Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems

被引:1
|
作者
Asiri, Mashael M. [1 ]
Alfraihi, Hessa [2 ]
Said, Yahia [3 ]
Othman, Kamal M. [4 ]
Salama, Ahmed S. [5 ]
Marzouk, Radwa [2 ]
机构
[1] King Khalid Univ, Appl Coll Mahayil, Dept Comp Sci, Abha 61421, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] Northern Border Univ, Coll Engn, Dept Elect Engn, Ar Ar 91431, Saudi Arabia
[4] Umm Al Qura Univ, Coll Engn & Islamic Architecture, Dept Elect Engn, Mecca 24211, Saudi Arabia
[5] Future Univ Egypt, Fac Engn & Technol, Dept Elect Engn, New Cairo 11845, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Biological system modeling; Safety; Consumer electronics; Internet of Things; Computational modeling; Threat modeling; Ecosystems; Blockchains; Deep learning; Search methods; Evidence theory; Blockchain; deep learning; reptile search algorithm; deep belief network; NETWORK; CARE;
D O I
10.1109/ACCESS.2024.3441094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing user electronics devices has become a significant concern in the digital period, and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep learning (DL) methods. Blockchain improves device safety by transforming access management, storing credentials on a tamper-resistant ledger, mitigating the risk of unauthorized access and giving a robust defence against malevolent actors. Integrating DL into this framework also raises safety measures, as it permits devices to inspect and regulate to develop attacks distinctly. DL models accurately recognize intricate designs and anomalies, allowing the technique to distinguish and threaten possible attacks in real time. The fusion of BC and DL not only improves the reliability of user electronics but also establishes a dynamic and adaptive safety system, enhancing consumer confidence in the safety of their devices. Therefore, this study presents a BC-Based Access Management with DL Threat Modeling (BCAM-DLTM) technique for securing consumer electronics devices in the IoT ecosystems. The BCAM-DLTM technique mainly follows a two-phase procedure: access management and threat detection. Moreover, BC technology can be applied to the access management of consumer electronics devices. Besides, the BCAM-DLTM technique applies a deep belief networks (DBNs) model for proficiently identifying threats. To enhance the recognition results of the DBN model, the hyperparameter tuning procedure uses the reptile search algorithm (RSA). The experimental outcome study of the BCAM-DLTM approach employs the NSLKDD dataset. The comprehensive results of the BCAM-DLTM approach portrayed a superior accuracy outcome of 99.63% over existing models in terms of distinct metrics.
引用
收藏
页码:110671 / 110680
页数:10
相关论文
共 50 条
  • [1] A Blockchain-based Access and Management System for IoT Devices
    Valentin, Manuel
    Pahl, Claus
    El Ioini, Nabil
    Barzegar, Hamid R.
    2021 EIGHTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2021, : 69 - 76
  • [2] Blockchain-Based Authentication and Explainable AI for Securing Consumer IoT Applications
    Kumar, Randhir
    Javeed, Danish
    Aljuhani, Ahamed
    Jolfaei, Alireza
    Kumar, Prabhat
    Islam, A. K. M. Najmul
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 1145 - 1154
  • [3] Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks
    Mena, Diego M. Mendez
    Yang, Baijian
    SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 7 - 12
  • [5] An enhanced deep learning integrated blockchain framework for securing industrial IoT
    Suneetha, G.
    Haripriya, D.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (01) : 1 - 20
  • [6] Securing internet of vehicles: a blockchain-based federated learning approach for enhanced intrusion detection
    Ullah, Irshad
    Deng, Xiaoheng
    Pei, Xinjun
    Mushtaq, Husnain
    Khan, Zia
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (04):
  • [7] Blockchain-Based Decentralized Access Control Framework for Enhanced Security and Privacy for Consumer Electronic Devices
    Mudhar, Jaideep Kaur
    Malhotra, Jyoteesh
    Rani, Shalli
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 6944 - 6951
  • [8] Blockchain-based Identity and Access Management in Industrial IoT Systems
    Vallois, Valentin
    Mehaoua, Ahmed
    Amziani, Mourad
    2021 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2021), 2021, : 623 - 627
  • [9] Secure ABE Scheme for Access Management in Blockchain-Based IoT
    Zhang, Jiansheng
    Xin, Yang
    Gao, Yulong
    Lei, Xiaohui
    Yang, Yixian
    IEEE ACCESS, 2021, 9 : 54840 - 54849
  • [10] A Blockchain-Based Architecture for Access Control Management of IoT Applications
    Moursy, Islam Ahmed
    Ghanem, Sahar Mohamed
    ElDerini, Mohamed Nazih
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,