Enhancing IIoT Security: AI-Driven Blockchain-Based Authentication Scheme
DOI:
https://doi.org/10.62951/ijcts.v1i3.19Keywords:
Artificial Intelligence, Authentication, Blockchain, Industrial Internet of Things (IIoT), SecurityAbstract
With the rapid expansion of the Industrial Internet of Things (IIoT), integrating devices, machines, and systems to optimize operations and enable data-driven decision-making, ensuring robust security measures is essential. While blockchain has shown the potential to upgrade traditional authentication methods in IIoT environments, vulnerabilities persist. This paper introduces two innovative methods to enhance blockchain-based authentication in IIoT: first, integrating AI-driven anomaly and threat detection into the blockchain authentication scheme; second, implementing Ethereum smart contracts for enhanced authentication with a two-factor authentication (2FA) system and GFE algorithms. By combining AI for anomaly detection with decentralized smart contracts and blockchain-based 2FA, and leveraging GFE algorithms to enhance blockchain capabilities, the proposed scheme aims to significantly fortify security measures. This integration offers a resilient defense against evolving threats, ensuring transparency, adaptability, and heightened security in IIoT applications.
References
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Liu, X. (2022). A lightweight and user-centric two-factor authentication mechanism for IoT based on blockchain and smart contract. In 2022 2nd International Conference of Smart Systems and Emerging Technologies (SMARTTECH) (pp. 91-96). https://doi.org/10.1109/SMARTTECH54121.2022.00032
Ayub Khan, A., Laghari, A. A., Shaikh, Z. A., Dacko-Pikiewicz, Z., & Kot, S. (2022). Internet of Things (IoT) security with blockchain technology: A state-of-the-art review. IEEE Access, 10, 122679-122695. https://doi.org/10.1109/ACCESS.2022.3223370
Babu, E. S., Devi, A. A., Kavati, I., & Srinivasarao, B. K. N. (2023). Blockchain-based authentication mechanism for edge devices in fog-enabled IoT networks. In TENCON 2023 - 2023 IEEE Region 10 Conference (TENCON) (pp. 558-563). https://doi.org/10.1109/TENCON58879.2023.10322432
Deep, A., Perrusquía, A., Aljaburi, L., Al-Rubaye, S., & Guo, W. (2024). A novel distributed authentication of blockchain technology integration in IoT services. IEEE Access, 12, 9550-9562. https://doi.org/10.1109/ACCESS.2024.3349955
Dong, J., et al. (2024). Blockchain-based certificate-free cross-domain authentication mechanism for Industrial Internet. IEEE Internet of Things Journal, 11(2), 3316-3330. https://doi.org/10.1109/JIOT.2023.3296506
Fauzi, A. H., & Khan, A. S. (2017). Threats advancement in primary user emulation attack and spectrum sensing data falsification (SSDF) attack in cognitive radio network (CRN) for 5G wireless network environment. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(2-10), 179-183.
Fedorov, I. R., Getmaniuk, I. B., & Bezzateev, S. V. (2023). Blockchain-based device authentication method in Industrial Internet of Things. In 2023 15th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (pp. 243-249). https://doi.org/10.1109/ICUMT61075.2023.10333273
Hassan, M. U., Rehmani, M. H., & Chen, J. (2023). Anomaly detection in blockchain networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 25(1), 289-318. https://doi.org/10.1109/COMST.2022.3205643
Khalil, U., Mueen-Uddin, Malik, O. A., & Hussain, S. (2022). A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: State-of-the-art advancements, challenges and future research directions. IEEE Access, 10, 76805-76823. https://doi.org/10.1109/ACCESS.2022.3189998
Khan, A. S., Abdullah, J., Zen, K., & Tarmizi, S. (2017). Secure and scalable group rekeying for mobile multihop relay network. Advanced Science Letters, 23(6), 5242-5245.
Khan, A. S., et al. (2023). Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network. IEEE Access, 11, 20524-20541. https://doi.org/10.1109/ACCESS.2023.3526940
Khan, A. S., et al. (2023). Ensemble based automotive paint surface defect detection augmented by order statistics filtering using machine learning. Authorea Preprints.
Khan, A. S., Halikul, I., & Johari Abdullah, N. F. (2015). Secure authentication and key management protocols for mobile multihop WiMAX networks. Jurnal Teknologi, 73(1), 75-81.
Khan, A. S., Javed, Y., Abdullah, J., Nazim, J. M., & Khan, N. (2017). Security issues in 5G device to device communication. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 366-371.
Khan, N., Abdullah, J., & Khan, A. S. (2017). Defending malicious script attacks using machine learning classifiers. Wireless Communications and Mobile Computing, 2017.
Khan, S., Abdullah, J., Khan, N., Julahi, A. A., & Tarmizi, S. (2017). Quantum-elliptic curve cryptography for multihop communication in 5G networks. International Journal of Computer Science and Network Security (IJCSNS), 17(5), 357-365.
Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2021). Blockchain-based massive data dissemination handling in IIoT environment. IEEE Network, 35(1), 318-325. https://doi.org/10.1109/MNET.011.2000355
Liu, Y., & Li, S. (2023). Hybrid cyber threats detection using explainable AI in Industrial IoT. In 2023 International Conference on Human-Centered Cognitive Systems (HCCS) (pp. 1-6). https://doi.org/10.1109/HCCS59561.2023.10452621
Rahman, Z., Yi, X., & Khalil, I. (2023). Blockchain-based AI-enabled Industry 4.0 CPS protection against advanced persistent threat. IEEE Internet of Things Journal, 10(8), 6769-6778. https://doi.org/10.1109/JIOT.2022.3147186
Saravanabhavan, C., et al. (2022). Blockchain-based secure Menger’s authentication for Industrial IoT. In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 1302-1308). https://doi.org/10.1109/ICACITE53722.2022.9823904
Selvarajan, S., et al. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing: Advances, Systems and Applications. https://doi.org/10.1186/s13677-023-00412-y
Seo, B.-S., Baek, J.-M., & Ko, K.-M. (2024). AI-enabled abnormal behaviour detection and visualization technology on blockchain network. In 2024 International Conference on Electronics, Information, and Communication (ICEIC) (pp. 1-4).
Sherin, K., Kaur, N., Joshi, A., Nayak, R. B. P., & Srinivas, K. (2023). The role of AI and blockchain in supply chain traceability. In 2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (pp. 918-922). https://doi.org/10.1109/ICACITE57410.2023.10183214
Shoaib, M., et al. (2023). Augmenting the robustness and efficiency of violence detection systems for surveillance and non-surveillance scenarios. IEEE Access, 11, 123295-123313.
Taherdoost, H. (2022). Blockchain technology and artificial intelligence together: A critical review on applications. Applied Sciences, 12(24), 12948. https://doi.org/10.3390/app122412948
Wang, X., Garg, S., Lin, H., Piran, M. J., Hu, J., & Hossain, M. S. (2021). Enabling secure authentication in Industrial IoT with transfer learning empowered blockchain. IEEE Transactions on Industrial Informatics, 17(11), 7725-7733. https://doi.org/10.1109/TII.2021.3049405
Zen, K., et al. (2015). Intelligent coordinator selection mechanism (ICSM) for IEEE802. 15.4 beacon-enabled MAC protocol in mobile wireless sensor networks. International Review on Computers and Software, 10(2), 164-171.
Zhou, W., Liu, M., Chen, C., & Luo, Z. (2021). A research on the development and application of blockchain technology in Industrial Internet of Things. In 2021 Computing, Communications and IoT Applications (ComComAp) (pp. 83-88). https://doi.org/10.1109/ComComAp53641.2021.9653137
Zubair, S., Fisal, N., Abazeed, M. B., Salihu, B. A., & Khan, A. S. (2015). Lightweight distributed geographical: A lightweight distributed protocol for virtual clustering in geographical forwarding cognitive radio sensor networks. International Journal of Communication Systems, 28(1), 1-18.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computer Technology and Science
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.