A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems
Abstract
:1. Introduction
1.1. Motivation and Objective
1.2. Contribution
- First, we propose a Viterbi algorithm to generate the fitness score and accuracy of the decision-making process by each communicating node in the network.
- Secondly, an indirect trust computation method is used to analyze the legitimacy and malicious behavior of each node.
- Lastly, a blockchain mechanism is integrated with the Viterbi algorithm and indirect trust method for maintaining transparency and security in the IIoT system.
- A thorough comparison is conducted between the existing and proposed mechanism for validating and verifying the out-performance of the system against various security measures. The simulated results demonstrate the worthy improvement in the IIoT performance.
2. Related Work
3. Proposed Approach
3.1. Data Generation and Collection Phase
3.2. Classification Phase
3.3. Viterbi Method
4. Performance Analysis
4.1. Baseline Mechanisms
4.2. Measuring Parameters
4.3. Evaluation
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wilamowski, B.M.; Irwin, J.D. (Eds.) Intelligent Systems; CRC Press: Boca Raton, FL, USA, 2018. [Google Scholar]
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial internet of things: Challenges, opportunities, and directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Malik, P.K.; Sharma, R.; Singh, R.; Gehlot, A.; Satapathy, S.C.; Alnumay, W.S.; Nayak, J. Industrial Internet of Things and its applications in industry 4.0: State of the art. Comput. Commun. 2021, 166, 125–139. [Google Scholar] [CrossRef]
- Tian, S.; Yang, W.; Le Grange, J.M.; Wang, P.; Huang, W.; Ye, Z. Smart healthcare: Making medical care more intelligent. Glob. Health J. 2019, 3, 62–65. [Google Scholar] [CrossRef]
- Gollmann, D. Computer security. Wiley Interdiscip. Rev. Comput. Stat. 2010, 2, 544–554. [Google Scholar] [CrossRef]
- Yang, H.; Bao, B.; Li, C.; Yao, Q.; Yu, A.; Zhang, J.; Ji, Y. Blockchain-enabled tripartite anonymous identification trusted service provisioning in industrial IoT. IEEE Internet Things J. 2021, 9, 2419–2431. [Google Scholar] [CrossRef]
- Ceccarelli, A.; Cinque, M.; Esposito, C.; Foschini, L.; Giannelli, C.; Lollini, P. FUSION—Fog computing and blockchain for trusted industrial internet of things. IEEE Trans. Eng. Manag. 2020, 1–15. [Google Scholar] [CrossRef]
- Yu, K.; Tan, L.; Aloqaily, M.; Yang, H.; Jararweh, Y. Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans. Ind. Inform. 2021, 17, 7669–7678. [Google Scholar] [CrossRef]
- Yang, Q.; Wang, H.; Wu, X.; Wang, T.; Zhang, S.; Liu, N. Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware. IEEE Internet Things Mag. 2021, 4, 86–92. [Google Scholar] [CrossRef]
- Sengupta, J.; Ruj, S.; Bit, S.D. A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 2020, 149, 102481. [Google Scholar] [CrossRef]
- Tan, S.F.; Samsudin, A. Recent Technologies, Security Countermeasure and Ongoing Challenges of Industrial Internet of Things (IIoT): A Survey. Sensors 2021, 21, 6647. [Google Scholar] [CrossRef] [PubMed]
- Lou, H.L. Implementing the Viterbi algorithm. IEEE Signal Process. Mag. 1995, 12, 42–52. [Google Scholar] [CrossRef]
- Su, B.; Du, C.; Huan, J. Trusted opportunistic routing based on node trust model. IEEE Access 2020, 8, 163077–163090. [Google Scholar] [CrossRef]
- Fu, X.; Wang, H.; Shi, P. A survey of Blockchain consensus algorithms: Mechanism, design and applications. Sci. China Inf. Sci. 2021, 64, 121101. [Google Scholar] [CrossRef]
- Lin, Y.; Gao, Z.; Shi, W.; Wang, Q.; Li, H.; Wang, M.; Rui, L. A Novel Architecture Combining Oracle with Decentralized Learning for IIoT. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
- Iqbal, S.; Noor, R.M.; Malik, A.W.; Rahman, A.U. Blockchain-enabled adaptive-learning-based resource-sharing framework for IIoT environment. IEEE Internet Things J. 2021, 8, 14746–14755. [Google Scholar] [CrossRef]
- Kumari, A.; Tanwar, S.; Tyagi, S.; Kumar, N. Blockchain-based massive data dissemination handling in IIoT environment. IEEE Netw. 2020, 35, 318–325. [Google Scholar] [CrossRef]
- Li, T.; Tian, Y.; Xiong, J.; Bhuiyan, M.Z. FVP-EOC: Fair, Verifiable and Privacy-Preserving Edge Outsourcing Computing in 5G-enabled IIoT. IEEE Trans. Ind. Inform. 2022. [Google Scholar] [CrossRef]
- Yao, H.; Gao, P.; Zhang, P.; Wang, J.; Jiang, C.; Lu, L. Hybrid intrusion detection system for edge-based IIoT relying on machine-learning-aided detection. IEEE Netw. 2019, 33, 75–81. [Google Scholar] [CrossRef]
- Alsaedi, A.; Moustafa, N.; Tari, Z.; Mahmood, A.; Anwar, A. TON_IoT telemetry dataset: A new generation dataset of IoT and IIoT for data-driven intrusion detection systems. IEEE Access 2020, 8, 165130–165150. [Google Scholar] [CrossRef]
- Kasongo, S.M. An advanced intrusion detection system for IIoT based on GA and tree based algorithms. IEEE Access 2021, 9, 113199–113212. [Google Scholar] [CrossRef]
- Abdel-Basset, M.; Chang, V.; Hawash, H.; Chakrabortty, R.K.; Ryan, M. Deep-IFS: Intrusion detection approach for industrial internet of things traffic in fog environment. IEEE Trans. Ind. Inform. 2020, 17, 7704–7715. [Google Scholar] [CrossRef]
- Alruwaili, F.F. Intrusion Detection and Prevention in Industrial IoT: A Technological Survey. In Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME); IEEE: New York, NY, USA, 2021; pp. 1–5. [Google Scholar]
- Gyamfi, E.; Jurcut, A.D. Novel Online Network Intrusion Detection System for Industrial IoT based on OI-SVDD and AS-ELM. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
- Yazdinejad, A.; Dehghantanha, A.; Parizi, R.M.; Hammoudeh, M.; Karimipour, H.; Srivastava, G. Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks. arXiv 2022, arXiv:2204.09829. [Google Scholar] [CrossRef]
- Rathee, G.; Kerrache, C.A.; Lahby, M. TrustBlkSys: A Trusted and Blockchained Cybersecure System for IIoT. IEEE Trans. Ind. Inform. 2022, 1–8. [Google Scholar] [CrossRef]
- Rathee, G.; Ahmad, F.; Hu, R.; Kerrache, C.A.; Azad, M.A. On the design and implementation of a secure blockchain-based hybrid framework for Industrial Internet-of-Things. Inf. Process. Manag. 2021, 58, 102526. [Google Scholar] [CrossRef]
- Le, T.T.H.; Oktian, Y.E.; Kim, H. XGBoost for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems. Sustainability 2022, 14, 8707. [Google Scholar] [CrossRef]
- Tharewal, S.; Ashfaque, M.W.; Banu, S.S.; Uma, P.; Hassen, S.M.; Shabaz, M. Intrusion detection system for industrial Internet of Things based on deep reinforcement learning. Wirel. Commun. Mob. Comput. 2022, 2022, 9023719. [Google Scholar] [CrossRef]
- Mansour, R.F. Blockchain assisted clustering with Intrusion Detection System for Industrial Internet of Things environment. Expert Syst. Appl. 2022, 207, 117995. [Google Scholar] [CrossRef]
Author Name | Description | Limitation |
---|---|---|
Yao et al. [19] | Authors have further proposed a hybrid intrusion detection architecture by introducing a machine learning-aided method. | The authors have used machine learning techniques that may further increase the computational steps in the network. |
Kasongo [21] | The authors have proposed an IDS genetic algorithm that further includes extra trees, naïve Bayes, linear regression, decision tree, and RF. | The integration of multiple algorithms increased the complexity and computation in the network. |
Basset et al. [22] | The authors have proposed a forensics-based deep learning mechanism for identifying intrusions in industrial traffics. | The deep learning mechanism may further involve multiple layers to identify the legitimacy of a device, which may further increase the delay in the network. |
Alruwaili [23] | The authors have proposed and investigated cybersecurity issues by identifying the prevention and intrusion detection gaps in the field of IIoT. | The authors have not identified the threats specifically related to industrial sectors. |
Gyamfi and Jurcut [24] | The authors have proposed a lightweight intrusion detection system based on online support vector data description using an adaptive sequential learning machine. | The proposed mechanism increased the communicational overhead in the network. |
Yazdinejad et al. [25] | The authors have proposed a federated learning mechanism to build a framework for automatically hunting the threats in blockchain-based industrial networks. | The proposed framework may further increase the storage and computational overhead while categorizing or identifying the legitimate devices in the network |
Symbol | Definition |
---|---|
Probability rate of device from i to j state having ‘l’ sequence of input | |
Initial probability rate of state i | |
Probability rate output of state i | |
Transition from state i to j |
Type | % of Threat Request | Phases of Security | Source Name |
---|---|---|---|
Ideal | 0 | 0 | 25 |
Malevolent | 15% | 2, 3 | 10 |
Prone to threat | 20% | 1, 4, 5 | 15 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rathee, G.; Kerrache, C.A.; Ferrag, M.A. A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems. J. Sens. Actuator Netw. 2022, 11, 71. https://doi.org/10.3390/jsan11040071
Rathee G, Kerrache CA, Ferrag MA. A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems. Journal of Sensor and Actuator Networks. 2022; 11(4):71. https://doi.org/10.3390/jsan11040071
Chicago/Turabian StyleRathee, Geetanjali, Chaker Abdelaziz Kerrache, and Mohamed Amine Ferrag. 2022. "A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems" Journal of Sensor and Actuator Networks 11, no. 4: 71. https://doi.org/10.3390/jsan11040071
APA StyleRathee, G., Kerrache, C. A., & Ferrag, M. A. (2022). A Blockchain-Based Intrusion Detection System Using Viterbi Algorithm and Indirect Trust for IIoT Systems. Journal of Sensor and Actuator Networks, 11(4), 71. https://doi.org/10.3390/jsan11040071