Towards IoT device privacy & data integrity through decentralized storage with blockchain and predicting malicious entities by stacked machine learning
IF 6 3区 计算机科学Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Zahoor Ali Khan , Nadeem Javaid , Arooba Saeed , Imran Ahmed , Farrukh Aslam Khan
{"title":"Towards IoT device privacy & data integrity through decentralized storage with blockchain and predicting malicious entities by stacked machine learning","authors":"Zahoor Ali Khan , Nadeem Javaid , Arooba Saeed , Imran Ahmed , Farrukh Aslam Khan","doi":"10.1016/j.iot.2025.101642","DOIUrl":null,"url":null,"abstract":"<div><div>Blockchain technology offers significant advantages in securing the internet of things (IoT) networks. However, IoT devices remain highly vulnerable to security and privacy threats, making them prime targets for malicious activities. This study addresses key challenges in IoT security, including ensuring device authenticity, preserving data integrity through decentralized storage, and enhancing the explainability of predictive models. To tackle these challenges, a novel approach integrating blockchain and machine learning (ML) is proposed. A stacking-based classification model is introduced to differentiate between legitimate and malicious IoT entities. At the base layer, the model leverages the extra trees, multinomial Naive Bayes, and Bernoulli Naive Bayes classifiers, while the logistic regression with cross-validation classifier functions as the meta-model. The preprocessing pipeline includes data normalization and handling of missing values to improve model robustness. To further strengthen security, a local blockchain is implemented on an IoT device manager to register IoT requestors with unique addresses. The Keccak256 hashing algorithm converts these addresses into hashes, which are securely stored on the local blockchain. The actual data is managed using the interplanetary file system, while block validation is performed using a proof-of-stake consensus mechanism. The proposed model classifies IoT devices with superior performance compared to baseline classifiers. Experimental results demonstrate the effectiveness of the stacking model, achieving notable improvements: a 6.90% increase in macro-recall, a 4.49% improvement in the Matthews correlation coefficient and Cohen’s kappa, a 3.33% enhancement in the macro-F1-score, and approximately a 1.02% gain in accuracy, micro-precision, micro-recall, and area under the receiver operating characteristics curve. Additionally, log loss and Hamming loss are reduced by 50%, indicating enhanced reliability and lower error rates. Results of the proposed stacking model are further assessed using the Friedman statistical test and 10-fold cross-validation techniques. To ensure interpretability, Shapley additive explanations and local interpretable model-agnostic explanations are employed, providing insights into model decisions. These findings underscore the effectiveness of the proposed approach in improving IoT security by combining blockchain for decentralized authentication and explainable ML for transparent decision-making.</div></div>","PeriodicalId":29968,"journal":{"name":"Internet of Things","volume":"32 ","pages":"Article 101642"},"PeriodicalIF":6.0000,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2542660525001568","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Blockchain technology offers significant advantages in securing the internet of things (IoT) networks. However, IoT devices remain highly vulnerable to security and privacy threats, making them prime targets for malicious activities. This study addresses key challenges in IoT security, including ensuring device authenticity, preserving data integrity through decentralized storage, and enhancing the explainability of predictive models. To tackle these challenges, a novel approach integrating blockchain and machine learning (ML) is proposed. A stacking-based classification model is introduced to differentiate between legitimate and malicious IoT entities. At the base layer, the model leverages the extra trees, multinomial Naive Bayes, and Bernoulli Naive Bayes classifiers, while the logistic regression with cross-validation classifier functions as the meta-model. The preprocessing pipeline includes data normalization and handling of missing values to improve model robustness. To further strengthen security, a local blockchain is implemented on an IoT device manager to register IoT requestors with unique addresses. The Keccak256 hashing algorithm converts these addresses into hashes, which are securely stored on the local blockchain. The actual data is managed using the interplanetary file system, while block validation is performed using a proof-of-stake consensus mechanism. The proposed model classifies IoT devices with superior performance compared to baseline classifiers. Experimental results demonstrate the effectiveness of the stacking model, achieving notable improvements: a 6.90% increase in macro-recall, a 4.49% improvement in the Matthews correlation coefficient and Cohen’s kappa, a 3.33% enhancement in the macro-F1-score, and approximately a 1.02% gain in accuracy, micro-precision, micro-recall, and area under the receiver operating characteristics curve. Additionally, log loss and Hamming loss are reduced by 50%, indicating enhanced reliability and lower error rates. Results of the proposed stacking model are further assessed using the Friedman statistical test and 10-fold cross-validation techniques. To ensure interpretability, Shapley additive explanations and local interpretable model-agnostic explanations are employed, providing insights into model decisions. These findings underscore the effectiveness of the proposed approach in improving IoT security by combining blockchain for decentralized authentication and explainable ML for transparent decision-making.
期刊介绍:
Internet of Things; Engineering Cyber Physical Human Systems is a comprehensive journal encouraging cross collaboration between researchers, engineers and practitioners in the field of IoT & Cyber Physical Human Systems. The journal offers a unique platform to exchange scientific information on the entire breadth of technology, science, and societal applications of the IoT.
The journal will place a high priority on timely publication, and provide a home for high quality.
Furthermore, IOT is interested in publishing topical Special Issues on any aspect of IOT.