Skip to main content
Log in

IoT-based blockchain intrusion detection using optimized recurrent neural network

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collecting and analyzing data or information by identifying the behavior of the user or predicting the attacks by the automatic response. So, in this paper, the Blockchain-based African Buffalo (BbAB) scheme with Recurrent Neural Network (RNN) model is proposed for detecting the intrusion by enhancing security. Furthermore, normal and malware user datasets are collected and trained in the system and the dataset is encrypted using Identity Based Encryption (IBE). The encrypted data are securely stored in the blockchain in the cloud. Hereafter, Recurrent Neural Network (RNN) was employed to detect the intrusion in a cloud environment. African buffalo optimization was used in the RNN prediction phase for continuous monitoring of intrusion. Finally, the performance results of the developed technique are compared with other conventional models in terms of accuracy, precision, recall, F1-score, and detection rate. The outperformance of the designed model attains better accuracy of 99.87% and high recall of 99.92%.it shows the efficiency of the designed model to protect data and security in cloud computing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

https://www.kaggle.com/datasets/piyushrumao/malware-executable-detection?select=uci_malware_detection.csv

References

  1. Perwej Y et al (2019) The internet of things (IoT) and its application domains. Int J Comput Appl 182(49):36–49

    Google Scholar 

  2. Rath M, Pattanayak B (2018) Technological improvement in modern health care applications using Internet of Things (IoT) and proposal of novel health care approach. International Journal of Human Rights in Healthcare

  3. Khoa TA et al (2020) Designing efficient smart home management with IoT smart lighting: a case study. Wireless Communications and Mobile Computing 2020

  4. Al Makdi K, Sheldon FT, Hussein AA (2020) Trusted Security Model for IDS Using Deep Learning. 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS). IEEE

  5. Anthi E et al (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6(5):9042–9053

    Article  Google Scholar 

  6. Nathiya T, Suseendran G (2019) An effective hybrid intrusion detection system for use in security monitoring in the virtual network layer of cloud computing technology. Data management, analytics and innovation. Springer, Singapore, pp. 483-497

  7. Brown IL (2018) An appropriate technology system for emergent beekeepers: Field testing and development towards implementation. Diss. University of Johannesburg (South Africa)

  8. Sharafaldin I et al (2019) Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. 2019 International Carnahan Conference on Security Technology (ICCST). IEEE

  9. Jayasinghe U et al (2019) TrustChain: A privacy preserving blockchain with edge computing." Wireless Communications and Mobile Computing 2019

  10. Borangiu T et al (2019) Digital transformation of manufacturing through cloud services and resource virtualization. Comput Ind 108:150–162

    Article  Google Scholar 

  11. Alashhab ZR et al (2021) "Impact of coronavirus pandemic crisis on technologies and cloud computing applications." Journal of Electronic. Sci Technol 19(1):100059

    Google Scholar 

  12. Nguyen DC et al (2021) Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal

  13. Zhang K, Jacobsen H-A (2018) Towards Dependable, Scalable, and Pervasive Distributed Ledgers with Blockchains (Technical Report)

  14. Velmurugadass P et al (2021) Enhancing Blockchain security in cloud computing with IoT environment using ECIES and cryptography hash algorithm. Materials Today: Proc 37:2653–2659

    Google Scholar 

  15. Datta P et al (2020) A secured smart national identity card management design using blockchain. 2020 2nd international conference on advanced information and communication technology (ICAICT). IEEE

  16. Kumar R, Bhalaji N (2021) Blockchain based chameleon hashing technique for privacy preservation in E-governance system. Wirel Pers Commun 117(2):987–1006

    Article  Google Scholar 

  17. Kerr M, Han F, van Schyndel R (2018) A blockchain implementation for the cataloguing of cctv video evidence. 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE

  18. Das S, Namasudra S (2022) A Novel Hybrid Encryption Method to Secure Healthcare Data in IoT-enabled Healthcare Infrastructure. Comput Electr Eng 101:107991

    Article  Google Scholar 

  19. Arif YM et al (2020) Blockchain-based data sharing for decentralized tourism destinations recommendation system. Int J Intel Eng Syst 13(6):472–486

    Google Scholar 

  20. Firdaus M, Rhee K-H (2021) On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Appl Sci 11(1):414

    Article  CAS  Google Scholar 

  21. Lee JY (2019) A decentralized token economy: How blockchain and cryptocurrency can revolutionize business. Bus Horiz 62(6):773–784

    Article  Google Scholar 

  22. Albanese G et al (2020) "Dynamic consent management for clinical trials via private blockchain technology." Journal of Ambient Intelligence and Humanized. Computing 11(11):4909–4926

    Google Scholar 

  23. Swetha MS et al (2020) Blockchain enabled secure healthcare Systems. 2020 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT). IEEE

  24. Khraisat A et al (2019) A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks. Electronics 8(11):1210

    Article  Google Scholar 

  25. Liang C et al (2020) Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 9(7):1120

    Article  Google Scholar 

  26. Alkadi O et al (2020) A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J 8(12):9463–9472

    Article  Google Scholar 

  27. Thilagam T, Aruna R (2021) Intrusion detection for network based cloud computing by custom RC-NN and optimization. ICT Express 7(4):512–520

    Article  Google Scholar 

  28. Derhab A et al (2020) Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering.Wireless Communications and Mobile Computing 2020.

  29. HaddadPajouh H et al (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88–96

    Article  Google Scholar 

  30. Mansour RF (2022) Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep 12(1):12937

    Article  ADS  CAS  PubMed  PubMed Central  Google Scholar 

  31. Belhadi A et al (2023) Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. Clust Comput 26(2):1147–1158

    Article  Google Scholar 

Download references

Code availability

Not applicable

Funding

Not applicable

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. Saravanan.

Ethics declarations

Human and Animal Rights

This article does not contain any studies with human or animal subjects performed by any of the authors.

Informed Consent

Informed consent does not apply as this was a retrospective review with no identifying patient information.

Consent to participate

Not applicable

Consent for publication

Not applicable

Conflicts of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saravanan, V., Madiajagan, M., Rafee, S.M. et al. IoT-based blockchain intrusion detection using optimized recurrent neural network. Multimed Tools Appl 83, 31505–31526 (2024). https://doi.org/10.1007/s11042-023-16662-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16662-6

Keywords

Navigation