IDS in IoT using Machine ‎Learning and Blockchain

Authors

  • Nada Abdu Alsharif Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Saudi Arabia
  • Shailendra Mishra Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Saudi Arabia
  • Mohammed Alshehri Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Saudi Arabia
Volume: 13 | Issue: 4 | Pages: 11197-11203 | August 2023 | https://doi.org/10.48084/etasr.5992

Abstract

The rise of IoT devices has brought forth an urgent need for enhanced security and privacy measures, as IoT devices are vulnerable to cyber-attacks that compromise the security and privacy of users. Traditional security measures do not provide adequate protection for such devices. This study aimed to investigate the use of machine learning and blockchain to improve the security and privacy of IoT devices, creating an intrusion detection system powered by machine learning algorithms and using blockchain to encrypt interactions between IoT devices. The performance of the whole system and different machine learning algorithms was evaluated on an IoT network using simulated attack data, achieving a detection accuracy of 99.9% when using Random Forrest, demonstrating its effectiveness in detecting attacks on IoT networks. Furthermore, this study showed that blockchain technology could improve security and privacy by providing a tamper-proof decentralized communication system.

Keywords:

IoT, machine learning, blockchain, IDS, cyber security, neural networks

Downloads

Download data is not yet available.

Author Biographies

Shailendra Mishra, Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Saudi Arabia

 

 

 

Mohammed Alshehri, Department of Information Technology, College of Computer and Information Sciences, Majmaah University, Saudi Arabia

 

 

References

M. Anwer, S. M. Khan, M. U. Farooq, and Waseemullah, "Attack Detection in IoT using Machine Learning," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7273–7278, Jun. 2021.

T. Alqurashi, "Arabic Sentiment Analysis for Twitter Data: A Systematic Literature Review," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10292–10300, Apr. 2023.

P. Singh, Z. Elmi, V. Krishna Meriga, J. Pasha, and M. A. Dulebenets, "Internet of Things for sustainable railway transportation: Past, present, and future," Cleaner Logistics and Supply Chain, vol. 4, Jul. 2022, Art. no. 100065.

H. Liu and B. Lang, "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey," Applied Sciences, vol. 9, no. 20, Jan. 2019, Art. no. 4396.

N. Behar and M. Shrivastava, "A Novel Model for Breast Cancer Detection and Classification," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9496–9502, Dec. 2022.

R. Doshi, N. Apthorpe, and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," in 2018 IEEE Security and Privacy Workshops (SPW), Feb. 2018, pp. 29–35.

A. Rahman et al., "On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives," Journal of Network and Systems Management, vol. 30, no. 4, Sep. 2022, Art. no. 73.

A. Rahman et al., "Impacts of blockchain in software-defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future directions," International Journal of Communication Systems, 2023, Art. no. e5429.

O. O. Mohammed, M. W. Mustafa, D. S. S. Mohammed, and A. O. Otuoze, "Available transfer capability calculation methods: A comprehensive review," International Transactions on Electrical Energy Systems, vol. 29, no. 6, 2019, Art. no. e2846.

R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan, "A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network," Journal of Parallel and Distributed Computing, vol. 164, pp. 55–68, Jun. 2022.

I. Butun, P. Österberg, and H. Song, "Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616–644, 2020.

S. M. Basha, D. Rajput, and V. Vandhan, "Impact of Gradient Ascent and Boosting Algorithm in Classification," International Journal of Intelligent Engineering and Systems, vol. 11, no. 1, pp. 41–49, Feb. 2018.

R. Darwin, "Implementation of Advanced IDS in Contiki for Highly Secured Wireless Sensor Network," International Journal of Applied Engineering Research13, vol. 13, no. 6, pp. 4214–4218, 2018.

"The Internet of Things (IoT)," Canadian Journal of Nursing Informatics, vol. 13, no. 1, 2018.

S. M. Basha and D. S. Rajput, "Chapter 9 - Survey on Evaluating the Performance of Machine Learning Algorithms: Past Contributions and Future Roadmap," in Deep Learning and Parallel Computing Environment for Bioengineering Systems, A. K. Sangaiah, Ed. Academic Press, 2019, pp. 153–164.

B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, Sep. 2020, Art. No. 100227.

A. Derhab et al., "Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security," Sensors, vol. 19, no. 14, Jan. 2019, Art. no. 3119.

E. Kfoury, J. Saab, P. Younes, and R. Achkar, "A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks," International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 11, no. 1, pp. 30–43, Jan. 2019.

N. Waheed, X. He, M. Ikram, M. Usman, S. S. Hashmi, and M. Usman, "Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures," ACM Computing Surveys, vol. 53, no. 6, Sep. 2020, Art. no. 122.

F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine Learning in IoT Security: Current Solutions and Future Challenges," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686–1721, 2020.

"Welcome to Python.org," Python.org, May 29, 2023. https://www.python.org/.

Python.org, May 29, 2023. https://www.python.org/.

M. Baz, "SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks," Sensors, vol. 22, no. 17, Jan. 2022, Art. no. 6505.

T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset," IEEE Access, vol. 8, pp. 29575–29585, 2020.

Downloads

How to Cite

[1]
N. A. Alsharif, S. Mishra, and M. Alshehri, “IDS in IoT using Machine ‎Learning and Blockchain”, Eng. Technol. Appl. Sci. Res., vol. 13, no. 4, pp. 11197–11203, Aug. 2023.

Metrics

Abstract Views: 2210
PDF Downloads: 610

Metrics Information

Most read articles by the same author(s)