Elevating Security Measures in Cyber-Physical Systems: Deep Neural NetworkBased Anomaly Detection with Ethereum Blockchain for Enhanced Data Integrity

被引:0
作者
Pimple, Jagdish F. [1 ,2 ]
Sharma, Avinash [1 ,3 ]
Mishra, Jitendra Kumar [4 ]
机构
[1] Madhyanchal Profess Univ Bhopal, Dept Comp Sci & Engn, Bhopal, MP, India
[2] St Vincent Pallotti Coll Engn & Technol, Dept Informat Technol, Nagpur, Maharashtra, India
[3] Oriental Coll Technol, Dept Comp Sci & Engn, Bhopal, MP, India
[4] Madhyanchal Profess Univ Bhopal, Dept Elect & Commun, Bhopal, MP, India
关键词
Deep neural network; Intrusion detection; Blockchain; Cyber-physical system; Security; PRIVACY; AUTHENTICATION; IDENTITY;
D O I
10.52783/jes.696
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rapid development of physical device-based data collection in emerging technology needs smart, secure, and intelligent transmission. Cyber physical systems compete with the requirement of intelligent transmission of data. In cyber physical systems, security is a very challenging task due to the heterogeneous connections of devices in real time. This paper proposes a novel methodology for cyber-attack finding in cyber physical systems. The proposed system employed a DNN-deep neural network for the categorization of normal and attack data. The employed deep neural network design for 4 hidden layers for the detection of anomalies. For the secured transmission, we employed the blockchain process in Ethereum. The process of Ethereum generates blocks of blockchain with headers and transmits data over the cyberworld to the physical world with the alteration of data. For the authentication of the projected algorithm tested on two real-time datasets, such as NSL-KDD15 and CIDDS_001. The working of proposed algorithm is very promising in compression of existing algorithms of deep learning like RNN-recurrent neural networks, DBN, and DNN.
引用
收藏
页码:105 / 115
页数:11
相关论文
共 39 条
[1]   The Blockchain Technologies in Healthcare: Prospects, Obstacles, and Future Recommendations; Lessons Learned from Digitalization [J].
Abbas, Alhamzah F. ;
Qureshi, Naveed Akhtar ;
Khan, Nohman ;
Chandio, Rabia ;
Ali, Javed .
INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING, 2022, 18 (09) :144-159
[2]  
Ajani Samir, 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), P486, DOI 10.1109/CICN.2013.106
[3]  
Ajani SN, 2023, INT J INTELL SYST, V12, P546
[4]   Blockchain-Based Solutions Supporting Reliable Healthcare for Fog Computing and Internet of Medical Things (IoMT) Integration [J].
Alam, Shadab ;
Shuaib, Mohammed ;
Ahmad, Sadaf ;
Jayakody, Dushantha Nalin K. ;
Muthanna, Ammar ;
Bharany, Salil ;
Elgendy, Ibrahim A. .
SUSTAINABILITY, 2022, 14 (22)
[5]   Enabling Blockchain with IoMT Devices for Healthcare [J].
Almalki, Jameel ;
Al Shehri, Waleed ;
Mehmood, Rashid ;
Alsaif, Khalid ;
Alshahrani, Saeed M. ;
Jannah, Najlaa ;
Khan, Nayyar Ahmed .
INFORMATION, 2022, 13 (10)
[6]   RETRACTED: Analysis of Privacy-Preserving Edge Computing and Internet of Things Models in Healthcare Domain (Retracted Article) [J].
Almusallam, Naif ;
Alabdulatif, Abdulatif ;
Alarfaj, Fawaz .
COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2021, 2021
[7]   Privacy Preservation of User Identity in Contact Tracing for COVID-19-Like Pandemics Using Edge Computing [J].
Alsahli, Mohammed Abdullah ;
Alsanad, Ahmed ;
Hassan, Mohammad Mehedi ;
Gumaei, Abdu .
IEEE ACCESS, 2021, 9 :125065-125079
[8]   Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques [J].
AlZubi, Ahmad Ali ;
Al-Maitah, Mohammed ;
Alarifi, Abdulaziz .
SOFT COMPUTING, 2021, 25 (18) :12319-12332
[9]  
Boutiara A, 2022, ADV THEORY NONLINEA, V6, P14, DOI 10.31197/atnaa.927938
[10]  
Chu K. M., 2022, Fog Computing Solutions for Smart In-Home Remote Healthcare