Open Access iconOpen Access



Design of Clustering Enabled Intrusion Detection with Blockchain Technology

S. Vimal1, S. Nalini2,*, K. Anguraj3, T. Chelladurai4

1 Department of Computational Intelligence, SRM Institute of Science and Technology, Kattankulathur, 603203, Tamilnadu, India
2 Department of Computer Science &Engineering, University College of Engineering, BIT Campus, Anna University, Tiruchirappalli, 620024, Tamilnadu, India
3 Department of Electronics and Communication Engineering, Sona College of Technology, Salem, 636005, Tamilnadu, India
4 Department of Electronics and Communication Engineering, PSNA College of Engineering and Technology, Dindigul, 624622, Tamilnadu, India

* Corresponding Author: S. Nalini. Email: email

Intelligent Automation & Soft Computing 2022, 33(3), 1907-1921.


Recent advancements in hardware and networking technologies have resulted in a large growth in the number of Internet of Things (IoT) devices connected to the Internet, which is likely to continue growing in the coming years. Traditional security solutions are insufficiently suited to the IoT context due to the restrictions and diversity of the resources available to objects. Security techniques such as intrusion detection and authentication are considered to be effective. Additionally, the decentralised and distributed nature of Blockchain technology makes it an excellent solution for overcoming the security issue. This paper proposes a chaotic bird swarm algorithm (CBSA)-based clustering technique based on an optimum deep belief network (ODBN) and Blockchain technology for secure authentication in an IoT setting. The CBSA-ODBN technique creates a clustering algorithm that utilises CBSA to pick cluster heads (CHs). The ODBN model is then utilised to identify the network, and the learning rate of the Deep Belief Network (DBN) model is optimally adjusted using the flower pollination technique (FPA). The suggested concept creates a layered security network paradigm for the Internet of Things using blockchain technology. Numerous simulations are run, with the outcomes analysed using a variety of measures, including detection rate, packet delivery ratio, energy usage, end-to-end latency, and processing cost. A careful comparison of the suggested model's performance to recently developed methodologies demonstrated the proposed model's superior performance.


Cite This Article

APA Style
Vimal, S., Nalini, S., Anguraj, K., Chelladurai, T. (2022). Design of clustering enabled intrusion detection with blockchain technology. Intelligent Automation & Soft Computing, 33(3), 1907-1921.
Vancouver Style
Vimal S, Nalini S, Anguraj K, Chelladurai T. Design of clustering enabled intrusion detection with blockchain technology. Intell Automat Soft Comput . 2022;33(3):1907-1921
IEEE Style
S. Vimal, S. Nalini, K. Anguraj, and T. Chelladurai "Design of Clustering Enabled Intrusion Detection with Blockchain Technology," Intell. Automat. Soft Comput. , vol. 33, no. 3, pp. 1907-1921. 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1230


  • 714


  • 0


Share Link