Towards smarter cyberthreats detection model for industrial internet of things (IIoT) 4.0

被引:10
|
作者
Hajlaoui, Rejab [1 ]
Moulahi, Tarek [2 ,3 ]
Zidi, Salah [4 ]
El Khediri, Salim [2 ,5 ]
Alaya, Bechir [6 ]
Zeadally, Sherali [7 ]
机构
[1] Univ Hail, Coll Comp Sci & Engn, Dept Informat & Comp Sci, Hail, Saudi Arabia
[2] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah, Saudi Arabia
[3] Univ Kairouan, Fac Sci & Technol Sidi Bouzid, Kairouan, Tunisia
[4] Univ Gabes, ISSIG, Gabes, Tunisia
[5] Univ Gafsa, Fac Sci Gafsa, Dept Comp Sci, Gafsa, Tunisia
[6] Qassim Univ, Coll Business & Econ, Dept Management Informat Syst & Prod Management, Buraydah 51452, Saudi Arabia
[7] Univ Kentucky, Coll Commun & Informat, Lexington, KY USA
关键词
Cyberthreats; Industrial internet of things (IIoT); Machine learning (ML); Smart contract; Blockchain; BLOCKCHAIN TECHNOLOGY; SENSOR NETWORKS; IOT; PRIVACY; ARCHITECTURE; MANAGEMENT; SECURITY; FUTURE; ISSUES; SYSTEM;
D O I
10.1016/j.jii.2024.100595
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Recently, Artificial Intelligence (AI) has been applied to the Internet of Things (IoT) as well as Industrial IoT 4.0 (IIoT). This has improved the autonomous behavior of smart things in terms of making independent and smart decisions. However, AI techniques are the target of many attacks like the poisoning of training data and the evasion attack. In this context, blockchain can be joined to AI methods to protect their execution. In this paper, we propose SmarterChain to safely detect cyberthreats in IoT. First, we train and generate machine learning models for cyberthreats detection. Next, we protect these models by embedding them on the blockchain. Finally, the models are used by intelligent devices anywhere to facilitate safe decision-making regarding cyberthreats. In addition to identifying the type of attack, our proposed solution outperforms previous detection methods, using the same dataset, in terms of safety ensured by smart contracts, with low overhead due to deployment and runtime.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Industry 4.0: Industrial Internet of Things (IIOT)
    Munirathinam, Sathyan
    DIGITAL TWIN PARADIGM FOR SMARTER SYSTEMS AND ENVIRONMENTS: THE INDUSTRY USE CASES, 2020, 117 : 129 - 164
  • [2] The Blackboard Industrial Internet of Things IIoT
    Langhans, Bernd
    INTERNATIONAL SUGAR JOURNAL, 2022, 124 (1480): : 226 - 227
  • [3] Application of Quality 4.0 (Q4.0) and Industrial Internet of Things (IIoT) in Agricultural Manufacturing Industry
    Singh, Jagmeet
    Ahuja, Inderpreet Singh
    Singh, Harwinder
    Singh, Amandeep
    AGRIENGINEERING, 2023, 5 (01): : 537 - 565
  • [4] Towards Firmware Analysis of Industrial Internet of Things (IIoT) Applying Symbolic Analysis to IIoT Firmware Vetting
    Palavicini, Geancarlo, Jr.
    Bryan, Josiah
    Sheets, Eaven
    Kline, Megan
    San Miguel, John
    IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 470 - 477
  • [5] Enabling Industrial Internet of Things(IIoT) towards an emerging smart energy system
    Ding Zhang
    Ching Chuen Chan
    George You Zhou
    GlobalEnergyInterconnection, 2018, 1 (01) : 39 - 47
  • [6] Network Optimization for Industrial Internet of Things (IIoT)
    Khalil, Ruhul Amin
    Saeed, Nasir
    IEEE SENSORS LETTERS, 2020, 4 (07)
  • [7] The industrial internet of things (IIoT): An analysis framework
    Boyes, Hugh
    Hallaq, Bit
    Cunningham, Joe
    Watson, Tim
    COMPUTERS IN INDUSTRY, 2018, 101 : 1 - 12
  • [8] Towards a smarter Internet of Things: semantic visions
    Manate, Bogdan
    Munteanu, Victor Ion
    Fortis, Teodor-Florin
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 582 - 587
  • [9] Towards a Distributed Digital Twin Framework for Predictive Maintenance in Industrial Internet of Things (IIoT)
    Abdullahi, Ibrahim
    Longo, Stefano
    Samie, Mohammad
    SENSORS, 2024, 24 (08)
  • [10] Cyber-Risks in the Industrial Internet of Things (IIoT): Towards a Method for Continuous Assessment
    Boye, Carolina Adaros
    Kearney, Paul
    Josephs, Mark
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 502 - 519