Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems

被引:1
|
作者
Asiri, Mashael M. [1 ]
Alfraihi, Hessa [2 ]
Said, Yahia [3 ]
Othman, Kamal M. [4 ]
Salama, Ahmed S. [5 ]
Marzouk, Radwa [2 ]
机构
[1] King Khalid Univ, Appl Coll Mahayil, Dept Comp Sci, Abha 61421, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] Northern Border Univ, Coll Engn, Dept Elect Engn, Ar Ar 91431, Saudi Arabia
[4] Umm Al Qura Univ, Coll Engn & Islamic Architecture, Dept Elect Engn, Mecca 24211, Saudi Arabia
[5] Future Univ Egypt, Fac Engn & Technol, Dept Elect Engn, New Cairo 11845, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Biological system modeling; Safety; Consumer electronics; Internet of Things; Computational modeling; Threat modeling; Ecosystems; Blockchains; Deep learning; Search methods; Evidence theory; Blockchain; deep learning; reptile search algorithm; deep belief network; NETWORK; CARE;
D O I
10.1109/ACCESS.2024.3441094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing user electronics devices has become a significant concern in the digital period, and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep learning (DL) methods. Blockchain improves device safety by transforming access management, storing credentials on a tamper-resistant ledger, mitigating the risk of unauthorized access and giving a robust defence against malevolent actors. Integrating DL into this framework also raises safety measures, as it permits devices to inspect and regulate to develop attacks distinctly. DL models accurately recognize intricate designs and anomalies, allowing the technique to distinguish and threaten possible attacks in real time. The fusion of BC and DL not only improves the reliability of user electronics but also establishes a dynamic and adaptive safety system, enhancing consumer confidence in the safety of their devices. Therefore, this study presents a BC-Based Access Management with DL Threat Modeling (BCAM-DLTM) technique for securing consumer electronics devices in the IoT ecosystems. The BCAM-DLTM technique mainly follows a two-phase procedure: access management and threat detection. Moreover, BC technology can be applied to the access management of consumer electronics devices. Besides, the BCAM-DLTM technique applies a deep belief networks (DBNs) model for proficiently identifying threats. To enhance the recognition results of the DBN model, the hyperparameter tuning procedure uses the reptile search algorithm (RSA). The experimental outcome study of the BCAM-DLTM approach employs the NSLKDD dataset. The comprehensive results of the BCAM-DLTM approach portrayed a superior accuracy outcome of 99.63% over existing models in terms of distinct metrics.
引用
收藏
页码:110671 / 110680
页数:10
相关论文
共 50 条
  • [31] An IoT and Blockchain-based approach for the smart water management system in agriculture
    Zeng, Hui
    Dhiman, Gaurav
    Sharma, Ashutosh
    Sharma, Amit
    Tselykh, Alexey
    EXPERT SYSTEMS, 2023, 40 (04)
  • [32] Trust management for IoT devices based on federated learning and blockchain
    Wang, Liang
    Li, Yilin
    Zuo, Lina
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (01):
  • [33] Performance Improvement of Blockchain-based IoT Applications using Deep Learning Techniques
    Patan, Rizwan
    Parizi, Reza M.
    2022 FOURTH INTERNATIONAL CONFERENCE ON BLOCKCHAIN COMPUTING AND APPLICATIONS (BCCA), 2022, : 151 - 158
  • [34] Securing IoT Devices Using Dynamic Power Management: Machine Learning Approach
    Chawla, Nikhil
    Singh, Arvind
    Kumar, Harshit
    Kar, Monodeep
    Mukhopadhyay, Saibal
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (22) : 16379 - 16394
  • [35] Blockchain-based cross-domain authentication strategy for trusted access to mobile devices in the IoT
    Dong, Shuai
    Yang, Hui
    Yuan, Jiaqi
    Jiao, Libin
    Yu, Ao
    Zhang, Jie
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1610 - 1612
  • [36] Blockchain-Based Smart Contract Model for Securing Healthcare Transactions by Using Consumer Electronics and Mobile-Edge Computing
    Datta, Sagnik
    Namasudra, Suyel
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 4026 - 4036
  • [37] A Novel Resource Management Framework for Blockchain-Based Federated Learning in IoT Networks
    Mishra, Aman
    Garg, Yash
    Pandey, Om Jee
    Shukla, Mahendra K.
    Vasilakos, Athanasios V.
    Hegde, Rajesh M.
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (04): : 648 - 660
  • [38] Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms
    Partida, Alberto
    Criado, Regino
    Romance, Miguel
    ELECTRONICS, 2021, 10 (04) : 1 - 26
  • [39] STewARD:SDN and blockchain-based Trust evaluation for Automated Risk management on IoT Devices
    Boussard, Mathieu
    Papillon, Serge
    Peloso, Pierre
    Signorini, Matteo
    Waisbard, Erez
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM 2019 WKSHPS), 2019, : 841 - 846
  • [40] Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes
    Alserhani, Faeiz M.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3856 - 3882