Author
Listed:
- Harshit Shah
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Dhruvil Shah
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Nilesh Kumar Jadav
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Rajesh Gupta
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Sudeep Tanwar
(Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad 382481, India)
- Osama Alfarraj
(Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia)
- Amr Tolba
(Computer Science Department, Community College, King Saud University, Riyadh 11437, Saudi Arabia)
- Maria Simona Raboaca
(Doctoral School, University Politehnica of Bucharest, Splaiul Independentei Street No. 313, 060042 Bucharest, Romania
National Research and Development Institute for Cryogenic and Isotopic Technologies—ICSI Rm. Vâlcea, Uzinei Street, No. 4, P.O. Box 7 Râureni, 240050 Râmnicu Vâlcea, Romania)
- Verdes Marina
(Faculty of Civil Engineering and Building Services, Department of Building Services, Technical University of Gheorghe Asachi, 700050 Iasi, Romania)
Abstract
The Internet of Things (IoT) is a key enabler technology that recently received significant attention from the scientific community across the globe. It helps transform everyone’s life by connecting physical and virtual devices with each other to offer staggering benefits, such as automation and control, higher productivity, real-time information access, and improved efficiency. However, IoT devices and their accumulated data are susceptible to various security threats and vulnerabilities, such as data integrity, denial-of-service, interception, and information disclosure attacks. In recent years, the IoT with blockchain technology has seen rapid growth, where smart contracts play an essential role in validating IoT data. However, these smart contracts can be vulnerable and degrade the performance of IoT applications. Hence, besides offering indispensable features to ease human lives, there is also a need to confront IoT environment security attacks, especially data integrity attacks. Toward this aim, this paper proposed an artificial intelligence-based system model with a dual objective. It first detects the malicious user trying to compromise the IoT environment using a binary classification problem. Further, blockchain technology is utilized to offer tamper-proof storage to store non-malicious IoT data. However, a malicious user can exploit the blockchain-based smart contract to deteriorate the performance IoT environment. For that, this paper utilizes deep learning algorithms to classify malicious and non-malicious smart contracts. The proposed system model offers an end-to-end security pipeline through which the IoT data are disseminated to the recipient. Lastly, the proposed system model is evaluated by considering different assessment measures that comprise the training accuracy, training loss, classification measures (precision, recall, and F1 score), and receiver operating characteristic (ROC) curve.
Suggested Citation
Harshit Shah & Dhruvil Shah & Nilesh Kumar Jadav & Rajesh Gupta & Sudeep Tanwar & Osama Alfarraj & Amr Tolba & Maria Simona Raboaca & Verdes Marina, 2023.
"Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment,"
Mathematics, MDPI, vol. 11(2), pages 1-22, January.
Handle:
RePEc:gam:jmathe:v:11:y:2023:i:2:p:418-:d:1034221
Download full text from publisher
Citations
Citations are extracted by the
CitEc Project, subscribe to its
RSS feed for this item.
Cited by:
- Harshwardhan Yadav & Param Shah & Neel Gandhi & Tarjni Vyas & Anuja Nair & Shivani Desai & Lata Gohil & Sudeep Tanwar & Ravi Sharma & Verdes Marina & Maria Simona Raboaca, 2023.
"CNN and Bidirectional GRU-Based Heartbeat Sound Classification Architecture for Elderly People,"
Mathematics, MDPI, vol. 11(6), pages 1-25, March.
- Walid I. Khedr & Ameer E. Gouda & Ehab R. Mohamed, 2023.
"P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture,"
Mathematics, MDPI, vol. 11(16), pages 1-36, August.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:2:p:418-:d:1034221. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.