SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication

被引:0
作者
Tuncel, Yusuf Kursat [1 ]
Öztoprak, Kasım [1 ]
机构
[1] Department of Computer Engineering, Konya Food And Agriculture University, Konya
关键词
Blockchain trust management; Edge computing security; Federated learning; Hybrid attention mechanism; Internet of things security; Machine-to-machine communication; Multi-agent reinforcement learning; Quantum-derived optimization; SAFE-CAST framework; Secure clustering;
D O I
10.7717/PEERJ-CS.2551
中图分类号
学科分类号
摘要
Machine-to-machine (M2M) communication within the Internet of Things (IoT) faces increasing security and efficiency challenges as networks proliferate. Existing approaches often struggle with balancing robust security measures and energy efficiency, leading to vulnerabilities and reduced performance in resource-constrained environments. To address these limitations, we propose SAFE-CAST, a novel secure AI-federated enumeration for clustering-based automated surveillance and trust framework. This study addresses critical security and efficiency challenges in M2M communication within the context of IoT. SAFE-CAST integrates several innovative components: (1) a federated learning approach using Lloyd’s K-means algorithm for secure clustering, (2) a quality diversity optimization algorithm (QDOA) for secure channel selection, (3) a dynamic trust management system utilizing blockchain technology, and (4) an adaptive multi-agent reinforcement learning for context-aware transmission scheme (AMARLCAT) to minimize latency and improve scalability. Theoretical analysis and extensive simulations using network simulator (NS)-3.26 demonstrate the superiority of SAFE-CAST over existing methods. The results show significant improvements in energy efficiency (21.6% reduction), throughput (14.5% increase), security strength (15.3% enhancement), latency (33.9% decrease), and packet loss rate (12.9% reduction) compared to state-of-the-art approaches. This comprehensive solution addresses the pressing need for robust, efficient, and secure M2M communication in the evolving landscape of IoT and edge computing. Copyright 2025 Tuncel and Öztoprak Distributed under Creative Commons CC-BY 4.0 OPEN ACCESS
引用
收藏
相关论文
共 45 条
[1]  
Ahmed MTA, Hashim F, Hashim SJ, Abdullah A., Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks, Electronics, 12, 4, (2023)
[2]  
Al-Shareeda MA, Manickam S, Laghari SA, Jaisan A., Replay-attack detection and prevention mechanism in industry 4.0 landscape for secure SECS/GEM communications, Sustainability, 14, 23, (2022)
[3]  
Alsultan M, Oztoprak K, Hassanpour R., Power aware routing protocols in wireless sensor network, IEICE Transactions on Communications, E99.B, 7, pp. 1481-1491, (2016)
[4]  
Bilami KE, Lorenz P., Lightweight blockchain-based scheme to secure wireless M2M area networks, Future Internet, 14, 5, (2022)
[5]  
Butun I, Tuncel YK, Oztoprak K., Application layer packet processing using PISA switches, Sensors, 21, 23, (2021)
[6]  
Choudhary D, Pahuja R., A blockchain-based cyber-security for connected networks, Peer-To-Peer Networking and Applications, 16, pp. 1852-1867, (2023)
[7]  
Dehalwar V, Kolhe ML, Deoli S, Jhariya MK., Blockchain-based trust management and authentication of devices in smart grid, Cleaner Engineering and Technology, 8, (2022)
[8]  
Djehaiche R, Aidel S, Sawalmeh A, Saeed N, Alenezi AH., Adaptive control of IoT/M2M devices in smart buildings using heterogeneous wireless networks, IEEE Sensors Journal, 23, 7, pp. 7836-7849, (2023)
[9]  
Ejigu MW, Santhosh J., IoT based comprehensive autonomous home automation and security system using M2M communication, Recent Advances in Computer Science and Communications, 14, 7, pp. 2234-2246, (2020)
[10]  
Fatani A, Elaziz MA, Dahou A, Al-Qaness MAA, Lu S., IoT intrusion detection system using deep learning and enhanced transient search optimization, IEEE Access, 9, pp. 123448-123464, (2021)