Intelligent System for Secure Tamper Protocol Model with IoT Blockchain Architecture for Data Mitigation
DOI:
https://doi.org/10.69996/jcai.2024016Keywords:
5G Technology, Internet of Things (IoT), Hidden Markov, Deep Learning, RoutingAbstract
In an era characterized by the proliferation of Internet of Things (IoT) devices and the critical importance of data integrity, the need for robust security mechanisms has never been greater. This paper introduces a novel "Secure Tamper Protocol Model" (STPM) integrated with an IoT-based blockchain architecture, designed to address the growing challenges of data mitigation in IoT ecosystems. This research explores the application of Symmetric Homomorphic Hidden Markov Models (SHHMMs) in the context
of anomaly detection, with a focus on %G - IoT environments. SHHMMs have shown remarkable promise in accurately identifying anomalies within diverse datasets. The study presents numerical findings indicating the model's high accuracy, precision, recall, and F1-Score, with an initial accuracy of 98.2% reaching 99.0% at Epoch 100. Comparative analysis against traditional methods like Hidden Markov Models (HMM) and Long Short-Term Memory (LSTM) models consistently highlights SHHMM's superior performance, demonstrated through Packet Delivery Ratio (PDR), Packet Loss, End-to-End Delay, and Overhead metrics. The integration of blockchain technology further enhances the practicality of SHHMM in ensuring data integrity and security. This research contributes to the advancement of anomaly detection techniques in 5G- IoT applications, offering a blend of precision and robustness.
References
[1] Shital Y Gaikwad, “Secure Data Transmission in the Wireless Sensor Network with Blockchain Cryptography Network,” Journal of Sensors, IoT & Health Sciences, vol.2, no.2, pp.41-55, 2024.
[2] O.Vermesan, P.Friess, P. Guillemin, S.Gusmeroli, H.Sundmaeker, A. Bassi et al., “Internet of things strategic research roadmap,” In Internet of things-global technological and societal trends from smart environments and spaces to green ICT, pp. 9-52, 2022.
[3] R. Delshi Howsalya Devi, S.Prabu and N. Legapriyadharshini, “Sentimental Analysis for the Improved User Experience in the E-Commerce Platform with the Fuzzy Model,” Journal of Computer Allied Intelligence, vol.2, no.3, pp.28-40, 2024.
[4] P.Ratta, A.Kaur, S.Sharma, M. Shabaz and G. Dhiman, “Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives,” Journal of Food Quality, vol.2021, pp.1-20, 2021.
[5] N.Alsharari, “Integrating blockchain technology with internet of things to efficiency,” International Journal of Technology, Innovation and Management (IJTIM), vol.1, no.2, pp.01-13, 2021.
[6] A.Sharma, S.Kaur and M. Singh, “A comprehensive review on blockchain and Internet of Things in healthcare,” Transactions on Emerging Telecommunications Technologies, vol.32, no.10, pp.e4333, 2021.
[7] M. A. Ferrag and L. Shu, “The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial,” IEEE Internet of Things Journal, vol.8, no.24, pp.17236-17260, 2021.
[8] A.Cruz, “Convergence between Blockchain and the Internet of Things,” International Journal of Technology, Innovation and Management (IJTIM), vol.1, no.1, pp.34-53, 2021.
[9] C. de Villiers, S.Kuruppu and D. Dissanayake, “A (new) role for business–Promoting the United Nations’ Sustainable Development Goals through the internet-of-things and blockchain technology,” Journal of business research, vol.131, pp.598-609, 2021.
[10] Q.Song, Y.Chen, Y. Zhong, K.Lan, S.Fong et al., “A supply-chain system framework based on internet of things using blockchain technology,” ACM Transactions on Internet Technology (TOIT), vol.21, no.1, pp.1-24, 2021.
[11]M.Alshaikhli, T. Elfouly, O.Elharrouss, A.Mohamed and N. Ottakath, “Evolution of Internet of Things from blockchain to IOTA: A survey,” IEEE Access, vol.10, pp.844-866, 2021.
[12] F.Elghaish, M.R.Hosseini, S.Matarneh, S. Talebi, S. Wu et al., “Blockchain and the ‘Internet of Things' for the construction industry: research trends and opportunities,” Automation in construction, vol.132, no.103942, 2021.
[13]J.Li, M.S.Herdem, J.Nathwani and J.Z. Wen, “Methods and applications for artificial intelligence, big data, internet-of-things, and blockchain in smart energy management,” Energy and AI, no.100208, 2022.
[14] A.Alkhateeb, C.Catal, G.Kar and A. Mishra, “Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review,” Sensors, vol.22, no.4, pp.1304, 2022.
[15]R.L.Kumar, F.Khan, S.Kadry and S. Rho, “A survey on blockchain for industrial internet of things,” Alexandria Engineering Journal, vol.61, no.8, pp.6001-6022, 2022.
[16]R.Huo, S.Zeng, Z.Wang, J.Shang, W.Chen et al., “A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges,” IEEE Communications Surveys & Tutorials, vol.24, no.1, pp.88-122, 2022.
[17]R. Chaganti, V. Varadarajan, V.S. Gorantla, T.R. Gadekallu and V. Ravi, “Blockchainbased cloud-enabled security monitoring using internet of things in smart agriculture,” Future Internet, vol.14, no.9, pp.250, 2022.
[18] D.Ngabo, D. Wang, C.Iwendi, J.H. Anajemba, L.A. Ajao et al., “Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things,” Electronics, vol.10, no.17, pp.2110, 2021.
[19]J.B. Awotunde, S. Misra, O.B.Ayoade, R.O. Ogundokun and M.K. Abiodun, “Blockchain-based framework for secure medical information in internet of things system,” In Blockchain Applications in the Smart Era. Cham: Springer International Publishing, pp.147-169, 2022.
[20]E. H. Abualsauod, “A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network,” Computers and Electrical Engineering, vol.99, no.107847, 2022.
[21] S. Rani, H.Babbar, G.Srivastava, T.R.Gadekallu and G. Dhiman, “Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain,” IEEE Internet of Things Journal, vol.10, no.7, pp.6074-6081, 2022.
[22] S.M. Sajjad, M.R. Mufti, M.Yousaf, W.Aslam, R.Alshahrani et al., “Detection and blockchain-based collaborative mitigation of internet of things botnets,” Wireless Communications and Mobile Computing, vol.2022, pp.1-26, 2022.
[23]Z.Shah, I.Ullah, H.Li, A.Levula and K. Khurshid, “Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey,” Sensors, vol.22, no.3, pp.1094, 2022.
[24] D.Debnath, S.K.Chettri and A.K. Dutta, “Security and privacy issues in internet of things,” In ICT Analysis and Applications, pp. 65-74, 2022.
[25] D. Guha Roy and S.N. Srirama, “A blockchain‐ based cyber attack detection scheme for decentralized Internet of Things using software‐ defined network,” Software: practice and experience, vol.51, no.7, pp.1540-1556, 2021.
[26] A. Sharma, S. Kaur and M. Singh, “A comprehensive review on blockchain and Internet of Things in healthcare,” Transactions on Emerging Telecommunications Technologies, vol.32, no.10, pp.e4333, 2021.
[27] D. Unal, M. Hammoudeh, M.A. Khan, A. Abuarqoub, G. Epiphaniou and R. Hamila, “Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things,” Computers & Security, vol.109, pp.102393, 2021.
[28] D. D. Sivaganesan, “A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks,” Journal of Trends in Computer Science and Smart Technology, vol.3, no.1, pp.59-69, 2021.
[29]C.Zhang, Y. Xu, H. Elahi, D. Zhang, Y. Tan et al., “A blockchain-based model migration approach for secure and sustainable federated learning in iot systems,” IEEE Internet of Things Journal, vol.10, no.8, pp.6574-6585, 2022.
[30]J.Wang, J. Chen, Y.Ren, P.K.Sharma, O.Alfarraj et al., “Data security storage mechanism based on blockchain industrial Internet of Things,” Computers & Industrial Engineering, vol.164, pp.107903, 2022.
[31] K.Yu, L.Tan, C.Yang, K.K.R.Choo, A.K.Bashir et al., “A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings,” IEEE Internet of Things Journal, vol.9, no.11, pp.8154-8167, 2021.
[32]T.M.Ghazal, M.T. Alshurideh and H.M. Alzoubi, “Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research,” In The International Conference on Artificial Intelligence and Computer Vision, pp. 589-600, 2021.
[33] X. Xu, X. Wang, Z. Li, H. Yu, G. Sun et al., “Mitigating conflicting transactions in hyperledger fabric-permissioned blockchain for delay-sensitive IoT applications,” IEEE Internet of Things Journal, vol.8, no.13, pp.10596-10607, 2021.
[34] S. P. Sankar, T. D. Subash, N.Vishwanath and D.E. Geroge, “Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things,” Peer-to-Peer Networking and Applications, vol.14, no.1, pp.392-402, 2021.
[35] A. Jain and B. Saha, “Blockchain integration for secure payroll transactions in Oracle Cloud HCM,” International Journal of New Research and Development, vol.5, no.12,pp.71-81, 2020.
[36] V. Hemamalini, G.Zayaraz and V. Vijayalakshmi, “BSPC: blockchain-aided secure process control for improving the efficiency of industrial Internet of Things,” Journal of Ambient Intelligence and Humanized Computing, vol.14, no.9, pp.11517-11530, 2023.
[37]B. Saha and M. Kumar, “Investigating cross-functional collaboration and knowledge sharing in cloud-native program management systems,” International Journal for Research in Management and Pharmacy, vol.9, no.12, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Computer Allied Intelligence(JCAI, ISSN: 2584-2676)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Fringe Global Scientific Press publishes all the papers under a Creative Commons Attribution-Non-Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/) license. Authors have the liberty to replicate and distribute their work. Authors have the ability to use either the whole or a portion of their piece in compilations or other publications that include their own work. Please see the licensing terms for more information on reusing the work.