Blockchain-Enabled Decentralized Edge Computing in Cyber Security for Intrusion Detection

Authors

  • Priyanka Patel Assistant Professor, Department of Computer Science and Engineering, Medi-Caps University, Indore, MP, India, 453331
  • Ruby Bhatt Assistant Professor, Department of Computer Science, Medi-Caps University, Indore, MP, India
  • Manish Joshi Assistant Professor, Department of Computer Science, Medi-Caps University, Indore, MP, India
  • Govinda Patil Assistant Professor, Department of Computer Science, Medi-Caps University, Indore, MP, India
  • Hemant Pal Assistant Professor, Department of Computer Science, Medi-Caps University, Indore, MP, India
  • Abdul Razzak Khan Qureshi Assistant Professor, Department of Computer Science, Medi-Caps University, Indore, MP, India

Keywords:

Blockchain, Edge Computing, Cybersecurity, Intrusion Detection, Decentralization

Abstract

The foundation of our modern society is an ever-expanding digital ecosystem; nevertheless, this ecosystem is also one that is continuously vulnerable to the threats posed by cyberattacks. The fact that intrusion detection is tasked with identifying and stopping unauthorised access to computer networks and systems has made it abundantly obvious that it is one of the most important aspects of cybersecurity in its entirety. On the other hand, due to the centralised architecture of old intrusion detection systems (IDS), it may be difficult for these systems to respond quickly and effectively to the complex nature of modern cyber threats because of the nature of the design itself. This unique technique makes an attempt to resolve some of the pressing problems that plague traditional intrusion detection systems. These problems include vulnerabilities caused by a single point of failure, data integrity concerns, and scalability concerns. This study presents a brand-new distributed intrusion detection system (IDS) that makes use of fog computing in order to recognise DDoS assaults against mining pools in blockchain-enabled IoT networks. Finding answers to the problems that were discussed before is the reason for doing this research in the first place. Random Forest (RF) and an updated gradient tree boosting approach (XG Boost) are used in order to conduct the performance evaluation of distributed fog nodes. On the basis of the use case of video analytics at the edge, an experimental configuration for an Internet of Things edge solution using the Hyperledger Sawtooth Blockchain has been constructed.

Downloads

Download data is not yet available.

References

H. Zhu, F. Wang, R. Lu, F. Liu, G. Fu, and H. Li, “Efficient and privacy-preserving proximity detection schemes for social applications,” IEEE Internet of Things Journal, 2017.

M. M. E. A. Mahmoud, N. Saputro, P. Akula, and K. Akkaya, “Privacy-preserving power injection over a hybrid AMI/LTE smart grid network,” IEEE Internet of Things Journal, vol. 4, no. 4, pp. 870–880, 2017.

P. Hu, H. Ning, T. Qiu, H. Song, Y. Wang, and X. Yao, “Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1143–1155, 2017.

M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic iot networks,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 269–282, 2018.

Shrivastava, A., Chakkaravarthy, M., Shah, M.A..A Novel Approach Using Learning Algorithm for Parkinson’s Disease Detection with Handwritten Sketches. In Cybernetics and Systems, 2022

Shrivastava, A., Chakkaravarthy, M., Shah, M.A., A new machine learning method for predicting systolic and diastolic blood pressure using clinical characteristics. In Healthcare Analytics, 2023, 4, 100219

Shrivastava, A., Chakkaravarthy, M., Shah, M.A.,Health Monitoring based Cognitive IoT using Fast Machine Learning Technique. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 720–729

Shrivastava, A., Rajput, N., Rajesh, P., Swarnalatha, S.R., IoT-Based Label Distribution Learning Mechanism for Autism Spectrum Disorder for Healthcare Application. In Practical Artificial Intelligence for Internet of Medical Things: Emerging Trends, Issues, and Challenges, 2023, pp. 305–321

Boina, R., Ganage, D., Chincholkar, Y.D., .Chinthamu, N., Shrivastava, A., Enhancing Intelligence Diagnostic Accuracy Based on Machine Learning Disease Classification. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 765–774

Shrivastava, A., Pundir, S., Sharma, A., ...Kumar, R., Khan, A.K. Control of A Virtual System with Hand Gestures. In Proceedings - 2023 3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023, 2023, pp. 1716–1721

M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, and M. Jo, “Design of secure user authenticated key management protocol for generic iot networks,” IEEE Internet of Things Journal, vol. 5, no. 1, pp. 269–282, 2018.

M. R. Akdeniz, Y. Liu, M. K. Samimi, S. Sun, S. Rangan, T. S. Rappaport, and E. Erkip, “Millimeter wave channel modeling and cellular capacity evaluation,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1164–1179, 2014.

Amit Kumar Tyagi, G. Aghila, “A Wide Scale Survey on Botnet”, International Journal of Computer Applications (ISSN: 0975-8887), Volume 34, No.9, pp. 9-22, November 2011.

Amit Kumar Tyagi. Article: Cyber Physical Systems (CPSs) – Opportunities and Challenges for Improving Cyber Security. International Journal of Computer Applications 137(14):19-27, March 2016. Published by Foundation of Computer Science (FCS), NY, USA.

G. Rekha, S. Malik, A.K. Tyagi, M.M. Nair "Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 3, pp. 72-81 (2020).

M. Chiang and T. Zhang. Fog and iot: An overview of research opportunities. IEEE Internet of Things Journal, 3(6):854-864, Dec 2016. ISSN 2327-4662

Downloads

Published

29.01.2024

How to Cite

Patel, P. ., Bhatt, R. ., Joshi, M. ., Patil, G. ., Pal, H. ., & Qureshi, A. R. K. . (2024). Blockchain-Enabled Decentralized Edge Computing in Cyber Security for Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(13s), 28–40. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/4565

Issue

Section

Research Article