Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme

Authors

  • Azreen Shafieqah Asri Universiti Malaysia Sarawak, Kuching, Sarawak
  • Faizatul Fitri Boestamam Universiti Malaysia Sarawak, Kuching, Sarawak
  • Harith Zakwan Bin Zakaria Universiti Malaysia Sarawak, Kuching, Sarawak
  • Mohammad Amir Alam Rahim Omar Universiti Malaysia Sarawak, Kuching, Sarawak
  • Mohammad Hamka Izzuddin Bin Mohamad Yahya Universiti Malaysia Sarawak, Kuching, Sarawak
  • Muhammad Faisal Director HRIMS, Ministry of Human Rights

DOI:

https://doi.org/10.62951/ijcts.v1i3.19

Keywords:

Artificial Intelligence, Authentication, Blockchain, Industrial Internet of Things (IIoT), Security

Abstract

With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.

References

Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A lightweight and user-centric two-factor authentication mechanism for IoT based on blockchain and smart contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH) (pp. 91-96). https://doi.org/10.1109/SMARTTECH54121.2022.00032

Ayub Khan, A., Laghari, A. A., Shaikh, Z. A., Dacko-Pikiewicz, Z., & Kot, S. (2022). Internet of Things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access, 10, 122679-122695. https://doi.org/10.1109/ACCESS.2022.3223370

Babu, E. S., Devi, A. A., Kavati, I., & Srinivasarao, B. K. N. (2023). Blockchain-based authentication mechanism for edge devices in fog-enabled IoT networks. In TENCON 2023 - 2023 IEEE Region 10 Conference (TENCON) (pp. 558-563). https://doi.org/10.1109/TENCON58879.2023.10322432

Deep, A., Perrusquía, A., Aljaburi, L., Al-Rubaye, S., & Guo, W. (2024). A novel distributed authentication of blockchain technology integration in IoT services. IEEE Access, 12, 9550-9562. https://doi.org/10.1109/ACCESS.2024.3349955

Dong, J., et al. (2024). Blockchain-based certificate-free cross-domain authentication mechanism for Industrial Internet. IEEE Internet of Things Journal, 11(2), 3316-3330. https://doi.org/10.1109/JIOT.2023.3296506

Fauzi, A. H., & Khan, A. S. (2017). Threats advancement in primary user emulation attack and spectrum sensing data falsification (SSDF) attack in cognitive radio network (CRN) for 5G wireless network environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 179-183.

Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. V. (2023). Blockchain-based device authentication method in Industrial Internet of Things. In 2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (pp. 243-249). https://doi.org/10.1109/ICUMT61075.2023.10333273

Hassan, M. U., Rehmani, M. H., & Chen, J. (2023). Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 25(1), 289-318. https://doi.org/10.1109/COMST.2022.3205643

Khalil, U., Mueen-Uddin, Malik, O. A., & Hussain, S. (2022). A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions. IEEE Access, 10, 76805-76823. https://doi.org/10.1109/ACCESS.2022.3189998

Khan, A. S., Abdullah, J., Zen, K., & Tarmizi, S. (2017). Secure and scalable group rekeying for mobile multihop relay network. Advanced Science Letters, 23(6), 5242-5245.

Khan, A. S., et al. (2023). Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network. IEEE Access, 11, 20524-20541. https://doi.org/10.1109/ACCESS.2023.3526940

Khan, A. S., et al. (2023). Ensemble based automotive paint surface defect detection augmented by order statistics filtering using machine learning. Authorea Preprints.

Khan, A. S., Halikul, I., & Johari Abdullah, N. F. (2015). Secure authentication and key management protocols for mobile multihop WiMAX networks. Jurnal Teknologi, 73(1), 75-81.

Khan, A. S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security issues in 5G device to device communication. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 366-371.

Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending malicious script attacks using machine learning classifiers. Wireless Communications and Mobile Computing, 2017.

Khan, S., Abdullah, J., Khan, N., Julahi, A. A., & Tarmizi, S. (2017). Quantum-elliptic curve cryptography for multihop communication in 5G networks. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 357-365.

Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2021). Blockchain-based massive data dissemination handling in IIoT environment. IEEE Network, 35(1), 318-325. https://doi.org/10.1109/MNET.011.2000355

Liu, Y., & Li, S. (2023). Hybrid cyber threats detection using explainable AI in Industrial IoT. In 2023 International Conference on Human-Centered Cognitive Systems (HCCS) (pp. 1-6). https://doi.org/10.1109/HCCS59561.2023.10452621

Rahman, Z., Yi, X., & Khalil, I. (2023). Blockchain-based AI-enabled Industry 4.0 CPS protection against advanced persistent threat. IEEE Internet of Things Journal, 10(8), 6769-6778. https://doi.org/10.1109/JIOT.2022.3147186

Saravanabhavan, C., et al. (2022). Blockchain-based secure Menger’s authentication for Industrial IoT. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 1302-1308). https://doi.org/10.1109/ICACITE53722.2022.9823904

Selvarajan, S., et al. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/s13677-023-00412-y

Seo, B.-S., Baek, J.-M., & Ko, K.-M. (2024). AI-enabled abnormal behaviour detection and visualization technology on blockchain network. In 2024 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-4).

Sherin, K., Kaur, N., Joshi, A., Nayak, R. B. P., & Srinivas, K. (2023). The role of AI and blockchain in supply chain traceability. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 918-922). https://doi.org/10.1109/ICACITE57410.2023.10183214

Shoaib, M., et al. (2023). Augmenting the robustness and efficiency of violence detection systems for surveillance and non-surveillance scenarios. IEEE Access, 11, 123295-123313.

Taherdoost, H. (2022). Blockchain technology and artificial intelligence together: A critical review on applications. Applied Sciences, 12(24), 12948. https://doi.org/10.3390/app122412948

Wang, X., Garg, S., Lin, H., Piran, M. J., Hu, J., & Hossain, M. S. (2021). Enabling secure authentication in Industrial IoT with transfer learning empowered blockchain. IEEE Transactions on Industrial Informatics, 17(11), 7725-7733. https://doi.org/10.1109/TII.2021.3049405

Zen, K., et al. (2015). Intelligent coordinator selection mechanism (ICSM) for IEEE802. 15.4 beacon-enabled MAC protocol in mobile wireless sensor networks. International Review on Computers and Software, 10(2), 164-171.

Zhou, W., Liu, M., Chen, C., & Luo, Z. (2021). A research on the development and application of blockchain technology in Industrial Internet of Things. In 2021 Computing, Communications and IoT Applications (ComComAp) (pp. 83-88). https://doi.org/10.1109/ComComAp53641.2021.9653137

Zubair, S., Fisal, N., Abazeed, M. B., Salihu, B. A., & Khan, A. S. (2015). Lightweight distributed geographical: A lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks. International Journal of Communication Systems, 28(1), 1-18.

Published

2024-07-17

How to Cite

Azreen Shafieqah Asri, Faizatul Fitri Boestamam, Harith Zakwan Bin Zakaria, Mohammad Amir Alam Rahim Omar, Mohammad Hamka Izzuddin Bin Mohamad Yahya, & Muhammad Faisal. (2024). Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme. International Journal of Computer Technology and Science, 1(3), 20–40. https://doi.org/10.62951/ijcts.v1i3.19

Most read articles by the same author(s)

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.