Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics

被引:0
|
作者
Alamro, Hayam [1 ]
Maray, Mohammed [2 ]
Aljabri, Jawhara [3 ]
Alahmari, Saad [4 ]
Abdullah, Monir [5 ]
Alqurni, Jehad Saad [6 ]
Alotaibi, Faiz Abdullah [7 ]
Mohamed, Abdelmoneim Ali [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Comp Sci, Dept Informat Syst, Abha, Saudi Arabia
[3] Univ Tabuk, Univ Coll Umluj, Dept Comp Sci, Tabuk, Saudi Arabia
[4] Northern Border Univ, Appl Coll, Dept Comp Sci, Ar Ar, Saudi Arabia
[5] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[6] Imam Abdulrahman Bin Faisal Univ, Coll Educ, Dept Educ Technol, POB 1982, Dammam 31441, Saudi Arabia
[7] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[8] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Majmaah 11952, Saudi Arabia
关键词
Internet of things; Consumer electronics; UAV; Mountain gazelle optimization; Cybersecurity; Deep learning; Feature selection; OPTIMIZATION ALGORITHM;
D O I
10.1016/j.aej.2024.11.016
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. Employing regular software updates, secure authentication protocols, and strong encryption are indispensable approaches to guarantee the integrity and privacy of user details. Drones offer users a bird's-eye view that can be started and implemented anywhere and anytime. But, the malicious use of drones has developed among criminals and cyber-criminals. The possibility and frequency of these attacks are maximum, and their effect is highly unsafe and devastating. Thus, the desire for protective, preventive counter-measures and detective are needed. Intrusion detection utilizing deep learning (DL) drones control advanced neural network (NN) structures to improve security surveillance in dynamic outdoor environments. Prepared with sophisticated sensors and onboard processing abilities, these drones autonomously examine aerial imagery to identify and classify possible risks like suspicious activities, unauthorized personnel, or vehicles. DL approaches allow drones to learn complex patterns and anomalies in real-time, enabling quick response and proactive security procedures. This study introduces an enhanced Mathematical Modeling-based Blockchain with Mountain Gazelle Optimization and Attention to Deep Learning for Cybersecurity (MGOADL-CS) technique in the drone's platform. The MGOADL-CS method aims to improve cybersecurity using BC technology in the drone's environment by detecting attacks using optimal DL models. In the initial stage, the MGOADL-CS technique uses a linear scaling normalization (LSN) approach to normalize the input data. The MGOADL-CS technique uses an improved tunicate swarm algorithm (ITSA) based feature selection approach for dimensionality reduction. Besides, the attention long shortterm memory neural network (ALSTM-NN) model is employed to detect and classify cyberattacks. Finally, the MGO-based hyperparameter tuning process is performed to adjust the hyperparameter values of the ALSTM-NN model. To highlight the enhanced attack detection results of the MGOADL-CS technique, a detailed simulation set is accomplished under the NSL dataset. The performance validation of the MGOADL-CS method portrayed a superior accuracy value of 99.71 % over existing approaches.
引用
收藏
页码:366 / 377
页数:12
相关论文
共 50 条
  • [1] LEVERAGING BLOCKCHAIN WITH CHAOTIC OPPOSITIONAL BARNACLES MATING OPTIMIZER-BASED DEEP LEARNING MODEL FOR SECURE IOT ENVIRONMENT IN CONSUMER ELECTRONICS
    Alrayes, Fatma s.
    Alruwais, Nuha
    Al-wesabi, Fahd n.
    Alashjaee, Abdullah m.
    Alharbi, Abeer a. k.
    Salama, Ahmed s.
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2025,
  • [3] Reputation-Based Stable Blockchain Sharding Scheme for Smart Cities With IoT Consumer Electronics: A Deep Reinforcement Learning Approach
    Li, Yaozong
    Luo, Xiong
    Zhao, Wenbing
    Gao, Honghao
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 5737 - 5746
  • [4] Securing Consumer Electronics Devices: A Blockchain-Based Access Management Approach Enhanced by Deep Learning Threat Modeling for IoT Ecosystems
    Asiri, Mashael M.
    Alfraihi, Hessa
    Said, Yahia
    Othman, Kamal M.
    Salama, Ahmed S.
    Marzouk, Radwa
    IEEE ACCESS, 2024, 12 : 110671 - 110680
  • [5] HARNESSING BLOCKCHAIN WITH ENSEMBLE DEEP LEARNING-BASED DISTRIBUTED DOS ATTACK DETECTION IN IOT-ASSISTED SECURE CONSUMER ELECTRONICS SYSTEMS
    Alrayes, Fatma S.
    Aljebreen, Mohammed
    Alghamdi, Mohammed
    Alrslani, Faheed A. F.
    Alshuhail, Asma
    Almukadi, Wafa Sulaiman
    Basheti, Iman
    Sharif, Mahir Mohammed
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2024, 32 (09N10)
  • [6] A blockchain based federated deep learning model for secured data transmission in healthcare Iot networks
    Ganapathy, G.
    Anand, Sujatha Jamuna
    Jayaprakash, M.
    Lakshmi, S.
    Priya, V. Banu
    Pandi V, Samuthira
    Measurement: Sensors, 2024, 33
  • [7] An Optimized and Scalable Blockchain-Based Distributed Learning Platform for Consumer IoT
    Wang, Zhaocheng
    Liu, Xueying
    Shao, Xinming
    Alghamdi, Abdullah
    Alrizq, Mesfer
    Munir, Md. Shirajum
    Biswas, Sujit
    MATHEMATICS, 2023, 11 (23)
  • [8] SECURING INTERNET OF THINGS-ASSISTED CONSUMER ELECTRONICS USING BLOCKCHAIN WITH DEEP LEARNING-BASED USER AUTHENTICATION
    Alamro, Hayam
    Nemri, Nadhem
    Aljebreen, Mohammed
    Alrslani, Faheed a. f.
    Alshuhail, Asma
    Salama, Ahmed s.
    FRACTALS-COMPLEX GEOMETRY PATTERNS AND SCALING IN NATURE AND SOCIETY, 2025,
  • [9] A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities
    Alotaibi, Jamal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2025, 18 (03)
  • [10] BlockDeepNet: A Blockchain-Based Secure Deep Learning for IoT Network
    Rathore, Shailendra
    Pan, Yi
    Park, Jong Hyuk
    SUSTAINABILITY, 2019, 11 (14)