International Journal of Advanced Technology and Engineering Exploration (IJATEE) ISSN (P): 2394-5443 ISSN (O): 2394-7454 Vol - 10, Issue - 106, September 2023
  1. 1
    Google Scholar
Intellig_block: enhancing IoT security with blockchain-based adversarial machine learning protection

Walid Dhifallah, Tarek Moulahi, Mounira Tarhouni and Salah Zidi

Abstract

Internet of things (IoT) systems were becoming increasingly complex due to advancements in open innovation, especially in the realms of intelligent automation and artificial intelligence (AI). However, their effective deployment was impeded by security concerns and the need for enhanced threat detection capabilities. To address these challenges and bolster the security of IoT devices, an architecture called "intellig_block" was developed. This architecture seamlessly integrated blockchain (BC) and AI technology to mitigate vulnerabilities and enhance system efficiency. The goal was to harness the advantages of BC and AI to offer effective solutions for the security challenges confronting IoT systems. The primary focus centered on thwarting contamination and evasion attacks on intrusion detection systems (IDS) powered by machine learning (ML). At that time, many existing solutions relied on traditional statistical frameworks or ML techniques, resulting in increased deployment and runtime costs. In contrast, the "intellig_block" architecture hashed the template file and embedded it as a smart contract to implement the categorization algorithm. The results of the experiments conducted at that time were quite promising: the execution time was short with minimal gas overhead. A potential method was proposed at that time for effectively identifying cyber threats in ML models using the "intellig_block" architecture, which could significantly fortify IDS. Smart contracts (SC) have been introduced as a solution to safeguard IDS results against adversarial machine learning (AML) attacks within BC. In that context, IoT devices leveraged these SC to promptly detect AMLs in real-time data streams. Comprehensive performance analysis and experimental findings at that time substantiated the efficacy of the model in shielding IoT devices against unreliable services, all while maintaining cost-effectiveness within a reasonable time frame and at an affordable cost.

Keyword

Internet of things, Cyber threats, Decentralization, Blockchain, Machine learning (ML), Evasion attack.

Cite this article

Dhifallah W, Moulahi T, Tarhouni M, Zidi S

Refference

[1][1]Karie NM, Sahri NM, Yang W, Valli C, Kebande VR. A review of security standards and frameworks for IoT-based smart environments. IEEE Access. 2021; 9:121975-95.

[2][2]Buczak AL, Guven E. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials. 2015; 18(2):1153-76.

[3][3]Saleem TJ, Chishti MA. Exploring the applications of machine learning in healthcare. International Journal of Sensors Wireless Communications and Control. 2020; 10(4):458-72.

[4][4]Hautamaki V, Karkkainen I, Franti P. Outlier detection using k-nearest neighbour graph. In proceedings of the 17th international conference on pattern recognition, 2004. 2004 (pp. 430-3). IEEE.

[5][5]Dina AS, Manivannan D. Intrusion detection based on machine learning techniques in computer networks. Internet of Things. 2021; 16:100462.

[6][6]Couderc N, Reichenbach C, Söderberg E. Performance analysis with Bayesian inference. In IEEE/ACM 45th international conference on software engineering: new ideas and emerging results 2023 (pp. 112-6). IEEE.

[7][7]Madhiarasan M, Deepa SN. Comparative analysis on hidden neurons estimation in multi layer perceptron neural networks for wind speed forecasting. Artificial Intelligence Review. 2017; 48:449-71.

[8][8]Alajlan R, Alhumam N, Frikha M. Cybersecurity for blockchain-based IoT systems: a review. Applied Sciences. 2023; 13(13):1-26.

[9][9]Li W, Wang Y, Li J, Au MH. Toward a blockchain-based framework for challenge-based collaborative intrusion detection. International Journal of Information Security. 2021; 20:127-39.

[10][10]Banerjee M, Lee J, Choo KK. A blockchain future for internet of things security: a position paper. Digital Communications and Networks. 2018; 4(3):149-60.

[11][11]Wright KL, Martinez M, Chadha U, Krishnamachari B. SmartEdge: a smart contract for edge computing. In IEEE international conference on internet of things (ithings) and IEEE green computing and communications (greencom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (smartdata) 2018 (pp. 1685-90). IEEE.

[12][12]Swan M. Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Technology and Society Magazine. 2015; 34(4):41-52.

[13][13]Qian Y, Jiang Y, Chen J, Zhang Y, Song J, Zhou M, et al. Towards decentralized IoT security enhancement: a blockchain approach. Computers & Electrical Engineering. 2018; 72:266-73.

[14][14]Rathore S, Pan Y, Park JH. BlockDeepNet: a blockchain-based secure deep learning for IoT network. Sustainability. 2019; 11(14):1-15.

[15][15]Shinde R, Patil S, Kotecha K, Ruikar K. Blockchain for securing ai applications and open innovations. Journal of Open Innovation: Technology, Market, and Complexity. 2021; 7(3):1-37.

[16][16]Abdel-basset M, Hawash H, Moustafa N, Razzak I, Abd EM. Privacy-preserved learning from non-iid data in fog-assisted IoT: a federated learning approach. Digital Communications and Networks. 2022:2-22.

[17][17]Kumar RL, Khan F, Kadry S, Rho S. A survey on blockchain for industrial internet of things. Alexandria Engineering Journal. 2022; 61(8):6001-22.

[18][18]Liu K, Yan Z, Liang X, Kantola R, Hu C. A survey on blockchain-enabled federated learning and its prospects with digital twin. Digital Communications and Networks. 2022:1-26.

[19][19]Rehman A, Abbas S, Khan MA, Ghazal TM, Adnan KM, Mosavi A. A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique. Computers in Biology and Medicine. 2022; 150:106019.

[20][20]Sun Z, Wan J, Yin L, Cao Z, Luo T, Wang B. A blockchain-based audit approach for encrypted data in federated learning. Digital Communications and Networks. 2022; 8(5):614-24.

[21][21]Chen Y, Chen H, Zhang Y, Han M, Siddula M, Cai Z. A survey on blockchain systems: attacks, defenses, and privacy preservation. High-Confidence Computing. 2022; 2(2):100048.

[22][22]Barbaria S, Mahjoubi H, Rahmouni HB. A novel blockchain-based architectural modal for healthcare data integrity: Covid19 screening laboratory use-case. Procedia Computer Science. 2023; 219:1436-43.

[23][23]Miao Q, Lin H, Hu J, Wang X. An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered internet of things. Digital Communications and Networks. 2022; 8(5):636-43.

[24][24]Yaacoub JP, Noura HN, Salman O. Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems. 2023; 3:155-79.

[25][25]Sáez-de-cámara X, Flores JL, Arellano C, Urbieta A, Zurutuza U. Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. Computers & Security. 2023; 131:103299.

[26][26]Mirdula S, Roopa M. MUD enabled deep learning framework for anomaly detection in IoT integrated smart building. e-Prime-Advances in Electrical Engineering, Electronics and Energy. 2023; 5:100186.

[27][27]Habiba M, Islam MR, Muyeen SM, Ali AS. Edge intelligence for network intrusion prevention in IoT ecosystem. Computers and Electrical Engineering. 2023; 108:108727.

[28][28]Taloba AI, Elhadad A, Rayan A, Abd ERM, Salem M, Alzahrani AA, et al. A blockchain-based hybrid platform for multimedia data processing in IoT-Healthcare. Alexandria Engineering Journal. 2023; 65:263-74.

[29][29]Singh I, Singh B. Access management of IoT devices using access control mechanism and decentralized authentication: a review. Measurement: Sensors. 2022: 100591.

[30][30]Alsuqaih HN, Hamdan W, Elmessiry H, Abulkasim H. An efficient privacy-preserving control mechanism based on blockchain for E-health applications. Alexandria Engineering Journal. 2023; 73:159-72.

[31][31]Xi P, Zhang X, Wang L, Liu W, Peng S. A review of blockchain-based secure sharing of healthcare data. Applied Sciences. 2022; 12(15):1-12.

[32][32]Zhang J, Yang Y, Liu X, Ma J. An efficient blockchain-based hierarchical data sharing for healthcare internet of things. IEEE Transactions on Industrial Informatics. 2022; 18(10):7139-50.

[33][33]Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z, et al. Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet of Things Journal. 2020; 8(3):1817-29.

[34][34]Bhan R, Pamula R, Faruki P, Gajrani J. Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network. The Journal of Supercomputing. 2023:1-42.

[35][35]Lou JT, Bhat SA, Huang NF. Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system. Peer-to-Peer Networking and Applications. 2023:1-23.

[36][36]Rafique W, Khan M, Khan S, Ally JS. SecureMed: a blockchain-based privacy-preserving framework for internet of medical things. Wireless Communications and Mobile Computing. 2023; 2023:1-14.

[37][37]Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, et al. PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Transactions on Network Science and Engineering. 2021; 8(3):2326-41.

[38][38]Taloba AI, Rayan A, Elhadad A, Abozeid A, Shahin OR, Abd ERM. A framework for secure healthcare data management using blockchain technology. International Journal of Advanced Computer Science and Applications. 2021; 12(12):639-46.

[39][39]Li T, Wang H, He D, Yu J. Blockchain-based privacy-preserving and rewarding private data sharing for IoT. IEEE Internet of Things Journal. 2022; 9(16):15138-49.

[40][40]Karaszewski R, Modrzyński P, Modrzyńska J. The use of blockchain technology in public sector entities management: an example of security and energy efficiency in cloud computing data processing. Energies. 2021; 14(7):1-19.

[41][41]Kamath V, Lahari Y, Mohanchandra K. Blockchain based framework for secure data sharing of medicine supply chain in health care system. International Journal of Artificial Intelligence. 2022; 9(1):32-8.

[42][42]Wang Y, Che T, Zhao X, Zhou T, Zhang K, Hu X. A blockchain-based privacy information security sharing scheme in industrial internet of things. Sensors. 2022; 22(9):1-20.

[43][43]Chi J, Li Y, Huang J, Liu J, Jin Y, Chen C, et al. A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things. Journal of Network and Computer Applications. 2020; 167:102710.

[44][44]Jiang S, Cao J, Wu H, Chen K, Liu X. Privacy-preserving and efficient data sharing for blockchain-based intelligent transportation systems. Information Sciences. 2023; 635:72-85.

[45][45]Alsaedi A, Moustafa N, Tari Z, Mahmood A, Anwar A. TON_IoT telemetry dataset: a new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access. 2020; 8:165130-50.