Abstract
The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. Therefore, alternative, intelligent solutions should be used to detect anomalies in the operating parameters of the infrastructures concerned, while ensuring the anonymity and confidentiality of industrial information. Blockchain is an encrypted, distributed archiving system designed to allow for the creation of real-time log files that are unequivocally linked. This ensures the security and transparency of transactions. This research presents, for the first time in the literature, an innovative Blockchain Security Architecture that aims to ensure network communication between traded Industrial Internet of Things devices, following the Industry 4.0 standard and based on Deep Learning Smart Contracts. The proposed smart contracts are implementing (via computer programming) a bilateral traffic control agreement to detect anomalies based on a trained Deep Autoencoder Neural Network. This architecture enables the creation of a secure distributed platform that can control and complete associated transactions in critical infrastructure networks, without the intervention of a single central authority. It is a novel approach that fuses artificial intelligence in the Blockchain, not as a supportive framework that enhances the capabilities of the network, but as an active structural element, indispensable and necessary for its completion.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bassi L (2017) Industry 4.0: hope, hype or revolution? In: 2017 IEEE 3rd international forum on research and technologies for society and industry (RTSI), Modena, 2017, pp 1–6
Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems, vol 3, 2015, pp 18–23
Gilchrist A (2016) Industry 4.0: the industrial internet of things, Publisher: A press, Release Date: June 2016, ISBN: 9781484220474
Xu LD, Xu EL, Li L (2018) Industry 4.0: state of the art and future trends. Int J Prod Res 56(8):2941–2962
Zhou K, Liu T, Zhou L (2015) Industry 4.0: towards future industrial opportunities and challenges. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD), Zhangjiajie, 2015, pp 2147–2152
El Hamdi S, Abouabdellah A, Oudani M (2019) Industry 4.0: fundamentals and main challenges. In: 2019 international colloquium on logistics and supply chain management (LOGISTIQUA), Montreuil—Paris, France, 2019, pp 1–5
Culot G, Fattori F, Podrecca M, Sartor M (2019) Addressing industry 4.0 cybersecurity challenges. IEEE Eng Manag Rev 47(3):79–86
Sklyar V, Kharchenko V (2019) ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), Metz, France, 2019, pp 1046–1049
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201
Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8–11
Dixit M, Tiwari A, Pathak H, Astya R (2018) An overview of deep learning architectures, libraries and its applications areas. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN), Greater Noida (UP), India, 2018, pp 293–297
Chen CLP (2015) Deep learning for pattern learning and recognition. In: 2015 IEEE 10th jubilee international symposium on applied computational intelligence and informatics, Timisoara, 2015, pp 17–17
Schmidhuber J Deep learning in neural networks: an overview. arXiv:1404.7828v4 [cs.NE]
Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: blockchain. In: 2017 3rd international conference on computational intelligence and networks (CINE), Odisha, 2017, pp 126–127
Mermer GB, Zeydan E, Arslan SS (2018) An overview of blockchain technologies: principles, opportunities and challenges. In: 2018 26th signal processing and communications applications conference (SIU), Izmir, 2018, pp 1–4
Zhao S, Li S, Yao Y (2019) Blockchain enabled industrial internet of things technology. IEEE Trans Comput Soc Syst 6(6):1442–1453
Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst 49(11):2266–2277
Mohanta BK, Panda SS, Jena D (2018) An overview of smart contract and use cases in blockchain technology. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), Bangalore, 2018, pp 1–4
Abbas QE, Sung-Bong J (2019) A survey of blockchain and its applications. In: 2019 international conference on artificial intelligence in information and communication (ICAIIC), Okinawa, Japan, 2019, pp 001–003
Andersen MP, Kolb J, Chen K, Fierro G, Culler DE, Popa RA (2017) WAVE: a decentralized authorization system for IoT via blockchain smart contracts. Technical report no. UCB/EECS-2017-234, Dec 29, 2017
Schmidhuber Jürgen (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117
Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press. http://www.deeplearningbook.org. Accessed 22 Feb 2019
Zou H, Hastie T (2005) Regularization and variable selection via the elastic net. J R Stat Soc Ser B (Stat Methodol) 67(2):301–320
Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 wireless telecommunications symposium (WTS), Phoenix, AZ, 2018, pp 1–5
Fernández-Saúco IA, Acosta-Mendoza N, Gago-Alonso A, García-Reyes EB (2019) Computing anomaly score threshold with autoencoders pipeline. In: Vera-Rodriguez R, Fierrez J, Morales A (eds) Progress in pattern recognition, image analysis, computer vision, and applications. CIARP 2018. Lecture notes in computer science, vol 11401. Springer, Cham
Falco G, Caldera C, Shrobe H (2018) IIoT cybersecurity risk modeling for SCADA Systems. IEEE Internet Things J 5(6):4486–4495
Al-Dalky R, Abduljaleel O, Salah K, Otrok H, Al-Qutayri M (2014) A modbus traffic generator for evaluating the security of SCADA systems. In: 2014 9th international symposium on communication systems, networks & digital sign (CSNDSP), Manchester, 2014, pp 809–814
Fachkha C (2019) Cyber threat investigation of SCADA modbus activities. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), CANARY ISLANDS, Spain, 2019, pp 1–7
Grooby S, Dargahi T, Dehghantanha A (2019) Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats. In: Dehghantanha A, Choo KK (eds) Handbook of big data and IoT security. Springer, Cham
Pan S, Morris T, Adhikari U (2015) Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans Smart Grid. https://doi.org/10.1109/tsg.2015.2409775
Pan S, Morris T, Adhikari U (2015) Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans Ind Inform 1:1. https://doi.org/10.1109/tii.2015.2420951
Pan S, Morris T, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188
Beaver J, Borges R, Buckner M, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: Proceedings of the 7th international symposium on resilient control systems, Aug 19–21, 2014, Denver, CO, USA
Wenzhu S, Wenting H, Zufeng X, Jianping C (2019) Overview of one-class classification. In: 2019 IEEE 4th international conference on signal and image processing (ICSIP), Wuxi, China, 2019, pp 6–10
Zhang Shichao, Zhang Chengqi, Yang Qiang (2003) Data preparation for data mining. Appl Artif Intell 17(5–6):375–381
Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37
Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874
Demertzis K, Kikiras P, Tziritas N, Sanchez SL, Iliadis L (2018) The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn Comput 2:35
Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3:6
Demertzis K, Iliadis L, Kikiras P, Tziritas N (2019) Cyber-typhon: an online multi-task anomaly detection framework. In: MacIntyre J, Maglogiannis I, Iliadis L, Pimenidis E (eds) Artificial intelligence applications and innovations. AIAI 2019. IFIP advances in information and communication technology, vol 559. Springer, Cham
Korda N, Szorenyi B, Li S (2016) Distributed clustering of linear bandits in peer to peer networks. In: ICML’16: proceedings of the 33rd international conference on international conference on machine learning, vol 48, June 2016, pp 1301–1309
Li S, Karatzoglou A, Gentile C (2016) Collaborative filtering bandits. In: Proceedings of the 39th international ACM SIGIR conference on research and development in information retrieval (SIGIR’16). Association for Computing Machinery, New York, NY, USA, pp 539–548. https://doi.org/10.1145/2911451.2911548
Hao F, Park D-S, Li S, Lee HM (2016) Mining λ-maximal cliques from a fuzzy graph. Sustainability 8:553
Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31st international conference on international conference on machine learning, vol 32 (ICML’14). JMLR.org, II–757–II–765
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Demertzis, K., Iliadis, L., Tziritas, N. et al. Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput & Applic 32, 17361–17378 (2020). https://doi.org/10.1007/s00521-020-05189-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-020-05189-8