Information Systems, College of Business, University of Jeddah, Kingdom of Saudi Arabia (KSA)

Abstract

Recent developments in the Internet of Things (IoT) have significantly expanded the interconnectedness of devices, leading to an increased need for strong security mechanisms. However, the proliferation of IoT networks has introduced critical vulnerabilities, particularly in data handling and storage, which are susceptible to unauthorized access, tampering, and malicious attacks. Addressing these challenges, this study proposes a multilayered Security Model for IoT that integrates advanced cryptographic techniques, blockchain technology, and machine learning algorithms to ensure the secrecy, integrity, and availability of data within IoT networks. The proposed model employs blockchain technology for decentralized, immutable data storage, effectively mitigating risks associated with unauthorized access and data tampering. Additionally, the model includes a deep learning-based malicious detection system, powered by a Convolutional Neural Network (CNN) in conjunction with the Q-Learning based Whale Optimization Algorithm (Q-WOA), to identify and counteract potential threats within the network. The result shows that the proposed CNN-Q-WOA models exceed others in most metrics. The proposed CNN-Q-WOA model excels accuracy with 0.965, which is higher than the others, leading to the higher overall correct prediction rate.

Index Terms

Data Confidentiality

Data Integrity

Threat Detection

Blockchain

Advanced Cryptography

Machine Learning

Reference

  1. 1.
    Malhotra, P., Singh, Y., Anand, P., Bangotra, D.K., Singh, P.K. and Hong, W.C., 2021. Internet of things: Evolution, concerns and security challenges. Sensors, 21(5), p.1809.
  2. 2.
    McGrath, McGrath RG. The end of competitive advantage: How to keep your strategy moving as fast as your business. Harvard Business Review Press; 2013 Jun 4.
  3. 3.
    Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L. and Janicke, H., 2018. Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet of Things Journal, 6(2), pp.2188-2204.
  4. 4.
    Alotaibi, B., 2019. Utilizing blockchain to overcome cyber security concerns in the internet of things: A review. IEEE Sensors Journal, 19(23), pp.10953-10971.
  5. 5.
    Abdel-Basset, M., Abdel-Fatah, L. and Sangaiah, A.K., 2018. Metaheuristic algorithms: A comprehensive review. Computational intelligence for multimedia big data on the cloud with engineering applications, pp.185-231.
  6. 6.
    Marini, F. and Walczak, B., 2015. Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems, 149, pp.153-165.
  7. 7.
    Mirjalili, Seyedali. "Evolutionary algorithms and neural networks." Studies in computational intelligence 780 (2019): 43-53.
  8. 8.
    Salehinejad, H., Sankar, S., Barfett, J., Colak, E. and Valaee, S., 2017. Recent advances in recurrent neural networks. arXiv preprint arXiv:1801.01078.
  9. 9.
    Kattenborn, T., Leitloff, J., Schiefer, F. and Hinz, S., 2021. Review on Convolutional Neural Networks (CNN) in vegetation remote sensing. ISPRS journal of photogrammetry and remote sensing, 173, pp.24-49.
  10. 10.
    Hassan, M.U., Rehmani, M.H. and Chen, J., 2019. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Generation Computer Systems, 97, pp.512-529.
  11. 11.
    Gebremichael, T., Ledwaba, L.P., Eldefrawy, M.H., Hancke, G.P., Pereira, N., Gidlund, M. and Akerberg, J., 2020. Security and privacy in the industrial internet of things: Current standards and future challenges. IEEE Access, 8, pp.152351-152366.
  12. 12.
    Sabillon, R., Cano, J.J. and Serra Ruiz, J., 2016. Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 2016, 4 (6).
  13. 13.
    Peres, R., Schreier, M., Schweidel, D.A. and Sorescu, A., 2023. Blockchain meets marketing: Opportunities, threats, and avenues for future research. International Journal of Research in Marketing, 40(1), pp.1-11.
  14. 14.
    Ma, B., Guo, W. and Zhang, J., 2020. A survey of online data-driven proactive 5G network optimisation using machine learning. IEEE access, 8, pp.35606-35637.
  15. 15.
    Marwala, T., 2022. Closing the gap: The fourth industrial revolution in Africa. Pan Macmillan South Africa.
  16. 16.
    Or-Meir, O., Nissim, N., Elovici, Y. and Rokach, L., 2019. Dynamic malware analysis in the modern era—A state of the art survey. ACM Computing Surveys (CSUR), 52(5), pp.1-48.
  17. 17.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20, pp.2481-2501.
  18. 18.
    Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things. Computer networks, 57(10), pp.2266-2279.
  19. 19.
    Al-Qarafi, A., Alrowais, F., S. Alotaibi, S., Nemri, N., Al-Wesabi, F.N., Al Duhayyim, M., Marzouk, R., Othman, M. and Al-Shabi, M., 2022. Optimal machine learning based privacy preserving blockchain assisted internet of things with smart cities environment. Applied Sciences, 12(12), p.5893.
  20. 20.
    Seshadri, S.S., Rodriguez, D., Subedi, M., Choo, K.K.R., Ahmed, S., Chen, Q. and Lee, J., 2020. Iotcop: A blockchain-based monitoring framework for detection and isolation of malicious devices in internet-of-things systems. IEEE Internet of Things Journal, 8(5), pp.3346-3359.
  21. 21.
    Alqaralleh, B.A., Vaiyapuri, T., Parvathy, V.S., Gupta, D., Khanna, A. and Shankar, K., 2021. Blockchain-assisted secure image transmission and diagnosis model on Internet of Medical Things Environment. Personal and ubiquitous computing, pp.1-11.
  22. 22.
    Rathee, G., Ahmad, F., Sandhu, R., Kerrache, C.A. and Azad, M.A., 2021. On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things. Information Processing & Management, 58(3), p.102526.
  23. 23.
    Shen, M., Liu, H., Zhu, L., Xu, K., Yu, H., Du, X. and Guizani, M., 2020. Blockchain-assisted secure device authentication for cross-domain industrial IoT. IEEE Journal on Selected Areas in Communications, 38(5), pp.942-954.
  24. 24.
    Unal, D., Hammoudeh, M., Khan, M.A., Abuarqoub, A., Epiphaniou, G. and Hamila, R., 2021. Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Computers & Security, 109, p.102393.
  25. 25.
    Issa, W., Moustafa, N., Turnbull, B., Sohrabi, N. and Tari, Z., 2023. Blockchain-based federated learning for securing internet of things: A comprehensive survey. ACM Computing Surveys, 55(9), pp.1-43.
  26. 26.
    Razdan, S. and Sharma, S., 2022. Internet of medical things (IoMT): Overview, emerging technologies, and case studies. IETE technical review, 39(4), pp.775-788.
  27. 27.
    S. Shen, L. Xie, Y. Zhang, G. Wu, H. Zhang, and S. Yu, "Joint differential game and double deep Q-networks for suppressing malware spread in Industrial Internet of Things," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5302–5315, Aug. 2023.
  28. 28.
    G. Wu, L. Xie, H. Zhang, J. Wang, S. Shen, and S. Yu, "STSIR: An individual-group game-based model for disclosing virus spread in Social Internet of Things," Journal of Network and Computer Applications, vol. 214, May 2023, Art. no. 103608.
  29. 29.
    Y. Shen, S. Shen, Q. Li, H. Zhou, Z. Wu, and Y. Qu, "Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes," Digital Communications and Networks, vol. 9, no. 4, pp. 906–919, Aug. 2023.
  30. 30.
    S. Yu, R. Zhai, Y. Shen, G. Wu, H. Zhang, S. Yu, and S. Shen, "Deep Q-Network-based open-set intrusion detection solution for Industrial Internet of Things," IEEE Internet of Things Journal, 2023, http://dx.doi.org/10.1109/JIOT.2023.3333903.
  31. 31.
    S. Shen, C. Cai, Z. Li, Y. Shen, G. Wu, and S. Yu, "Deep Q-Network-based heuristic intrusion detection against edge-based SIoT zero-day attacks," Applied Soft Computing, vol. 150, Jan. 2024, Art. no. 111080.
  32. 32.
    S. Shen, X. Wu, P. Sun, H. Zhou, Z. Wu, and S. Yu, "Optimal privacy preservation strategies with signalling Q-learning for edge-computing-based IoT resource grant systems," Expert Systems with Applications, vol. 225, Sep. 2023, Art. no. 120192.
  33. 33.
    Ficco, M., 2021. Malware analysis by combining multiple detectors and observation windows. IEEE Transactions on Computers, 71(6), pp.1276-1290.
  34. 34.
    Kaveh, A., and Armin Dadras. "A novel meta-heuristic optimization algorithm: thermal exchange optimization." Advances in engineering software 110 (2017): 69-84.
  35. 35.
    Zhang, Q., Zhang, M., Chen, T., Sun, Z., Ma, Y. and Yu, B., 2019. Recent advances in convolutional neural network acceleration. Neurocomputing, 323, pp.37-51.
  36. 36.
    Alavizadeh, Hooman, Hootan Alavizadeh, and Julian Jang-Jaccard. "Deep Q-learning based reinforcement learning approach for network intrusion detection." Computers 11, no. 3 (2022): 41.
  37. 37.
    Mirjalili, Seyedali, and Andrew Lewis. "The whale optimization algorithm." Advances in engineering software 95 (2016): 51-67.
  38. 38.
    Jun, Benjamin, and Paul Kocher. "The Intel random number generator." Cryptography Research Inc. white paper 27 (1999): 1-8.
  39. 39.
    Mäurer, Nils, Thomas Gräupl, Christoph Gentsch, and Corinna Schmitt. "Comparing different Diffie-Hellman key exchange flavors for LDACS." In 2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), pp. 1-10. IEEE, 2020.
  40. 40.
    Sihotang, Hengki Tamando, Syahril Efendi, Elvyawati M. Zamzami, and Herman Mawengkang. "Design and implementation of Rivest Shamir Adleman’s (RSA) cryptography algorithm in text file data security." In Journal of Physics: Conference Series, vol. 1641, no. 1, p. 012042. IOP Publishing, 2020.
  41. 41.
    NF-UQ-NIDS dataset, Available online at: https://staff.itee.uq.edu.au/marius/NIDS_datasets/
SCOPUS
SCImago Journal & Country Rank