Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics

被引:0
|
作者
Alamro, Hayam [1 ]
Maray, Mohammed [2 ]
Aljabri, Jawhara [3 ]
Alahmari, Saad [4 ]
Abdullah, Monir [5 ]
Alqurni, Jehad Saad [6 ]
Alotaibi, Faiz Abdullah [7 ]
Mohamed, Abdelmoneim Ali [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Comp Sci, Dept Informat Syst, Abha, Saudi Arabia
[3] Univ Tabuk, Univ Coll Umluj, Dept Comp Sci, Tabuk, Saudi Arabia
[4] Northern Border Univ, Appl Coll, Dept Comp Sci, Ar Ar, Saudi Arabia
[5] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[6] Imam Abdulrahman Bin Faisal Univ, Coll Educ, Dept Educ Technol, POB 1982, Dammam 31441, Saudi Arabia
[7] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[8] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Majmaah 11952, Saudi Arabia
关键词
Internet of things; Consumer electronics; UAV; Mountain gazelle optimization; Cybersecurity; Deep learning; Feature selection; OPTIMIZATION ALGORITHM;
D O I
10.1016/j.aej.2024.11.016
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. Employing regular software updates, secure authentication protocols, and strong encryption are indispensable approaches to guarantee the integrity and privacy of user details. Drones offer users a bird's-eye view that can be started and implemented anywhere and anytime. But, the malicious use of drones has developed among criminals and cyber-criminals. The possibility and frequency of these attacks are maximum, and their effect is highly unsafe and devastating. Thus, the desire for protective, preventive counter-measures and detective are needed. Intrusion detection utilizing deep learning (DL) drones control advanced neural network (NN) structures to improve security surveillance in dynamic outdoor environments. Prepared with sophisticated sensors and onboard processing abilities, these drones autonomously examine aerial imagery to identify and classify possible risks like suspicious activities, unauthorized personnel, or vehicles. DL approaches allow drones to learn complex patterns and anomalies in real-time, enabling quick response and proactive security procedures. This study introduces an enhanced Mathematical Modeling-based Blockchain with Mountain Gazelle Optimization and Attention to Deep Learning for Cybersecurity (MGOADL-CS) technique in the drone's platform. The MGOADL-CS method aims to improve cybersecurity using BC technology in the drone's environment by detecting attacks using optimal DL models. In the initial stage, the MGOADL-CS technique uses a linear scaling normalization (LSN) approach to normalize the input data. The MGOADL-CS technique uses an improved tunicate swarm algorithm (ITSA) based feature selection approach for dimensionality reduction. Besides, the attention long shortterm memory neural network (ALSTM-NN) model is employed to detect and classify cyberattacks. Finally, the MGO-based hyperparameter tuning process is performed to adjust the hyperparameter values of the ALSTM-NN model. To highlight the enhanced attack detection results of the MGOADL-CS technique, a detailed simulation set is accomplished under the NSL dataset. The performance validation of the MGOADL-CS method portrayed a superior accuracy value of 99.71 % over existing approaches.
引用
收藏
页码:366 / 377
页数:12
相关论文
共 50 条
  • [21] Modelling and Analysis of Smart Tourism Based on Deep Learning and Attention Mechanism
    Dong, Miao
    Dong, Shihao
    Jiang, Weichang
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2024, 23 (05)
  • [22] A blockchain-enabled learning model based on distributed deep learning architecture
    Zhang, Yang
    Liang, Yongquan
    Jia, Bin
    Wang, Pinxiang
    Zhang, Xiaosong
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 6577 - 6604
  • [23] Deep Learning-Based Attention Mechanism Algorithm for Blockchain Credit Default Prediction
    Lin, Wangke
    Liu, Yue
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2025, 16 (02) : 381 - 391
  • [24] A new DDoS attacks intrusion detection model based on deep learning for cybersecurity
    Akgun, Devrim
    Hizal, Selman
    Cavusoglu, Unal
    COMPUTERS & SECURITY, 2022, 118
  • [25] Optimal Deep-Learning-Based Cyberattack Detection in a Blockchain-Assisted IoT Environment
    Assiri, Fatmah Y.
    Ragab, Mahmoud
    MATHEMATICS, 2023, 11 (19)
  • [26] RETRACTION: Blockchain-Based Deep Learning to Process IoT Data Acquisition in Cognitive Data
    Hannah, S.
    Deepa, A. J.
    Chooralil, V. S.
    BIOMED RESEARCH INTERNATIONAL, 2023, 2023
  • [27] Blockchain-based deep learning in IoT, healthcare and cryptocurrency price prediction: a comprehensive review
    Arora, Shefali
    Mittal, Ruchi
    Shrivastava, Avinash K.
    Bali, Shivani
    INTERNATIONAL JOURNAL OF QUALITY & RELIABILITY MANAGEMENT, 2024, 41 (08) : 2199 - 2225
  • [28] Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach
    He, Ying
    Wang, Yuhang
    Qiu, Chao
    Lin, Qiuzhen
    Li, Jianqiang
    Ming, Zhong
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2226 - 2237
  • [29] Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment
    Alkhonaini, Mimouna Abdullah
    Alohali, Manal Abdullah
    Aljebreen, Mohammed
    Eltahir, Majdy M.
    Alanazi, Meshari H.
    Yafoz, Ayman
    Alsini, Raed
    Khadidos, Alaa O.
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 112 : 49 - 62
  • [30] Improving the Accuracy of Deep Learning Modelling Based on Statistical Calculation of Mathematical Equations
    Li, Feng
    Hu, Yujun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT II, 2023, 14087 : 343 - 353