Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems

被引:1
|
作者
Asiri, Mashael M. [1 ]
Alfraihi, Hessa [2 ]
Said, Yahia [3 ]
Othman, Kamal M. [4 ]
Salama, Ahmed S. [5 ]
Marzouk, Radwa [2 ]
机构
[1] King Khalid Univ, Appl Coll Mahayil, Dept Comp Sci, Abha 61421, Saudi Arabia
[2] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[3] Northern Border Univ, Coll Engn, Dept Elect Engn, Ar Ar 91431, Saudi Arabia
[4] Umm Al Qura Univ, Coll Engn & Islamic Architecture, Dept Elect Engn, Mecca 24211, Saudi Arabia
[5] Future Univ Egypt, Fac Engn & Technol, Dept Elect Engn, New Cairo 11845, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Biological system modeling; Safety; Consumer electronics; Internet of Things; Computational modeling; Threat modeling; Ecosystems; Blockchains; Deep learning; Search methods; Evidence theory; Blockchain; deep learning; reptile search algorithm; deep belief network; NETWORK; CARE;
D O I
10.1109/ACCESS.2024.3441094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing user electronics devices has become a significant concern in the digital period, and a forward-thinking solution covers the fusion of blockchain (BC) technology and deep learning (DL) methods. Blockchain improves device safety by transforming access management, storing credentials on a tamper-resistant ledger, mitigating the risk of unauthorized access and giving a robust defence against malevolent actors. Integrating DL into this framework also raises safety measures, as it permits devices to inspect and regulate to develop attacks distinctly. DL models accurately recognize intricate designs and anomalies, allowing the technique to distinguish and threaten possible attacks in real time. The fusion of BC and DL not only improves the reliability of user electronics but also establishes a dynamic and adaptive safety system, enhancing consumer confidence in the safety of their devices. Therefore, this study presents a BC-Based Access Management with DL Threat Modeling (BCAM-DLTM) technique for securing consumer electronics devices in the IoT ecosystems. The BCAM-DLTM technique mainly follows a two-phase procedure: access management and threat detection. Moreover, BC technology can be applied to the access management of consumer electronics devices. Besides, the BCAM-DLTM technique applies a deep belief networks (DBNs) model for proficiently identifying threats. To enhance the recognition results of the DBN model, the hyperparameter tuning procedure uses the reptile search algorithm (RSA). The experimental outcome study of the BCAM-DLTM approach employs the NSLKDD dataset. The comprehensive results of the BCAM-DLTM approach portrayed a superior accuracy outcome of 99.63% over existing models in terms of distinct metrics.
引用
收藏
页码:110671 / 110680
页数:10
相关论文
共 50 条
  • [41] RETRACTION: Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data
    Hannah, S.
    Deepa, A. J.
    Chooralil, V. S.
    BIOMED RESEARCH INTERNATIONAL, 2023, 2023
  • [42] Blockchain-based deep learning in IoT, healthcare and cryptocurrency price prediction: a comprehensive review
    Arora, Shefali
    Mittal, Ruchi
    Shrivastava, Avinash K.
    Bali, Shivani
    INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT, 2024, 41 (08) : 2199 - 2225
  • [43] Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach
    Zkik, Karim
    Sebbar, Anass
    Fadi, Oumaima
    Kamble, Sachin
    Belhadi, Amine
    ELECTRONIC COMMERCE RESEARCH, 2024, 24 (01) : 497 - 533
  • [44] Demonstration of Blockchain-based IoT Devices Anonymous Access Network Using Zero-knowledge Proof
    Yuan, Jiaqi
    Yang, Hui
    Dong, Shuai
    Yao, Qiuyan
    Jiao, Libin
    Zhang, Jie
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1607 - 1609
  • [45] Securing blockchain-based crowdfunding platforms: an integrated graph neural networks and machine learning approach
    Karim Zkik
    Anass Sebbar
    Oumaima Fadi
    Sachin Kamble
    Amine Belhadi
    Electronic Commerce Research, 2024, 24 : 497 - 533
  • [46] N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management
    Hu, Teng
    Yang, Siqi
    Wang, Yanping
    Li, Gongliang
    Wang, Yulong
    Wang, Gang
    Yin, Mingyong
    SENSORS, 2023, 23 (20)
  • [47] Mobility Management for Blockchain-Based Ultra-Dense Edge Computing: A Deep Reinforcement Learning Approach
    Zhang, Haibin
    Wang, Rong
    Sun, Wen
    Zhao, Huanlei
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (11) : 7346 - 7359
  • [48] Vulnerability Analysis of Smart Contract for Blockchain-Based IoT Applications: A Machine Learning Approach
    Zhou, Qihao
    Zheng, Kan
    Zhang, Kuan
    Hou, Lu
    Wang, Xianbin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (24) : 24695 - 24707
  • [49] A Blockchain-Based Model Migration Approach for Secure and Sustainable Federated Learning in IoT Systems
    Zhang, Cheng
    Xu, Yang
    Elahi, Haroon
    Zhang, Deyu
    Tan, Yunlin
    Chen, Junxian
    Zhang, Yaoxue
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (08) : 6574 - 6585
  • [50] LEVERAGING BLOCKCHAIN WITH CHAOTIC OPPOSITIONAL BARNACLES MATING OPTIMIZER-BASED DEEP LEARNING MODEL FOR SECURE IOT ENVIRONMENT IN CONSUMER ELECTRONICS
    Alrayes, Fatma s.
    Alruwais, Nuha
    Al-wesabi, Fahd n.
    Alashjaee, Abdullah m.
    Alharbi, Abeer a. k.
    Salama, Ahmed s.
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2025,