AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure
Abstract
:1. Introduction
1.1. Motivation
- Nowadays, IoT sensors are connected to critical infrastructures to exchange sensitive data between devices. However, IoT devices use legacy infrastructure and weak protocols that are vulnerable to different cyberattacks, such as botnets, DoS attacks, ransomware, malicious node injection, and data poisoning attacks.
- Most of the researchers in this domain use AI-enabled solutions for IoT-based critical infrastructure [5,10,13]. Their proposed AI solutions for security threat detection in IoT-based critical infrastructure are not resistant to data poisoning attacks, i.e., the dataset is itself corrupted or has been tampered with by the attackers. Moreover, most of the existing works have lower accuracy in classifying attack and non-attack data for critical infrastructure. Furthermore, they have not used PCA and XAI approaches to include essential features that can maximize the performance of AI models.
- In addition, the researchers who adopted blockchain-based solutions are computationally expensive because they have to process both attack and non-attack data [14,15]. They have not used any intelligence or filtering mechanism that can bifurcate attack and non-attack data, thus reducing the computation overhead of the blockchain.
- Based on the aforementioned facts, there is a requirement for an amalgamation of AI and blockchain for security enhancements in IoT-enabled critical infrastructure. Therefore, we proposed an AI and blockchain-based intelligent and secure data dissemination architecture for IoT-based critical infrastructure.
1.2. Research Contributions
- To propose an AI and blockchain-driven secure data dissemination architecture for anomaly detection in IoT-enabled critical infrastructure.
- We applied diverse future selection methods, such as PCA and XAI, that fetch the important future from the dataset to reduce the computation overhead. Furthermore, we employed different AI classifiers, such as RF, DT, SVM, GaussianNB, and perception, that classify the malicious and non-malicious data by training the AI classifier on the standard dataset comprising network traffic and communication protocol between IoT sensors for the critical infrastructure. Furthermore, the AI models are secured against data poisoning attacks using an isolation forest algorithm that deteriorates the performance of AI training.
- Moreover, we incorporated an IPFS-driven blockchain network that ensures the secure data storage of the IoT-enabled critical infrastructure’s data.
- The performance of the proposed architecture is evaluated by considering distinct performance parameters, such as accuracy, precision, recall, F1 score, receiver operating characteristic (ROC) curve, and scalability.
1.3. Organization
2. Related Work
3. System Model and Problem Formulation
4. The Proposed Architecture
4.1. Data Collection Layer
4.2. Intelligence Layer
4.2.1. Dataset Description
4.2.2. Data Poisoning Attack Prevention: Isolation Forest
4.2.3. Data Pre-Processing
4.2.4. AI-Based Classification
4.3. Blockchain Layer
4.4. Application Layer
5. Results and Discussion
5.1. Experimental Setup
5.2. Feature Selection
- PCA: It is an AI approach that transforms the columns of a dataset into a new set of features known as principal components. It effectively compressed the data into fewer feature columns that enable dimensionality reduction. Figure 3 shows the PCA-based feature selection approach. Initially, the dataset contains 83 features used for the IoT-based critical application. However, these large numbers of features make it time-consuming to train our AI model. Therefore, using the PCA approach, we have significantly reduced the number of features from 83 to 35. From the graph, we observed the importance of feature selection to reduce the number of dimensions and improve the performance of the IoT-based critical application.
- XAI: Furthermore, we applied XAI to select more specific features based on the feature score. Initially, we identified 35 features out of 83 using the PCA approach. However, we found the requirement to reduce the feature count further to achieve notable results for AI classifiers in terms of accuracy, precision, and F1 score. Figure 4 depicts the feature selection process of the XAI-based approach. From the results, we observed that there are 20 features, such as Bwd header len, Init Bwd win Byts, Fwd IAT Max, Fwd IAT Mean, etc., that are important and have a higher weight than other features. Therefore, we have passed the selected features to the different AI classifiers.
5.3. Performance Analysis of AI Classifier
5.4. Performance Analysis of the Blockchain
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Cyrus, C. Striking Back: An IoT Security Guide for Critical Infrastructure. Online: 6 September 2021. Available online: https://www.iotworldtoday.com/guide/striking-back-an-iot-security-guide-for-critical-infrastructure/ (accessed on 7 November 2022).
- Jadav, N.K.; Gupta, R.; Tanwar, S. AI and Onion Routing-based Secure Architectural Framework for IoT-based Critical Infrastructure. In Proceedings of the 2023 13th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 19–20 January 2023; pp. 559–564. [Google Scholar] [CrossRef]
- Lozano, M.A.; Llopis, I.P.; Alarcón, A.C.; Domingo, M.E. A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures. In Proceedings of the 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), Vilanova i la Geltru, Spain, 17–20 April 2023; pp. 1–5. [Google Scholar] [CrossRef]
- Securing IoT Devices against Attacks that Target Critical Infrastructure. Online: 21 October 2022. Available online: https://www.microsoft.com/en-us/security/blog/2022/10/21/securing-iot-devices-against-attacks-that-target-critical-infrastructure/ (accessed on 7 November 2022).
- Gehlot, A.; Joshi, A. Neural Network based Intrusion Detection system for critical infrastructure. In Proceedings of the 2022 IEEE 2nd Mysore Sub Section International Conference (MysuruCon), Mysuru, India, 16–17 October 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Mercier, D.; Lucieri, A.; Munir, M.; Dengel, A.; Ahmed, S. Evaluating Privacy-Preserving Machine Learning in Critical Infrastructures: A Case Study on Time-Series Classification. IEEE Trans. Ind. Inform. 2022, 18, 7834–7842. [Google Scholar] [CrossRef]
- Kendzierskyj, S.; Jahankhani, H. The Role of Blockchain in Supporting Critical National Infrastructure. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; pp. 208–212. [Google Scholar] [CrossRef]
- Liu, X.; Qian, C.; Hatcher, W.G.; Xu, H.; Liao, W.; Yu, W. Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities. IEEE Access 2019, 7, 79523–79544. [Google Scholar] [CrossRef]
- Chin, W.L.; Li, W.; Chen, H.H. Energy Big Data Security Threats in IoT-Based Smart Grid Communications. IEEE Commun. Mag. 2017, 55, 70–75. [Google Scholar] [CrossRef]
- Namasudra, S. A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure. Comput. Electr. Eng. 2022, 104, 108426. [Google Scholar] [CrossRef]
- Villar Miguelez, C.; Monzon Baeza, V.; Parada, R.; Monzo, C. Guidelines for Renewal and Securitization of a Critical Infrastructure Based on IoT Networks. Smart Cities 2023, 6, 728–743. [Google Scholar] [CrossRef]
- Sun, L.; Jiang, X.; Ren, H.; Guo, Y. Edge-Cloud Computing and Artificial Intelligence in Internet of Medical Things: Architecture, Technology and Application. IEEE Access 2020, 8, 101079–101092. [Google Scholar] [CrossRef]
- Hayyolalam, V.; Aloqaily, M.; Ozkasap, O.; Guizani, M. Edge Intelligence for Empowering IoT-Based Healthcare Systems. IEEE Wirel. Commun. 2021, 28, 6–14. [Google Scholar] [CrossRef]
- Liu, Y.; Shan, G.; Liu, Y.; Alghamdi, A.; Alam, I.; Biswas, S. Blockchain Bridges Critical National Infrastructures: E-Healthcare Data Migration Perspective. IEEE Access 2022, 10, 28509–28519. [Google Scholar] [CrossRef]
- Otoum, S.; Ridhawi, I.A.; Mouftah, H. Securing Critical IoT Infrastructures With Blockchain-Supported Federated Learning. IEEE Internet Things J. 2022, 9, 2592–2601. [Google Scholar] [CrossRef]
- Bashiri Mosavi, A.; Amiri, A.; Hosseini, H. A Learning Framework for Size and Type Independent Transient Stability Prediction of Power System Using Twin Convolutional Support Vector Machine. IEEE Access 2018, 6, 69937–69947. [Google Scholar] [CrossRef]
- Chang, C.P.; Hsu, W.C.; Liao, I. Anomaly Detection for Industrial Control Systems Using K-Means and Convolutional Autoencoder. In Proceedings of the 2019 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 19–21 September 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Feng, C.; Li, T.; Chana, D. Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks. In Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Denver, CO, USA, 26–29 June 2017; pp. 261–272. [Google Scholar] [CrossRef]
- Stefanidis, K.; Voyiatzis, A.G. An HMM-Based Anomaly Detection Approach for SCADA Systems. In Information Security Theory and Practice; Foresti, S., Lopez, J., Eds.; Springer International Publishing: Cham, Switerland, 2016; pp. 85–99. [Google Scholar]
- Alhaidari, F.A.; AL-Dahasi, E.M. New Approach to Determine DDoS Attack Patterns on SCADA System Using Machine Learning. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 3–4 April 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Chauhan, K.; Jani, S.; Thakkar, D.; Dave, R.; Bhatia, J.; Tanwar, S.; Obaidat, M.S. Automated Machine Learning: The New Wave of Machine Learning. In Proceedings of the 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), Bangalore, India, 5–7 March 2020; pp. 205–212. [Google Scholar] [CrossRef]
- Verma, C.; Stoffová, V.; Illés, Z.; Tanwar, S.; Kumar, N. Machine Learning-Based Student’s Native Place Identification for Real-Time. IEEE Access 2020, 8, 130840–130854. [Google Scholar] [CrossRef]
- Elnour, M.; Meskin, N.; Khan, K.M. Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest. In Proceedings of the 2020 IEEE Conference on Control Technology and Applications (CCTA), Montreal, QC, Canada, 24–26 August 2020; pp. 877–884. [Google Scholar] [CrossRef]
- Rakesh, N.; Kumaran, U. Performance Analysis of Water Quality Monitoring System in IoT Using Machine Learning Techniques. In Proceedings of the 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS), Bengaluru, India, 21–22 December 2021; Volume 1, pp. 1–6. [Google Scholar] [CrossRef]
- Puthal, D.; Wilson, S.; Nanda, A.; Liu, M.; Swain, S.; Sahoo, B.P.; Yelamarthi, K.; Pillai, P.; El-Sayed, H.; Prasad, M. Decision tree based user-centric security solution for critical IoT infrastructure. Comput. Electr. Eng. 2022, 99, 107754. [Google Scholar] [CrossRef]
- Narayanan, S.N.; Joshi, A.; Bose, R. ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1673–1686. [Google Scholar] [CrossRef]
- Sharmeen, S.; Huda, S.; Abawajy, J.; Ahmed, C.M.; Hassan, M.M.; Fortino, G. An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet Things J. 2022, 9, 7298–7310. [Google Scholar] [CrossRef]
- Khan, M.A.; Abbas, S.; Rehman, A.; Saeed, Y.; Zeb, A.; Uddin, M.I.; Nasser, N.; Ali, A. A Machine Learning Approach for Blockchain-Based Smart Home Networks Security. IEEE Netw. 2021, 35, 223–229. [Google Scholar] [CrossRef]
- Gu, J.; Zhao, L.; Yue, X.; Arshad, N.I.; Mohamad, U.H. Multistage quality control in manufacturing process using blockchain with machine learning technique. Inf. Process. Manag. 2023, 60, 103341. [Google Scholar] [CrossRef]
- Dixit, P.; Bhattacharya, P.; Tanwar, S.; Gupta, R. Anomaly detection in autonomous electric vehicles using AI techniques: A comprehensive survey. Expert Syst. 2022, 39, e12754. [Google Scholar] [CrossRef]
- Mahmoud Ragab, A.A. A Blockchain-Based Architecture for Enabling Cybersecurity in the Internet-of-Critical Infrastructures. Comput. Mater. Contin. 2022, 72, 1579–1592. [Google Scholar] [CrossRef]
- Radoglou-Grammatikis, P.; Lagkas, T.; Argyriou, V.; Sarigiannidis, P. IEC 60870-5-104 Intrusion Detection Dataset. 2022. Available online: https://ieee-dataport.org/documents/iec-60870-5-104-intrusion-detection-dataset (accessed on 11 August 2023). [CrossRef]
- Mankodiya, H.; Jadav, D.; Gupta, R.; Tanwar, S.; Alharbi, A.; Tolba, A.; Neagu, B.C.; Raboaca, M.S. XAI-Fall: Explainable AI for Fall Detection on Wearable Devices Using Sequence Models and XAI Techniques. Mathematics 2022, 10, 1990. [Google Scholar] [CrossRef]
- Tanwar, S.; Ramani, T.; Tyagi, S. Dimensionality reduction using PCA and SVD in big data: A comparative case study. In Proceedings of the Future Internet Technologies and Trends: First International Conference, ICFITT 2017, Surat, India, 31 August–2 September 2017; Proceedings 1. Springer: Berlin/Heidelberg, Germany, 2018; pp. 116–125. [Google Scholar]
- Raj, R. Principal Component Analysis (PCA) in Machine Learning. Available online: https://www.enjoyalgorithms.com/blog/principal-component-analysis-in-ml (accessed on 6 November 2022).
- How Much Does It Cost to Store Each IPFS Hash in Ethereum Blockchain. Available online: https://ethereum.stackexchange.com/questions/61100/how-much-does-it-cost-to-store-each-ipfs-hash-in-ethereum-blockchain (accessed on 15 October 2023).
- Abuhasel, K.A. A Linear Probabilistic Resilience Model for Securing Critical Infrastructure in Industry 5.0. IEEE Access 2023, 11, 80863–80873. [Google Scholar] [CrossRef]
- Jadav, N.K.; Gupta, R.; Kakkar, R.; Tanwar, S. Intelligent Onion Routing and UAV-based Electronic Health Record Sharing Framework for Healthcare 4.0. In Proceedings of the IEEE INFOCOM 2023—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken, NJ, USA, 20–20 May 2023; pp. 1–6. [Google Scholar] [CrossRef]
Author | Year | Objective | Methodology | 1 | 2 | 3 | 4 | 5 | Pros | Cons |
---|---|---|---|---|---|---|---|---|---|---|
Chang et al. [17] | 2019 | Anomaly detection in ICS | K-means and convolutional autoencoder | X | X | X | X | X | The adopted approaches gives higher accuracy on a gas pipeline and water storage tank dataset | PCA and XAI has not considered |
Alhaidari et al. [20] | 2019 | Secure supervisory control and data acquisition systems against DDoS attack | NB, RF, and J48 | X | X | ✔ | X | X | Among all three approach RF gives higher accuracy | They have focused on the feature selection |
Elnour et al. [23] | 2020 | Hybrid attack detection scheme for water treatment plant | Isolation Forest and CNN | X | X | ✔ | X | X | The scheme detects maximum attacks, reduces the computational complexity and increases the accuracy compared with the other approaches | Not discussed about data poisoning attack on the dataset |
Rakesh et al. [24] | 2021 | Monitor water quality using ML approach | NB, RF, and LR | X | X | X | X | X | The scheme compares the simulation results with the experimental results | Not considered feature selection |
Khan et al. [28] | 2021 | Facilitate resource-efficient solution to the IoT application | ANN, SVM, DT, and DELM | X | X | X | ✔ | X | The scheme offer security and protection to the smart home | Not considered data positioning attack and IPFS-based storage |
Puthal et al. [25] | 2022 | User-centric security and fake data identification for IoT-based critical infrastructure | DT | X | X | X | X | X | They proposed theoretical and experimental solution that resist brute force, DDoS, and replay attack | Not compared the DT results with other AI approaches such as SVM, RF, XGBoost, etc. |
Narayanan et al. [26] | 2022 | Anomalies detection in smart cyber-physical systems | Automatic behavioural abstraction technique based on neural networks | X | X | ✔ | X | X | The scheme detects the maximum number of attack with 1 percent a false positive rate | They have not taken feature selection approaches and data poisoning attack |
Ragab et al. [31] | 2022 | To secure the industrial control system | SVM, RF, Adaboost, KNN, and BDLE-CAD | X | X | X | ✔ | X | They applied chimp optimization based feature selection that increases the accuracy | Not considered data poisoning attack for dataset |
Gu et al. [29] | 2023 | Quality control in manufacturing process | KNN, XGboost, ANN, XGB Max | X | X | X | ✔ | X | The proposed scheme prevents DoS, man in the top, DDoS, and brute force. | Not considered data poisoning attack. |
The proposed architecture | 2023 | Secure data dissemination architecture | RF, DT, SVM, perceptron, and GaussianNB classifier | ✔ | ✔ | ✔ | ✔ | ✔ | Accurate, efficient, secure, and reliable architecture for IoT-based critical infrastructure | - |
AI Classifiers | Parameters Used |
---|---|
RF | n_estimators: 200, max_depth: 5 |
DT | criterion: [‘gini’], splitter: [‘best’, ‘random’] |
SVM | gamma: [‘auto’], probability: True, kernel: [‘rbf’] |
Perceptron | alphafloat: [0.0001], l1_ratiofloat: [0.15] |
GaussianNB | priors: None, var_smoothing: 1 |
AI Models | Accuracy (%) | Precision (%) | Recall (%) | F1 Score (%) |
---|---|---|---|---|
RF | 98.46 | 97.56 | 95.55 | 96.65 |
SVM | 59.76 | 59.41 | 57.65 | 58.89 |
Decision tree | 95.71 | 97.56 | 96.53 | 94.45 |
Perceptron | 94.22 | 92.23 | 87.23 | 93.32 |
GaussianNB | 86.42 | 81.23 | 78.34 | 85.43 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Rathod, T.; Jadav, N.K.; Tanwar, S.; Polkowski, Z.; Yamsani, N.; Sharma, R.; Alqahtani, F.; Gafar, A. AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure. Sensors 2023, 23, 8928. https://doi.org/10.3390/s23218928
Rathod T, Jadav NK, Tanwar S, Polkowski Z, Yamsani N, Sharma R, Alqahtani F, Gafar A. AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure. Sensors. 2023; 23(21):8928. https://doi.org/10.3390/s23218928
Chicago/Turabian StyleRathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, Zdzislaw Polkowski, Nagendar Yamsani, Ravi Sharma, Fayez Alqahtani, and Amr Gafar. 2023. "AI and Blockchain-Based Secure Data Dissemination Architecture for IoT-Enabled Critical Infrastructure" Sensors 23, no. 21: 8928. https://doi.org/10.3390/s23218928