[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

AI-assisted bio-inspired algorithm for secure IoT communication networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is made up of intelligent devices that interact with each other. It allows information to be gathered and shared by these devices. In addition, IoT now has a wide range of life applications such as business, logistics, health monitoring, smart ecosystem, and information concerning individuals, social and private environments. Security-related issues involved in such a communication network are drastically increasing day by day. Therefore, existing authentication and authorization concepts must grow along with technological evolution. This paper presents an artificial intelligence (AI)-assisted Bio-inspired algorithm for secure IoT communication networks (AI-BIAS) to improve future communication. The proposed framework is categorized into two sections: First, the Bio-inspired algorithm-assisted blockchain technology for authentication and authorization in the IoT communication network is presented. Further, the Artificial Intelligence algorithm monitors the proposed IoT communication network. The experimental results show that the proposed model enhances the accuracy ratio of 98.3%, average latency of 26 ms, average cost of 25.7%, authentication time 0.04 ms, multistep prediction’s MAPE, and RMSE values are 0.7645 and 0.9878 when compared to other popular methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Manogaran, G., Rawal, B.S., Saravanan, V., Kumar, P.M., Martínez, O.S., Crespo, R.G., Montenegro-Marin, C.E., Krishnamoorthy, S.: Blockchain-based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 161, 248–256 (2020)

    Article  Google Scholar 

  2. Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1–13 (2021)

    Article  Google Scholar 

  3. Tran, D.N., Nguyen, T.N., Khanh, P.C.P., Trana, D.T.: An IoT-based design using accelerometers in animal behavior recognition systems. IEEE Sens. J. (2021). https://doi.org/10.1109/JSEN.2021.3051194

    Article  Google Scholar 

  4. Amudha, G.: Dilated transaction access and retrieval: improving the information retrieval of blockchain-assimilated internet of things transactions. Wirel. Pers. Commun. (2021). https://doi.org/10.1007/s11277-021-08094-y

    Article  Google Scholar 

  5. Khalid, L.F., Ameen, S.Y.: Secure IoT integration in daily lives: a review. J. Inf. Technol. Inform 1(1), 6–12 (2021)

    Google Scholar 

  6. Kondoro, A., Dhaou, I.B., Tenhunen, H., Mvungi, N.: Real-time performance analysis of secure IoT protocols for microgrid communication. Future Gener. Comput. Syst. 116, 1–12 (2021)

    Article  Google Scholar 

  7. Seyhan, K., Nguyen, T.N., Akleylek, S., Cengiz, K., Islam, S.H.: Bi-GISIS KE: modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58, 102788 (2021)

    Google Scholar 

  8. Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I. (eds.): Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press, Boca Raton (2020)

    Google Scholar 

  9. Bera, B., Saha, S., Das, A.K., Kumar, N., Lorenz, P., Alazab, M.: Blockchain-envisioned secure data delivery and collection scheme for 5G-based IoT-enabled internet of drones environment. IEEE Trans. Veh. Technol. 69(8), 9097–9111 (2020)

    Article  Google Scholar 

  10. Ahmad, U., Song, H., Bilal, A., Alazab, M., Jolfaei, A.: Secure passive keyless entry and start system using machine learning. In: International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, pp. 304–313. Springer, Cham (2018, December)

  11. Gandhi, U.D., Kumar, P.M., Varatharajan, R., Manogaran, G., Sundarasekar, R., Kadu, S.: HIoTPOT: surveillance on IoT devices against recent threats. Wirel. Pers. Commun. 103(2), 1179–1194 (2018)

    Article  Google Scholar 

  12. Wei, T., Feng, W., Chen, Y., Wang, C.X., Ge, N., Lu, J.: Hybrid satellite-terrestrial communication networks for the maritime Internet of Things: key technologies, opportunities, and challenges. IEEE Internet Things J. 8(11), 8910–8934 (2021)

    Article  Google Scholar 

  13. Al-Naji, F.H., Zagrouba, R.: Secure IoT based on Blockchain: quantitive evaluation and analysis of the correlation between block mining time and blockchain efficiency. Int. J. Appl. Eng. Res. 15(4), 377–384 (2020)

    Google Scholar 

  14. Mendoza, D., Gaona-García, P.A., Vargas, F., Montenegro, C.: Communication infrastructure for monitoring the heart rate of patients on the cloud using IoT devices. Int. Inf. Inst. (Tokyo) Inf. 21(1), 131–138 (2018)

    Google Scholar 

  15. Jamshed, M.A., Pervaiz, H., Ahmed, S.H., Alam, A.S.: Cooperative communication techniques in wireless-powered backscatter communication: preambles and technical perspective. In: Wireless-Powered Backscatter Communications for Internet of Things, pp. 1–24. Springer, Cham (2020)

    Google Scholar 

  16. Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues, and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)

    Article  Google Scholar 

  17. Garg, S., Kaur, K., Kaddoum, G., Gagnon, F., Ahmed, S.H., Jayakody, D.N.K.: LiSA: a lightweight and secure authentication mechanism for smart metering infrastructure. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019, December)

  18. Patwary, A.A.N., Fu, A., Battula, S.K., Naha, R.K., Garg, S., Mahanti, A.: FogAuthChain: a secure location-based authentication scheme in fog computing environments using Blockchain. Comput. Commun. 162, 212–224 (2020)

    Article  Google Scholar 

  19. Thaseen, I.S., Chitturi, A.K., Al-Turjman, F., Shankar, A., Ghalib, M.R., Abhishek, K.: An intelligent long-short-term memory ensemble with a genetic algorithm for network anomaly identification. Trans. Emerg. Telecommun. Technol. (2020). https://doi.org/10.1002/ett.4149

    Article  Google Scholar 

  20. Luhach, R., Jha, C.K., Luhach, A.K.: Research and analysis of open security issues in communication for wireless sensor network. In: International Conference on Smart Trends for Information Technology and Computer Communications, pp. 135–142. Springer, Singapore (2016, August)

  21. Nguyen, C.H., Pham, T.L., Nguyen, T.N., Ho, C.H., Nguyen, T.A.: The linguistic summarization and the interpretability, scalability of fuzzy representations of multilevel semantic structures of worddomains. Microprocess. Microsyst. 81, 103641 (2021)

    Article  Google Scholar 

  22. Ogudo, K.A., Muwawa Jean Nestor, D., Ibrahim Khalaf, O., DaeiKasmaei, H.: A device performance and data analytics concept for smartphones’ IoT services and machine-type communication in cellular networks. Symmetry 11(4), 593 (2019)

    Article  Google Scholar 

  23. Miraz, M.H., Ali, M.: Integration of blockchain and IoT: an enhanced security perspective. Ann. Emerg. Technol. Comput. (AETiC) 4(4), 52–63 (2020)

    Article  Google Scholar 

  24. Prasad, S.K., Rachna, J., Khalaf, O.I., Le, D.N.: Map matching algorithm: real-time location tracking for smart security application. Telecommun. Radio Eng. 79(13), 1189–1203 (2020)

    Article  Google Scholar 

  25. Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Blockchain and trust for secure, end-user-based, and decentralized IoT service provision. IEEE Access 8, 119961–119979 (2020)

    Article  Google Scholar 

  26. Muthanna, A., Ateya, A.A., Khakimov, A., Gudkova, I., Abuarqoub, A., Samouylov, K., Koucheryavy, A.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019)

    Article  Google Scholar 

  27. Kumar, V.V., Devi, M., Raja, P.V., Kanmani, P., Priya, V., Sudhakar, S., Sujatha, K.: Design peer-to-peer protocol with sensible and secure IoT communication for future internet architecture. Microprocess. Microsyst. 78, 103216 (2020)

    Article  Google Scholar 

  28. Pacheco, J., Benitez, V.H., Pan, Z.: Security framework for IoT end nodes with neural networks. Int. J. Mach. Learn. Comput. 9(4), 381–386 (2019)

    Article  Google Scholar 

  29. Haseeb, K., Islam, N., Almogren, A., Din, I.U.: Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7, 185496–185505 (2019)

    Article  Google Scholar 

  30. Abidi, M.H., Alkhalefah, H., Moiduddin, K., Alazab, M., Mohammed, M.K., Ameen, W., Gadekallu, T.R.: Optimal 5G network slicing using machine learning and deep learning concepts. Comp. Stand. and Inter. 76, 1–15 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

The authors are grateful to the Taif University Researchers Supporting Project number (TURSP-2020/36), Taif University, Taif, Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xincan Fan.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Research involving human and/or animal participants

This article does not contain any studies with human participants or animals performed by any authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alroobaea, R., Arul, R., Rubaiee, S. et al. AI-assisted bio-inspired algorithm for secure IoT communication networks. Cluster Comput 25, 1805–1816 (2022). https://doi.org/10.1007/s10586-021-03520-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-021-03520-z

Keywords

Navigation