LW-PWECC: Cryptographic Framework of Attack Detection and Secure Data Transmission in IoT

J Ranjith, K Mahantesh, C N Abhilash

Abstract


In the present era, the number of Internet of Health Things (IoHT) devices and applications has drastically expanded. Security and attack are major issues in the IoHT domain because of the nature of its architecture and sorts of devices. Over the recent few years, network attacks have dramatically increased. Many detection and encryption techniques are existing however they lack accuracy, training stability, insecurity, delay etc. By the above concerns, this manuscript introduces a novel deep learning technique called Agnostic Spiking Binarized neural network with Improved Billiards optimization for accurate detection of network attacks and Light Weight integrated Puzzle War Elliptic Curve Cryptographic framework for secure data transmission with high security and minimal delay. Optimal features from the datasets are selected by volcano eruption optimization algorithm with better convergence for reducing the overall processing time. Wilcoxon Rank Sum and Mc Neymar’s tests are performed for proving the statistical analyses. The outcomes show that the introduced approach performs with an overall accuracy of 99.93% which is better than the previous techniques demonstrating the effectiveness.


Keywords


Internet of Things; Deep Learning; Attack Detection; Secure Data Transmission; Cryptographic Framework; Encryption and Decryption.

Full Text:

PDF

References


K. Qureshi, M. Saeed, A. Ahmed, and G. Jeon, “A Novel and Secure Attacks Detection Framework for Smart Cities Industrial Internet of Things,” Sustainable Cities and Society, vol. 61, p. 102343, 2020.

F. S. de Lima Filho F. Silveira, A. Junior, G. Vargas solar, and L. Silveira, “Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning,” Security and Communication Networks, vol. 2019, pp. 1–15, 2019.

N. Velayudhan, A. Arulappan, and M. Madanan, “Sybil attack detection and secure data transmission in VANET using CMEHA-DNN and MD5-ECC,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 7, 2021.

A. Chenniappan and N. Vasuki, “Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission,” Wireless Personal Communications, vol. 121, no. 12 2021.

J. Alzubi and Alzubi, “Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 7, 2021.

A. Tekerek, “A Novel Architecture for Web-Based Attack Detection Using Convolutional Neural Network,” Comput. Secur., vol. 100, p. 102096, 2021.

A. Diro and N. Chilamkurti, “Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications,” IEEE Communications Magazine, vol. 56, pp. 124–130, 2018.

J. Alsamiri and K. Alsubhi, “Internet of Things Cyber Attacks Detection using Machine Learning”, International Journal of Advanced Computer Science and Applications, vol. 10, no. 12, 2019.

A. I. Naeem Firdous Syed Zubair Baig and C. Valli, “Denial of service attack detection through machine learning for the IoT,” Journal of Information and Telecommunication, vol. 4, no. 4, pp. 482–503, 2020.

T. Gu, A. Abhishek, H. Fu, H. Zhang, D. Basu and P. Mohapatra, "Towards Learning-automation IoT Attack Detection through Reinforcement Learning," 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM), pp. 88-97, 2020.

F. Alsubaei, A. Abuhussein and S. Shiva, "Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment," 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), pp. 112-120, 2017.

S. M. Nagarajan, G. G. Deverajan, U. Kumaran, M. Thirunavukkarasan, M. D. Alshehri, and S. Alkhalaf, "Secure Data Transmission in Internet of Medical Things Using RES-256 Algorithm," in IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 8876-8884, Dec. 2022, doi: 10.1109/TII.2021.3126119.

R. Bosri, A. Uzzal, A. Omar, M. Bhuiyan, and S. Rahman, “HIDEchain: A User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices,” IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 376–381, 2020.

M. Ahmed, S. Byreddy, A. Nutakki, L. F. Sikos, and P. Haskell-Dowland, “ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things,” Ad Hoc Networks, vol. 122, p. 102621, 2021.

M. Ahmed, S. Byreddy, A. Nutakki, L. F. Sikos, and P. Haskell-Dowland, “ECU-IoHT,” Ad Hoc Networks, 2020.

L. Wang, Y. Ali, S. Nazir, and M. Niazi, "ISA Evaluation Framework for Security of Internet of Health Things System Using AHP-TOPSIS Methods," in IEEE Access, vol. 8, pp. 152316-152332, 2020.

J. Chen, Y. Zhao, J. Lin, Y. Dai, B. Hu, and S. Gao, "A Flexible Insole Gait Monitoring Technique for the Internet of Health Things," in IEEE Sensors Journal, vol. 21, no. 23, pp. 26397-26405, 2021.

J. J. Kang, M. Dibaei, G. Luo, W. Yang, and X. Zheng, "A Privacy- Preserving Data Inference Framework for Internet of Health Things Networks," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1209-1214, 2020.

A. Abbas, R. Alroobaea, M. Krichen, S. Rubaiee, S. Vimal, and F. M. Almansour, “Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things,” Personal and ubiquitous computing, pp. 1-14, 2021.

C. Huang, G. Xu, S. Chen, W. Zhou, E. Y. Ng, and V. H. C. de Albuquerque, “An improved federated learning approach enhanced internet of health things framework for private decentralized distributed data,” Information Sciences, vol. 614, pp. 138-152, 2022.

A. O. Almagrabi, R. Ali, D. Alghazzawi, A. AlBarakati, and T. Khurshaid, “A Reinforcement Learning-Based Framework for Crowdsourcing in Massive Health Care Internet of Things,” Big Data, vol. 10, no. 2, pp. 161–170, 2022.

A. Rana, C. Chakraborty, S. Sharma, S. Dhawan, S. K. Pani, and I. Ashraf, “Internet of Medical Things-Based Secure and Energy-Efficient Framework for Health Care,” Big Data, vol. 10, no. 1, pp. 18–33, 2022.

Y. Qu, X. Ming, S. Qiu, M. Zheng, and Z. Hou, “An integrative framework for online prognostic and health management using internet of things and convolutional neural network,” Sensors, vol. 19, no. 10, p. 2338, 2019.

M. Kaur, D. Singh, V. Kumar, B. B. Gupta, and A. A. Abd El-Latif, "Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things," in IEEE Transactions on Green Communications and Networking, vol. 5, no. 3, pp. 1223-1231, Sept. 2021.

S. Ariyanti and Kautsarina, "A Proposed The Internet of Things (IoT) Framework for Health Sector in Indonesia," 2018 IEEE Region Ten Symposium (Tensymp), pp. 282-286, 2018.

M. A. Rahman, M. S. Hossain, A. J. Showail, N. A. Alrajeh, and M. F. Alhamid, “A secure, private, and explainable IoHT framework to support sustainable health monitoring in a smart city,” Sustainable Cities and Society, vol. 72, p. 103083, 2021.

A. Mukherjee, S. Ghosh, A. Behere, S. K. Ghosh, and R. Buyya, “Internet of Health Things (IoHT) for personalized health care using integrated edge-fog-cloud network,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, no. 1, pp. 943-959, 2021.

M. Bansal and Priya, "Application Layer Protocols for Internet of Healthcare Things (IoHT)," 2020 Fourth International Conference on Inventive Systems and Control (ICISC), pp. 369-376, 2020.

Q. Vu Khanh, N. Vi Hoai, A. Dang Van, and Q. Nguyen Minh, “An integrating computing framework based on edge-fog-cloud for internet of healthcare things applications,” Internet of Things, vol. 23, p. 100907, 2023.

E. C. Junior, R. M. de Castro Andrade, and L. S. Rocha, "KREATION: Kotlin Framework for Self-Adaptive IoHT Applications," 2023 IEEE 11th International Conference on Serious Games and Applications for Health (SeGAH), pp. 1-8, 2023.

F. Farhin, M. S. Kaiser, and M. Mahmud, "Towards Secured Service Provisioning for the Internet of Healthcare Things," 2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT), pp. 1-6, 2020.

M. I. Alam, M. O. Ahmad, S. T. Siddiqui, M. R. Khan, H. Khan, and K. A. Qidwai, “Blockchain for 5G-Enabled IoHT---A Framework for Secure Healthcare Automation,” In Proceedings of Data Analytics and Management, pp. 793–801, 2023.

B. Bai, S. Nazir, Y. Bai, and A. Anees, “Security and provenance for Internet of Health Things: A systematic literature review,” Journal of Software: Evolution and Process, vol. 33, no. 5, p. e2335, 2021.

P. Sarosh, S. A. Parah, and G. Mohiuddin Bhat, "Fast Image Encryption Framework for Medical Images," 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), pp. 149-154, 2021.

A. Dutta, C. Misra, R. K. Barik, and S. Mishra, “Enhancing Mist Assisted Cloud Computing Toward Secure and Scalable Architecture for Smart Healthcare,” In Advances in Communication and Computational Technology, pp. 1515–1526, 2021.

F. Mosaiyebzadeh, S. Pouriyeh, R. M. Parizi, M. Han, and D. M. Batista, "Intrusion Detection System for IoHT Devices using Federated Learning," IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1-6, 2023.

A. K M, A. Joshy, A. T. George, and G. Gopika, "Internet of Healthcare Things (IoHT) Enabled Incessant Real Time Patient Monitoring System Using Non-Invasive Sensors," 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 01-06, 2022.

C. C. Prajapati, H. Kaur, and J. Singla, "A Comprehensive Review on Smart Fog-Based Healthcare Framework," 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), pp. 622-627, 2020.

M. T. Khan, L. Barik, A. Adholiya, S. S. Patra, A. N. Brahma, and R. K. Barik, "Task Offloading Scheme for Latency Sensitive Tasks In 5G IOHT on Fog Assisted Cloud Computing Environment," 2022 3rd International Conference for Emerging Technology (INCET), pp. 1-5, 2022.

Y. Justindhas and P. Jeyanthi, “Attack Detection and Prevention in IoT-SCADA Networks Using NK-Classifier,” Soft Comput., vol. 26, no. 14, pp. 6811–6823, 2022.

O. Aouedi, K. Piamrat, G. Muller, and K. Singh, “Federated Semi-Supervised Learning for Attack Detection in Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 19, 2022.

S. P. K. Gudla, S. K. Bhoi, S. R. Nayak, K. K. Singh, A. Verma, and I. Izonin, “A Deep Intelligent Attack Detection Framework for Fog-Based IoT Systems,” Computational Intelligence and Neuroscience, vol. 2022, p. 6967938, 2022.

A. Duraisamy and M. Subramaniam, “Attack Detection on IoT Based Smart Cities Using IDS Based MANFIS Classifier and Secure Data Transmission Using IRSA Encryption,” Wirel. Pers. Commun., vol. 119, no. 2, pp. 1913–1934, 2021.

B. A. Alabsi, M. Anbar, and S. D. A. Rihan, “CNN-CNN: Dual Convolutional Neural Network Approach for Feature Selection and Attack Detection on Internet of Things Networks,” Sensors, vol. 23, no. 14, 2023.

P. Kumar, R. Kumar, G. P. Gupta, R. Tripathi, A. Jolfaei, and A. K. M. Najmul Islam, “A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system,” Journal of Parallel and Distributed Computing, vol. 172, pp. 69–83, 2023.

I. Priyadarshini, P. Mohanty, A. Alkhayyat, R. Sharma, and S. Kumar, “SDN and application layer DDoS attacks detection in IoT devices by attention-based Bi-LSTM-CNN,” Transactions on Emerging Telecommunications Technologies, vol. 34, no. 11, p. e4758, 2023.

K. P. Vijayakumar, K. Pradeep, A. Balasundaram, and M. R. Prusty, “Enhanced Cyber Attack Detection Process for Internet of Health Things (IoHT) Devices Using Deep Neural Network,” Processes, vol. 11, no. 4, 2023.

M. Ezhilarasi, L. Gnanaprasanambikai, A. Kousalya, and M. Shanmugapriya, “A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks,” Soft Computing, vol. 27, 2022.

T. Thulasi and K. Sivamohan, “LSO-CSL: Light Spectrum Optimizer-Based Convolutional Stacked Long Short Term Memory for Attack Detection in IoT-Based Healthcare Applications,” Expert Syst. Appl., vol. 232, 2023.

K. S. Sankaran and B.-H. Kim, “Deep learning based energy efficient optimal RMC-CNN model for secured data transmission and anomaly detection in industrial IOT,” Sustainable Energy Technologies and Assessments, vol. 56, p. 102983. 2023.

A. Duraisamy, M. Subramaniam, and C. R. R. Robin, “An Optimized Deep Learning Based Security Enhancement and Attack Detection on IoT Using IDS and KH-AES for Smart Cities,” Studies in Informatics and Control, vol. 30, no. 2, pp. 121-131, 2021.

E. Hosseini, A. Al-Shakarchi, K. Z. Ghafoor, D. B. Rawat, M. Saif, and X. Yang, “Volcano eruption algorithm for solving optimization problems,” Neural Computing and Applications, vol. 33, pp. 2321-2337, 2020.

V. -T. Nguyen, Q. -K. Trinh, R. Zhang, and Y. Nakashima, "STT-BSNN: An In-Memory Deep Binary Spiking Neural Network Based on STT-MRAM," in IEEE Access, vol. 9, pp. 151373-151385, 2021.

X. Yao, J. Zhu, G. Huo, N. Xu, X. Liu, and C. Zhang, “Model-agnostic multi-stage loss optimization meta learning,” International Journal of Machine Learning and Cybernetics, vol. 12, no. 8, pp. 2349–2363, 2021.

A. Kaveh, M. Khanzadi, and M. Rastegar Moghaddam, “Billiards-inspired optimization algorithm; a new meta-heuristic method,” Structures, vol. 27, pp. 1722–1739, 2020

Y. Justindhas and P. Jeyanthi, “Attack Detection and Prevention in IoT-SCADA Networks Using NK-Classifier,” Soft Comput., vol. 26, no. 14, pp. 6811–6823, 2022.

T. S. L. V. Ayyarao et al., “War Strategy Optimization Algorithm: A New Effective Metaheuristic Algorithm for Global Optimization,” in IEEE Access, vol. 10, pp. 25073-25105, 2022.

F. A. Zeidabadi and M. Dehghani, “POA: Puzzle Optimization Algorithm,” International Journal of Intelligent Engineering and Systems, vol. 15, no. 1, 2022.

L. Liang et al., "Exploring Adversarial Attack in Spiking Neural Networks with Spike-Compatible Gradient," In IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 5, pp. 2569-2583, 2023.

R. Bhandari and V. B. Kirubanand, “Enhanced encryption technique for secure iot data transmission,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no. 5, p. 3732, 10 2019.

M. A. Ahmed and S. Alnatheer, “Deep Q-Learning with Bit-Swapping-Based Linear Feedback Shift Register fostered Built-In Self-Test and Built-In Self-Repair for SRAM,” Micromachines, vol. 13, no. 6, p. 971, 2022.

S. Rathore and J. H. Park, “Semi-supervised learning based distributed attack detection framework for IoT,” Applied Soft Computing, vol. 72, pp. 79–89, 2018.

S. Majumder, S. Ray, D. Sadhukhan, M. Khurram, and M. Dasgupta, “ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things ECC-CoAP: Elliptic Curve Cryptography Based Constraint Application Protocol for Internet of Things,” Wireless Personal Communications, vol. 116, pp. 1867-1896, 2021.




DOI: https://doi.org/10.18196/jrc.v5i1.20514

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Ranjith J, Mahantesh K, Abhilash C N

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

 


Journal of Robotics and Control (JRC)

P-ISSN: 2715-5056 || E-ISSN: 2715-5072
Organized by Peneliti Teknologi Teknik Indonesia
Published by Universitas Muhammadiyah Yogyakarta in collaboration with Peneliti Teknologi Teknik Indonesia, Indonesia and the Department of Electrical Engineering
Website: http://journal.umy.ac.id/index.php/jrc
Email: jrcofumy@gmail.com


Kuliah Teknik Elektro Terbaik