{"title":"基于ELCG-DSA和LWS-BiOLSTM的工业物联网入侵检测系统","authors":"Basava Ramanjaneyulu Gudivaka , Rajya Lakshmi Gudivaka , Raj Kumar Gudivaka , Dinesh Kumar Reddy Basani , Sri Harsha Grandhi , Sundarapandian Murugesan , M.M. Kamruzzaman","doi":"10.1016/j.suscom.2025.101127","DOIUrl":null,"url":null,"abstract":"<div><div>The growing connectivity of Industrial Internet of Things (IIoT) systems has increased cyber threats, necessitating early detection of intrusions. However, existing systems often lack focus on intermediate and continuous multifactor authorization between IIoT and Industrial Control Systems (ICS). To overcome this, an efficient IDS for IIoT using an Exponential Linear Congruential Generator - Digital Signature Algorithm (ELCG-DSA) and Log Wave Sigmoid-Bidirectional Once Long Short-Term Memory (LWS-BiOLSTM) is proposed. Initially, the industry and vehicle details are registered in the blockchain network, and the Polychoric Entropy Correlation-Tiger Hashing Algorithm (PEC-Tiger) generates hash codes through smart contract creation. From the generated hash codes, a partial digital signature is created by using the ELCG-DSA technique. After login, the registered details are processed for enhancing security using Montgomery Modulo Curve Cryptography (MMCC). Then, the details are verified by using PEC-Tiger, and if the hash code matches, the key generation centre is notified for the creation of a fully digital signature. After verification, the Luus–Jaakola Sequence-based Pelican Optimization Algorithm (LJS-POA) is applied for load balancing. Next, the data security is verified in the IDS training set, in which the features are extracted from preprocessed data. Then, the Synthetic Minority Oversampling Technique (SMOTE) is utilized for data balancing, and LWS-BiOLSTM is implemented to classify attacks. Furthermore, the attacked data is blocked, and non-attacked data is stored in the ICS through digital signature verification. Thus, the experimental results of the proposed framework outperform the other conventional techniques by achieving 98.78 % accuracy and 98.71 % security level.</div></div>","PeriodicalId":48686,"journal":{"name":"Sustainable Computing-Informatics & Systems","volume":"46 ","pages":"Article 101127"},"PeriodicalIF":3.8000,"publicationDate":"2025-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A predominant intrusion detection system in IIoT using ELCG-DSA AND LWS-BiOLSTM with blockchain\",\"authors\":\"Basava Ramanjaneyulu Gudivaka , Rajya Lakshmi Gudivaka , Raj Kumar Gudivaka , Dinesh Kumar Reddy Basani , Sri Harsha Grandhi , Sundarapandian Murugesan , M.M. Kamruzzaman\",\"doi\":\"10.1016/j.suscom.2025.101127\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The growing connectivity of Industrial Internet of Things (IIoT) systems has increased cyber threats, necessitating early detection of intrusions. However, existing systems often lack focus on intermediate and continuous multifactor authorization between IIoT and Industrial Control Systems (ICS). To overcome this, an efficient IDS for IIoT using an Exponential Linear Congruential Generator - Digital Signature Algorithm (ELCG-DSA) and Log Wave Sigmoid-Bidirectional Once Long Short-Term Memory (LWS-BiOLSTM) is proposed. Initially, the industry and vehicle details are registered in the blockchain network, and the Polychoric Entropy Correlation-Tiger Hashing Algorithm (PEC-Tiger) generates hash codes through smart contract creation. From the generated hash codes, a partial digital signature is created by using the ELCG-DSA technique. After login, the registered details are processed for enhancing security using Montgomery Modulo Curve Cryptography (MMCC). Then, the details are verified by using PEC-Tiger, and if the hash code matches, the key generation centre is notified for the creation of a fully digital signature. After verification, the Luus–Jaakola Sequence-based Pelican Optimization Algorithm (LJS-POA) is applied for load balancing. Next, the data security is verified in the IDS training set, in which the features are extracted from preprocessed data. Then, the Synthetic Minority Oversampling Technique (SMOTE) is utilized for data balancing, and LWS-BiOLSTM is implemented to classify attacks. Furthermore, the attacked data is blocked, and non-attacked data is stored in the ICS through digital signature verification. Thus, the experimental results of the proposed framework outperform the other conventional techniques by achieving 98.78 % accuracy and 98.71 % security level.</div></div>\",\"PeriodicalId\":48686,\"journal\":{\"name\":\"Sustainable Computing-Informatics & Systems\",\"volume\":\"46 \",\"pages\":\"Article 101127\"},\"PeriodicalIF\":3.8000,\"publicationDate\":\"2025-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Sustainable Computing-Informatics & Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2210537925000472\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Sustainable Computing-Informatics & Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2210537925000472","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
A predominant intrusion detection system in IIoT using ELCG-DSA AND LWS-BiOLSTM with blockchain
The growing connectivity of Industrial Internet of Things (IIoT) systems has increased cyber threats, necessitating early detection of intrusions. However, existing systems often lack focus on intermediate and continuous multifactor authorization between IIoT and Industrial Control Systems (ICS). To overcome this, an efficient IDS for IIoT using an Exponential Linear Congruential Generator - Digital Signature Algorithm (ELCG-DSA) and Log Wave Sigmoid-Bidirectional Once Long Short-Term Memory (LWS-BiOLSTM) is proposed. Initially, the industry and vehicle details are registered in the blockchain network, and the Polychoric Entropy Correlation-Tiger Hashing Algorithm (PEC-Tiger) generates hash codes through smart contract creation. From the generated hash codes, a partial digital signature is created by using the ELCG-DSA technique. After login, the registered details are processed for enhancing security using Montgomery Modulo Curve Cryptography (MMCC). Then, the details are verified by using PEC-Tiger, and if the hash code matches, the key generation centre is notified for the creation of a fully digital signature. After verification, the Luus–Jaakola Sequence-based Pelican Optimization Algorithm (LJS-POA) is applied for load balancing. Next, the data security is verified in the IDS training set, in which the features are extracted from preprocessed data. Then, the Synthetic Minority Oversampling Technique (SMOTE) is utilized for data balancing, and LWS-BiOLSTM is implemented to classify attacks. Furthermore, the attacked data is blocked, and non-attacked data is stored in the ICS through digital signature verification. Thus, the experimental results of the proposed framework outperform the other conventional techniques by achieving 98.78 % accuracy and 98.71 % security level.
期刊介绍:
Sustainable computing is a rapidly expanding research area spanning the fields of computer science and engineering, electrical engineering as well as other engineering disciplines. The aim of Sustainable Computing: Informatics and Systems (SUSCOM) is to publish the myriad research findings related to energy-aware and thermal-aware management of computing resource. Equally important is a spectrum of related research issues such as applications of computing that can have ecological and societal impacts. SUSCOM publishes original and timely research papers and survey articles in current areas of power, energy, temperature, and environment related research areas of current importance to readers. SUSCOM has an editorial board comprising prominent researchers from around the world and selects competitively evaluated peer-reviewed papers.