BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems

被引:4
作者
Anwar, Masooma [1 ]
Tariq, Noshina [1 ]
Ashraf, Muhammad [2 ]
Moqurrab, Syed Atif [3 ]
Alabdullah, Bayan [4 ]
Alsagri, Hatoon S. [5 ]
Almjally, Abrar [6 ]
机构
[1] Air Univ, Dept Avion Engn, Islamabad 44000, Pakistan
[2] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad 44000, Pakistan
[3] Gachon Univ, Sch Comp, Seongnam Si 13120, South Korea
[4] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 88428, Riyadh 11671, Saudi Arabia
[5] Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & Informat Sci, Informat Syst Dept, Riyadh 13318, Saudi Arabia
[6] Imam Mohammad Ibn Saud Islamic Univ, Coll Comp & Informat Sci, Informat Technol, Riyadh 13318, Saudi Arabia
关键词
Smart healthcare; Cyber-physical systems; jamming attacks; sensor nodes; trust;
D O I
10.1109/ACCESS.2024.3404656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity challenges pose a significant threat to Healthcare Cyber Physical Systems (CPS) because they heavily rely on wireless communication. Particularly, jamming attacks can severely disrupt the integrity of these CPS networks. This research introduces a decentralized system to address this issue. Therefore, this paper suggested a system that leverages trust and blockchain technology to detect jamming attacks in healthcare CPS effectively. It proposes a layered model to improve CPS networks' lifetime and performance. In smart healthcare environments, it ensures secure and reliable communication between sensor nodes, wearable sensors, medical devices, and monitoring systems. Results show that the suggested approach outperforms the baseline model in identifying and minimizing jamming assaults, with an average percentage difference of 15.71% more detection rate, 20.21% less packet loss rates, 16.65% less node-level energy consumption, reduced network latency of 8.29%, and 9.63% more network throughput.
引用
收藏
页码:101878 / 101894
页数:17
相关论文
共 59 条
[1]   A Deep Autoencoder Trust Model for Mitigating Jamming Attack in IoT Assisted by Cognitive Radio [J].
Abdalzaher, Mohamed S. ;
Elwekeil, Mohamed ;
Wang, Taotao ;
Zhang, Shengli .
IEEE SYSTEMS JOURNAL, 2022, 16 (03) :3635-3645
[2]   A Jamming-Resilient and Scalable Broadcasting Algorithm for Multiple Access Channel Networks [J].
Aldawsari, Bader A. ;
Jafarian, Jafar Haadi .
APPLIED SCIENCES-BASEL, 2021, 11 (03) :1-21
[3]  
Aljabri F., 2023, Multimedia Tools Appl., V83, P48119
[4]   Reactive jammer detection in OFDM with index modulation? [J].
Altun, Ufuk ;
Kaplan, Ahmet ;
Kurt, Gunes Karabulut ;
Altunbas, Ibrahim ;
Kucukyavuz, Defne ;
Kesal, Mustafa ;
Basar, Ertugrul .
PHYSICAL COMMUNICATION, 2022, 55
[5]  
Bagali S, 2019, 2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, P196, DOI [10.1109/wispnet45539.2019.9032861, 10.1109/WiSPNET45539.2019.9032861]
[6]   Artificial Intelligence of Things for Smarter Healthcare: A Survey of Advancements, Challenges, and Opportunities [J].
Baker, Stephanie ;
Xiang, Wei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02) :1261-1293
[7]   An Adaptable Module for Designing Jamming Attacks in WiFi Networks for ns-3 [J].
Bout, Emilie ;
Loscri, Valeria .
PROCEEDINGS OF THE 25TH ACM INTERNATIONAL CONFERENCE ON MODELING ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, MSWIM 2022, 2022, :121-124
[8]  
Chen W., 2021, ACM Trans. Sensor Netw., V17, p29H
[9]   A Lightweight Blockchain based Two Factor Authentication Mechanism for LoRaWAN Join Procedure [J].
Danish, Syed Muhammad ;
Lestas, Marios ;
Asif, Waqar ;
Qureshi, Hassaan Khaliq ;
Rajarajan, Muttukrishnan .
2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
[10]   Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing [J].
Eldosouky, AbdelRahman ;
Ferdowsi, Aidin ;
Saad, Walid .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :2840-2854