BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Kavitha Dhanushkodi, Kiruthika Venkataramani, Naghul Pranav K R, Ravikumar Sethuraman
{"title":"BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology","authors":"Kavitha Dhanushkodi,&nbsp;Kiruthika Venkataramani,&nbsp;Naghul Pranav K R,&nbsp;Ravikumar Sethuraman","doi":"10.1002/ett.70037","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70037","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.

Abstract Image

求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信