Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: C, Vimala Josphinea; * | M, Theodore Kingslinb | R, Fatima Vincyc | M, Mohanad | Babitha, S.e
Affiliations: [a] Artificial Intelligence and Datascience, R.M.K Engineering College, Kavaraipettai, Gummidipoondi taluk, Chennai, India | [b] Department of Electronics and Communication Engineering, R.M.K College of Engineering and Technology, Puduvoyal, Gummidipoondi taluk, Chennai, India | [c] Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai, India | [d] Artificial Intelligence and Data Science, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai, India | [e] Department of Information Technology, Hindustan Institute of Technology and Science, Padur, India
Correspondence: [*] Corresponding author: Vimala Josphine C, Artificial Intelligence and Datascience, R.M.K Engineering College, Puduvoyal, Gummidipoondi taluk, Thiruvallur District, Chennai – 601206, India. E-mail: [email protected].
Abstract: “Internet-of-Things (IoT)” systems and components are highly noticed by cybercriminals including the affiliated or the nation-state sponsored threat actors as become a united part of the linked ecosystem and the society. But, the difficulties in protecting the systems and the devices are combined of scale and multiple deployments, the speed-paced cyber threats landscape, and more parameters. With the enhanced internet services, cyber security grows one of the highest research issues of the latest digital world. It is very important to develop a cyber security model to identify the various types of attacks. To overcome these problems, a quantum-inspired blockchain-assisted cyber security model is obtained in the IoT platform. Firstly, the required information is obtained from quality online information resources. Then, the information is stored in the quantum-inspired blockchain with optimal key, where the key optimization is performed with the help of the Fitness-based Jellyfish Chameleon Swarm Algorithm (FJCSA). Then, the stored data are recovered and finally, fed to the intrusion detection stage to verify whether it is affected by any unauthorized entities. The intrusion detection is done with the support of “Adaptive Attention-based Long Short Term Memory (LSTM) with Adaboost (AALSTM-Ab)”, where the parameters are optimized by using the FJCSA. Furthermore, the experimental results of the developed model are validated by comparing the performance of various recently implemented blockchain-based cyber security approaches with respect to several positive and negative performance measures. From the result analysis, the accuracy and precision rate of the recommended model are 95.50% and 91.40%.
Keywords: Internet of things, blockchain-based cyber security, key optimization, intrusion detection, Fitness-based Jellyfish Chameleon Swarm Algorithm, Adaptive Attention-based Long Short Term Memory with Adaboost
DOI: 10.3233/IDT-230579
Journal: Intelligent Decision Technologies, vol. 18, no. 2, pp. 1203-1232, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]