Open Access iconOpen Access

ARTICLE

crossmark

Design of Clustering Enabled Intrusion Detection with Blockchain Technology

S. Vimal1, S. Nalini2,*, K. Anguraj3, T. Chelladurai4

1 Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur, 603203, Tamilnadu, India
2 Department of Computer Science &Engineering, University College of Engineering, BIT Campus, Anna University, Tiruchirappalli, 620024, Tamilnadu, India
3 Department of Electronics and Communication Engineering, Sona College of Technology, Salem, 636005, Tamilnadu, India
4 Department of Electronics and Communication Engineering, PSNA College of Engineering and Technology, Dindigul, 624622, Tamilnadu, India

* Corresponding Author: S. Nalini. Email: email

Intelligent Automation & Soft Computing 2022, 33(3), 1907-1921. https://doi.org/10.32604/iasc.2022.025219

Abstract

Recent advancements in hardware and networking technologies have resulted in a large growth in the number of Internet of Things (IoT) devices connected to the Internet, which is likely to continue growing in the coming years. Traditional security solutions are insufficiently suited to the IoT context due to the restrictions and diversity of the resources available to objects. Security techniques such as intrusion detection and authentication are considered to be effective. Additionally, the decentralised and distributed nature of Blockchain technology makes it an excellent solution for overcoming the security issue. This paper proposes a chaotic bird swarm algorithm (CBSA)-based clustering technique based on an optimum deep belief network (ODBN) and Blockchain technology for secure authentication in an IoT setting. The CBSA-ODBN technique creates a clustering algorithm that utilises CBSA to pick cluster heads (CHs). The ODBN model is then utilised to identify the network, and the learning rate of the Deep Belief Network (DBN) model is optimally adjusted using the flower pollination technique (FPA). The suggested concept creates a layered security network paradigm for the Internet of Things using blockchain technology. Numerous simulations are run, with the outcomes analysed using a variety of measures, including detection rate, packet delivery ratio, energy usage, end-to-end latency, and processing cost. A careful comparison of the suggested model's performance to recently developed methodologies demonstrated the proposed model's superior performance.

Keywords


Cite This Article

S. Vimal, S. Nalini, K. Anguraj and T. Chelladurai, "Design of clustering enabled intrusion detection with blockchain technology," Intelligent Automation & Soft Computing, vol. 33, no.3, pp. 1907–1921, 2022. https://doi.org/10.32604/iasc.2022.025219



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1169

    View

  • 677

    Download

  • 0

    Like

Share Link