(Publisher of Peer Reviewed Open Access Journals)

International Journal of Advanced Technology and Engineering Exploration (IJATEE)

ISSN (Print):2394-5443    ISSN (Online):2394-7454
Volume-10 Issue-106 September-2023
Full-Text PDF
Paper Title : Intellig_block: enhancing IoT security with blockchain-based adversarial machine learning protection
Author Name : Walid Dhifallah, Tarek Moulahi, Mounira Tarhouni and Salah Zidi
Abstract :

Internet of things (IoT) systems were becoming increasingly complex due to advancements in open innovation, especially in the realms of intelligent automation and artificial intelligence (AI). However, their effective deployment was impeded by security concerns and the need for enhanced threat detection capabilities. To address these challenges and bolster the security of IoT devices, an architecture called "intellig_block" was developed. This architecture seamlessly integrated blockchain (BC) and AI technology to mitigate vulnerabilities and enhance system efficiency. The goal was to harness the advantages of BC and AI to offer effective solutions for the security challenges confronting IoT systems. The primary focus centered on thwarting contamination and evasion attacks on intrusion detection systems (IDS) powered by machine learning (ML). At that time, many existing solutions relied on traditional statistical frameworks or ML techniques, resulting in increased deployment and runtime costs. In contrast, the "intellig_block" architecture hashed the template file and embedded it as a smart contract to implement the categorization algorithm. The results of the experiments conducted at that time were quite promising: the execution time was short with minimal gas overhead. A potential method was proposed at that time for effectively identifying cyber threats in ML models using the "intellig_block" architecture, which could significantly fortify IDS. Smart contracts (SC) have been introduced as a solution to safeguard IDS results against adversarial machine learning (AML) attacks within BC. In that context, IoT devices leveraged these SC to promptly detect AMLs in real-time data streams. Comprehensive performance analysis and experimental findings at that time substantiated the efficacy of the model in shielding IoT devices against unreliable services, all while maintaining cost-effectiveness within a reasonable time frame and at an affordable cost.

Keywords : Internet of things, Cyber threats, Decentralization, Blockchain, Machine learning (ML), Evasion attack.
Cite this article : Dhifallah W, Moulahi T, Tarhouni M, Zidi S. Intellig_block: enhancing IoT security with blockchain-based adversarial machine learning protection . International Journal of Advanced Technology and Engineering Exploration. 2023; 10(106):1167-1183. DOI:10.19101/IJATEE.2023.10101465.
References :
[1]Karie NM, Sahri NM, Yang W, Valli C, Kebande VR. A review of security standards and frameworks for IoT-based smart environments. IEEE Access. 2021; 9:121975-95.
[Crossref] [Google Scholar]
[2]Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials. 2015; 18(2):1153-76.
[Crossref] [Google Scholar]
[3]Saleem TJ, Chishti MA. Exploring the applications of machine learning in healthcare. International Journal of Sensors Wireless Communications and Control. 2020; 10(4):458-72.
[Crossref] [Google Scholar]
[4]Hautamaki V, Karkkainen I, Franti P. Outlier detection using k-nearest neighbour graph. In proceedings of the 17th international conference on pattern recognition, 2004. 2004 (pp. 430-3). IEEE.
[Crossref] [Google Scholar]
[5]Dina AS, Manivannan D. Intrusion detection based on machine learning techniques in computer networks. Internet of Things. 2021; 16:100462.
[Crossref] [Google Scholar]
[6]Couderc N, Reichenbach C, Söderberg E. Performance analysis with Bayesian inference. In IEEE/ACM 45th international conference on software engineering: new ideas and emerging results 2023 (pp. 112-6). IEEE.
[Crossref] [Google Scholar]
[7]Madhiarasan M, Deepa SN. Comparative analysis on hidden neurons estimation in multi layer perceptron neural networks for wind speed forecasting. Artificial Intelligence Review. 2017; 48:449-71.
[Crossref] [Google Scholar]
[8]Alajlan R, Alhumam N, Frikha M. Cybersecurity for blockchain-based IoT systems: a review. Applied Sciences. 2023; 13(13):1-26.
[Crossref] [Google Scholar]
[9]Li W, Wang Y, Li J, Au MH. Toward a blockchain-based framework for challenge-based collaborative intrusion detection. International Journal of Information Security. 2021; 20:127-39.
[Crossref] [Google Scholar]
[10]Banerjee M, Lee J, Choo KK. A blockchain future for internet of things security: a position paper. Digital Communications and Networks. 2018; 4(3):149-60.
[Crossref] [Google Scholar]
[11]Wright KL, Martinez M, Chadha U, Krishnamachari B. SmartEdge: a smart contract for edge computing. In IEEE international conference on internet of things (ithings) and IEEE green computing and communications (greencom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (smartdata) 2018 (pp. 1685-90). IEEE.
[Crossref] [Google Scholar]
[12]Swan M. Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Technology and Society Magazine. 2015; 34(4):41-52.
[Crossref] [Google Scholar]
[13]Qian Y, Jiang Y, Chen J, Zhang Y, Song J, Zhou M, et al. Towards decentralized IoT security enhancement: a blockchain approach. Computers & Electrical Engineering. 2018; 72:266-73.
[Crossref] [Google Scholar]
[14]Rathore S, Pan Y, Park JH. BlockDeepNet: a blockchain-based secure deep learning for IoT network. Sustainability. 2019; 11(14):1-15.
[Crossref] [Google Scholar]
[15]Shinde R, Patil S, Kotecha K, Ruikar K. Blockchain for securing ai applications and open innovations. Journal of Open Innovation: Technology, Market, and Complexity. 2021; 7(3):1-37.
[Crossref] [Google Scholar]
[16]Abdel-basset M, Hawash H, Moustafa N, Razzak I, Abd EM. Privacy-preserved learning from non-iid data in fog-assisted IoT: a federated learning approach. Digital Communications and Networks. 2022:2-22.
[Crossref] [Google Scholar]
[17]Kumar RL, Khan F, Kadry S, Rho S. A survey on blockchain for industrial internet of things. Alexandria Engineering Journal. 2022; 61(8):6001-22.
[Crossref] [Google Scholar]
[18]Liu K, Yan Z, Liang X, Kantola R, Hu C. A survey on blockchain-enabled federated learning and its prospects with digital twin. Digital Communications and Networks. 2022:1-26.
[Crossref] [Google Scholar]
[19]Rehman A, Abbas S, Khan MA, Ghazal TM, Adnan KM, Mosavi A. A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Computers in Biology and Medicine. 2022; 150:106019.
[Crossref] [Google Scholar]
[20]Sun Z, Wan J, Yin L, Cao Z, Luo T, Wang B. A blockchain-based audit approach for encrypted data in federated learning. Digital Communications and Networks. 2022; 8(5):614-24.
[Crossref] [Google Scholar]
[21]Chen Y, Chen H, Zhang Y, Han M, Siddula M, Cai Z. A survey on blockchain systems: attacks, defenses, and privacy preservation. High-Confidence Computing. 2022; 2(2):100048.
[Crossref] [Google Scholar]
[22]Barbaria S, Mahjoubi H, Rahmouni HB. A novel blockchain-based architectural modal for healthcare data integrity: Covid19 screening laboratory use-case. Procedia Computer Science. 2023; 219:1436-43.
[Crossref] [Google Scholar]
[23]Miao Q, Lin H, Hu J, Wang X. An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered internet of things. Digital Communications and Networks. 2022; 8(5):636-43.
[Crossref] [Google Scholar]
[24]Yaacoub JP, Noura HN, Salman O. Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems. 2023; 3:155-79.
[Crossref] [Google Scholar]
[25]Sáez-de-cámara X, Flores JL, Arellano C, Urbieta A, Zurutuza U. Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. Computers & Security. 2023; 131:103299.
[Crossref] [Google Scholar]
[26]Mirdula S, Roopa M. MUD enabled deep learning framework for anomaly detection in IoT integrated smart building. e-Prime-Advances in Electrical Engineering, Electronics and Energy. 2023; 5:100186.
[Crossref] [Google Scholar]
[27]Habiba M, Islam MR, Muyeen SM, Ali AS. Edge intelligence for network intrusion prevention in IoT ecosystem. Computers and Electrical Engineering. 2023; 108:108727.
[Crossref] [Google Scholar]
[28]Taloba AI, Elhadad A, Rayan A, Abd ERM, Salem M, Alzahrani AA, et al. A blockchain-based hybrid platform for multimedia data processing in IoT-Healthcare. Alexandria Engineering Journal. 2023; 65:263-74.
[Crossref] [Google Scholar]
[29]Singh I, Singh B. Access management of IoT devices using access control mechanism and decentralized authentication: a review. Measurement: Sensors. 2022: 100591.
[Crossref] [Google Scholar]
[30]Alsuqaih HN, Hamdan W, Elmessiry H, Abulkasim H. An efficient privacy-preserving control mechanism based on blockchain for E-health applications. Alexandria Engineering Journal. 2023; 73:159-72.
[Crossref] [Google Scholar]
[31]Xi P, Zhang X, Wang L, Liu W, Peng S. A review of blockchain-based secure sharing of healthcare data. Applied Sciences. 2022; 12(15):1-12.
[Crossref] [Google Scholar]
[32]Zhang J, Yang Y, Liu X, Ma J. An efficient blockchain-based hierarchical data sharing for healthcare internet of things. IEEE Transactions on Industrial Informatics. 2022; 18(10):7139-50.
[Crossref] [Google Scholar]
[33]Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z, et al. Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet of Things Journal. 2020; 8(3):1817-29.
[Crossref] [Google Scholar]
[34]Bhan R, Pamula R, Faruki P, Gajrani J. Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network. The Journal of Supercomputing. 2023:1-42.
[Crossref] [Google Scholar]
[35]Lou JT, Bhat SA, Huang NF. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. Peer-to-Peer Networking and Applications. 2023:1-23.
[Crossref] [Google Scholar]
[36]Rafique W, Khan M, Khan S, Ally JS. SecureMed: a blockchain-based privacy-preserving framework for internet of medical things. Wireless Communications and Mobile Computing. 2023; 2023:1-14.
[Crossref] [Google Scholar]
[37]Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, et al. PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering. 2021; 8(3):2326-41.
[Crossref] [Google Scholar]
[38]Taloba AI, Rayan A, Elhadad A, Abozeid A, Shahin OR, Abd ERM. A framework for secure healthcare data management using blockchain technology. International Journal of Advanced Computer Science and Applications. 2021; 12(12):639-46.
[Google Scholar]
[39]Li T, Wang H, He D, Yu J. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet of Things Journal. 2022; 9(16):15138-49.
[Crossref] [Google Scholar]
[40]Karaszewski R, Modrzyński P, Modrzyńska J. The use of blockchain technology in public sector entities management: an example of security and energy efficiency in cloud computing data processing. Energies. 2021; 14(7):1-19.
[Crossref] [Google Scholar]
[41]Kamath V, Lahari Y, Mohanchandra K. Blockchain based framework for secure data sharing of medicine supply chain in health care system. International Journal of Artificial Intelligence. 2022; 9(1):32-8.
[Crossref] [Google Scholar]
[42]Wang Y, Che T, Zhao X, Zhou T, Zhang K, Hu X. A blockchain-based privacy information security sharing scheme in industrial internet of things. Sensors. 2022; 22(9):1-20.
[Crossref] [Google Scholar]
[43]Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. Journal of Network and Computer Applications. 2020; 167:102710.
[Crossref] [Google Scholar]
[44]Jiang S, Cao J, Wu H, Chen K, Liu X. Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems. Information Sciences. 2023; 635:72-85.
[Crossref] [Google Scholar]
[45]Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access. 2020; 8:165130-50.
[Crossref] [Google Scholar]