Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS
Sourav Mishra, Vijay Kumar Chaurasiya
{"title":"Secure Transactions in IoT Network Using PINN-Based Intrusion Detection System and HDPoA Blockchain Protocol","authors":"Sourav Mishra,&nbsp;Vijay Kumar Chaurasiya","doi":"10.1002/ett.70116","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>IoT is a rapidly developing technology with a wealth of creative application possibilities. However, IoT wireless sensor networks are vulnerable to Denial of Service (DoS) attacks due to their insecure nature. Although network integrity and security have been ensured through the use of distributed ledger and blockchain technologies, privacy preservation concerns frequently arise with traditional approaches. So, deep learning-based Physics-informed neural networks (PINN) and Honesty-based Distributed Proof-of-Authority (HDPoA) are developed to enhance transaction security and detect intrusions. Initially, the mobile nodes were deployed in different regions to gather transactions and an intrusion detection system to analyze attacks. First, the Intrusion Detection System (IDS) uses a deep learning approach for detecting the intrusion in the network. For that, the collected data from the deployed nodes are pre-processed using Variational auto-encoder and min-max normalization to standardize input dataset values. Then the features are selected using wild horse optimization and classified using PINN to predict data attack or non-attack. After that, Homomorphic variable tag generation is used for normal transactions with multiple copies in the same document, which are then converted into hash values using the Keccak hashing function. The miner validates transactions based on rank-based priority. Honesty-based Distributed Proof-of-Authority (HDPoA) was used for network security, making it suitable for deployment in blockchain-based IoT applications. The proposed deep learning-based PINN classifier reached 97.2% accuracy and 96.52% specificity. Homomorphic variable (HV) tag generation takes 0.4 s, while the Keccak algorithm takes 0.3 s for hash generation, and the HDPoA protocol has 420 s for block generation time.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70116","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

IoT is a rapidly developing technology with a wealth of creative application possibilities. However, IoT wireless sensor networks are vulnerable to Denial of Service (DoS) attacks due to their insecure nature. Although network integrity and security have been ensured through the use of distributed ledger and blockchain technologies, privacy preservation concerns frequently arise with traditional approaches. So, deep learning-based Physics-informed neural networks (PINN) and Honesty-based Distributed Proof-of-Authority (HDPoA) are developed to enhance transaction security and detect intrusions. Initially, the mobile nodes were deployed in different regions to gather transactions and an intrusion detection system to analyze attacks. First, the Intrusion Detection System (IDS) uses a deep learning approach for detecting the intrusion in the network. For that, the collected data from the deployed nodes are pre-processed using Variational auto-encoder and min-max normalization to standardize input dataset values. Then the features are selected using wild horse optimization and classified using PINN to predict data attack or non-attack. After that, Homomorphic variable tag generation is used for normal transactions with multiple copies in the same document, which are then converted into hash values using the Keccak hashing function. The miner validates transactions based on rank-based priority. Honesty-based Distributed Proof-of-Authority (HDPoA) was used for network security, making it suitable for deployment in blockchain-based IoT applications. The proposed deep learning-based PINN classifier reached 97.2% accuracy and 96.52% specificity. Homomorphic variable (HV) tag generation takes 0.4 s, while the Keccak algorithm takes 0.3 s for hash generation, and the HDPoA protocol has 420 s for block generation time.

求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信