IDS in IoT using Machine Learning and Blockchain
Received: 27 April 2023 | Revised: 17 May 2023 and 22 May 2023 | Accepted: 30 May 2023 | Online: 15 July 2023
Corresponding author: Nada Abdu Alsharif
Abstract
The rise of IoT devices has brought forth an urgent need for enhanced security and privacy measures, as IoT devices are vulnerable to cyber-attacks that compromise the security and privacy of users. Traditional security measures do not provide adequate protection for such devices. This study aimed to investigate the use of machine learning and blockchain to improve the security and privacy of IoT devices, creating an intrusion detection system powered by machine learning algorithms and using blockchain to encrypt interactions between IoT devices. The performance of the whole system and different machine learning algorithms was evaluated on an IoT network using simulated attack data, achieving a detection accuracy of 99.9% when using Random Forrest, demonstrating its effectiveness in detecting attacks on IoT networks. Furthermore, this study showed that blockchain technology could improve security and privacy by providing a tamper-proof decentralized communication system.
Keywords:
IoT, machine learning, blockchain, IDS, cyber security, neural networksDownloads
References
M. Anwer, S. M. Khan, M. U. Farooq, and Waseemullah, "Attack Detection in IoT using Machine Learning," Engineering, Technology & Applied Science Research, vol. 11, no. 3, pp. 7273–7278, Jun. 2021.
T. Alqurashi, "Arabic Sentiment Analysis for Twitter Data: A Systematic Literature Review," Engineering, Technology & Applied Science Research, vol. 13, no. 2, pp. 10292–10300, Apr. 2023.
P. Singh, Z. Elmi, V. Krishna Meriga, J. Pasha, and M. A. Dulebenets, "Internet of Things for sustainable railway transportation: Past, present, and future," Cleaner Logistics and Supply Chain, vol. 4, Jul. 2022, Art. no. 100065.
H. Liu and B. Lang, "Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey," Applied Sciences, vol. 9, no. 20, Jan. 2019, Art. no. 4396.
N. Behar and M. Shrivastava, "A Novel Model for Breast Cancer Detection and Classification," Engineering, Technology & Applied Science Research, vol. 12, no. 6, pp. 9496–9502, Dec. 2022.
R. Doshi, N. Apthorpe, and N. Feamster, "Machine Learning DDoS Detection for Consumer Internet of Things Devices," in 2018 IEEE Security and Privacy Workshops (SPW), Feb. 2018, pp. 29–35.
A. Rahman et al., "On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives," Journal of Network and Systems Management, vol. 30, no. 4, Sep. 2022, Art. no. 73.
A. Rahman et al., "Impacts of blockchain in software-defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future directions," International Journal of Communication Systems, 2023, Art. no. e5429.
O. O. Mohammed, M. W. Mustafa, D. S. S. Mohammed, and A. O. Otuoze, "Available transfer capability calculation methods: A comprehensive review," International Transactions on Electrical Energy Systems, vol. 29, no. 6, 2019, Art. no. e2846.
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan, "A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network," Journal of Parallel and Distributed Computing, vol. 164, pp. 55–68, Jun. 2022.
I. Butun, P. Österberg, and H. Song, "Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616–644, 2020.
S. M. Basha, D. Rajput, and V. Vandhan, "Impact of Gradient Ascent and Boosting Algorithm in Classification," International Journal of Intelligent Engineering and Systems, vol. 11, no. 1, pp. 41–49, Feb. 2018.
R. Darwin, "Implementation of Advanced IDS in Contiki for Highly Secured Wireless Sensor Network," International Journal of Applied Engineering Research13, vol. 13, no. 6, pp. 4214–4218, 2018.
"The Internet of Things (IoT)," Canadian Journal of Nursing Informatics, vol. 13, no. 1, 2018.
S. M. Basha and D. S. Rajput, "Chapter 9 - Survey on Evaluating the Performance of Machine Learning Algorithms: Past Contributions and Future Roadmap," in Deep Learning and Parallel Computing Environment for Bioengineering Systems, A. K. Sangaiah, Ed. Academic Press, 2019, pp. 153–164.
B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, "Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology," Internet of Things, vol. 11, Sep. 2020, Art. No. 100227.
A. Derhab et al., "Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security," Sensors, vol. 19, no. 14, Jan. 2019, Art. no. 3119.
E. Kfoury, J. Saab, P. Younes, and R. Achkar, "A Self Organizing Map Intrusion Detection System for RPL Protocol Attacks," International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 11, no. 1, pp. 30–43, Jan. 2019.
N. Waheed, X. He, M. Ikram, M. Usman, S. S. Hashmi, and M. Usman, "Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures," ACM Computing Surveys, vol. 53, no. 6, Sep. 2020, Art. no. 122.
F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine Learning in IoT Security: Current Solutions and Future Challenges," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686–1721, 2020.
"Welcome to Python.org," Python.org, May 29, 2023. https://www.python.org/.
Python.org, May 29, 2023. https://www.python.org/.
M. Baz, "SEHIDS: Self Evolving Host-Based Intrusion Detection System for IoT Networks," Sensors, vol. 22, no. 17, Jan. 2022, Art. no. 6505.
T. Su, H. Sun, J. Zhu, S. Wang, and Y. Li, "BAT: Deep Learning Methods on Network Intrusion Detection Using NSL-KDD Dataset," IEEE Access, vol. 8, pp. 29575–29585, 2020.
Downloads
How to Cite
License
Copyright (c) 2023 Nada Abdu Alsharif, Shailendra Mishra, Mohammed Alshehri
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.