Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics

被引:0
|
作者
Alamro, Hayam [1 ]
Maray, Mohammed [2 ]
Aljabri, Jawhara [3 ]
Alahmari, Saad [4 ]
Abdullah, Monir [5 ]
Alqurni, Jehad Saad [6 ]
Alotaibi, Faiz Abdullah [7 ]
Mohamed, Abdelmoneim Ali [8 ]
机构
[1] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Syst, POB 84428, Riyadh 11671, Saudi Arabia
[2] King Khalid Univ, Coll Comp Sci, Dept Informat Syst, Abha, Saudi Arabia
[3] Univ Tabuk, Univ Coll Umluj, Dept Comp Sci, Tabuk, Saudi Arabia
[4] Northern Border Univ, Appl Coll, Dept Comp Sci, Ar Ar, Saudi Arabia
[5] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci & Artificial Intelligence, Bisha 67714, Saudi Arabia
[6] Imam Abdulrahman Bin Faisal Univ, Coll Educ, Dept Educ Technol, POB 1982, Dammam 31441, Saudi Arabia
[7] King Saud Univ, Coll Humanities & Social Sci, Dept Informat Sci, POB 28095, Riyadh 11437, Saudi Arabia
[8] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Syst, Al Majmaah 11952, Saudi Arabia
关键词
Internet of things; Consumer electronics; UAV; Mountain gazelle optimization; Cybersecurity; Deep learning; Feature selection; OPTIMIZATION ALGORITHM;
D O I
10.1016/j.aej.2024.11.016
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security in the Internet of Things (IoT)-consumer electronics is decisive in safeguarding connected devices from possible vulnerabilities and threats. Strong security measures are required to protect against unauthorized access, data breaches, and cyberattacks as these smart devices gather, transfer, and save sensitive information. Employing regular software updates, secure authentication protocols, and strong encryption are indispensable approaches to guarantee the integrity and privacy of user details. Drones offer users a bird's-eye view that can be started and implemented anywhere and anytime. But, the malicious use of drones has developed among criminals and cyber-criminals. The possibility and frequency of these attacks are maximum, and their effect is highly unsafe and devastating. Thus, the desire for protective, preventive counter-measures and detective are needed. Intrusion detection utilizing deep learning (DL) drones control advanced neural network (NN) structures to improve security surveillance in dynamic outdoor environments. Prepared with sophisticated sensors and onboard processing abilities, these drones autonomously examine aerial imagery to identify and classify possible risks like suspicious activities, unauthorized personnel, or vehicles. DL approaches allow drones to learn complex patterns and anomalies in real-time, enabling quick response and proactive security procedures. This study introduces an enhanced Mathematical Modeling-based Blockchain with Mountain Gazelle Optimization and Attention to Deep Learning for Cybersecurity (MGOADL-CS) technique in the drone's platform. The MGOADL-CS method aims to improve cybersecurity using BC technology in the drone's environment by detecting attacks using optimal DL models. In the initial stage, the MGOADL-CS technique uses a linear scaling normalization (LSN) approach to normalize the input data. The MGOADL-CS technique uses an improved tunicate swarm algorithm (ITSA) based feature selection approach for dimensionality reduction. Besides, the attention long shortterm memory neural network (ALSTM-NN) model is employed to detect and classify cyberattacks. Finally, the MGO-based hyperparameter tuning process is performed to adjust the hyperparameter values of the ALSTM-NN model. To highlight the enhanced attack detection results of the MGOADL-CS technique, a detailed simulation set is accomplished under the NSL dataset. The performance validation of the MGOADL-CS method portrayed a superior accuracy value of 99.71 % over existing approaches.
引用
收藏
页码:366 / 377
页数:12
相关论文
共 50 条
  • [31] Food Recognition Model Based on Deep Learning and Attention Mechanism
    He, Lili
    Cai, Zhiwei
    Ouyang, Dantong
    Bai, Hongtao
    2022 8TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS, BIGCOM, 2022, : 206 - 216
  • [32] An Efficient Indoor Localization Based on Deep Attention Learning Model
    Abozeid A.
    Taloba A.I.
    Abd El-Aziz R.M.
    Alwaghid A.F.
    Salem M.
    Elhadad A.
    Computer Systems Science and Engineering, 2023, 46 (02): : 2637 - 2650
  • [33] Food Recognition Model Based on Deep Learning and Attention Mechanism
    He, Lili
    Cai, Zhiwei
    Ouyang, Dantong
    Bai, Hongtao
    2022 8TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS, BIGCOM, 2022, : 331 - 341
  • [34] IOT BASED DANCE MOVEMENT RECOGNITION MODEL BASED ON DEEP LEARNING FRAMEWORK
    Ji, Zhen
    Tian, Yaonong
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (02): : 1091 - 1106
  • [35] Blockchain-assisted improved interval type-2 fuzzy deep learning-based attack detection on internet of things driven consumer electronics
    Alabdan, Rana
    Alabduallah, Bayan
    Alruwais, Nuha
    Arasi, Munya A.
    Asklany, Somia A.
    Alghushairy, Omar
    Alallah, Fouad Shoie
    Alshareef, Abdulrhman
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 110 : 153 - 167
  • [36] Blockchain and Deep Learning-Based IDS for Securing SDN-Enabled Industrial IoT Environments
    Poorazad, Samira Kamali
    Benzaid, Chafika
    Taleb, Tarik
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 2760 - 2765
  • [37] RETRACTED: Secure cloud storage for IoT based distributed healthcare environment using blockchain orchestrated and deep learning model (Retracted Article)
    Rajasekaran, P.
    Duraipandian, M.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 1069 - 1084
  • [38] Blockchain and IoT Based Infrastructure for Secure Smart City Using Deep Learning Algorithm with Dingo Optimization
    Mishra, Sourav
    Chaurasiya, Vijay Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 132 (01) : 17 - 37
  • [39] Blockchain and IoT Based Infrastructure for Secure Smart City Using Deep Learning Algorithm with Dingo Optimization
    Sourav Mishra
    Vijay Kumar Chaurasiya
    Wireless Personal Communications, 2023, 132 : 17 - 37
  • [40] Facial Micro-expression Modelling-Based Student Learning Rate Evaluation Using VGG–CNN Transfer Learning Model
    Mahendar M.
    Malik A.
    Batra I.
    SN Computer Science, 5 (2)