Abstract

The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.

Highlights

  • The Internet of Things (IoT)-based applications and services include sensor networks, healthcare systems, transportation, smart industry, communication systems, smart cities, and manufacturing [1]

  • Patient safety and confidentiality concerns have grown while data collection, data ownership, location privacy, etc., will be at risk

  • The study concluded the recent trends of IOT algorithms and the main challenges in fog computing, which works as a middle layer between data centers in the cloud and IOT networks

Read more

Summary

Introduction

The Internet of Things (IoT)-based applications and services include sensor networks, healthcare systems, transportation, smart industry, communication systems, smart cities, and manufacturing [1]. The Internet of Thing (IoT) will deliver about 85% of all IoT devices in healthcare by 2025 [1]. IoT devices are widely used in healthcare to give real-time services to patients and physicians [3]. Patient safety and confidentiality concerns have grown while data collection, data ownership, location privacy, etc., will be at risk. By copying data and changing the identification of healthcare equipment, intruders and hackers can Sensors 2022, 22, 2112 and confidentiality concerns have grown while data collection, data ownership, l2oocfa tion privacy, etc., will be at risk. By copying data and changing the identification of healthcare equipment, intruders and hackers can target the 5G-enabled IoMT netweaosrilky.

BBaacckkggrroouunnddaannddRReellaatteeddSSttuuddiieess
GB Android
Smart Contracts
PoX Consensus Mechanism
Authorization Consensus Mechanism
Hybrid Consensus Mechanism
Contribution
Methodology
Proposed Framework
Proposed Smart Contracts and Fog Computing
Proposed Algorithm
1: Enhance Analysis of both the IOMT end 2
Experimental Setup
Results and Discussion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call