Author:
Selvarajan Shitharth,Srivastava Gautam,Khadidos Alaa O.,Khadidos Adil O.,Baza Mohamed,Alshehri Ali,Lin Jerry Chun-Wei
Abstract
AbstractThe Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
Funder
Natural Sciences and Engineering Research Council of Canada
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference40 articles.
1. Ali S, Wang G, Riaz S, Rafique T (2022) Preserving the Privacy of Dependent Tuples Using Enhanced Differential Privacy. Human-centric Comput Informat Sci 12:1–5
2. Jia C, Jia C, Kong L, Lin W, Qi L (2022) Privacy-aware retrieval of electronic medical records by fuzzy keyword search. Hum Centric Comput Inf Sci 12:1–15
3. Tan SF, Samsudin A (2021) Recent technologies, security countermeasure and ongoing challenges of industrial internet of things (iiot): A survey. Sensors 21(19):6647
4. Pal S, Jadidi Z (2021) Analysis of security issues and countermeasures for the industrial internet of things. Appl Sci 11(20):9393
5. Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H (2022) Edge-iiotset: A new comprehensive realistic cyber security dataset of iot and iiot applications for centralized and federated learning. IEEE Access 10:40281–40306
Cited by
63 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献