Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network

JK Samriya, S Kumar, M Kumar, M Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
IEEE Transactions on Consumer Electronics, 2023ieeexplore.ieee.org
The rapid integration of Internet of Things (IoT) services and applications across various
sectors is primarily driven by their ability to process real-time data and create intelligent
environments through artificial intelligence for service consumers. However, the security and
privacy of data have emerged as significant threats to consumers within IoT networks. Issues
such as node tampering, phishing attacks, malicious code injection, malware threats, and
the potential for Denial of Service (DoS) attacks pose serious risks to the safety and …
The rapid integration of Internet of Things (IoT) services and applications across various sectors is primarily driven by their ability to process real-time data and create intelligent environments through artificial intelligence for service consumers. However, the security and privacy of data have emerged as significant threats to consumers within IoT networks. Issues such as node tampering, phishing attacks, malicious code injection, malware threats, and the potential for Denial of Service (DoS) attacks pose serious risks to the safety and confidentiality of information. To solve this problem, we propose an integrated autonomous IoT network within a cloud architecture, employing Blockchain technology to heighten network security. The primary goal of this approach is to establish a Heterogeneous Autonomous Network (HAN), wherein data is processed and transmitted through cloud architecture. This network is integrated with a Reinforced Neural Network (RNN) called ClouD_RNN, specifically designed to classify the data perceived and collected by sensors. Further, the collected data is continuously monitored by an autonomous network and classified for fault detection and malicious activity. In addition, network security is enhanced by the Blockchain Adaptive Windowing Meta Optimization Protocol (BAW_MOP). Extensive experimental results validate that our proposed approach significantly outperforms state-of-the-art approaches in terms of throughput, accuracy, end-to-end delay, data delivery ratio, network security, and energy efficiency.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果