Kavitha Dhanushkodi, Kiruthika Venkataramani, Naghul Pranav K R, Ravikumar Sethuraman
{"title":"BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology","authors":"Kavitha Dhanushkodi, Kiruthika Venkataramani, Naghul Pranav K R, Ravikumar Sethuraman","doi":"10.1002/ett.70037","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70037","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications