Next Article in Journal
Recent Advanced Applications of Virtual Industrial Informatics and Robotics
Previous Article in Journal
Research on a High-Performance Rock Image Classification Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

AIBPSF-IoMT: Artificial Intelligence and Blockchain-Based Predictive Security Framework for IoMT Technologies

by
Bandar M. Alshammari
1,2
1
Computer and Information Sciences College, Jouf University, Sakaka 72388, Saudi Arabia
2
TCC Research and Development Labs, Technology Control Company, Riyadh 11434, Saudi Arabia
Electronics 2023, 12(23), 4806; https://doi.org/10.3390/electronics12234806
Submission received: 22 October 2023 / Revised: 18 November 2023 / Accepted: 22 November 2023 / Published: 28 November 2023
(This article belongs to the Section Artificial Intelligence)

Abstract

:
The latest advancements in artificial intelligence (AI) technologies, including machine and deep learning models, in prediction, recommending, and automating processes have greatly impacted IoT devices in general, and protect them from cyberattacks in particular. Blockchain also has features that assist in creating more secure IoT devices due to its abilities of traceability, acceptability, and trust. This paper studies the current advancements in the IoT and blockchain, their architectures, and their effect on security. The paper proposes a novel framework that takes into consideration the advantages and benefits of machine/deep learning models and blockchain in order to provide a solution that makes IoT devices more secure. This framework is based on the IoT four-layer architecture, and it aims to enhance the way IoT devices detect and recognise cyberattacks using blockchain and machine/deep learning algorithms. Machine and deep learning algorithms are responsible for detecting security attacks in the IoT, based on their patterns. The blockchain platform is responsible for verifying whether a specific request is secure, and it also uses cryptography to sign all new requests in order to recognise them in future requests. The MQTTset dataset, which is contains data associated with intrusion detection cases, has been used to implement a case study that aims to prove the validity of this framework. Various machine and deep learning algorithms have been used in this case study which have all achieved high results with regard to precision, recall, accuracy, and F1 performance measurements. Such results have proven the validity and reliability of the proposed framework to detect and predict new attacks before their requests are processed within a particular IoT system.

1. Introduction

The capabilities in the fields of IoT, blockchain, and AI technologies represent a great opportunity in overcoming many of the security issues in many other fields [1]. Recent studies expect that more than 20 billion IoT devices are going to be connected to the internet by 2022 [2]. It is expected that the market of the IoT industry will be around USD 58 billion by 2025, seeing an increase of 34% from 2020 [3]. In another study, the number of IoT devices is expected to reach more than 76 billion by 2026 [4].
IoT devices can face several challenges related to security, privacy, cost, service insufficiency, defective architecture, and data manipulation [5]. There are also other common challenges faced by IoT devices related to standardisation, connectivity, and integration [6]. In fact, IoT can be considered as the technology that might be the risk of being attacked most nowadays [7]. IoT devices are considered to be weak against cyberattacks due to their limitations of storage, computation, and network capacity [8]. Several works in the literature have aimed to propose solutions to these challenges using blockchain technologies. For example, the works of Novo [9] and Javaid et al. [10] provide solutions that address the privacy of IoT using blockchain technologies. More works that address the challenges of IoT are the solutions by Yu et al. [11] and Javaid et al. [12], who have provided solutions for the data manipulation issue.
Blockchain was first introduced in 2008 as an application of bitcoin by Nakamoto [13]. Blockchain’s main objective is to be a trusted distributed ledger; its implementation is mostly based on cryptography [14]. Blockchain can be described as a sequence of blocks, in which each block records a list of transactions that cannot be tampered with [15]. Blockchain has received much attention within the last few years, and is becoming the focus of multiple industries. It has gained most of its popularity for its application in the financial services [16]. However, it has been recently used in many other fields such as healthcare [17,18], IoT [19,20], and others.
Integrating blockchains within IoT is called an ‘IoT blockchain’, defined as a blockchain system that is constructed to empower IoT applications [21]. The great benefit of such integration is creating an automated secure transaction of data using a decentralised approach [7]. There are several attempts being made to develop applications that are mature and combine the advantages of both technologies, such as the work of Bahga et al. [22] and Huh et al. [23]. Moreover, there were even some early attempts that took into consideration how to provide secure systems using IoT blockchains, such as the work of Sharma et al. [24]. However, it has been identified that many of these applications require more advancements in order to fully leverage the IoT blockchain [21].
The use of IoT technologies have lately raised a number of security issues and concerns. These are a result of several features that are associated with the structure of IoT technologies. The most common challenges are caused as a result of the heterogeneity of IoT devices, as they have to interact with many objects and need to adapt to various types of security requirements and protocols [25]. Additionally, IoT devices, in many cases, operates in complex environments with insufficient computational power, which could cause many challenges, including those related to security [26].
It is without any doubt that the integration of IoT devices with blockchain can significantly impact their advancements, such as using the greatest benefits of blockchain as a technology that is a resilient and distributed P2P. Such an integration in this case can lead to more efficient processes that are verifiable, less complex, and save cost and time [27]. It can also greatly benefit the security of any system, including IoT systems, and such benefits include enhancing data security and improving trustworthiness [28].
Unfortunately, most existing AI systems that aim to detect cyberattacks use fixed databases which have knowledge of previous attacks in order to recognise new ones [28]. Therefore, it is necessary to have intelligent systems that can detect and predict new attacks before their requests are processed within a particular IoT system, and this is the problem that this paper addresses. This paper proposes a novel framework that takes into consideration the key features and benefits of AI and blockchain technologies in order to enhance the security of IoT systems. This framework aims to provide IoT systems with an automated methodology that can help them detect existing cyberattacks and learn from them to predict new ones.
The remainder of this paper is organised as follows. Section 2 provides an understanding of the background of the IoT, its architecture, and how it can improve security. Section 3 gives an explanation of the blockchain technology, including its importance, structure, and impact on data security. Section 4 illustrates the proposed framework, its different components, and how it is integrated within a specific IoT architecture. Section 5 and Section 6 show how to apply this framework on a case study and its results, to prove its validity and reliability. Section 7 summarises the outcomes of this paper and proposes future extensions of this work.

2. Internet of Things (IoT) in Brief

Recently, the IoT has gained more attention and become popular among academics and in industry generally. This has been caused by a number of reasons, mainly associated with advancements that have occurred in wireless sensor networks (WSNs) in previous years [29]. This section will briefly discuss IoT architectures, security principles related to the IoT, and how AI can advance the security of the IoT.

2.1. IoT Architecture

The IoT can be defined as several objects (e.g., RFID, sensors, and mobile phones) that interact with each other to accomplish specific objectives [30]. A toaster that was capable of being turned on and off remotely can be described as the first IoT device. It was connected to the internet through a computer equipped with a TCP/IP network and was created by John Romkey in 1990 [31].
In the literature, there are several proposals for designing an IoT architecture, depending on the scope and objective of that IoT. The study of Burhan et al. [32] illustrated that there are three layers representing an IoT architecture: the perception layer, network layer, and application layer. Due to the three-layer architecture limitation, a four-layer architecture was proposed, containing an additional support layer between the perception and network layers [33]. Another proposal that uses the four-layer architecture for IoT was defined by ITU-T, and these layers consist of application, support, network, and devices [34]. The other proposal has shown that there could be some improvements to the IoT architecture by defining a five-layer architecture. The main improvement consists of adding a layer to the three-layer architecture that handles the entire functioning and models of the IoT systems called the business layer, while the other is called the process layer, made to handle the storage and processing of data [35]. A summary of these different types of IoT architectures is illustrated in Figure 1.
As a result of the changing requirements of IoT services, there exist several approaches of designing architectures depending on the scope of the project being addressed [36]. For example, many of these architectures have various types of software and hardware that make it more difficult to interact with installed IoT [37]. This has caused a number of challenges and issues with regard to deploying IoT in any project, and hence there is a great need for developing a standardised platform for IoT [38].

2.2. IoT Security Principles

It has been stated that there are a number of basic security principles which any IoT system needs to follow, such as confidentiality, integrity, privacy, availability, and authenticity [39]. However, these principles face a number of security challenges such as mobility, heterogeneity, scalability, computation complexity, and communication complexity [40]. There are several works that aim to overcome these security challenges and achieve IoT security. For example, the works of Oualha et al. [41], Guo et al. [42], and Touati et al. [43] define techniques that address the stated security issues of the IoT for preserving the confidentiality of the security principles of the IoT.
Privacy is another important IoT security principle, which faces several security challenges that need to be considered. There exist several works that aim to adhere to the privacy principle and take into consideration the security challenges of IoT, such as Huang et al. [44], Evans et al. [45], Appavoo et al. [46], Alcaide et al. [47], and Gheisari et al. [48]. The IoT security principle of availability has been also addressed in several studies which have suggested solutions to overcome the security challenges associated with it. These include the works of Maleh et al. [49], Kumar et al. [50], Kasinathan et al. [51], and Cusack et al. [52].
Another solution was proposed to address the authentication concerns between the IoT transport and application layers using the RSA algorithm [53]. A public key infrastructure-based framework was developed to consider the security issues caused by operations between clients and services [54,55]. Furthermore, Wu et al. [56] suggested a signature-encryption-based model to consider security requirements for the IoT, such as anonymity and trustworthiness. In this regard, a solution was developed to be a mutual authentication protocol using an elliptic curve cryptography algorithm that aims to preserve the privacy of the IoT [57].
Other classifications of security issues facing IoT devices were defined by Khan et al. [8] who classified them in three levels; low, intermediate, and high. Security issues that are classified as low-level are related to jamming adversaries, insecure initialisation, and sleep deprivation attacks [8]. Cyberattacks such as replay, buffer reservation, and RPL routing are classified as intermediate-level issues [8]. Security issues such as insecurity of interfaces, insecurity of software, and security of middleware are considered to be high-level [8].
Developing a secure framework for IoT systems has been defined in the literature in several works. This includes the work of Chakrabarty and Engels which defined a secure framework for IoT used in smart cities as one consisting of four blocks (i.e., black network, trusted SDN controller, unified registry, and key management system) [58]. Branitskiy et al. [59] addressed the problem of detecting attacks on the IoT using a combined method based on parallel data processing and machine learning. Statistical algorithms based on the CRPS metric have been used in a recent work to detect anomalies in IoT devices in which the detection occurred at the fog layer of the IoT architecture [60].
Research published by Mrabet et al. [61] and Mishra et al. [62] has illustrated the types of attacks that every layer in the IoT architecture might encounter; these are shown in Figure 2. Moreover, there are other types of attacks that are related to each IoT layer. For example, the perception layer is exposed to node capturing attacks [63], eavesdropping and interference attacks [64], and malicious code and false data injection attacks [5]. Cyberattacks through phishing sites [65] and access [66] are mostly directed towards the IoT network layer. With regards to the middleware layer, it has faced significant cyberattacks such as man-in-the-middle, SQL injection, and signature wrapping [5].
It can be seen that these solutions are directed towards specific projects. Then, it is necessary to develop a generic framework that can be applied to various types of IoT projects, regardless of their scope or objectives.

2.3. Impact of Artificial Intelligence on IoT Security

AI technologies such as machine learning algorithms can play a major role in making systems more secure [67]. On the contrary, they can also be used to launch more accurate and successful cyberattacks [68]. A study in this field has been conducted by Ucci et al. [69], in which they defined an approach that aims to detect malware using machine learning techniques. Likewise, a model was proposed to detect botnet cyberattacks in IoT using a hybrid deep learning algorithm [70]. In the same context, multi-layer deep learning algorithms have been used to detect botnet cyberattacks in industrial IoT [71].
Cyberattacks on IoT devices can be categorised into two types: network-based and host-based [72]. Network-based solutions include Al-Haija and Al-Dala’ien’s work, where they developed the ELBA-IoT, a model based on machine learning using decision tree algorithms to detect botnet attacks facing IoT networks [72]. Another work consisting of several supervised machine learning models was developed for the purpose of detecting attacks on the IoT network layer [73]. Host-based attack solutions also exist in the literature including in the works of Özçelik at al. [74], where there are edge-based detection and preventing approaches against DDoS attacks on IoT devices.
Machine learning models have also been used in other works to define more secure solutions for IoT recently. For example, the work of Roldán et al. [75] defined an intelligent solution that integrates the technologies of complex event processing and machine learning in order to detect cyberattacks (e.g., malware, DDoS, and privacy breaches) in real time. The work of Ahmed et al. surveyed the solutions based on machine learning schemes to create more secure IoT with regards to their authentication and authorisation, and provided a taxonomy for them [76]. In fact, there exist many works in the literature that focus on using machine learning algorithms for the security of IoT, and such works are defined in [77,78,79,80,81]. However, selecting the most appropriate solution is still a challenge, and the work of Shafiq et al. [82] has outlined this problem and identified a framework for that purpose.
A more detailed classification of such works is to divide them into categories with relation to the type of the machine learning model used in them (i.e., supervised, unsupervised, and reinforcement). Supervised machine learning solutions aim to work as a detection technique for network intrusion and spoofing attacks in IoT devices using SVM and KNN algorithms and are shown in [83,84,85]. Examples of unsupervised machine learning solutions that are used to detect cyberattacks on IoT devices is shown in Tan et al. [86], who use the analysis of multivariate correlation to detect DoS attacks. Reinforcement learning solutions have also been defined in the literature in order to obtain more secure IoT devices, such as in the studies of [87,88].
Furthermore, deep learning algorithms have also been widely used in creating models that make IoT devices more secure towards adversaries and cyberattacks. For example, there are several studies that define models for detecting anomaly cyberattacks on IoT [89,90,91,92]. Such developments are based on supervised deep learning techniques such as LSMT, RNN, and GNN [93]. Furthermore, there also exist many studies that provide anomaly intrusion detection models using other deep learning techniques (e.g., CNN, DBN, and DML), including in the works of [94,95,96,97,98].

3. Blockchain Background and Security-Related Research

Blockchain has recently gained popularity, and more specifically in applications developed to overcome the COVID-19 pandemic [99]. A popular use in this regard is the development of trusted solutions that track movements of infected people with COVID-19 in order to mitigate the pandemic [100]. Most applications developed for the purpose of mitigating COVID-19 are system-centric, technologies including IoT and blockchains, that aim to prevent people from being infected with COVID-19 [101]. In a review study conducted by Tanwar et al. [102], they classified the use of blockchains into five major categories (i.e., detection, monitoring, prediction, response, and prevention). This section will give an overview of the blockchain technology in more details, its structure, and how it can enhance the security of IoT.

3.1. Blockchain Structure

Blockchain is a technology that is based on a distributed ledger and aims to record transactions in a mechanism that is consensual and secured [103]. It is a technology that aims to reduce cost and provide more effective and trustworthy transactions between different parties without the need for a centralised authority to govern these transactions [28]. The use cases of blockchain are not only related to cryptocurrencies but in fact cover many other sectors. Blockchain use cases can be categorised into different categories, and one study classifies them into five categories. These are related to data storage management, trading of goods and data, identity management, rating systems, and others [104].
It has been stated that the most important characteristics of blockchain consist of information storage, transaction execution, function performance, and generating trust [105]. There are specific security properties that must be present in blockchain applications consisting of tamper-resistance, resistance to DDoS and double-spending attacks, and pseudonymity [105].
Blockchain technologies can be classified into three categories, public, consortium, and private, and this classification depends on their accessibility, construction, and verification [105]. The basic structure of most blockchain applications consists of six layers (i.e., application, contract, incentive, consensus, network, and data) [105], as shown in Figure 3. The structure of each block in the blockchain is divided into four parts comprising the main data, the hash of the previous and current block, the time span of generating the block, and other information such as the block signature [106].
This structure gives distributed entities the ability to interact in a distributed, secure, scalable P2P network [107]. In order to put in place reliable security properties for blockchain, Zhang et al. [105] suggested seven security requirements for online transactions. These are consistency, integrity, availability, prevention, confidentiality, anonymity, and unlinkability [105].

3.2. Security of Blockchains

Blockchain carries a number of risks associated with its usage including vulnerabilities exposure, private key security, criminal activity, and transaction privacy leakage [108]. With regards to cybersecurity, blockchain can be seen as a promising approach for handling many security-related issues. For example, Meng et al. [109] suggested implementing a collaborative intrusion detection system based on a blockchain environment. Blockchain is the technology behind promoting bitcoin as a cryptocurrency, but this has caused the blockchain technology to face several attacks including double-spending and mining pool [110]. Another use of applying blockchain technology is in developing anomaly detection systems for various types of projects including electrical vehicle and bitcoin transactions, as mentioned by Signorini et al. [111], Jin et al. [112], and Morishima [113].
With regards to the importance of blockchain on the security of systems, there are several works that have recently investigated this problem. The work of Medhane et al. [114] proposed a distributed security framework based on blockchain using software-defined networking on the edge cloud. The aim is to detect the security attacks at the cloud layer, and as a result the IoT edge layer will have fewer attacks [114]. Moreover, Rathore et al. [115] proposed similar work, relying on blockchain to deliver a security framework that is decentralised and uses mobile edge computing. This framework is defined to detect security attacks based on SDN at the IoT network layer [115].

3.3. Blockchain and IoT Integration from a Security Perspective

In a survey, Panarello et al. [116] categorised the types of studies that consider the integration of blockchain with IoT into five types, based on the security principle addressed. These addressed security principles are as follows: confidentiality, authentication, integrity, availability, and non-repudiation. However, there are some challenges often facing these solutions, mostly related to privacy, computation and mining nodes, time consumption, communication overhead, and scalability [117].
The importance of integrating IoT with blockchain technologies has been studied recently in several works, and there exist several proposals in this regard [118]. For example, the work of Alphand et al. [119] defined an E2E solution that uses blockchain technologies in order to provide a secure access of IoT. FairAccess is another decentralised pseudonymous framework that depends on blockchain technologies to provide a secure access control manager for IoT [120]. Similarly, ControlChain is a blockchain-based access control architecture which was proposed to provide secure interactions with IoT devices [121].
For a similar purpose, Novo et al. [122] proposed a distributed solution to manage IoT using blockchain technologies. Mishra et al. [123] defined another blockchain-based model for IoT to provide decentralised authorisation based on the smart contract concepts. ELIB is a model defined by Mohanty et al. [124] to integrate blockchain technologies with IoT for smart homes. The model aims to establish a secure transmission of data between IoT entities in smart homes and monitor all requests between them. There are also other solutions in the literature that integrate blockchain with IoT for the purpose of having more secure entities, such as the Spacechain architecture [125], G-PBFT protocol [126], BlockMedCare healthcare system [127], and LSB system [128].
A recent advancement in regards to combining AI and blockchain is the concept of decentralised AI (DAI) [129]. DAI is mainly about performing data analytics and making decisions based on a trusted and secure data that is shared on the blockchain [129,130]. One work proposed BlockDeepNet, which is a secure framework that is based on blockchain and deep learning [131]. This work aims to protect IoT devices from data poisoning cyberattacks at the device level [131]. Moreover, it is a solution that relies on blockchain and deep learning algorithms to detect intrusions on IoT used in transportation systems [132].
It can be seen that these solutions are not capable of detecting and predicting new attacks before their requests are processed within a particular IoT system. An exception in this field is the work of Alsemmeari et al. [133], which defined a resilient framework using TNN and blockchain to make IoMT more secure. However, this paper proposes a different novel framework that takes into consideration the key features and benefits of AI and blockchain technologies in order to enhance the security of IoT systems by providing IoMT systems with an automated methodology that can help them detect existing cyberattacks and learn from them to predict new ones.

4. Discussion of the Proposed Framework: AIBPSF-IoMT

It is understood that as long as new devices are connected to the internet, new unknown cyberattacks will occur over time [118]. Therefore, it is important to have a secure protocol that is based on machine learning and blockchain technologies to identify new attacks on IoT [134]. This section addresses this challenge and shows a framework that integrates both AI and blockchain technologies to IoT architectures in order to make them more secure. In addition, it also shows a complete flowchart of the modified architecture and how to interact with the different types of layers of the IoT architecture. It finally illustrates how to implement the modified architecture on a real case study using specific AI algorithms applied on a dataset of intrusion detection cases.

4.1. AI Blockchain-Based Secure IoT Architecture Framework

AIBPSF-IoMT is a secure framework that is based on the IoT four-layer architecture. It aims to enhance the way that IoT devices detect cyberattacks using machine/deep learning algorithms and blockchains. This framework is unique and takes into consideration all the challenges and weaknesses of securing IoT objects. The framework as shown in Figure 4 consists of two components: the first one is the typical IoT architecture with all of its four layers and objects. The second component is the machine/deep learning blockchain-based predictive agent.

4.2. AI Blockchain Predictive Security Agent

This section demonstrates how the agent works in collaboration with IoT devices (Figure 5 shows this agent’s flowchart). The agent consists of a number of components that work in collaboration with each other in order to provide secure communications with IoT devices. The agent starts working as soon as the IoT device receives a request from an outside device. The main goal of this agent is to check whether or not all outside requests are legitimate and will not cause any harm to the platform in which the IoT device is functioning. The agent consists of three main components (i.e., blockchain platform, data source, and AI processor). Moreover, the agent should perform a number of operations to ensure a secure flow of data within the IoT device. More details about these three components are shown below.

4.2.1. Blockchain Platform

This can be considered as the first component in the agent. The basic role of the blockchain platform is to ensure that all transactions and requests are cryptographically signed. This platform’s main goal is to verify all requests made from outside the IoT architecture. Once a request is made by an outsider to the IoT device, the device will start engaging with the blockchain platform to check whether or not the request is altered or not. Then, it will return a signed message that contains information about the requester who made the initial request to the IoT device. Such information is passed towards the second step in the platform, containing details on whether the request can be verified.
The second operation performed by the blockchain platform is to sign all requests which have been classified as secure using a sequence of blocks. This is considered to be the last operation of the agent, and it is only performed for secure transactions. Once a return message is triggered by the platform, indicating that the request is genuine and secure, the blockchain platform signs it cryptographically in order to further secure it in this regard.

4.2.2. Data Source (DS)

The second operation performed by the agent is to check with its data source (DS) if the pattern of the coming request is recognised. It will receive a responding message containing information consisting of whether the incoming pattern is recognised or not. In the case that it recognises the incoming request, it will give details about its level of security. However, if it does not recognise the incoming request, it will notify the agent as such and about all patterns similar to the incoming request. Then, it will be necessary to process the request using the AI processor.
DS is also responsible for providing the agent with information regarding the security level of the incoming requests. Based on such information, the agent can decide whether to proceed to the next level in case the AI processor describes it as secure, or to decline the request if the AI processor describes it otherwise. The AI processor is also responsible for updating the DS with its decision regarding this new request.
The DS consists of several entities that aim to give reliable results regarding the security of requests to the IoT devices. The first entity is responsible for saving all the machine learning algorithms that have been found to be effective in predicting cyberattacks on IoT devices. The second is responsible for having the details of all cyberattacks and their patterns which have been found in the past that target IoT devices. The third component is responsible for handling all the requests from the platform and matching them with the patterns stored in the DS.

4.2.3. Artificial Intelligence (AI) Processor

The third component in the security predictive agent is the AI processor, which has a number of tasks to perform in order to minimise the number of requests made from adversaries to IoT devices. This processor is responsible for analysing all requests that are not recognised by the DS. This analysis is performed using a number of machine learning algorithms that compare patterns of any request with previous requests in order to identify whether it is secure or not. Once this analysis is complete, then it will perform two additional tasks. One is to update the DS with all the details of this request, including its source and security level. This will ensure that such requests will be saved in the DS and can be recognised much faster in the future. The second task is to return the security level of the request to the agent in order to perform its final operations.

4.3. Cyberattacks on IoT and Their AI Detection Algorithms

As shown previously, AI methods such as ML and DL algorithms have been used in different works to predict and mitigate cyberattacks on IoT devices. This section summarises existing cyberattacks according to their attack types, the IoT architecture layer, and the AI method used to detect them. Figure 6 shows this analysis, which has been generated from different resources, including the works of Tahsien et al. [135], Abdullahi et al. [136], Thakkar et al. [137], Aljuhani [138], Aldhaheri et al. [139], and Kuzlu et al. [140].
Although most AI techniques have shown promising results with regards to detecting and mitigating cyberattacks against IoT, they still have some limitations. These limitations include the accuracy rate of some of these techniques, computation power, training time, and their complexity [136]. However, Figure 6 can be described as the first step towards having a data source for the framework defined in this section. The DS of the AI agent needs to contain information that defines the suspected type of attack and its most promising AI algorithm to help detect it. The most important thing here is not to add any detection method unless it has been tested and proven to be accurate.

5. IoT Medical Case Study

This section illustrates how to validate the framework defined in this work (AIBPSF-IoMT) by implementing the part which relates to AI detection methods on recognised and unrecognised patterns to a real case study (the other part of the framework is related to the blockchain platform which can be designed as a public blockchain scheme in this paper since its validity has been proven in many cases [133]). This case study is based on a dataset called MQTTset, and below is a detailed illustration of this experiment.

5.1. Dataset Used in Context

The dataset used in this case study is called MQTTset, which has been developed by Vaccari et al. [141]. MQTTset is based on the protocol of MQTT that is commonly used in IoT networks. MQTTset has been proven to be a reliable dataset in training machine learning models for providing a detection approach for cyberattacks on IoT devices.
This dataset has been developed using the IoT-Flock tool that is capable of analysing IoT network traffic and implementing various types of cyber threats against CoAP and MQTT protocols [142]. The data in the MQTTset has been collected from several sensors designed to give measurements of data related to the physical environment and patient-monitoring sensors.

5.2. Pre-Processing Features

MQTTset has three files, and each of these files has information related to IoT network flows collected from a specific ICU. Each of these files has 50 fields, with information that is related to sensing IoT. The MQTTset environment and patient-monitoring files are considered a normal behaviour of data flow from and to the IoT. For the purpose of this case study, these files have been modified by inserting a new label to show whether the data in every record is either recognised as a non-attack record by the system or not. Such records that are considered as recognised are labelled with 1 and those which are not recognised are labelled with 0. MQTTset attack file is the third file of this dataset, and is the one which represents attacks that were generated from different sources. For the purpose of validating this framework (AIBPSF-IoMT), records in this file have been classified into two categories: one is labelled with 3, representing data previously not recognised, and others are labelled with 4, representing attacks previously recognised.
Two different case studies have been used to verify the validity of the framework developed in this paper. One is to label records with labels of either recognised or not, that are associated with a specific attribute in the files. In this case, records which are generated from specific IP sources are labelled with either recognised or not. This is of course applied to the three files (i.e., records that are considered to be attacks or not). The other case is to label records in the three files with either recognised or not without relating them to specific features. The main reason is to identify whether the model will be capable of giving better results for those attacks which have patterns or features that have been recognised previously.

5.3. Selection Features

The feature selection step is one of the most important steps in developing machine or deep learning models. Feature selection is the step which identifies those features which may lead to better predictions, and hence identifying those ones which can cause the opposite. This step has to be performed using a strategy that aims to reduce overfitting, employ less training time, and be less exposed to test failures. In this experiment, the logistic regression technique has been used to extract features that are relevant to the dataset used in this case. Moreover, a cross-validation technique called stratified KFold, using 10-folds, has been used to validate the model against overfitting.

5.4. ML and DL Algorithm Selection

There are distinct types of ML and DL algorithms that have proven to be applicable for classifying data with multiclass classification, similar to the case being investigated in this case. As mentioned previously, this experiment is based on inserting a new label into the dataset being studied, which is considered a multiclass classification label. Therefore, it is important to choose ML and DL algorithms that have shown to give higher reliability in predicting results for this model.

5.4.1. Machine Learning Algorithms

In this experiment, several machine learning algorithms have been chosen to test their ability to validate the model developed here. The naive Bayes algorithm is one of the ML algorithms that can predict models and give reliable results. A special type of naive Bayes called categorical naive Bayes has been chosen for this experiment. It is one of the most suitable classifiers for models where the features are categorically distributed.
The other ML chosen for this experiment is the k-nearest neighbours, which is also a reliable classifier for models with multiclassified features. The k-nearest neighbours algorithm has been implemented with the number of neighbours set to 5 for this experiment. Another ML algorithm used in this experiment is the decision tree, which is a common supervised classifier for multiclass classification models. This algorithm is common due to its ability to predict models from preparing little data, its simplicity, and its lower cost when compared to other algorithms. This algorithm has been used with certain parameters in order to give more predictive results consisting of the criterion set as ‘gini’, random state set to 100, maximum depth of 10, and leaf nodes minimum number of 5.
Another ML algorithm is the random forest, which is a powerful classifier for supervised learning models. Similarly, a number of parameters have been used in the random forest classifier in order to give more reliable results. These parameters consist of setting the tree maximum depth to 10 and setting the random state to 100 (the random state controls the features’ randomness and sampling). Gradient boosting is another classifier used in this study since it is known to be a common algorithm used in classification problems. The parameters used in this study for this classifier consist of setting the performed number of boosting stages to 100, learning rate to 1.0, maximum depth to 1, and the random state to 0.

5.4.2. Deep Learning Algorithms

There exist several deep learning algorithms that are capable of predicting models and giving reliable results for supervised learning models. An example of such an algorithm is a convolutional neural network (CNN). A CNN has been used in this experiment due to its importance in pattern recognition. CNNs are popular for their simple structure, higher adaptability, and requiring a lower number of training parameters. Conv1D is a two-dimensional neural network and is used for the purpose of this experiment; it uses a single spatial convolution layer. The first layer of convolution uses ReLU activation, 64 filters, and 2 kernels. Another algorithm used in this context is the recurrent neural network (RNN). RNN is also popular in contexts similar to this case study due to its ease of use and customisation. A simple RNN is used in this work, using ReLU activation and 64 filters.
The third DL algorithm used in this work is long short-term memory (LSTM). LSTM is another powerful DL algorithm that is famous for its powerful performance. For this work, LSTM uses 64 filters and the return sequence (which defines whether or not to return the last output) is set to true. The final DL algorithm used is the gated recurrent unit (GRU). GRU is another powerful deep learning algorithm, and it uses 64 filters and the return sequence is set to true for this case study. Furthermore, some of these algorithms have been combined together in order to verify whether these would give better predictions than if they were applied on their own. These algorithms include combining CNN and LSTM, CNN and RNN, CNN and GRU, RNN and GRU, RNN and LSTM, and finally RNN and CNN.
All of these different models have been used with 48 dense layers at two stages. The first one is to make a model density of 16 deeply connected layers, applying a 1D maximum pooling operation, and flattening the input. The second stage is to make a model density of 32 deeply connected layers. The models are then compiled with loss of sparse categorical cross-entropy and Adam. Fitting the model is also another important step; we use a batch size of 128 and 10 epochs in this case study.

6. Case Study Results Analysis

This section analyses the results of the case study described above with regard to a number of performance evaluation measurements. This section will first illustrate how the dataset studied in this paper is prepared for the experiment. Then, it outlines how the measurement are used in this analysis and how they are applied in the case studied in this paper. Lastly, an interpretation of the results will be given and discussed in more detail.

6.1. Dataset Preparation

The model described in this paper has been applied to the MQTTset. The MQTTset has 188,694 records distributed on three files. The environment monitoring file contains 31,758 and the patient monitoring file has 76,810 records. The attacks file, which has 80,126 records, is the one which has all the cyberattack records.
For the purposes of this case study, two versions of these three files have been created. Each file is divided into roughly two halves in order to have balanced sets, and hence obtain reliable results. The inserted label for each half either indicates that patterns of the related record are recognised or not. The inserted label in the first version (V1) of these files is randomly distributed (i.e., it is not directly associated with any particular features). The second version (V2) of these files has a label that indicates whether the record has a pattern that is recognised or not in association with a particular feature. In this version, the records with specific IP sources haven been labelled as either recognised or not. All records in these files that are considered to be non-attack records are labelled with ‘0’ if they are not recognised, and with ‘1’ if they are recognised. In addition, those records which are considered to be security attacks are labelled with ‘3’ if they are not recognised and with ‘4’ if they are recognised.

6.2. Performance Evaluation Measurements

In order to analyse the results of the case study described above, four performance evaluation metrics have been chosen to validate the results of this model. These metrics are ones which have been widely used in similar cases, consisting of precision, accuracy, recall, and F1 score.

6.2.1. Precision

The precision metric is represented by the ratio of samples that are identified as true positives to the samples that are identified as either true positives and false positives. This metric can be expressed as shown in Equation (1).
P r e c i s i o n = T P T P + F P

6.2.2. Accuracy

The accuracy metric measures the ratio of the number of samples that are accurately identified to the total number of samples. It can be expressed as shown in Equation (2).
A c c u r a c y = T P + T N T P + F P + T N + F N

6.2.3. Recall

The recall metric is expressed by the ratio of samples that are identified as true positives to the samples that are identified as either true positives and false negatives. This metric can be illustrated as in Equation (3).
R e c a l l = T P T P + F N

6.2.4. F1 Score

The F1 score metric is calculated by measuring the weighted average of the recall and precision metrics. It can be expressed as shown in Equation (4).
F 1 - s c o r e = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l

6.3. Discussion of Results

Table 1 shows the performance evaluation metrics after applying the specific ML algorithms on the dataset as described previously. It can be seen clearly that the model is giving a good prediction with both versions of the dataset. However, it also clearly shows that V2 of the dataset, which has the records labelled with data with an association with specific features (i.e., IP sources), gives better measurements with regards to all of the measurements. Hence, more reliable predictions can be inferred in this regard.
Table 2 shows how the various number of DL algorithms performed when applied to the same dataset, in accordance with the model described here. It can be clearly seen that all of these metrics performed very well when applied to the V2 dataset. This is not the case when applied to the V1 dataset, where although it has similar results, CNN did not give results above 80s. However, CNN tended to perform well either on its own or when combined with other DL algorithms when applied to versions of the dataset that have multiclass classifications labels associated with certain features, as in V2.
Another observation with regards to Table 2 is that algorithms GRU, RNN + GRU, and RNN + LSTM tended to give better results when applied to V1 of the dataset. On the other hand, algorithms LSTM, RNN + GRU, and RNN + CNN gave better results when applied to V2 of the dataset. It can be also identified that RNN + GRU is the algorithm which tends to give better results for the dataset in both versions V1 and V2. Hence, it could be seen as the most reliable algorithm for this context.
To further verify the results of the model described in this paper, a comparison of these results was conducted with another model that considers the same dataset. The benchmark was taken from the work of Hussain et al. [143]. Table 3 shows the results of the comparison, showing the results of ML for V2 of the model described in this paper. Four ML algorithms that are common between the two works are shown. It can be seen that V2 of the model has better results in reference to the RF and DT algorithms but that was not the case with regards to the KNN algorithm. The NB results vary between the two models but in general it performed much better with regards to precision, accuracy, and F1 score.
It is clearly shown that the model defined by this paper can give reliable and accurate results. In addition, it can be indicated that this model can give better predictions when used with DL algorithms than most ML algorithms. Therefore, these results prove the reliability of this model. The other point that these results show is that most of the DL algorithms, especially when combined with others, can give better predictions than ML algorithms for multiclass classification models. It can also be concluded that these ML and DL algorithms can also give good predictions for cyberattacks, as shown in previous studies.

7. Conclusions

IoT is an evolving technology that has lately begun to receive considerable amount of attention. However, this technology is still developing and requires more work to be conducted towards overcoming its inherent challenges. The most prominent characteristics of IoT consist of being heterogeneous and having multiple interconnections which lead to the production of data that are huge and hard to manage. Such characteristics and others have caused a number of security threats that IoT architectures have started to face recently. Therefore, it is essential to put in place a framework that considers such threats from an early stage in order to develop more secure IoT systems.
This paper proposes a novel framework that takes into consideration the advantages and benefits of ML and DL algorithms and blockchain in order to secure IoT devices. It has been shown how this framework works towards all requests made in any layer of the IoT architecture, and this makes this framework unique. There are many cyberattacks that can target different layers of the IoT architecture. However, this framework ensures that many of these cyberattacks can be handled and contained using the AI agent proposed by this framework.
Finally, the paper concludes by providing an experiment in which the proposed framework is applied to a real dataset. The MQTTset dataset has been used in this experiment using a number of relevant ML and DL algorithms to verify the reliability of this model. A number of evaluation performance measurements (i.e., precision, recall, accuracy, and F1) have been used in order to evaluate the model. The results have shown the high reliability and good predictions of this model, especially when cyberattack patterns are known and recognised.
More investigations should be conducted in order to identify which AI models can give more reliable results, as an extension to this work. Furthermore, future work could also aim to identify how to protect each IoT layer from certain cyberattacks, using this framework on different datasets generated from IoMT devices.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available in this article.

Acknowledgments

I would like to thank the anonymous reviewers for their valuable and helpful comments. I also extend my acknowledgement to the Technology Control Company in Saudi Arabia for conducting this research in its R&D labs.

Conflicts of Interest

The author declares no conflict of interest. Author Bandar M. Alshammari was employed by the Technology Control Company.

References

  1. Singh, S.K.; Rathore, S.; Park, J.H. BlockIoTIntelligence: A Blockchain-enabled Intelligent IoT Architecture with Artificial Intelligence. Future Gener. Comput. Syst. 2020, 110, 721–743. [Google Scholar] [CrossRef]
  2. Kandaswamy, R.; Furlonger, D. Blockchain-Based Transformation. 2021. Available online: https://www.gartner.com/en/doc/3869696-blockchain-based-transformation-a-gartner-trend-insight-report (accessed on 20 May 2022).
  3. Gartner Research. Forecast: IT Services for IoT, Worldwide, 2019–2025. Technical Report. 2021. Available online: https://www.gartner.com/en/documents/4004741 (accessed on 20 May 2022).
  4. Statista Research Department. Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025. Resreport, Statista. 2016. Available online: https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (accessed on 20 May 2022).
  5. Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
  6. Karie, N.M.; Sahri, N.M.; Haskell-Dowland, P. IoT Threat Detection Advances, Challenges and Future Directions. In Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), Sydney, NSW, Australia, 21 April 2020; pp. 22–29. [Google Scholar] [CrossRef]
  7. Alfandi, O.; Khanji, S.; Ahmad, L.; Khattak, A. A survey on boosting IoT security and privacy through blockchain. Clust. Comput. 2021, 24, 37–55. [Google Scholar] [CrossRef]
  8. Khan, M.A.; Salah, K. IoT security: Review, blockchain solutions, and open challenges. Future Gener. Comput. Syst. 2018, 82, 395–411. [Google Scholar] [CrossRef]
  9. Novo, O. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT. IEEE Internet Things J. 2018, 5, 1184–1195. [Google Scholar] [CrossRef]
  10. Javaid, U.; Aman, M.N.; Sikdar, B. Blockpro: Blockchain based data provenance and integrity for secure iot environments. In Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, Shenzhen, China, 4 November 2018; pp. 13–18. [Google Scholar] [CrossRef]
  11. Yu, Y.; Li, Y.; Tian, J.; Liu, J. Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things. IEEE Wirel. Commun. 2018, 25, 12–18. [Google Scholar] [CrossRef]
  12. Javaid, U.; Aman, M.N.; Sikdar, B. DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts. In Proceedings of the 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–5. [Google Scholar] [CrossRef]
  13. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 26 November 2023).
  14. Aste, T.; Tasca, P.; Di Matteo, T. Blockchain technologies: The foreseeable impact on society and industry. Computer 2017, 50, 18–28. [Google Scholar] [CrossRef]
  15. Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar] [CrossRef]
  16. Peters, G.; Panayi, E.; Chapelle, A. Trends in Cryptocurrencies and Blockchain Technologies: A Monetary Theory and Regulation Perspective. J. Financ. Perspect. 2015, 3, 3. [Google Scholar]
  17. Mettler, M. Blockchain technology in healthcare: The revolution starts here. In Proceedings of the 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany, 14–16 September 2016; pp. 1–3. [Google Scholar] [CrossRef]
  18. Agbo, C.C.; Mahmoud, Q.H.; Eklund, J.M. Blockchain Technology in Healthcare: A Systematic Review. Healthcare 2019, 7, 56. [Google Scholar] [CrossRef]
  19. Wang, Q.; Zhu, X.; Ni, Y.; Gu, L.; Zhu, H. Blockchain for the IoT and industrial IoT: A review. Internet Things 2020, 10, 100081. [Google Scholar] [CrossRef]
  20. Samaniego, M.; Jamsrandorj, U.; Deters, R. Blockchain as a Service for IoT. In Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Chengdu, China, 15–18 December 2016; pp. 433–436. [Google Scholar] [CrossRef]
  21. Lao, L.; Li, Z.; Hou, S.; Xiao, B.; Guo, S.; Yang, Y. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Comput. Surv. (CSUR) 2020, 53, 1–32. [Google Scholar] [CrossRef]
  22. Bahga, A.; Madisetti, V.K. Blockchain Platform for Industrial Internet of Things. J. Softw. Eng. Appl. 2016, 9, 533–546. [Google Scholar] [CrossRef]
  23. Huh, S.; Cho, S.; Kim, S. Managing IoT devices using blockchain platform. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Republic of Korea, 19–22 February 2017; pp. 464–467. [Google Scholar] [CrossRef]
  24. Sharma, P.K.; Singh, S.; Jeong, Y.S.; Park, J.H. DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks. IEEE Commun. Mag. 2017, 55, 78–85. [Google Scholar] [CrossRef]
  25. Sundmaeker, H.; Guillemin, P.; Friess, P.; Woelfflé, S. Vision and challenges for realising the Internet of Things. Clust. Eur. Res. Proj. Internet Things Eur. Commision 2010, 3, 34–36. [Google Scholar]
  26. Riahi Sfar, A.; Natalizio, E.; Challal, Y.; Chtourou, Z. A roadmap for security challenges in the Internet of Things. Digit. Commun. Netw. 2018, 4, 118–137. [Google Scholar] [CrossRef]
  27. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
  28. Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2019, 7, 10127–10149. [Google Scholar] [CrossRef]
  29. Lewis, F.L. Wireless sensor networks. Smart Environ. Technol. Protoc. Appl. 2004, 11, 46. [Google Scholar]
  30. Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  31. Jesus, E.F.; Chicarino, V.R.; De Albuquerque, C.V.; Rocha, A.A.d.A. A survey of how to use blockchain to secure internet of things and the stalker attack. Secur. Commun. Netw. 2018, 2018, 9675050. [Google Scholar] [CrossRef]
  32. Burhan, M.; Rehman, R.A.; Khan, B.; Kim, B.S. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors 2018, 18, 2796. [Google Scholar] [CrossRef]
  33. Darwish, D. Improved layered architecture for Internet of Things. Int. J. Comput. Acad. Res. (IJCAR) 2015, 4, 214–223. [Google Scholar]
  34. Recommendation Y.4000/Y.2060 (06/12); Y.2060 Overview of Internet of Things; ITU-T: Geneva, Switzerland, 2012; p. 570.
  35. Sethi, P.; Sarangi, S.R. Internet of things: Architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 2017, 9324035. [Google Scholar] [CrossRef]
  36. Krčo, S.; Pokrić, B.; Carrez, F. Designing IoT architecture(s): A European perspective. In Proceedings of the 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, Republic of Korea, 6–8 March 2014; pp. 79–84. [Google Scholar] [CrossRef]
  37. Yelamarthi, K.; Aman, M.S.; Abdelgawad, A. An application-driven modular IoT architecture. Wirel. Commun. Mob. Comput. 2017, 2017, 1350929. [Google Scholar] [CrossRef]
  38. Al-Qaseemi, S.A.; Almulhim, H.A.; Almulhim, M.F.; Chaudhry, S.R. IoT architecture challenges and issues: Lack of standardization. In Proceedings of the 2016 Future Technologies Conference (FTC), San Francisco, CA, USA, 6–7 December 2016; pp. 731–738. [Google Scholar] [CrossRef]
  39. Grammatikis, P.I.R.; Sarigiannidis, P.G.; Moscholios, I.D. Securing the Internet of Things: Challenges, threats and solutions. Internet Things 2019, 5, 41–70. [Google Scholar] [CrossRef]
  40. Kouicem, D.E.; Bouabdallah, A.; Lakhlef, H. Internet of things security: A top-down survey. Comput. Netw. 2018, 141, 199–221. [Google Scholar] [CrossRef]
  41. Oualha, N.; Nguyen, K.T. Lightweight Attribute-Based Encryption for the Internet of Things. In Proceedings of the 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, USA, 1–4 August 2016; pp. 1–6. [Google Scholar] [CrossRef]
  42. Guo, F.; Mu, Y.; Susilo, W.; Wong, D.S.; Varadharajan, V. CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 2014, 9, 763–771. [Google Scholar] [CrossRef]
  43. Touati, L.; Challal, Y.; Bouabdallah, A. C-CP-ABE: Cooperative Ciphertext Policy Attribute-Based Encryption for the Internet of Things. In Proceedings of the 2014 International Conference on Advanced Networking Distributed Systems and Applications, Bejaia, Algeria, 17–19 June 2014; pp. 64–69. [Google Scholar] [CrossRef]
  44. Huang, X.; Fu, R.; Chen, B.; Zhang, T.; Roscoe, A.W. User interactive Internet of things privacy preserved access control. In Proceedings of the 2012 International Conference for Internet Technology and Secured Transactions, London, UK, 10–12 December 2012; pp. 597–602. [Google Scholar]
  45. Evans, D.; Eyers, D.M. Efficient Data Tagging for Managing Privacy in the Internet of Things. In Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Besancon, France, 20–23 November 2012; pp. 244–248. [Google Scholar] [CrossRef]
  46. Appavoo, P.; Chan, M.C.; Bhojan, A.; Chang, E.C. Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. In Proceedings of the 2016 8th International Conference on Communication Systems and Networks (COMSNETS), Bangalore, India, 5–10 January 2016; pp. 1–8. [Google Scholar]
  47. Alcaide, A.; Palomar, E.; Montero-Castillo, J.; Ribagorda, A. Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 2013, 37, 111–123. [Google Scholar] [CrossRef]
  48. Gheisari, M.; Najafabadi, H.E.; Alzubi, J.A.; Gao, J.; Wang, G.; Abbasi, A.A.; Castiglione, A. OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 2021, 123, 1–13. [Google Scholar] [CrossRef]
  49. Maleh, Y.; Ezzati, A.; Belaissaoui, M. Dos attacks analysis and improvement in dtls protocol for internet of things. In Proceedings of the International Conference on Big Data and Advanced Wireless Technologies, Blagoevgrad, Bulgaria, 10–11 November 2016; pp. 1–7. [Google Scholar]
  50. Kumar, P.M.; Gandhi, U.D. Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application. J. Supercomput. 2020, 76, 3963–3983. [Google Scholar] [CrossRef]
  51. Kasinathan, P.; Pastrone, C.; Spirito, M.A.; Vinkovits, M. Denial-of-Service detection in 6LoWPAN based Internet of Things. In Proceedings of the 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Lyon, France, 7–9 October 2013; pp. 600–607. [Google Scholar] [CrossRef]
  52. Cusack, B.; Tian, Z.; Kyaw, A.K. Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT. In Interoperability, Safety and Security in IoT; Springer: Cham, Switzerland, 2016; pp. 127–138. [Google Scholar]
  53. Kothmayr, T.; Schmitt, C.; Hu, W.; Brünig, M.; Carle, G. DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw. 2013, 11, 2710–2723. [Google Scholar] [CrossRef]
  54. Hong, N. A security framework for the internet of things based on public key infrastructure. Adv. Mater. Res. 2013, 671–674, 3223–3226. [Google Scholar] [CrossRef]
  55. Pranata, H.; Athauda, R.; Skinner, G. Securing and governing access in ad-hoc networks of internet of things. In Proceedings of the IASTED International Conference on Engineering and Applied Science, EAS, Colombo, Sri Lanka, 27–29 December 2012; pp. 84–90. [Google Scholar]
  56. Wu, Z.Q.; Zhou, Y.W.; Ma, J.F. A security transmission model for internet of things. Jisuanji Xuebao (Chin. J. Comput.) 2011, 34, 1351–1364. [Google Scholar] [CrossRef]
  57. Pham, C.D.; Dang, T.K. A lightweight authentication protocol for D2D-enabled IoT systems with privacy. Pervasive Mob. Comput. 2021, 74, 101399. [Google Scholar] [CrossRef]
  58. Chakrabarty, S.; Engels, D.W. A secure IoT architecture for Smart Cities. In Proceedings of the 2016 13th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016; pp. 812–813. [Google Scholar] [CrossRef]
  59. Branitskiy, A.; Kotenko, I.; Saenko, I. Applying machine learning and parallel data processing for attack detection in IoT. IEEE Trans. Emerg. Top. Comput. 2021, 9, 1642–1653. [Google Scholar] [CrossRef]
  60. Sharma, D.K.; Dhankhar, T.; Agrawal, G.; Singh, S.K.; Gupta, D.; Nebhen, J.; Razzak, I. Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks. Ad Hoc Netw. 2021, 121, 102603. [Google Scholar] [CrossRef]
  61. Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef] [PubMed]
  62. Mishra, N.; Pandya, S. Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review. IEEE Access 2021, 9, 59353–59377. [Google Scholar] [CrossRef]
  63. K, S.K.; Sahoo, S.; Mahapatra, A.; Swain, A.K.; Mahapatra, K. Security Enhancements to System on Chip Devices for IoT Perception Layer. In Proceedings of the 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), Bhopal, India, 18–20 December 2017; pp. 151–156. [Google Scholar] [CrossRef]
  64. Liao, C.H.; Shuai, H.H.; Wang, L.C. Eavesdropping prevention for heterogeneous Internet of Things systems. In Proceedings of the 2018 15th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 12–15 January 2018; pp. 1–2. [Google Scholar] [CrossRef]
  65. Anti-Phishing Working Group, Inc. Phishing Activity Trends Report. 2005. Available online: http://www.antiphishing.org/APWG_Phishing-Activity_Report_Jul_05.pdf (accessed on 22 May 2023).
  66. Li, C.; Chen, C. A multi-stage control method application in the fight against phishing attacks. In Proceeding of the 26th Computer Security Academic Communication across the Country; 2011; p. 145. [Google Scholar]
  67. Biggio, B.; Roli, F. Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recognit. 2018, 84, 317–331. [Google Scholar] [CrossRef]
  68. Kong, Z.; Xue, J.; Wang, Y.; Huang, L.; Niu, Z.; Li, F. A survey on adversarial attack in the age of artificial intelligence. Wirel. Commun. Mob. Comput. 2021, 2021, 4907754. [Google Scholar] [CrossRef]
  69. Ucci, D.; Aniello, L.; Baldoni, R. Survey of machine learning techniques for malware analysis. Comput. Secur. 2019, 81, 123–147. [Google Scholar] [CrossRef]
  70. Alkahtani, H.; Aldhyani, T.H. Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications. Secur. Commun. Netw. 2021, 2021, 3806459. [Google Scholar] [CrossRef]
  71. Mudassir, M.; Unal, D.; Hammoudeh, M.; Azzedin, F. Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches. Wirel. Commun. Mob. Comput. 2022, 2022, 2845446. [Google Scholar] [CrossRef]
  72. Abu Al-Haija, Q.; Al-Dala’ien, M. ELBA-IoT: An Ensemble Learning Model for Botnet Attack Detection in IoT Networks. J. Sens. Actuator Netw. 2022, 11, 18. [Google Scholar] [CrossRef]
  73. Abu Al-Haija, Q. Top-Down Machine Learning-Based Architecture for Cyberattacks Identification and Classification in IoT Communication Networks. Front. Big Data 2022, 4, 782902. [Google Scholar] [CrossRef] [PubMed]
  74. Özçelik, M.; Chalabianloo, N.; Gür, G. Software-Defined Edge Defense Against IoT-Based DDoS. In Proceedings of the 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, Finland, 21–23 August 2017; pp. 308–313. [Google Scholar] [CrossRef]
  75. Roldán, J.; Boubeta-Puig, J.; Luis Martínez, J.; Ortiz, G. Integrating complex event processing and machine learning: An intelligent architecture for detecting IoT security attacks. Expert Syst. Appl. 2020, 149, 113251. [Google Scholar] [CrossRef]
  76. Istiaque Ahmed, K.; Tahir, M.; Hadi Habaebi, M.; Lun Lau, S.; Ahad, A. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Sensors 2021, 21, 5122. [Google Scholar] [CrossRef]
  77. Bagaa, M.; Taleb, T.; Bernabe, J.B.; Skarmeta, A. A Machine Learning Security Framework for Iot Systems. IEEE Access 2020, 8, 114066–114077. [Google Scholar] [CrossRef]
  78. Shafiq, M.; Tian, Z.; Bashir, A.K.; Du, X.; Guizani, M. CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques. IEEE Internet Things J. 2021, 8, 3242–3254. [Google Scholar] [CrossRef]
  79. Sarker, I.H.; Abushark, Y.B.; Alsolami, F.; Khan, A.I. IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry 2020, 12, 754. [Google Scholar] [CrossRef]
  80. Vishwakarma, R.; Jain, A.K. A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1019–1024. [Google Scholar] [CrossRef]
  81. Kumar, A.; Lim, T.J. EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 289–294. [Google Scholar] [CrossRef]
  82. Shafiq, M.; Tian, Z.; Sun, Y.; Du, X.; Guizani, M. Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Gener. Comput. Syst. 2020, 107, 433–442. [Google Scholar] [CrossRef]
  83. Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, H.P. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. IEEE Commun. Surv. Tutor. 2014, 16, 1996–2018. [Google Scholar] [CrossRef]
  84. Branch, J.; Szymanski, B.; Giannella, C.; Wolff, R.; Kargupta, H. In-Network Outlier Detection in Wireless Sensor Networks. In Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06), Lisboa, Portugal, 4–7 July 2006; p. 51. [Google Scholar] [CrossRef]
  85. Ozay, M.; Esnaola, I.; Yarman Vural, F.T.; Kulkarni, S.R.; Poor, H.V. Machine Learning Methods for Attack Detection in the Smart Grid. IEEE Trans. Neural Netw. Learn. Syst. 2016, 27, 1773–1786. [Google Scholar] [CrossRef] [PubMed]
  86. Tan, Z.; Jamdagni, A.; He, X.; Nanda, P.; Liu, R.P. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 447–456. [Google Scholar] [CrossRef]
  87. Mohammed, T.; Albeshri, A.; Katib, I.; Mehmood, R. UbiPriSEQ—Deep Reinforcement Learning to Manage Privacy, Security, Energy, and QoS in 5G IoT HetNets. Appl. Sci. 2020, 10, 7120. [Google Scholar] [CrossRef]
  88. Miao, Q.; Lin, H.; Wang, X.; Hassan, M.M. Federated deep reinforcement learning based secure data sharing for Internet of Things. Comput. Netw. 2021, 197, 108327. [Google Scholar] [CrossRef]
  89. Shi, W.C.; Sun, H.M. DeepBot: A time-based botnet detection with deep learning. Soft Comput. 2020, 24, 16605–16616. [Google Scholar] [CrossRef]
  90. Li, Y.; Xu, Y.; Liu, Z.; Hou, H.; Zheng, Y.; Xin, Y.; Zhao, Y.; Cui, L. Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 2020, 154, 107450. [Google Scholar] [CrossRef]
  91. Xu, R.; Cheng, Y.; Liu, Z.; Xie, Y.; Yang, Y. Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services. Future Gener. Comput. Syst. 2020, 112, 228–242. [Google Scholar] [CrossRef]
  92. Yin, C.; Zhang, S.; Wang, J.; Xiong, N.N. Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 112–122. [Google Scholar] [CrossRef]
  93. Alsoufi, M.A.; Razak, S.; Siraj, M.M.; Nafea, I.; Ghaleb, F.A.; Saeed, F.; Nasser, M. Anomaly-Based Intrusion Detection Systems in IoT Using Deep Learning: A Systematic Literature Review. Appl. Sci. 2021, 11, 8383. [Google Scholar] [CrossRef]
  94. Diro, A.A.; Chilamkurti, N. Distributed attack detection scheme using deep learning approach for Internet of Things. Future Gener. Comput. Syst. 2018, 82, 761–768. [Google Scholar] [CrossRef]
  95. Munir, M.; Siddiqui, S.A.; Dengel, A.; Ahmed, S. DeepAnT: A Deep Learning Approach for Unsupervised Anomaly Detection in Time Series. IEEE Access 2019, 7, 1991–2005. [Google Scholar] [CrossRef]
  96. Thamilarasu, G.; Chawla, S. Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 2019, 19, 1977. [Google Scholar] [CrossRef]
  97. Mo, R.; Pei, Y.; Venkatarayalu, N.; Nathaniel, P.; Premkumar, A.B.; Sun, S. An Unsupervised TCN-based Outlier Detection for Time Series with Seasonality and Trend. In Proceedings of the 2021 IEEE VTS 17th Asia Pacific Wireless Communications Symposium (APWCS), Osaka, Japan, 30–31 August 2021; pp. 1–5. [Google Scholar] [CrossRef]
  98. Hwang, R.H.; Peng, M.C.; Huang, C.W.; Lin, P.C.; Nguyen, V.L. An Unsupervised Deep Learning Model for Early Network Traffic Anomaly Detection. IEEE Access 2020, 8, 30387–30399. [Google Scholar] [CrossRef]
  99. Bansal, A.; Garg, C.; Padappayil, R.P. Optimizing the implementation of COVID-19 “immunity certificates” using blockchain. J. Med. Syst. 2020, 44, 140. [Google Scholar] [CrossRef]
  100. Khurshid, A. Applying Blockchain Technology to Address the Crisis of Trust During the COVID-19 Pandemic. JMIR Med. Inform. 2020, 8, e20477. [Google Scholar] [CrossRef]
  101. He, W.; Zhang, Z.J.; Li, W. Information technology solutions, challenges, and suggestions for tackling the COVID-19 pandemic. Int. J. Inf. Manag. 2021, 57, 102287. [Google Scholar] [CrossRef]
  102. Tanwar, S.; Bhatia, Q.; Patel, P.; Kumari, A.; Singh, P.K.; Hong, W.C. Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward. IEEE Access 2020, 8, 474–488. [Google Scholar] [CrossRef]
  103. Chong, A.Y.L.; Lim, E.T.; Hua, X.; Zheng, S.; Tan, C.W. Business on chain: A comparative case study of five blockchain-inspired business models. J. Assoc. Inf. Syst. 2019, 20, 9. [Google Scholar] [CrossRef]
  104. Conoscenti, M.; Vetrò, A.; De Martin, J.C. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar] [CrossRef]
  105. Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34. [Google Scholar] [CrossRef]
  106. Lin, I.C.; Liao, T.C. A survey of blockchain security issues and challenges. Int. J. Netw. Secur. 2017, 19, 653–659. [Google Scholar]
  107. Deepa, N.; Pham, Q.V.; Nguyen, D.C.; Bhattacharya, S.; Prabadevi, B.; Gadekallu, T.R.; Maddikunta, P.K.R.; Fang, F.; Pathirana, P.N. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Gener. Comput. Syst. 2022, 131, 209–226. [Google Scholar] [CrossRef]
  108. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020, 107, 841–853. [Google Scholar] [CrossRef]
  109. Meng, W.; Tischhauser, E.W.; Wang, Q.; Wang, Y.; Han, J. When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access 2018, 6, 10179–10188. [Google Scholar] [CrossRef]
  110. Conti, M.; Sandeep Kumar, E.; Lal, C.; Ruj, S. A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutor. 2018, 20, 3416–3452. [Google Scholar] [CrossRef]
  111. Signorini, M.; Pontecorvi, M.; Kanoun, W.; Di Pietro, R. BAD: A Blockchain Anomaly Detection Solution. IEEE Access 2020, 8, 173481–173490. [Google Scholar] [CrossRef]
  112. Jin, R.; Wei, B.; Luo, Y.; Ren, T.; Wu, R. Blockchain-Based Data Collection With Efficient Anomaly Detection for Estimating Battery State-of-Health. IEEE Sensors J. 2021, 21, 13455–13465. [Google Scholar] [CrossRef]
  113. Morishima, S. Scalable anomaly detection in blockchain using graphics processing unit. Comput. Electr. Eng. 2021, 92, 107087. [Google Scholar] [CrossRef]
  114. Medhane, D.V.; Sangaiah, A.K.; Hossain, M.S.; Muhammad, G.; Wang, J. Blockchain-Enabled Distributed Security Framework for Next-Generation IoT: An Edge Cloud and Software-Defined Network-Integrated Approach. IEEE Internet Things J. 2020, 7, 6143–6149. [Google Scholar] [CrossRef]
  115. Rathore, S.; Wook Kwon, B.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
  116. Panarello, A.; Tapas, N.; Merlino, G.; Longo, F.; Puliafito, A. Blockchain and IoT Integration: A Systematic Survey. Sensors 2018, 18, 2575. [Google Scholar] [CrossRef] [PubMed]
  117. Salman, T.; Zolanvari, M.; Erbad, A.; Jain, R.; Samaka, M. Security Services Using Blockchains: A State of the Art Survey. IEEE Commun. Surv. Tutor. 2019, 21, 858–880. [Google Scholar] [CrossRef]
  118. Lee, J.Y.; Lee, J. Current research trends in IoT security: A systematic mapping study. Mob. Inf. Syst. 2021, 2021, 8847099. [Google Scholar] [CrossRef]
  119. Alphand, O.; Amoretti, M.; Claeys, T.; Dall’Asta, S.; Duda, A.; Ferrari, G.; Rousseau, F.; Tourancheau, B.; Veltri, L.; Zanichelli, F. IoTChain: A blockchain security architecture for the Internet of Things. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018; pp. 1–6. [Google Scholar] [CrossRef]
  120. Ouaddah, A.; Abou Elkalam, A.; Ait Ouahman, A. FairAccess: A new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Netw. 2016, 9, 5943–5964. [Google Scholar] [CrossRef]
  121. Pinno, O.J.A.; Gregio, A.R.A.; De Bona, L.C.E. ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT. In Proceedings of the GLOBECOM 2017–2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar] [CrossRef]
  122. Novo, O. Scalable Access Management in IoT Using Blockchain: A Performance Evaluation. IEEE Internet Things J. 2019, 6, 4694–4701. [Google Scholar] [CrossRef]
  123. Mishra, R.K.; Yadav, R.K.; Nath, P. Blockchain-Based Decentralized Authorization Technique for Data Sharing in the Internet of Things. In Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 22–23 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  124. Mohanty, S.N.; Ramya, K.; Rani, S.S.; Gupta, D.; Shankar, K.; Lakshmanaprabu, S.; Khanna, A. An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Gener. Comput. Syst. 2020, 102, 1027–1037. [Google Scholar] [CrossRef]
  125. Du, M.; Wang, K.; Liu, Y.; Qian, K.; Sun, Y.; Xu, W.; Guo, S. Spacechain: A Three-Dimensional Blockchain Architecture for IoT Security. IEEE Wirel. Commun. 2020, 27, 38–45. [Google Scholar] [CrossRef]
  126. Lao, L.; Dai, X.; Xiao, B.; Guo, S. G-PBFT: A Location-based and Scalable Consensus Protocol for IoT-Blockchain Applications. In Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, 18–22 May 2020; pp. 664–673. [Google Scholar] [CrossRef]
  127. Azbeg, K.; Ouchetto, O.; Jai Andaloussi, S. BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security. Egypt. Inform. J. 2022, 23, 329–343. [Google Scholar] [CrossRef]
  128. Dorri, A.; Kanhere, S.S.; Jurdak, R.; Gauravaram, P. LSB: A Lightweight Scalable Blockchain for IoT security and anonymity. J. Parallel Distrib. Comput. 2019, 134, 180–197. [Google Scholar] [CrossRef]
  129. Ai, N. Decentralized AI Blockchain Whitepaper; Nebula AI Team: Montreal, QC, Canada, 2018. [Google Scholar]
  130. Dinh, T.N.; Thai, M.T. AI and Blockchain: A Disruptive Integration. Computer 2018, 51, 48–53. [Google Scholar] [CrossRef]
  131. Rathore, S.; Pan, Y.; Park, J.H. BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network. Sustainability 2019, 11, 3974. [Google Scholar] [CrossRef]
  132. Abdel-Basset, M.; Moustafa, N.; Hawash, H.; Razzak, I.; Sallam, K.M.; Elkomy, O.M. Federated Intrusion Detection in Blockchain-Based Smart Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021, 23, 2523–2537. [Google Scholar] [CrossRef]
  133. Alsemmeari, R.A.; Dahab, M.Y.; Alsulami, A.A.; Alturki, B.; Algarni, S. Resilient Security Framework Using TNN and Blockchain for IoMT. Electronics 2023, 12, 2252. [Google Scholar] [CrossRef]
  134. Sudhakaran, P. Energy efficient distributed lightweight authentication and encryption technique for IoT security. Int. J. Commun. Syst. 2022, 35, e4198. [Google Scholar] [CrossRef]
  135. Tahsien, S.M.; Karimipour, H.; Spachos, P. Machine learning based solutions for security of Internet of Things (IoT): A survey. J. Netw. Comput. Appl. 2020, 161, 102630. [Google Scholar] [CrossRef]
  136. Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [Google Scholar] [CrossRef]
  137. Thakkar, A.; Lohiya, R. A review on machine learning and deep learning perspectives of IDS for IoT: Recent updates, security issues, and challenges. Arch. Comput. Methods Eng. 2021, 28, 3211–3243. [Google Scholar] [CrossRef]
  138. Aljuhani, A. Machine Learning Approaches for Combating Distributed Denial of Service Attacks in Modern Networking Environments. IEEE Access 2021, 9, 42236–42264. [Google Scholar] [CrossRef]
  139. Aldhaheri, S.; Alghazzawi, D.; Cheng, L.; Barnawi, A.; Alzahrani, B.A. Artificial Immune Systems approaches to secure the internet of things: A systematic review of the literature and recommendations for future research. J. Netw. Comput. Appl. 2020, 157, 102537. [Google Scholar] [CrossRef]
  140. Kuzlu, M.; Fair, C.; Guler, O. Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Discov. Internet Things 2021, 1, 1–14. [Google Scholar] [CrossRef]
  141. Vaccari, I.; Chiola, G.; Aiello, M.; Mongelli, M.; Cambiaso, E. MQTTset, a New Dataset for Machine Learning Techniques on MQTT. Sensors 2020, 20, 6578. [Google Scholar] [CrossRef] [PubMed]
  142. Ghazanfar, S.; Hussain, F.; Rehman, A.U.; Fayyaz, U.U.; Shahzad, F.; Shah, G.A. IoT-Flock: An Open-source Framework for IoT Traffic Generation. In Proceedings of the 2020 International Conference on Emerging Trends in Smart Technologies (ICETST), Karachi, Pakistan, 26–27 March 2020; pp. 1–6. [Google Scholar] [CrossRef]
  143. Hussain, F.; Abbas, S.G.; Shah, G.A.; Pires, I.M.; Fayyaz, U.U.; Shahzad, F.; Garcia, N.M.; Zdravevski, E. A Framework for Malicious Traffic Detection in IoT Healthcare Environment. Sensors 2021, 21, 3025. [Google Scholar] [CrossRef]
Figure 1. Different IoT architectures.
Figure 1. Different IoT architectures.
Electronics 12 04806 g001
Figure 2. Examples of cyberattacks on different layers of IoT architecture.
Figure 2. Examples of cyberattacks on different layers of IoT architecture.
Electronics 12 04806 g002
Figure 3. Blockchain structure.
Figure 3. Blockchain structure.
Electronics 12 04806 g003
Figure 4. AI blockchain predictive security framework.
Figure 4. AI blockchain predictive security framework.
Electronics 12 04806 g004
Figure 5. AI blockchain predictive security agent process flowchart.
Figure 5. AI blockchain predictive security agent process flowchart.
Electronics 12 04806 g005
Figure 6. Examples of cyberattacks on IoT and their AI detection algorithms.
Figure 6. Examples of cyberattacks on IoT and their AI detection algorithms.
Electronics 12 04806 g006
Table 1. Machine learning algorithms’ performance evaluation measurements.
Table 1. Machine learning algorithms’ performance evaluation measurements.
ClassifierPerformance Measurements
PrecisionRecallAccuracyF1 Score
V1V2V1V2V1V2V1V2
NB78.648096.462478.568396.313178.234196.571078.529296.1949
KNN81.628697.105881.617197.141182.463397.466781.604597.1172
RF89.998399.987289.832599.987890.259199.989489.787999.9875
GB87.690899.718087.610599.764087.921999.740387.580299.7406
DT96.8762100.096.8635100.096.5710100.096.8562100.0
Table 2. Deep learning algorithms’ performance evaluation measurements.
Table 2. Deep learning algorithms’ performance evaluation measurements.
ClassifierPerformance Measurements
PrecisionRecallAccuracyF1 Score
V1V2V1V2V1V2V1V2
CNN78.173099.333776.836099.368477.179599.305776.543999.3470
RNN80.906899.754780.855299.746581.572999.788080.828399.7501
GRU87.543799.644886.469799.650586.544099.697986.299599.6473
LSTM85.066399.809084.682999.804185.224499.835784.639799.8064
CNN + LSTM84.873799.615584.122999.627584.450699.676783.988399.6192
CNN + GRU85.291599.516784.787999.548785.076099.591984.682699.5291
RNN + GRU86.575199.818686.270299.808086.438099.841086.187699.8126
RNN + LSTM86.991799.500386.791799.515386.925699.576086.735499.5038
RNN + CNN85.176899.854284.480799.859084.917099.878184.364899.8563
Table 3. Performance evaluation measurement comparison between V2 and benchmark.
Table 3. Performance evaluation measurement comparison between V2 and benchmark.
ClassifierPerformance Measurements
PrecisionRecallAccuracyF1 Score
BenchmarkV2BenchmarkV2BenchmarkV2BenchmarkV2
NB79.671196.462499.705396.313152.182396.571068.509296.1949
KNN99.650297.105899.686797.141199.487397.466799.586997.1172
RF99.706899.987299.795299.987899.512399.989499.653599.9875
DT99.6944100.099.7993100.099.4789100.099.6388100.0
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Alshammari, B.M. AIBPSF-IoMT: Artificial Intelligence and Blockchain-Based Predictive Security Framework for IoMT Technologies. Electronics 2023, 12, 4806. https://doi.org/10.3390/electronics12234806

AMA Style

Alshammari BM. AIBPSF-IoMT: Artificial Intelligence and Blockchain-Based Predictive Security Framework for IoMT Technologies. Electronics. 2023; 12(23):4806. https://doi.org/10.3390/electronics12234806

Chicago/Turabian Style

Alshammari, Bandar M. 2023. "AIBPSF-IoMT: Artificial Intelligence and Blockchain-Based Predictive Security Framework for IoMT Technologies" Electronics 12, no. 23: 4806. https://doi.org/10.3390/electronics12234806

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop