Intellig_block: enhancing IoT security with blockchain-based adversarial machine learning protection
Journal: International Journal of Advanced Technology and Engineering Exploration (IJATEE) (Vol.10, No. 106)Publication Date: 2023-10-30
Authors : Walid Dhifallah Tarek Moulahi Mounira Tarhouni; Salah Zidi;
Page : 1167-1183
Keywords : Internet of things; Cyber threats; Decentralization; Blockchain; Machine learning (ML); Evasion attack.;
Abstract
Internet of things (IoT) systems were becoming increasingly complex due to advancements in open innovation, especially in the realms of intelligent automation and artificial intelligence (AI). However, their effective deployment was impeded by security concerns and the need for enhanced threat detection capabilities. To address these challenges and bolster the security of IoT devices, an architecture called "intellig_block" was developed. This architecture seamlessly integrated blockchain (BC) and AI technology to mitigate vulnerabilities and enhance system efficiency. The goal was to harness the advantages of BC and AI to offer effective solutions for the security challenges confronting IoT systems. The primary focus centered on thwarting contamination and evasion attacks on intrusion detection systems (IDS) powered by machine learning (ML). At that time, many existing solutions relied on traditional statistical frameworks or ML techniques, resulting in increased deployment and runtime costs. In contrast, the "intellig_block" architecture hashed the template file and embedded it as a smart contract to implement the categorization algorithm. The results of the experiments conducted at that time were quite promising: the execution time was short with minimal gas overhead. A potential method was proposed at that time for effectively identifying cyber threats in ML models using the "intellig_block" architecture, which could significantly fortify IDS. Smart contracts (SC) have been introduced as a solution to safeguard IDS results against adversarial machine learning (AML) attacks within BC. In that context, IoT devices leveraged these SC to promptly detect AMLs in real-time data streams. Comprehensive performance analysis and experimental findings at that time substantiated the efficacy of the model in shielding IoT devices against unreliable services, all while maintaining cost-effectiveness within a reasonable time frame and at an affordable cost.
Other Latest Articles
- Intelligent face sketch recognition system using shearlet transform and convolutional neural network model
- Trusted surveillance system based on blockchain-internet of spatial things for smart cities
- A comprehensive control strategy for power quality enhancement in railway power system
- Design and implementation system of mobile oxygen concentrator and telemedicine for comprehensive treatment of SpO2
- Broadcasting about Vaccination Campaigns: An Analysis of the Media in Ceará
Last modified: 2023-10-07 16:37:10