A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing
Abstract
:Featured Application
Abstract
1. Introduction
2. State-of-the-Art: A Review
3. The Proposed Architecture
3.1. Physical Sensing Layer
3.2. Network and Protocol Layer
3.3. Blockchain Tools and Transport Layer
3.4. Application Layer
3.5. Advanced Service Layer
4. Comparison of Our Design Approach with the Existing Literature: Potential Benefits
5. Validation and Data Analysis with ML
5.1. Selected Attacks
5.2. First Scenario: Experimentation without BCT
- The attributes related to processor information include Processor_pct_User Time, Processor_pct_Processor_Time, Processor_pct_Privileged_Time and so on.
- The process information attributes cover Process_IORead_Operations_sec, Process_IO_WriteOperations_sec, Process_IO_Write_Bytes_sec and so on.
- The packet information attributes involve Network_I(IntelR_82574L_GNC)PacketsReceivedUnknown, Network_I(IntelR_82574L_GNC, Packets Outbound Errors, Network_I(Intel R _82574L_GNC), PacketsSentUnicastsec and so on.
- Memory information attributes are (but are not limited to) MemoryAvailable Bytes, Memory Cache Bytes and MemoryPage Faultssec.
- Logical disk information attributes contain LogicalDisk(_Total)pct_DiskReadTime, LogicalDisk(_Total)DiskWritessec and LogicalDisk(_Total)CurrentDiskQueue Length,
- Accuracy defined as:
- Precision defined as:
- Sensitivity defined as the proportion of actual positives which are predicted positive:
- Matthews Correlation Coefficient (MCC): defines the correlation between the predicted value and the observed one [4]. MCC measures the quality of a classifier to perform a classification task.
- Upload the TON_IoT dataset.
- Data pre-processing (a CFS is selected for the attribute evaluator and best first is selected for the search method).
- Select the classifier type and configure the classifier parameters.
- Model training.
- Test phase and select the test options (cross-validation = 10-fold).
- Run the simulation to evaluate predictive accuracy.
- The name of the ANN classifier in the WEKA environment is called multilayer perceptron: a classifier using the backpropagation technique to classify instances. In our experiments, the multilayer perceptron classifier parameters were set as follows: MultilayerPerceptron -L 0.3 -M 0.2 -N 500 -V 0 -S 0 -E 20 -H a. Here, the LearningRate (the learning rate for weight updates) is equal to 0.3, Momentum = 0.2, TrainingTime = 500, Validation threshold = 20, HiddenLayer (to define the hidden layers of the neural network) equal to a (attributes + classes)
- Regarding the decision tree classifier under the WEKA environment, REPTree classifier was selected and defined as a fast decision tree learner with the following setting: REPTree -M 2 -V 0.001 -N 3 -S 1 -L -1 -I 0.0. Here, numFolds (the specified number of folds of data used for pruning the decision tree) equals 3, minNum (minimum number of instances per leaf) equals 2 and minVarianceProp (the minimum proportion of the variance on all the data that need to be present at a node) equals 0.001.
- In the WEKA environment, the SVM classifier is called SMO and it implements John Platt’s sequential minimal optimization algorithm for training a support vector classifier. For SMO, the following options are active: SMO -C 1.0 -L 0.001 -P 1.0E-12 -N 0 -V -1 -W 1 -K “weka.classifiers.functions.supportVector.PolyKernel -E 1.0 -C 250007” -calibrator “weka.classifiers.functions.Logistic -R 1.0E-8 -M -1 -num-decimal-places 4”. Here, epsilon (the epsilon for round-off error) is set to 1.0E-12, SVM kernel (i.e., polynomial kernel) is set to -K “weka.classifiers.functions.supportVector.PolyKernel -E 1.0 -C 250007” and calibrator (the calibration method to use) is set to “weka.classifiers.functions.Logistic -R 1.0E-8 -M -1 -num-decimal-places 4”.
- The Random Forest classifier under WEKA was selected, which is defined as a class for constructing a forest of random trees with the following setting: RandomForest -P 100 -I 100 -num-slots 1 -K 0 -M 1.0 -V 0.001 -S 1, where bagSizePercent (size of each bag, as a percentage of the training set size) equals 100, numIterations (the number of trees in the random forest) equals 100 and maxDepth (the maximum depth of the tree, 0 for unlimited) is equal to 0.
- Naïve Bayes classifier, a statistical classifier, has been adopted. It assumes that the values of attributes in the classes are independent. This assumption is called class conditional independence and it is based on Bayes’ theorem. Under WEKA, the NB classifier is called Naive Bayes using estimator classes. Therefore, the Naive Bayes parameters were set as follows: useKernelEstimator (use a kernel estimator for numeric attributes rather than a normal distribution) is set to false, numDecimalPlaces (the number of decimal places to be used for the output of numbers in the model) is set to 2, and batchSize (the preferred number of instances to process if batch prediction is being performed) is set to 100.
- Finally, AdaBoost classifier is used for comparison purposes. It is defined as an adaptive boosting algorithm based on minimizing the exponential loss function. Therefore, the AdaBoost parameters in WEKA were set as follows: AdaBoostM1 -P 100 -S 1 -I 10 -W weka.classifiers.trees.DecisionStump, where the base classifier to be used is DecisionStump and batchSize is set to 100.
5.3. Second Scenario: Experimentation with BCT
- Data sensing gathered from physical layer (including read/write of new sensor value and authentication request).
- Data control and validation performed by the access control system in the transport layer level (i.e., the client process will prepare the sensorID, userID and userpwd to be sent to server process for an authentication request).
- BC access control data structure will be used to save relevant data related to sensor authentication process (i.e., including authentication identity, authorized persons, location for the same command and the number of tentative with wrong password. All collected data are used to create a smart contract describing the sensor information asset performed by the application layer to provide sensor authentication service.
- ML tools and optimization technique. This process is carried out by the advanced service layer based on the information provided by the BC access control data structure to detect DDoS and brute force attacks by using the gathered data (i.e., LocationForSameCommand and Numberoftentativewithwrongpassword will serve as features). The optimization technique is employed through the usage of the SMO classifier (a kind of SVM classifier) by implementing John Platt’s sequential minimal optimization algorithm for training a support vector classifier.
- Data analysis and performance metrics: this step is required to determine the performance evaluation of the proposed model in terms of the four introduced metrics (accuracy, precision, sensitivity and MCC).
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kusiak, A. Smart manufacturing. Int. J. Prod. Res. 2017, 56, 508–517. [Google Scholar] [CrossRef]
- Kagermann, C.H.; Helbig, J.; Hellinger, A.; Wahlster, W. Recommendations for Implementing the Strategic Initiative Industry 4.0: Securing the Future of German Manufacturing Industry; Final Report of the Industrie 4.0 Working Group. 2013. Available online: https://www.din.de/blob/76902/e8cac883f42bf28536e7e8165993f1fd/recommendations-for-implementing-industry-4-0-data.pdf (accessed on 1 February 2022).
- Da Xu, L.; Xu, E.L.; Li, L. Industry 4.0: State of the art and future trends. Int. J. Prod. Res. 2018, 56, 2941–2962. [Google Scholar]
- Zolanvari, M.; Teixeira, M.A.; Gupta, L.; Khan, K.M.; Jain, R. Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE Internet Things J. 2019, 6, 6822–6834. [Google Scholar] [CrossRef] [Green Version]
- Tuptuk, N.; Hailes, S. Security of smart manufacturing systems. J. Manuf. Syst. 2018, 47, 93–106. [Google Scholar] [CrossRef]
- Mitchell, T.M. Machine Learning; McGraw-Hill: New York, NY, USA, 1997; Volume 45. ISBN 007042 8077.
- Aboelwafa, M.M.N.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [Google Scholar] [CrossRef]
- Latif, S.; Zou, Z.; Idrees, Z.; Ahmad, J. A Novel Attack Detection Scheme for the Industrial Internet of Things Using a Lightweight Random Neural Network. IEEE Access 2020, 8, 89337–89350. [Google Scholar] [CrossRef]
- Ambika, P. Chapter Thirteen—Machine Learning and Deep Learning Algorithms on the Industrial Internet of Things (IIoT); Raj, P., Evangeline, P., Eds.; Advances in Computers 2020; Elsevier: Amsterdam, The Netherlands, 2020; Volume 117, pp. 321–338. [Google Scholar]
- El Mamy, S.; Mrabet, H.; Gharbi, H.; Jemai, A.; Trentesaux, D. A Survey on the Usage of Blockchain Technology for Cyber-Threats in the Context of Industry 4.0. Sustainability 2020, 12, 9179. [Google Scholar] [CrossRef]
- Mrabet, H.; Belguith, S.; Alhomoud, A.; Jemai, A. A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors 2020, 20, 3625. [Google Scholar] [CrossRef]
- Gao, J.; Asamoah, K.O.; Sifah, E.B.; Smahi, A.; Xia, Q.; Xia, H.; Zhang, X.; Dong, G. GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access 2018, 6, 9917–9925. [Google Scholar] [CrossRef]
- Dai, H.-N.; Zheng, Z.; Zhang, Y. Blockchain for Internet of Things: A Survey. IEEE Internet Things J. 2019, 6, 8076–8094. [Google Scholar] [CrossRef] [Green Version]
- Zhao, S.; Li, S.; Yao, Y. Blockchain Enabled Industrial Internet of Things Technology. IEEE Trans. Comput. Soc. Syst. 2019, 6, 1442–1453. [Google Scholar] [CrossRef]
- Shahbazi, Z.; Byun, Y.-C. Integration of Blockchain, IoT and Machine Learning for Multistage Quality Control and Enhancing Security in Smart Manufacturing. Sensors 2021, 21, 1467. [Google Scholar] [CrossRef] [PubMed]
- Maleh, Y.; Shojafar, M.; Alazab, M.; Romdhani, I. Blockchain for Cybersecurity and Privacy Architectures, Challenges, and Applications; CRC Press: Boca Raton, FL, USA, 2020. [Google Scholar]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 March 2022).
- Said, A.; Janjua, M.U.; Hassan, S.-U.; Muzammal, Z.; Saleem, T.; Thaipisutikul, T.; Tuarob, S.; Nawaz, R. Detailed analysis of Ethereum network on transaction behavior, community structure and link prediction. PeerJ Comput. Sci. 2021, 7, e815. [Google Scholar] [CrossRef]
- Jović, M.; Tijan, E.; Žgaljić, D.; Aksentijević, S. Improving Maritime Transport Sustainability Using Blockchain-Based Information Exchange. Sustainability 2020, 12, 8866. [Google Scholar] [CrossRef]
- Litke, A.; Anagnostopoulos, D.; Varvarigou, T. Blockchains for Supply Chain Management: Architectural Elements and Chal-lenges towards a Global Scale Deployment. Logistics 2019, 3, 5. [Google Scholar] [CrossRef] [Green Version]
- Prashar, D.; Jha, N.; Jha, S.; Lee, Y.; Joshi, G. Blockchain-Based Traceability and Visibility for Agricultural Products: A Decen-tralized Way of Ensuring Food Safety in India. Sustainability 2020, 12, 3497. [Google Scholar] [CrossRef] [Green Version]
- Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2017, 14, 1. [Google Scholar] [CrossRef] [Green Version]
- Klöckner, M.; Kurpjuweit, S.; Velu, C.; Wagner, S.M. Does Blockchain for 3D Printing Offer Opportunities for Business Model Innovation? Res. Manag. 2020, 63, 18–27. [Google Scholar] [CrossRef]
- Wang, Y.-C.; Chen, C.-L.; Deng, Y.-Y. Authorization Mechanism Based on Blockchain Technology for Protecting Museum-Digital Property Rights. Appl. Sci. 2021, 11, 1085. [Google Scholar] [CrossRef]
- Liang, G.; Weller, S.R.; Luo, F.; Zhao, J.; Dong, Z.Y. Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks. IEEE Trans. Smart Grid 2018, 10, 3162–3173. [Google Scholar] [CrossRef]
- Aitzhan, N.Z.; Svetinovic, D. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
- Lin, C.; He, D.; Huang, X.; Choo, K.-K.R.; Vasilakos, A.V. BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 2018, 116, 42–52. [Google Scholar] [CrossRef]
- Tanwar, S.; Bhatia, Q.; Patel, P.; Kumari, A.; Singh, P.K.; Hong, W.-C. Machine Learning Adoption in Blockchain-Based Smart Applications: The Challenges, and a Way Forward. IEEE Access 2019, 8, 474–488. [Google Scholar] [CrossRef]
- Jameel, F.; Javaid, U.; Khan, W.; Aman, M.; Pervaiz, H.; Jäntti, R. Reinforcement Learning in Blockchain-Enabled IIoT Networks: A Survey of Recent Advances and Open Challenges. Sustainability 2020, 12, 5161. [Google Scholar] [CrossRef]
- Javaid, M.; Haleem, A.; Singh, R.P.; Khan, S.; Suman, R. Blockchain technology applications for Industry 4.0: A literature-based review. Blockchain Res. Appl. 2021, 2, 100027. [Google Scholar] [CrossRef]
- Rathee, G.; Balasaraswathi, M.; Chandran, K.P.; Gupta, S.D.; Boopathi, C.S. A secure IoT sensors communication in industry 4.0 using blockchain technology. J. Ambient Intell. Humaniz. Comput. 2020, 12, 533–545. [Google Scholar] [CrossRef]
- Shrivastava, A.; Krishna, K.M.; Rinawa, M.L.; Soni, M.; Ramkumar, G.; Jaiswal, S. Inclusion of IoT, ML, and Blockchain Technologies in Next Generation Industry 4.0 Environment. Mater. Today Proc. 2021. [Google Scholar] [CrossRef]
- Leng, J.; Ye, S.; Zhou, M.; Zhao, J.L.; Liu, Q.; Guo, W.; Cao, W.; Fu, L. Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey. IEEE Trans. Syst. Man, Cybern. Syst. 2020, 51, 237–252. [Google Scholar] [CrossRef]
- Faridi, M.S.; Ali, S.; Duan, G.; Wang, G. Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. In Security, Privacy, and Anonymity in Computation, Communication, and Storage; Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H., Eds.; SpaCCS 2020. Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2021; Volume 12382. [Google Scholar]
- Chen, Y.; Lu, Y.; Bulysheva, L.; Kataev, M.Y. Applications of Blockchain in Industry 4.0: A Review. Inf. Syst. Front. 2022, 1–15. [Google Scholar] [CrossRef]
- Ghaffari, F.; Bertin, E.; Crespi, N.; Behrad, S.; Hatin, J. A Novel Access Control Method Via Smart Contracts for Internet-Based Service Provisioning. IEEE Access 2021, 9, 81253–81273. [Google Scholar] [CrossRef]
- Zaidi, S.Y.A.; Shah, M.A.; Khattak, H.A.; Maple, C.; Rauf, H.T.; El-Sherbeeny, A.M.; El-Meligy, M.A. An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts. Sustainability 2021, 13, 10556. [Google Scholar] [CrossRef]
- Kirli, D.; Couraud, B.; Robu, V.; Salgado-Bravo, M.; Norbu, S.; Andoni, M.; Antonopoulos, I.; Negrete-Pincetic, M.; Flynn, D.; Kiprakis, A. Smart contracts in energy systems: A systematic review of fundamental approaches and implementations. Renew. Sustain. Energy Rev. 2022, 158, 112013. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Derdour, M.; Mukherjee, M.; Derhab, A.; Maglaras, L.; Janicke, H. Blockchain Technologies for the Internet of Things: Research Issues and Challenges. IEEE Internet Things J. 2019, 6, 2188–2204. [Google Scholar] [CrossRef] [Green Version]
- Moustafa, N. New Generations of Internet of Things Datasets for Cybersecurity Applications based Machine Learning: TON_IoT Datasets. In Proceedings of the eResearch Australasia Conference 2019, Brisbane, Australia, 21–25 October 2019. [Google Scholar]
- Taha, S.; Abdulrazzaq, F.; Safauldeen Omar, M.; Mustafa, A. Decentralized security and data integrity of blockchain using deep learning techniques. Period. Eng. Nat. Sci. 2020, 8, 1911–1923. [Google Scholar]
- Gadekallu, T.R.; Kumar, N.; Hakak, S.; Bhattacharya, S. Blockchain-Based Attack Detection on Machine Learning Algorithms for IoT-Based e-Health Applications. IEEE Internet Things Mag. 2021, 4, 30–33. [Google Scholar] [CrossRef]
- Scicchitano, F.; Liguori, A.; Guarascio, M.; Ritacco, E.; Manco, G. A Deep Learning Approach for Detecting Security Attacks on Blockchain. In Proceedings of the Fourth Italian Conference on Cyber Security (ITASEC), Ancona, Italy, 24–25 May 2020; pp. 212–222. [Google Scholar]
- Afaq, A.; Ahmed, Z.; Haider, N.; Imran, M. Blockchain-based Collaborated Federated Learning for Improved Security, Privacy and Reliability. arXiv 2022, arXiv:2201.08551. [Google Scholar]
Years | Authors | Focus |
---|---|---|
2018 | Gao et al. [12] | Authors have proposed a monitoring system based on smart contract to identify malicious usage of electrical power. |
2018 | Li et al. [22] | Authors have introduced the energy BC based on the consortium BCT and the Stackelberg game. |
2018 | Aitzhan et al. [26] | Authors have implemented a token-based private decentralized energy trading system. |
2018 | Lin et al. [27] | A four-layer framework based on smart contract BCT for fine-grained access control system is proposed for Industry 4.0. |
2019 | Dai et al. [13] | Authors have proposed a four-layer architecture for the concept of Blockchain of Things (BCoT) in industrial applications. |
2019 | Zhao et al. [14] | Authors have proposed a new architecture based on smart contract for client and resource registrations in IIoT. |
2019 | Liang et al. [25] | Authors have proposed a data protection framework based on distributed BC. |
2019 | Tanwar et al. [28] | Authors have proposed a hybrid technique based on BC and ML to detect attacks for energy-trading applications. |
2020 | Jameel et al. [29] | Authors have proposed a reinforcement learning technique to address the block time minimization and transaction throughput of blockchain-based IIoT networks. |
2021 | Shahbazi et al. [15] | Authors have proposed a new architecture based on smart contract, BC and ML for quality control in smart manufacturing application. |
2021 | Javaid et al. [30] | Authors have proposed BCT applications for Industry 4.0 such as manufacturing data protection, automotive, information and security. |
2021 | Rathee et al. [31] | An IIoT framework based on BC for sensor authentication is proposed by the authors. |
2021 | Shrivastava et al. [32] | The paper exposes the main enabling technologies for Industry 4.0 such as IoT, Artificial Intelligence, cloud computing and BC. |
2021 | Leng et al. [33] | Authors present the various metrics for the usage of BC in manufacturing. |
2021 | Faridi et al. [34] | Authors propose BC and IoT-based product traceability system for textile manufacturing applications. |
2022 | Chen et al. [35] | The review paper discusses the BC applications in Industry 4.0 such as authentication, asset tracking and smart contract exchange. |
Architecture | Description | Smart Contract Data Structure | Design Approach: Discussion |
---|---|---|---|
Latif et al. [8] | The authors propose an IIoT system architecture based on four layers such as physical, network, middleware and application layers. | Not applicable. | Authors suggest a solution based on ML to detect DDoS, malware, and advanced persistent threats in the edge and fog computing. The architecture can be enforced with BC to provide traceability and integrity. |
Gao et al. [12] | The GridMonitoring system is based on four layers for smart grid network applications. | Smart contract is employed for the recording of the violations on the smart meter, data on the smart grid network and the state of the smart meter. | The benefit of the proposed solution beside the BCT is the usage of an authentication mechanism and data center to save all information to report any violations. The solution employed a classical smart contract database to report any violations that can be the object of an injection attack. The solution can be enhanced with an ML-based solution to prevent injection and XSS attacks. |
Dai et al. [13] | The architecture is composed of perception, communication, Blockchain-composite and industrial applications layers. | The survey paper exhibits the life cycle of smart contracts including creation, deployment, execution and completion. | The architecture is highly structured. BC-composite layer includes data, consensus and network sub-layers. Merging data and network in one layer can lead to serious privacy violations in case of MitM attacks. |
Zhao et al. [14] | The proposed architecture is based on three layers incorporating BC, data and governance layers. | A smart contract is used for both client and resource registrations. | The number of layers is optimized. The solution lacks a cloud data storage to recover data from disaster situations. |
Shahbazi et al. [15] | The suggested architecture is based on a smart contract between manufacturer and supplier for quality control applications in smart manufacturing. | The proposed BC data structure is used to store manufacturer and supplier data. | The proposed architecture is composed of three layers such as sensor layer, smart contract layer and distributed ledger layer. |
Zaidi et al. [37] | Authors propose an access control contract to control the request sent by subjects to IoT objects. | Authors propose three types such as object attribute management contract, subject attribute management contract and policy management contract. | ML is not suggested in the proposed architecture. |
Our architecture | The architecture is based on five layers including physical sensing, network/protocols, Transport-BC, application and advanced service layers. | A smart contract data structure and algorithm are proposed for sensor access control system, DDoS and brute force attacks prediction. | The BC components are dispatched into two layers such as BC tools and transport layer and advanced service layer. On the one hand, BC tools and transport layer provides data integrity. On the other hand, advanced service layer offers data traceability. |
Security Metric | GridMonitoring [12] | Zhao [14] | BSeIn [27] | ABAC [37] | Our Proposal |
---|---|---|---|---|---|
Integrity | 🗸 | 🗸 | × | 🗸 | 🗸 |
Availability | 🗸 | × | × | 🗸 | 🗸 |
Immutability | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 |
Confidentiality | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 |
Privacy | × | × | 🗸 | 🗸 | 🗸 |
Layer | Attacks | Description |
---|---|---|
ML, Data and cloud services | Poisoning | Attack against ML via injecting adversarial samples to the training data in order to distort the model prediction |
Evasion | Samples are changed at the inferring phase to evade detection | |
Impersonate | Prefers to imitate data samples from victims, in particular for application scenarios related to image recognition | |
Application | Injection | Untrusted data that are sent to an interpreter or database |
Brute force Buffer overflow XSS | An attempt to guess a password via sending various passwords This attack is targeting SCADA system and tries to overwrite a buffer to disrupt controller activity A kind of injection attack sent via a browser script | |
Transport | Flooding | Repeating the request of a new connection until the IIoT system reaches maximum level |
De-synchronization | Disruption of an existing connection | |
Network/protocol | DoS | Attempt to stop or reduce activity of an IIoT |
DDoS | A distributed DoS attack from several location | |
MitM | Violating data confidentiality or integrity during transfer | |
HELLO flood | Uses HELLO packets as weapon to launch the attack on IIoT system | |
Physical sensing | Eavesdropping | Deducing data sent by IIoT devices across network |
RFID tracking Jamming | Modifying a content of a tag or trying to disable it Creating radio interference and exhaustion on IIoT devices |
Type | Label | Description |
---|---|---|
0 | normal | Normal activity |
1 | ddos | Distributed denial of service attack |
2 | dos | Denial of service attack |
3 | injection | Injection attack |
4 | mitm | Man in the middle attack |
5 | password | Brute force attack |
6 | xss | Cross-site scripting attack |
7 | scanning | Port scanning attack |
ANN | DT | SVM | RF | NB | AdaBoost | |
---|---|---|---|---|---|---|
Time to build the model (s) | 3232.14 | 30.59 | 2.31 | 13.6 | 0.55 | 3.81 |
Time to test model on training data (s) | 2.72 | 0.12 | 0.22 | 0.42 | 3.06 | 0.55 |
Confusion Matrix | Target | ||
---|---|---|---|
Normal | Attack | ||
Model | Normal | True Positive | False Positive |
(TP) | (FP) | ||
Attack | False Negative | True Negative | |
(FN) | (TN) |
% | Normal Activity | DDoS | DoS | Injection | MitM | Brute Force | XSS | Scanning |
---|---|---|---|---|---|---|---|---|
ANN | 100 | 100 | 99.3 | 100 | 100 | 100 | 100 | 99.7 |
DT | 99.9 | 100 | 99.9 | 99.4 | 100 | 100 | 100 | 99.8 |
SVM | 100 | 100 | 100 | 100 | 100 | 99.8 | 100 | 100 |
RF | 99.5 | 99.7 | 99.3 | 99.6 | 57.7 | 99.8 | 99.4 | 99 |
NB | 61.9 | 95.8 | 56.6 | 82.4 | 11.8 | 98.2 | 87.8 | 25.1 |
% | Normal Activity | DDoS | DoS | Injection | MitM | Brute Force | XSS | Scanning |
---|---|---|---|---|---|---|---|---|
ANN | 100 | 100 | 99.3 | 100 | 100 | 100 | 100 | 99.7 |
DT | 99.9 | 100 | 99.9 | 99.6 | 100 | 100 | 100 | 99.8 |
SVM | 100 | 100 | 100 | 100 | 100 | 99.9 | 100 | 100 |
RF | 99.6 | 99.8 | 99.3 | 99.7 | 57.7 | 100 | 99.7 | 99 |
NB | 63.2 | 97.6 | 56.6 | 85.4 | 11.8 | 98.5 | 90.4 | 25.1 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mrabet, H.; Alhomoud, A.; Jemai, A.; Trentesaux, D. A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing. Appl. Sci. 2022, 12, 4641. https://doi.org/10.3390/app12094641
Mrabet H, Alhomoud A, Jemai A, Trentesaux D. A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing. Applied Sciences. 2022; 12(9):4641. https://doi.org/10.3390/app12094641
Chicago/Turabian StyleMrabet, Hichem, Adeeb Alhomoud, Abderrazek Jemai, and Damien Trentesaux. 2022. "A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing" Applied Sciences 12, no. 9: 4641. https://doi.org/10.3390/app12094641
APA StyleMrabet, H., Alhomoud, A., Jemai, A., & Trentesaux, D. (2022). A Secured Industrial Internet-of-Things Architecture Based on Blockchain Technology and Machine Learning for Sensor Access Control Systems in Smart Manufacturing. Applied Sciences, 12(9), 4641. https://doi.org/10.3390/app12094641