Intelligent System for Secure Tamper Protocol Model with IoT Blockchain Architecture for Data Mitigation

Authors

  • BH.V.V.S.R.K.K.Pavan Assistant Professor, Department of ECE, Bonam Venkata Chalamayya Institute of Technology and Science (Autonomous), Amalapuram, Andhra Pradesh, 533201, India.
  • D.Venkata Satish Assistant Professor, Department of ECE, Bonam Venkata Chalamayya Institute of Technology and Science (Autonomous), Amalapuram, Andhra Pradesh, 533201, India.
  • B.Mounica Assistant Professor, Department of CSE, Vignan Institute of Technology and Science Deshmukhi, Telangana, 508284, India.
  • T. Aditya Kumar Assistant Professor, Department of CSE, Keshav Memorial Institute of Technology, Hyderabad, Telangana, 500029, India.

DOI:

https://doi.org/10.69996/jcai.2024016

Keywords:

5G Technology, Internet of Things (IoT), Hidden Markov, Deep Learning, Routing

Abstract

In an era characterized by the proliferation of Internet of Things (IoT) devices and the critical importance of data integrity, the need for robust security mechanisms has never been greater. This paper introduces a novel "Secure Tamper Protocol Model" (STPM) integrated with an IoT-based blockchain architecture, designed to address the growing challenges of data mitigation in IoT ecosystems. This research explores the application of Symmetric Homomorphic Hidden Markov Models (SHHMMs) in the context
of anomaly detection, with a focus on %G - IoT environments. SHHMMs have shown remarkable promise in accurately identifying anomalies within diverse datasets. The study presents numerical findings indicating the model's high accuracy, precision, recall, and F1-Score, with an initial accuracy of 98.2% reaching 99.0% at Epoch 100. Comparative analysis against traditional methods like Hidden Markov Models (HMM) and Long Short-Term Memory (LSTM) models consistently highlights SHHMM's superior performance, demonstrated through Packet Delivery Ratio (PDR), Packet Loss, End-to-End Delay, and Overhead metrics. The integration of blockchain technology further enhances the practicality of SHHMM in ensuring data integrity and security. This research contributes to the advancement of anomaly detection techniques in 5G- IoT applications, offering a blend of precision and robustness. 

References

[1] Shital Y Gaikwad, “Secure Data Transmission in the Wireless Sensor Network with Blockchain Cryptography Network,” Journal of Sensors, IoT & Health Sciences, vol.2, no.2, pp.41-55, 2024.

[2] O.Vermesan, P.Friess, P. Guillemin, S.Gusmeroli, H.Sundmaeker, A. Bassi et al., “Internet of things strategic research roadmap,” In Internet of things-global technological and societal trends from smart environments and spaces to green ICT, pp. 9-52, 2022.

[3] R. Delshi Howsalya Devi, S.Prabu and N. Legapriyadharshini, “Sentimental Analysis for the Improved User Experience in the E-Commerce Platform with the Fuzzy Model,” Journal of Computer Allied Intelligence, vol.2, no.3, pp.28-40, 2024.

[4] P.Ratta, A.Kaur, S.Sharma, M. Shabaz and G. Dhiman, “Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives,” Journal of Food Quality, vol.2021, pp.1-20, 2021.

[5] N.Alsharari, “Integrating blockchain technology with internet of things to efficiency,” International Journal of Technology, Innovation and Management (IJTIM), vol.1, no.2, pp.01-13, 2021.

[6] A.Sharma, S.Kaur and M. Singh, “A comprehensive review on blockchain and Internet of Things in healthcare,” Transactions on Emerging Telecommunications Technologies, vol.32, no.10, pp.e4333, 2021.

[7] M. A. Ferrag and L. Shu, “The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial,” IEEE Internet of Things Journal, vol.8, no.24, pp.17236-17260, 2021.

[8] A.Cruz, “Convergence between Blockchain and the Internet of Things,” International Journal of Technology, Innovation and Management (IJTIM), vol.1, no.1, pp.34-53, 2021.

[9] C. de Villiers, S.Kuruppu and D. Dissanayake, “A (new) role for business–Promoting the United Nations’ Sustainable Development Goals through the internet-of-things and blockchain technology,” Journal of business research, vol.131, pp.598-609, 2021.

[10] Q.Song, Y.Chen, Y. Zhong, K.Lan, S.Fong et al., “A supply-chain system framework based on internet of things using blockchain technology,” ACM Transactions on Internet Technology (TOIT), vol.21, no.1, pp.1-24, 2021.

[11]M.Alshaikhli, T. Elfouly, O.Elharrouss, A.Mohamed and N. Ottakath, “Evolution of Internet of Things from blockchain to IOTA: A survey,” IEEE Access, vol.10, pp.844-866, 2021.

[12] F.Elghaish, M.R.Hosseini, S.Matarneh, S. Talebi, S. Wu et al., “Blockchain and the ‘Internet of Things' for the construction industry: research trends and opportunities,” Automation in construction, vol.132, no.103942, 2021.

[13]J.Li, M.S.Herdem, J.Nathwani and J.Z. Wen, “Methods and applications for artificial intelligence, big data, internet-of-things, and blockchain in smart energy management,” Energy and AI, no.100208, 2022.

[14] A.Alkhateeb, C.Catal, G.Kar and A. Mishra, “Hybrid blockchain platforms for the internet of things (IoT): A systematic literature review,” Sensors, vol.22, no.4, pp.1304, 2022.

[15]R.L.Kumar, F.Khan, S.Kadry and S. Rho, “A survey on blockchain for industrial internet of things,” Alexandria Engineering Journal, vol.61, no.8, pp.6001-6022, 2022.

[16]R.Huo, S.Zeng, Z.Wang, J.Shang, W.Chen et al., “A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges,” IEEE Communications Surveys & Tutorials, vol.24, no.1, pp.88-122, 2022.

[17]R. Chaganti, V. Varadarajan, V.S. Gorantla, T.R. Gadekallu and V. Ravi, “Blockchainbased cloud-enabled security monitoring using internet of things in smart agriculture,” Future Internet, vol.14, no.9, pp.250, 2022.

[18] D.Ngabo, D. Wang, C.Iwendi, J.H. Anajemba, L.A. Ajao et al., “Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things,” Electronics, vol.10, no.17, pp.2110, 2021.

[19]J.B. Awotunde, S. Misra, O.B.Ayoade, R.O. Ogundokun and M.K. Abiodun, “Blockchain-based framework for secure medical information in internet of things system,” In Blockchain Applications in the Smart Era. Cham: Springer International Publishing, pp.147-169, 2022.

[20]E. H. Abualsauod, “A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network,” Computers and Electrical Engineering, vol.99, no.107847, 2022.

[21] S. Rani, H.Babbar, G.Srivastava, T.R.Gadekallu and G. Dhiman, “Security Framework for Internet-of-Things-Based Software-Defined Networks Using Blockchain,” IEEE Internet of Things Journal, vol.10, no.7, pp.6074-6081, 2022.

[22] S.M. Sajjad, M.R. Mufti, M.Yousaf, W.Aslam, R.Alshahrani et al., “Detection and blockchain-based collaborative mitigation of internet of things botnets,” Wireless Communications and Mobile Computing, vol.2022, pp.1-26, 2022.

[23]Z.Shah, I.Ullah, H.Li, A.Levula and K. Khurshid, “Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey,” Sensors, vol.22, no.3, pp.1094, 2022.

[24] D.Debnath, S.K.Chettri and A.K. Dutta, “Security and privacy issues in internet of things,” In ICT Analysis and Applications, pp. 65-74, 2022.

[25] D. Guha Roy and S.N. Srirama, “A blockchain‐ based cyber attack detection scheme for decentralized Internet of Things using software‐ defined network,” Software: practice and experience, vol.51, no.7, pp.1540-1556, 2021.

[26] A. Sharma, S. Kaur and M. Singh, “A comprehensive review on blockchain and Internet of Things in healthcare,” Transactions on Emerging Telecommunications Technologies, vol.32, no.10, pp.e4333, 2021.

[27] D. Unal, M. Hammoudeh, M.A. Khan, A. Abuarqoub, G. Epiphaniou and R. Hamila, “Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things,” Computers & Security, vol.109, pp.102393, 2021.

[28] D. D. Sivaganesan, “A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks,” Journal of Trends in Computer Science and Smart Technology, vol.3, no.1, pp.59-69, 2021.

[29]C.Zhang, Y. Xu, H. Elahi, D. Zhang, Y. Tan et al., “A blockchain-based model migration approach for secure and sustainable federated learning in iot systems,” IEEE Internet of Things Journal, vol.10, no.8, pp.6574-6585, 2022.

[30]J.Wang, J. Chen, Y.Ren, P.K.Sharma, O.Alfarraj et al., “Data security storage mechanism based on blockchain industrial Internet of Things,” Computers & Industrial Engineering, vol.164, pp.107903, 2022.

[31] K.Yu, L.Tan, C.Yang, K.K.R.Choo, A.K.Bashir et al., “A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings,” IEEE Internet of Things Journal, vol.9, no.11, pp.8154-8167, 2021.

[32]T.M.Ghazal, M.T. Alshurideh and H.M. Alzoubi, “Blockchain-enabled internet of things (IoT) platforms for pharmaceutical and biomedical research,” In The International Conference on Artificial Intelligence and Computer Vision, pp. 589-600, 2021.

[33] X. Xu, X. Wang, Z. Li, H. Yu, G. Sun et al., “Mitigating conflicting transactions in hyperledger fabric-permissioned blockchain for delay-sensitive IoT applications,” IEEE Internet of Things Journal, vol.8, no.13, pp.10596-10607, 2021.

[34] S. P. Sankar, T. D. Subash, N.Vishwanath and D.E. Geroge, “Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things,” Peer-to-Peer Networking and Applications, vol.14, no.1, pp.392-402, 2021.

[35] A. Jain and B. Saha, “Blockchain integration for secure payroll transactions in Oracle Cloud HCM,” International Journal of New Research and Development, vol.5, no.12,pp.71-81, 2020.

[36] V. Hemamalini, G.Zayaraz and V. Vijayalakshmi, “BSPC: blockchain-aided secure process control for improving the efficiency of industrial Internet of Things,” Journal of Ambient Intelligence and Humanized Computing, vol.14, no.9, pp.11517-11530, 2023.

[37]B. Saha and M. Kumar, “Investigating cross-functional collaboration and knowledge sharing in cloud-native program management systems,” International Journal for Research in Management and Pharmacy, vol.9, no.12, 2022.

Downloads

Published

2024-08-31

Issue

Section

Research Articles

How to Cite

BH.V.V.S.R.K.K.Pavan, D.Venkata Satish, B.Mounica, & T. Aditya Kumar. (2024). Intelligent System for Secure Tamper Protocol Model with IoT Blockchain Architecture for Data Mitigation. Journal of Computer Allied Intelligence(JCAI, ISSN: 2584-2676), 2(4), 1-19. https://doi.org/10.69996/jcai.2024016