Computers, Materials & Continua DOI:10.32604/cmc.2022.030825 | ![]() |
Article |
Privacy Preserving Blockchain with Optimal Deep Learning Model for Smart Cities
1Department of Computing Technologies, SRM Institute of Science and Technology, Kattankulathur, Chennai, 603203, India
2Department of Computer Science and Information Technology, School of Engineering and Technology, Kebridehar University, Kebridehar, 250, Ethiopia
3Department of Computer Science and Engineering, K.Ramakrishnan College of Engineering, Tiruchirappalli, 621112, India
4Department of Computer Science and Engineering, K.Ramakrishnan College of Technology, Tiruchirappalli, 621112, India
5Energy Department, Technical College of Engineering, Duhok Polytechnic University, Duhok, Iraq
6Computer Science Department, College of Science, Nawroz University, Duhok, Iraq
7Computer Network Department, Technical College of Informatics, Sulaimani Polytechnic University, Sulaimani, Iraq
8College of Technical Engineering, The Islamic University, Najaf, Iraq
*Corresponding Author: Ahmed Alkhayyat. Email: ahmedalkhayyat85@iunajaf.edu.iq
Received: 02 April 2022; Accepted: 25 May 2022
Abstract: Recently, smart cities have emerged as an effective approach to deliver high-quality services to the people through adaptive optimization of the available resources. Despite the advantages of smart cities, security remains a huge challenge to be overcome. Simultaneously, Intrusion Detection System (IDS) is the most proficient tool to accomplish security in this scenario. Besides, blockchain exhibits significance in promoting smart city designing, due to its effective characteristics like immutability, transparency, and decentralization. In order to address the security problems in smart cities, the current study designs a Privacy Preserving Secure Framework using Blockchain with Optimal Deep Learning (PPSF-BODL) model. The proposed PPSF-BODL model includes the collection of primary data using sensing tools. Besides, z-score normalization is also utilized to transform the actual data into useful format. Besides, Chameleon Swarm Optimization (CSO) with Attention Based Bidirectional Long Short Term Memory (ABiLSTM) model is employed for detection and classification of intrusions. CSO is employed for optimal hyperparameter tuning of ABiLSTM model. At the same time, Blockchain (BC) is utilized for secure transmission of the data to cloud server. This cloud server is a decentralized, distributed, and open digital ledger that is employed to store the transactions in different methods. A detailed experimentation of the proposed PPSF-BODL model was conducted on benchmark dataset and the outcomes established the supremacy of the proposed PPSF-BODL model over recent approaches with a maximum accuracy of 97.46%.
Keywords: Blockchain; smart city; security; intrusion detection system; chameleon swarm optimization; deep learning; parameter tuning
Globally, technological advancements has brought improvements in lifestyle while sensing technology has changed the way of life in particular. This next-gen technology helps the industries and economies to explore much more opportunities [1]. While the individuals are linked with one another via smartphones, laptops, and tabs, on the other hand, smart gadgets, meters, and appliances are commonly used in almost all the cities across the globe [2]. Motor vehicles and community systems, moreover services, are most probably associated thus forming a new paradigm called ‘internet of things’ (IoT). Additionally, researchers, scholars and institutions are enhancing their standards and IoT protocols to standardize their gadgets’ associations [3]. Subsequently, cities are on expansion mode in terms of infrastructure, control systems, services, and monitoring systems so as to adopt the changes introduced recently. Location services, smart traffic, weather, and smart transportation are also linked among with each other [4]. But, this sort of uncontrolled development of the cities brings forth totally new circumstances and problems which should be taken into account by government officials as well as stakeholders. Smart city concepts are completely based on embedded structures, intelligent technologies, and sensing technology. Generally, smart cities use information technologies and fixed infrastructures to enhance the living standards. There exists two chief problems such as security and electrical crime concerns [5]. Smart city security is ensured by three elements such as governance, technology and society.
Intrusion Detection Systems (IDS) are highly efficient tools in terms of monitoring network activities, identification of unauthorized usage, detection of information system destruction, and system protection from interior and exterior intrusions (intrusions from inside or outside the network) [6,7]. Meanwhile, IDS is recommended as a highly important security solution for newly-developed online web-based applications in relation to smart cities and Internet of Things (IoT) atmosphere. In general, IDS-based systems commence a greater quantity of unsuitable and fake alarms, whenever abnormal performances are identified [8]. If the activated fake alarm rate is too high, I t tend to diminish the performance of IDS in contrast to cyber-attacks and makes the job of security analysts completely challenging. Further, it also incurs heavy cost for detection, management and computation of intrusions. In addition to these, the risks for failure are high when using traditional IDS-based methodology for IoT since the latter does not approve the speedy development of smart city applications [9]. Thus, a powerful information security system model is required to be specific that allows the fast development of smart city applications under IoT environment [10].
In literature [11], the researchers proposed a smart city intrusion detection architecture based Restricted Boltzmann Machines (RBM). RBM is employed owing to its capacity to learn high-level features from original information in an unsupervised manner and the ability to depict the information generated by smart sensors and meters. Additionally, the extracted features and distinct classifications are trained in this method. In the study conducted earlier [12], the researchers proposed a video-based IDS with DL. Now, You YOLO approach is employed for object recognition whereas intrusion is detected using the presented method by shifting the centre of mass of the identified objects. Furthermore, Simple Online and Real-time Tracking (SORT) approach is utilized to track real-time intruders. Ramadan [13] proposed a simple and two light approaches for detection and prevention of intrusions in smart city—multipath-based IDS (MBIDS) and Threshold-based IDS (TBIDS). The researcher applied cross-layer method between network and the application layers for intrusion detection.
Gupta et al. [14] presented a hybrid optimization and DL-centric IDS to resolve the problem in IoT-assisted smart cities. Initially, the dataset endures pre-processing to obtain accurate and effective IDSs. Next, clustering and FS are implemented by MinK-means Algorithm and Hybrid Chicken Swarm Genetic Algorithm (HCSGA). Qureshi et al. [15] aimed at managing a minimum of three components in smart cities such as smart living, security provision, and smart mobility by designing three natural-inspired solutions. Daniel et al. [16] presented Cognitive Smart City Network (CSC-Net) structure that describes how information is gathered from the application of smart cities and it is examined through cognitive computation. The study forecasted Mobile Edge Computing solution (MEC) that allows node cooperation among IoT gadgets to ensure reliable and secure transmission between fog layer and smart device and equally between cloud and fog layers. In literature [17], an IDS was presented for detecting the injection attacks in IoT applications. Here, two kinds of FS approaches (recursive feature elimination and constant removal) were utilized and were validated using several ML classification methods such as Decision Tree, SVM, and Random Forest. Few other models based on blockchain are also available in the literature [18–25].
In this background, the current study designs Privacy Preserving Secure Framework using Blockchain with Optimal Deep Learning (PPSF-BODL) model for smart cities. The proposed PPSF-BODL model uses z-score normalization to transform the actual data into useful format. Also, Chameleon Swarm Optimization (CSO) with Attention-based Bidirectional Long Short Term Memory (ABiLSTM) model is engaged for detection and classification of intrusions. Moreover, Blockchain (BC) is utilized for secure transmission of the data to cloud server. A detailed experimentation of the proposed PPSF-BODL model was conducted on benchmark dataset.
In this study, a novel PPSF-BODL technique has been developed for both identification and classification of intrusions in smart city environment. The proposed PPSF-BODL model includes the collection of primary data using sensing tools. Also, z-score normalization is utilized to transform the actual data into useful format. Next, ABiLSTM model is employed for intrusion detection and classification. Finally, CSO is employed for optimal hyperparameter tuning of ABiLSTM model.
2.1 ABiLSTM Based Classification
Once the input data is pre-processed, ABiLSTM model is employed for intrusion detection and classification [26]. BiLSTM model is employed to enhance the learning abilities of conventional LSTM model by considering bidirectional relationship of the data. It helps in attaining more structural data via gating scheme which in turn improves the efficiency. Further, it also performs data encoding to obtain data features that enhance the generalization abilities. It begins with input series after which the inverse form of the input series is combined with LSTM model. BiLSTM approach is produced via forward
Here,
ABiLSTM model enables the learning of related data in various representative sub-spaces. It processes the data concurrently to reduce computation complexity. Based on the final hidden layer
where
where, K, and y represent the query, key, and value matrix respectively. The respective vectors q,
where
Figure 1: Structure of BiLSTM
2.2 CSO Based Hyperparameter Optimization
In the final stage, CSO is employed for optimal hyperparameter tuning of ABiLSTM model. In order to optimally determine the hyper-parameters, CSO technique is utilized which enhances the efficiency of the entire classifier. CSO [27] technique is a meta-heuristic approach that follows the initialization of population to determine the optimization process. Consider that the total number of populations is C which exists in the searching space of D. An initial population is generated from the dimension composed from arbitrary initialization in the searching space as given below.
An initial vector of
An improved capability of chameleons to search from the searching space is formulated as follows
Now,
At this point, W signifies the weight of inertias,
whereas y is used to define the acceleration of chameleons. It can be understood that the CSO initialized the optimization and the chameleon locations are upgraded using the formulas given below.
Here,
Figure 2: Processes of CSO technique
Blockchain (BC) is used for secure transmission of the data to cloud server. This cloud server is a decentralized, distributed, and open digital ledger that is employed to store the transactions in different ways. BC is a set of blocks where each block is made up of timestamp, hash values of the existing and current blocks, and transaction details (bitcoin, ethereum). BC is a shared, decentralized and a public digital ledger which is employed to store the transaction details in a distinct manner. Therefore, an intruder record could not be modified for every block that is made up of cryptographic values of the current block. Fig. 3 demonstrates the structure of BC. BC provides the ability to distribute the ledger of information in a trusted, shared, safe, and decentralized manner. Decentralized storage is a kind of BC which is employed to store the maximum information that is interconnected with current and previous blocks through smart contract code. LitecoinDB, Swarm, SiacoinDB, MoneroDB, BigchainDB, IPFS, and so on, have been employed for decentralized data. Interplanetary File System (IPFS) is determined as shared, Point-to-Point, and decentralized dataset that is connected and transmits typical files. IPFS is employed with BC method for IoT function to gain maximal throughput.
Figure 3: Structure of BC
In this section, the intrusion detection performance of the proposed PPSF-BODL model was validated using NSL-KDD 2015 dataset. It includes 41 features and 125973 samples under two classes (normal-67343 and anomaly-58630).
Fig. 4 demonstrates the confusion matrices generated by PPSF-BODL model on distinct ratios of training set (TRS) and testing set (TSS). With 80% of TRS, the proposed PPSF-BODL model identified 52411 samples as normal and 45536 samples as samples with anomalies. In addition, with 20% of TSS, PPSF-BODL model categorized 13195 samples as normal and 11318 samples as anomalies. Next, with 70% of TRS, PPSF-BODL model found 45892 samples under normal category while 39995 samples as anomalies. With 30% of TSS, the proposed PPSF-BODL model classified 19,710 samples under normal and 17123 samples under anomalies.
Figure 4: Confusion matrix of PPSF-BODL technique under distinct TRS and TSS
Tab. 1 displays the comprehensive IDS classification results accomplished by PPSF-BODL model with 80% of TRS and 20% of TSS. Fig. 5 provides the thorough classification results accomplished by PPSF-BODL model with 80% of TRS. The figure infer that proposed PPSF-BODL model identified normal class with
Figure 5: Results of the analysis of PPSF-BODL technique on 80% of TRS
Fig. 6 exhibits the comprehensive classification results accomplished by PPSF-BODL model with 20% of TSS. The figure corresponds that the proposed PPSF-BODL model acknowledged normal class with
Figure 6: Results of the analysis of PPSF-BODL technique on 20% of TSS
Both Training Accuracy (TA) and Validation Accuracy (VA), attained by the proposed PPSF-BODL model on 80:20 of TRS/TSS data, were assessed and the results are demonstrated in Fig. 7. The experimental outcomes imply that the proposed PPSF-BODL model gained the maximum TA and VA values. To be specific, VA seemed to be higher than TA.
Figure 7: TA and VA analyses results of PPSF-BODL technique on TRS/TSS of 80:20
Both Training Loss (TL) and Validation Loss (VL), achieved by PPSF-BODL model on 80:20 of TRS/TSS data, were analyzed and the results are showcased in Fig. 8. The experimental outcomes infer that the proposed PPSF-BODL model accomplished the least TL and VL values. To be specific, VL seemed to be lower than TL.
Figure 8: TL and VL analyses results of PPSF-BODL technique on TRS/TSS of 80:20
Tab. 2 provides a brief overview of IDS classification outcomes accomplished by PPSF-BODL model with 70% of TRS and 30% of TSS.
Fig. 9 demonstrates the detailed classification results attained by the proposed PPSF-BODL model with 70% of TRS. The figure indicates that PPSF-BODL model identified normal class with
Figure 9: Results of the analysis of PPSF-BODL technique on 70% of TRS
Fig. 10 exhibits the comprehensive classification results achieved by PPSF-BODL model with 30% of TSS. The figure shows that PPSF-BODL model recognized normal class with
Figure 10: Results of the analysis of PPSF-BODL technique on 30% of TRS
The TA and VA values gained by the proposed PPSF-BODL algorithm on 70:30 of TRS/TSS data are demonstrated in Fig. 11. The experimental outcomes infer that the proposed PPSF-BODL model gained the maximum TA and VA values. To be specific, VA seemed to be higher than TA.
Figure 11: TA and VA analyses results of PPSF-BODL technique on TRS/TSS of 70:30
TL and VL values, achieved by the proposed PPSF-BODL technique on 70:30 of TRS/TSS data, are portrayed in Fig. 12. The experimental outcomes infer that PPSF-BODL technique accomplished the minimal TL and VL values. Specifically, VL appeared to be lesser than TL.
Figure 12: TL and VL analyses results of PPSF-BODL technique on TRS/TSS of 70:30
Finally, Tab. 3 and Fig. 13 highlight the comparative analysis results accomplished by PPSF-BODL model and other recent models [20]. As per the results, CS-PSO and GB models achieved less
Figure 13: Comparative analysis results of PPSF-BODL technique and other recent models
The above mentioned results and discussion ensured the superiority of the proposed PPSF-BODL model over other methods.
In this study, a novel PPSF-BODL approach has been developed for identification and classification of intrusions in smart city environment. The proposed PPSF-BODL model includes primary data collection with the help of sensing tools. Further, z-score normalization is also utilized to transform the actual data into useful format. Next, ABiLSTM model is employed for detection and classification of intrusions. Finally, CSO is employed for optimal hyperparameter tuning of ABiLSTM model. BC is utilized for secure transmission of the data to cloud server. This cloud server is a decentralized, distributed, and open digital ledger that is employed to store the transactions through different methods. A detailed experimentation of the proposed PPSF-BODL model was carried out on benchmark dataset and the outcomes established the supremacy of the proposed PPSF-BODL model over recent approaches with a maximum accuracy of 97.46%. In future, CSO algorithm can be applied to feature subset selection so as to enhance the intrusion detection results.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
![]() | This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |