Skip to main content

Integrated Smart IoT Infrastructure Management Using Window Blockchain and Whale LSTM Approaches

  • Conference paper
  • First Online:
Advances in Information Communication Technology and Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 392))

  • 605 Accesses

Abstract

Internet of Things (IoT) is playing a vital role in the smart infrastructure environment. The IoT vendors are delivering their products in the market without any concern about the security of the devices, so it is an open number of security issues on the IoT devices and data. Security threats are growing high because existing techniques measures are inadequate; two of the most significant concerns in IoT are security and privacy. Due to the IoT devices limited CPU, storage, and energy resources, existing security architectures are unable to provide the key safety requirements, so deep learning and blockchain algorithms are used. These IoT devices give accurate results from heavy complex datasets. Furthermore, blockchain and deep learning model are very familiar to give secured devices to IoT. This proposed model is window blockchain (WBC). In proof-of-work, it leverages past (n − 1) hash to construct the next hash with minimal change; because of this quick block analysis time, we can easily prevent IoT devices from the attackers. WBC’s performance is evaluated using an actual data stream generated by one of the analyzed smart infrastructure devices. Another method using deep learning hybrid algorithms for LSTM networks with whale optimization algorithm is a new schema optimization technique that mimics humpback whales’ intelligent bubble-net fishing activity. It is an easy, powerful, and predator probabilistic optimization algorithm that can avoid local optima and find global optimal answer. The findings indicate that the proposed window blockchain model improves security and reduces memory utilization this employing limited resources. In the Whale +LSTM (WLSTM), a large number of the dataset were gathered using a real-time scenario using OMNET++IoT plugins, and a Python API is created to insert various malicious activity through networks. The proposed WLSTM model output of 99% has been tested and related to other deep learning utilizing benchmark datasets such as CIDDC-001, UNSWN15, and KDD datasets, as well as actual datasets; the prediction of unknown threats is used to tackle the computation complexity in big networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhihan Lv, Bin Hu: Infrastructure monitoring and operation for smart cities based on IoT system. IEEE Trans. Indust. Inf. 16(3). https://doi.org/10.1109/TII.2019.2913535 (2020)

  2. Mukherjee, A., Chakraborty, N.: Whale optimization algorithm: an implementation to design low-pass FIR filter. IEEE [IPACT2017]. https://doi.org/10.1109/IPACT.2017.8244929

  3. Dorri, A., Kanhere, S.S.: LSB: a lightweight scalable blockchain for IoT security and anonymity. J. Parallel Distrib. Comp. https://doi.org/10.1016/j.jpdc.2019.08.005.

  4. Khraisat, A., Alazab, A.: A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity. https://doi.org/10.1186/s42400-021-00077-7 (2021)

  5. Vinayakumar, R., Alazab, M.: A visualized botnet detection system based deep learning for the internet of things networks of smart cities. IEEE Trans. Indust. Appl. https://doi.org/10.1109/TIA.2020.2971952 (2020)

  6. Monikaroopak, Tian, G.Y.: An intrusion detection system against DDos attacks in IoT networks. IEEE. https://doi.org/10.1109/CCWC47524.2020.9031206 (2020)

  7. Su, T., Sun, H.: Bat: deep learning methods on network intrusion detection using NSL-KDD dataset. IEEE. https://doi.org/10.1109/ACCESS.2020.2972627 (2020)

  8. Tanzir Mehedi, S.K., Shamim, A.A.M.: Blockchain—Based security management of IoT infrastructure with ethereum transactions. Springer. https://doi.org/10.1007/s42044-019-00044-z (2019)

  9. Liang, W., Huang, W.: Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet Things J. Doi: https://doi.org/10.1109/JIOT.2020.2974281 (2019)

  10. Ly, V., Nguyen, Q.U.: Deep transfer learning for IoT attack detection. doi: https://doi.org/10.1109/ACCESS.2020.3000476 June 18, 2020

  11. Manimurugan, S., Almutairi, S.: Effective attack detection in internet of medical things smart environment using a deep belief neural network. IEEE. doi: https://doi.org/10.1109/ACCESS.2020.2986013 (2020)

  12. Ning, G.-Y., Cao, D.-Q.: Improved whale optimization algorithm for solving constrained optimization problems. Hindawi vol. https://doi.org/10.1155/2021/8832251 (2021)

  13. Patidar, S., Singh Bains, I.: Web security in IoT networks using deep learning model. IEEE Xplore. doi: https://doi.org/10.1109/ICSSIT48917.2020.9214114 (2020)

  14. Soleimanian Gharehchopogh, F., Gholizadeh, H.: A comprehensive survey: whale optimization algorithm and its applications. https://doi.org/10.1016/j.swevo.2019.03.004 (2019)

  15. Beltagy, I., Peters, M.E.: Longformer: the long-document transformer. https://github.com/allenai/longformer (2020)

  16. Jiang, F., Fu, Y.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comp. 5(2). doi: https://doi.org/10.1109/TSUSC.2018.2793284 (2020)

  17. Boukhalfa, A., Abdellaoui, A.: LSTM Deep Learning Method for Network Intrusion Detection System, vol. 10, no. 3 (2020)

    Google Scholar 

  18. Otoum, S., Kantarci, B.: On the feasibility of deep learning in sensor network intrusion detection. IEEE Netw. Lett. 1(2). doi: https://doi.org/10.1109/LNET.2019.2901792 (2019)

  19. Reyna, A., Martín, C.: On blockchain and its integration with IoT. Challenges Opportunities. https://doi.org/10.1016/j.future.2018.05.046 (2018)

  20. Waheed, N., He, X.: Security and privacy in IoT using machine learning and blockchain: threats and countermeasures. ACM Comput. Surv. 53(3), (2020)

    Google Scholar 

  21. Riyanto, R.A.: Discretizing whale optimization algorithm to optimize a long short-term memory. IEEE. doi: https://doi.org/10.1109/ICOIACT50329.2020.9331972 (2020)

  22. Sun, X., Jin Gao, X.: The research on application of sliding window LS_SVM in the batch process. doi: https://doi.org/10.1109/ACC.2013.6579852 (2013)

  23. Rana, N., Latiff, M.S.: Whale optimization algorithm: a systematic review of contemporary applications, modifications and developments. https://doi.org/10.1007/s00521-020-04849-z (2020)

  24. Fu, J., Qiao, S.: A study on the optimization of Blockchain Hashing algorithm based on PRCA. https://doi.org/10.1155/2020/8876317 (2020)

  25. Sultan, M.A.M.: IoT Security Issues via Blockchain: A Review Paper. doi: https://doi.org/10.1145/3320154.3320163

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Janani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Janani, K., Ramamoorthy, S. (2022). Integrated Smart IoT Infrastructure Management Using Window Blockchain and Whale LSTM Approaches. In: Goar, V., Kuri, M., Kumar, R., Senjyu, T. (eds) Advances in Information Communication Technology and Computing. Lecture Notes in Networks and Systems, vol 392. Springer, Singapore. https://doi.org/10.1007/978-981-19-0619-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0619-0_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0618-3

  • Online ISBN: 978-981-19-0619-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics