Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment

被引:34
作者
Shah, Harshit [1 ]
Shah, Dhruvil [1 ]
Jadav, Nilesh Kumar [1 ]
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
Alfarraj, Osama [2 ]
Tolba, Amr [2 ]
Raboaca, Maria Simona [3 ,4 ]
Marina, Verdes [5 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, India
[2] King Saud Univ, Community Coll, Comp Sci Dept, Riyadh 11437, Saudi Arabia
[3] Univ Politehn Bucuresti, Doctoral Sch, Splaiul Independentei St 313, Bucharest 060042, Romania
[4] Natl Res & Dev Inst Cryogen & Isotop Technol ICSI, Uzinei St 4,POB 7 Raureni, Ramnicu Valcea 240050, Romania
[5] Tech Univ Gheorghe Asachi, Fac Civil Engn & Bldg Serv, Dept Bldg Serv, Iasi 700050, Romania
关键词
blockchain; artificial intelligence; intrusion detection system; internet of things; malicious smart contract; BLOCKCHAIN; MECHANISM;
D O I
10.3390/math11020418
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The Internet of Things (IoT) is a key enabler technology that recently received significant attention from the scientific community across the globe. It helps transform everyone's life by connecting physical and virtual devices with each other to offer staggering benefits, such as automation and control, higher productivity, real-time information access, and improved efficiency. However, IoT devices and their accumulated data are susceptible to various security threats and vulnerabilities, such as data integrity, denial-of-service, interception, and information disclosure attacks. In recent years, the IoT with blockchain technology has seen rapid growth, where smart contracts play an essential role in validating IoT data. However, these smart contracts can be vulnerable and degrade the performance of IoT applications. Hence, besides offering indispensable features to ease human lives, there is also a need to confront IoT environment security attacks, especially data integrity attacks. Toward this aim, this paper proposed an artificial intelligence-based system model with a dual objective. It first detects the malicious user trying to compromise the IoT environment using a binary classification problem. Further, blockchain technology is utilized to offer tamper-proof storage to store non-malicious IoT data. However, a malicious user can exploit the blockchain-based smart contract to deteriorate the performance IoT environment. For that, this paper utilizes deep learning algorithms to classify malicious and non-malicious smart contracts. The proposed system model offers an end-to-end security pipeline through which the IoT data are disseminated to the recipient. Lastly, the proposed system model is evaluated by considering different assessment measures that comprise the training accuracy, training loss, classification measures (precision, recall, and F1 score), and receiver operating characteristic (ROC) curve.
引用
收藏
页数:22
相关论文
共 31 条
  • [1] X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things
    Al-Hawawreh, Muna
    Sitnikova, Elena
    Aboutorab, Neda
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3962 - 3977
  • [2] K-nearest neighbour-based smart contract for internet of medical things security using blockchain
    Al-Otaibi, Yasser D.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
  • [3] A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks
    Alkadi, Osama
    Moustafa, Nour
    Turnbull, Benjamin
    Choo, Kim-Kwang Raymond
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12): : 9463 - 9472
  • [4] Allen Day E.M., ETHEREUM BIGQUERY PU
  • [5] Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Park, Youngho
    Tanwar, Sudeep
    [J]. IEEE ACCESS, 2018, 6 : 20673 - 20693
  • [6] Novel and Secure Blockchain Framework for Health Applications in IoT
    Bataineh, Marah R.
    Mardini, Wail
    Khamayseh, Yaser M.
    Yassein, Muneer Masadeh Bani
    [J]. IEEE ACCESS, 2022, 10 : 14914 - 14926
  • [7] AI-Envisioned Blockchain-Enabled Signature-Based Key Management Scheme for Industrial Cyber-Physical Systems
    Das, Ashok Kumar
    Bera, Basudeb
    Saha, Sourav
    Kumar, Neeraj
    You, Ilsun
    Chao, Han-Chieh
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (09) : 6374 - 6388
  • [8] Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart Contracts
    Durieux, Thomas
    Ferreira, Joao F.
    Abreu, Rui
    Cruz, Pedro
    [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 530 - 541
  • [9] Ferreira J.F., SMARTBUGS WILD DATAS
  • [10] Deep learning-based malicious smart contract detection scheme for internet of things environment
    Gupta, Rajesh
    Patel, Mohil Maheshkumar
    Shukla, Arpit
    Tanwar, Sudeep
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97