An Anomaly Detecting Blockchain Strategy for Secure IoT Networks

被引:2
作者
Alsadi, Naseem [1 ]
Hilal, Waleed [1 ]
Surucu, Onur [1 ]
Giuliani, Alessandro [1 ]
Gadsden, Stephen A. [1 ]
Yawney, John [2 ]
Iskander, Stephan [3 ]
机构
[1] McMaster Univ, 1280 Main St W, Hamilton, ON L8S 4L8, Canada
[2] Adastra Corp, 8500 Leslie St 600, Thornhill, ON L3T 7M8, Canada
[3] Univ Guelph, Guelph, ON N1G 2W1, Canada
来源
DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI | 2022年 / 12117卷
关键词
Internet of Things; Blockchain; Cybersecurity;
D O I
10.1117/12.2618301
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Highly distributed connected systems, such as the Internet of Things (IoT), have made their way across numerous fields of application. IoT systems present a method for the connection for various heterogeneous devices across the internet, facilitating the efficient distribution, collection and processing of system-related data. However, while system inter-connectivity has aided communication and augmented the effectiveness of integrated technology, it has also increased system vulnerability. To this end, researchers have proposed various security protocols and frameworks for IoT ecosystems. Yet while many suggested approaches augment system security, centralization remains an area of concern within IoT systems. Therefore, we propose the use of a decentralization scheme for IoT ecosystems based on Blockchain technology. The proposed method is inspired by Helium, a public wireless long-range network powered by blockchain. Each network node is characterized by its device properties, which are comprised of local and network-level features. Communication in the network requires the testimony of other companion nodes, ensuring that anomalous behaviour is not accepted and thereby preventing malicious attacks of various sorts.
引用
收藏
页数:9
相关论文
共 18 条
  • [11] Performance analysis of exponential backoff
    Kwak, BJ
    Song, NO
    Miller, LE
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (02) : 343 - 355
  • [12] Identifying stealth malware using CPU power consumption and learning algorithms
    Luckett, Patrick
    McDonald, Todd
    Glisson, William B.
    Benton, Ryan
    Dawson, Joel
    Doyle, Blair A.
    [J]. JOURNAL OF COMPUTER SECURITY, 2018, 26 (05) : 589 - 613
  • [13] Matsumoto M., 1998, ACM Transactions on Modeling and Computer Simulation, V8, P3, DOI 10.1145/272991.272995
  • [14] A Friend or a Foe? Detecting Malware using Memory and CPU Features
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 73 - 84
  • [15] Santha M., 1984, 25th Annual Symposium on Foundations of Computer Science (Cat. No. 84CH2085-9), P434, DOI 10.1109/SFCS.1984.715945
  • [16] Machine Learning Framework to Analyze IoT Malware Using ELF and Opcode Features
    Tien, Chin-Wei
    Chen, Shang-Wen
    Ban, Tao
    Kuo, Sy-Yen
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (01):
  • [17] Research on the Security Criteria of Hash Functions in the Blockchain
    Wang, Maoning
    Duan, Meijiao
    Zhu, Jianming
    [J]. PROCEEDINGS OF THE 2ND ACM WORKSHOP ON BLOCKCHAINS, CRYPTOCURRENCIES, AND CONTRACTS (BCC'18), 2018, : 47 - 55
  • [18] Where Is Current Research on Blockchain Technology?-A Systematic Review
    Yli-Huumo, Jesse
    Ko, Deokyoon
    Choi, Sujin
    Park, Sooyong
    Smolander, Kari
    [J]. PLOS ONE, 2016, 11 (10):