Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems

被引:2
作者
Asiri, Mashael M. [1 ]
Alfraihi, Hessa [2 ]
Said, Yahia [3 ]
Othman, Kamal M. [4 ]
Salama, Ahmed S. [5 ]
Marzouk, Radwa [2 ]
机构
[1] King Khalid Univ, Appl Coll Mahayil, Dept Comp Sci, Abha 61421, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] Northern Border Univ, Coll Engn, Dept Elect Engn, Ar Ar 91431, Saudi Arabia
[4] Umm Al Qura Univ, Coll Engn & Islamic Architecture, Dept Elect Engn, Mecca 24211, Saudi Arabia
[5] Future Univ Egypt, Fac Engn & Technol, Dept Elect Engn, New Cairo 11845, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Biological system modeling; Safety; Consumer electronics; Internet of Things; Computational modeling; Threat modeling; Ecosystems; Blockchains; Deep learning; Search methods; Evidence theory; Blockchain; deep learning; reptile search algorithm; deep belief network; NETWORK; CARE;
D O I
10.1109/ACCESS.2024.3441094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing user electronics devices has become a significant concern in the digital period, and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep learning (DL) methods. Blockchain improves device safety by transforming access management, storing credentials on a tamper-resistant ledger, mitigating the risk of unauthorized access and giving a robust defence against malevolent actors. Integrating DL into this framework also raises safety measures, as it permits devices to inspect and regulate to develop attacks distinctly. DL models accurately recognize intricate designs and anomalies, allowing the technique to distinguish and threaten possible attacks in real time. The fusion of BC and DL not only improves the reliability of user electronics but also establishes a dynamic and adaptive safety system, enhancing consumer confidence in the safety of their devices. Therefore, this study presents a BC-Based Access Management with DL Threat Modeling (BCAM-DLTM) technique for securing consumer electronics devices in the IoT ecosystems. The BCAM-DLTM technique mainly follows a two-phase procedure: access management and threat detection. Moreover, BC technology can be applied to the access management of consumer electronics devices. Besides, the BCAM-DLTM technique applies a deep belief networks (DBNs) model for proficiently identifying threats. To enhance the recognition results of the DBN model, the hyperparameter tuning procedure uses the reptile search algorithm (RSA). The experimental outcome study of the BCAM-DLTM approach employs the NSLKDD dataset. The comprehensive results of the BCAM-DLTM approach portrayed a superior accuracy outcome of 99.63% over existing models in terms of distinct metrics.
引用
收藏
页码:110671 / 110680
页数:10
相关论文
共 40 条
  • [1] Alalayah KM., 2023, Comput. Syst. Sci. Eng, V46, P3121, DOI [10.32604/csse.2023.036352, DOI 10.32604/CSSE.2023.036352]
  • [2] Blockchain-Powered Healthcare Systems: Enhancing Scalability and Security with Hybrid Deep Learning
    Ali, Aitizaz
    Ali, Hashim
    Saeed, Aamir
    Khan, Aftab Ahmed
    Tin, Ting Tin
    Assam, Muhammad
    Ghadi, Yazeed Yasin
    Mohamed, Heba G.
    [J]. SENSORS, 2023, 23 (18)
  • [3] Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. COMPLEXITY, 2021, 2021
  • [4] Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks
    Alkhonaini, Mimouna Abdullah
    Al Mazroa, Alanoud
    Aljebreen, Mohammed
    Hassine, Siwar Ben Haj
    Allafi, Randa
    Dutta, Ashit Kumar
    Alsubai, Shtwai
    Khamparia, Aditya
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2024, 102 : 169 - 178
  • [5] Cloud-IIoT-Based Electronic Health Record Privacy-Preserving by CNN and Blockchain-Enabled Federated Learning
    Alzubi, Jafar A.
    Alzubi, Omar A.
    Singh, Ashish
    Ramachandran, Manikandan
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) : 1080 - 1087
  • [6] Arya L., 2023, P 2023 9 INT C ADV C, P834, DOI [10.1109/ICACCS57279.2023.10112989, DOI 10.1109/ICACCS57279.2023.10112989]
  • [7] Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment
    Assiri, Fatmah Y.
    Ragab, Mahmoud
    [J]. MATHEMATICS, 2023, 11 (19)
  • [8] Canadian Institute for Cybersecurity (CIS), NSL-KDD Dataset
  • [9] Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain
    Chen, Jianguo
    Li, Kenli
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) : 11633 - 11642
  • [10] Das S., 2023, Researchsquare