A multi-objectives framework for secure blockchain in fog-cloud network of vehicle-to-infrastructure applications

被引:3
|
作者
Lakhan, Abdullah [1 ,10 ,11 ]
Mohammed, Mazin Abed [2 ,10 ,11 ]
Abdulkareem, Karrar Hameed [3 ,4 ]
Deveci, Muhammet [5 ,6 ,7 ]
Marhoon, Haydar Abdulameer [8 ]
Nedoma, Jan [9 ,10 ]
Martinek, Radek [11 ,12 ]
机构
[1] Dawood Univ Engn & Technol, Dept Cybersecur & Comp Sci, Karachi 74800, Sindh, Pakistan
[2] Univ Anbar, Coll Comp Sci & Informat Technol, Dept Artificial Intelligence, Anbar 31001, Iraq
[3] Al Muthanna Univ, Coll Agr, Samawah 66001, Iraq
[4] Univ Warith Al Anbiyaa, Coll Engn, Karbala Karbala, Iraq
[5] Natl Def Univ, Turkish Naval Acad, Dept Ind Engn, TR-34942 Istanbul, Turkiye
[6] UCL, Bartlett Sch Sustainable Construct, Gower St, London WC1E 6BT, England
[7] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos, Lebanon
[8] Univ Kerbala, Coll Comp Sci & Informat Technol, Karbala, Iraq
[9] Al Ayen Univ, Sci Res Ctr, Informat & Commun Technol Res Grp, Thi Qar, Iraq
[10] VSB Tech Univ Ostrava, Dept Telecommun, Ostrava 70800, Czech Republic
[11] VSB Tech Univ Ostrava, Dept Cybernet & Biomed Engn, Ostrava 70800, Czech Republic
[12] Opole Univ Technol, Fac Elect Engn Automat Control & Informat, PL-45758 Opole, Poland
关键词
Security; Concave and convex; Cyber-attacks; Blockchain; Cloud; LSTM; V2I; Vehicular; NSGA-II; AUTHENTICATION; COMMUNICATION; EFFICIENT; ATTACKS; SCHEME;
D O I
10.1016/j.knosys.2024.111576
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Intelligent Transport System (ITS) is an emerging paradigm that offers numerous services at the infrastructure level for vehicle applications. Vehicle-to-infrastructure (V2I) is an advanced form of ITS where diverse vehicle services are deployed on the roadside unit. V2I consists of distributed computing nodes where transport applications are parallel processed. Many research challenges exist in the presented V2I paradigms regarding security, cyber-attacks, and application processing among heterogeneous nodes. These cyber-attacks, Sybil attacks, and their attempts cause a lack of security and degrade the V2I performance in the presented paradigms. This paper presents a new secure blockchain framework that handles cyber-attacks, as mentioned earlier. This paper formulates this complex problem as a combinatorial problem, encompassing concave and convex problems. The convex function minimizes the given constraints, such as time and security risk, and the concave function improves performance and accuracy. Therefore, numerous constraints, such as time, energy, malware detection accuracy, and application deadlines, require optimization for the considered problem. Combining the jointly non-dominated sorting genetic algorithm (NSGA-II) and long short -term memory (LSTM) schemes is the best way to meet the problem's limitations. In this study, the paper designed a malware dataset with known and unknown malware. The different kinds of malware lists (e.g., cyber-attacks) are considered in the form of known and unknown malware lists with the characteristics, size of code, where malware comes from, attack on which data, and current status of the workload after being attacked by the malware. Our main idea is to present blockchain, NSGA-II, and LSTM schemes that handle phishing, routing, Sybil, and 51% of cyber-attacks without compromising application performance. Simulation results show that the study reduces delay and energy, improves accuracy, and minimizes security risks for vehicular applications.
引用
收藏
页数:16
相关论文
共 36 条
  • [21] A Joint Multi-Criteria Utility-Based Network Selection Approach for Vehicle-to-Infrastructure Networking
    Jiang, Dingde
    Huo, Liuwei
    Lv, Zhihan
    Song, Houbing
    Qin, Wenda
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 19 (10) : 3305 - 3319
  • [22] A multi-objective approach for optimizing IoT applications offloading in fog-cloud environments with NSGA-II
    Mokni, Ibtissem
    Yassa, Sonia
    JOURNAL OF SUPERCOMPUTING, 2024, : 27034 - 27072
  • [23] Research of the multi-way connectivity probability for platoon-based vehicle-to-infrastructure communication network
    Shao Caixing
    Zhang Jianhua
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (01) : 1 - 7
  • [24] Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT
    Zhang, Jiawei
    Li, Teng
    Ying, Zuobin
    Ma, Jianfeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (02) : 1546 - 1561
  • [25] Research of the multi-way connectivity probability for platoon-based vehicle-to-infrastructure communication network
    Shao Caixing
    Zhang Jianhua
    The Journal of China Universities of Posts and Telecommunications, 2016, (01) : 1 - 7
  • [26] Real-Time Task Scheduling in Fog-Cloud Computing Framework for IoT Applications: A Fuzzy Logic based Approach
    Ali, Hala S.
    Rout, Rashmi Ranjan
    Parimi, Priyanka
    Das, Sajal K.
    2021 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2021, : 556 - 564
  • [27] Traffic prediction assisted wavelength allocation in vehicle-to-infrastructure communication: A fiber-wireless network based framework
    Gupta, Akshita
    Singh, Abhishek Pratap
    Srivastava, Arunima
    Bohara, Vivek Ashok
    Srivastava, Anand
    Maier, Martin
    VEHICULAR COMMUNICATIONS, 2024, 45
  • [28] An IoT-based bag-of-tasks scheduling framework for deadline-sensitive applications in fog-cloud environment
    Deldari, Arash
    Holghinezhad, Alireza
    Computing, 2025, 107 (01)
  • [29] Secure-fault-tolerant efficient industrial internet of healthcare things framework based on digital twin federated fog-cloud networks
    Lakhan, Abdullah
    Lateef, Ali Azawii Abdul
    Ghani, Mohd Khanapi Abd
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Nedoma, Jan
    Martinek, Radek
    Garcia-Zapirain, Begona
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
  • [30] A Mobility-Aware Network Selection Method for Vehicle-to-Infrastructure Communication over LTE-A Multi-tier Networks
    Ndashimye, Emmanuel
    Sarkar, Nurul I.
    Ray, Sayan Kumar
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 315 - 320