Adaptive Service Dependent Secure Blockchain Model for Improved Security in IoT Networks

International Journal of Electrical and Electronics Engineering
© 2024 by SSRG - IJEEE Journal
Volume 11 Issue 5
Year of Publication : 2024
Authors : R. Premkumar, S. Sathyalakshmi
pdf
How to Cite?

R. Premkumar, S. Sathyalakshmi, "Adaptive Service Dependent Secure Blockchain Model for Improved Security in IoT Networks," SSRG International Journal of Electrical and Electronics Engineering, vol. 11,  no. 5, pp. 20-26, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I5P103

Abstract:

The problem of secure routing and data security in Internet of Things (IoT) networks is analyzed, and the nature of IoT nodes in terms of behavior introduces a higher threat towards data transmission and data security. The existence of malformed malicious devices introduces different threats which degrade the performance of entire IoT networks, and the services provided. To handle this, there are a number of secure routing algorithms prescribed in literature that have great deflection in the performance in secure routing and data security. To improve security, an Adaptive Service Dependent Secure Blockchain Model (ASSBM) is presented in this article. The model focused on two constraints: (1) maximizing the service throughput by incorporating a secure routing algorithm with Transmission Behavior Analysis, which analyzes the behavior of different IoT nodes in different data transmissions to measure the Transmission Leverage Trust (TLT) and used towards route selection, and (2) improving the data security by adapting service-centric blockchain algorithm which applies data encryption with different encryption schemes and keys being selected according to the nature of service. By classifying the services under different categories, the selection of encryption schemes and keys are differentiated between various classes of services. Both stages support the improvement of data security and secure transmission. The ASSBM model hikes the secure routing and data security performance.

Keywords:

IoT Networks, Blockchain Security, Secure Routing, ASSBM, TLT.

References:

[1] Garima Thakur et al., “An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment,” IEEE Access, vol. 11, pp. 26877-26892, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Junyu Ren et al., “Task Offloading Strategy with Emergency handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT,” Tsinghua Science and Technology, vol. 27, no. 4, pp. 760-776, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Tharaka Hewa et al., “Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing,” IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7174-7185, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[4] B. Sowmiya et al., “Linear Elliptical Curve Digital Signature (LECDS) with Blockchain Approach for Enhanced Security on Cloud Server,” IEEE Access, vol. 9, pp. 138245-138253, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Mohammad Wazid et al., “Fortifying Smart Transportation Security through Public Blockchain,” IEEE Internet of Things Journal, vol. 9, no. 17, pp. 16532-16545, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Qin Liu et al., “The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities,” IEEE Systems Journal, vol. 16, no. 4, pp. 5741-5752, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Bhaskara S. Egala et al., “Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things with Effective Access Control,” IEEE Internet of Things Journal, vol. 8, no. 14, pp. 11717-11731, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Rizwan Patan et al., “Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities,” IEEE Internet of Things Journal, vol. 9, no. 19, pp. 19296-19306, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Shailendra Rathore, Jong Hyuk Park, and Hangbae Chang, “Deep Learning and Blockchain-Empowered Security Framework for Intelligent 5G-Enabled IoT,” IEEE Access, vol. 9, pp. 90075-90083, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Prabhakar Krishnan et al., “Software-Defined Security-by-Contract for Blockchain-Enabled MUD-Aware Industrial IoT Edge Networks,” IEEE Transactions on Industrial Informatics, vol. 18, no. 10, pp. 7068-7076, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ruba Awadallah, and Azman Samsudin, “Using Blockchain in Cloud Computing to Enhance Relational Database Security,” IEEE Access, vol. 9, pp. 137353-137366, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Manyu Zhao, Wei Liu, and Kai He, “Research on Data Security Model of Environmental Monitoring Based on Blockchain,” IEEE Access, vol. 10, pp. 120168-120180, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Zhuofan Liao et al., “Blockchain on Security and Forensics Management in Edge Computing for IoT: A Comprehensive Survey,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1159-1175, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mohamed Amine Ferrag, and Lei Shu, “The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial,” IEEE Internet of Things Journal, vol. 8, no. 24, pp. 17236-17260, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Cigdem Bakir, “New Blockchain-Based Special Keys Security Model with Path Compression Algorithm for Big Data,” IEEE Access, vol. 10, pp. 94738-94753, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ruonan Li et al., “A Blockchain-Enabled Framework for Enhancing Scalability and Security in IIoT,” IEEE Transactions on Industrial Informatics, vol. 19, no. 6, pp. 7389-7400, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Jiashu Wu et al., “Adaptive Bi-Recommendation and Self-Improving Network for Heterogeneous Domain Adaptation-Assisted IoT Intrusion Detection,” IEEE Internet of Things Journal, vol. 10, no. 15, pp. 13205-13220, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Xiaoheng Deng et al., “Flow Topology-Based Graph Convolutional Network for Intrusion Detection in Label-Limited IoT Networks,” IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 684-696, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Yixuan Wu et al., “Intelligent Intrusion Detection for Internet of Things Security: A Deep Convolutional Generative Adversarial NetworkEnabled Approach,” IEEE Internet of Things Journal, vol. 10, no. 4, pp. 3094-3106, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Nanavath Kiran Singh Nayak, and Budhaditya Bhattacharyya, “MAC Protocol Based IoT Network Intrusion Detection Using Improved Efficient Shuffle Bidirectional COOT Channel Attention Network,” IEEE Access, vol. 11, pp. 77385-77402, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Xiaokang Zhou et al., “Hierarchical Adversarial Attacks Against Graph-Neural-Network-Based IoT Network Intrusion Detection System,” IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9310-9319, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Ayodeji Oseni et al., “An Explainable Deep Learning Framework for Resilient Intrusion Detection in IoT-Enabled Transportation Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 1, pp. 1000-1014, 2023.
[CrossRef] [Google Scholar] [Publisher Link]