Abstract
The Internet of Things (IoT) is made up of intelligent devices that interact with each other. It allows information to be gathered and shared by these devices. In addition, IoT now has a wide range of life applications such as business, logistics, health monitoring, smart ecosystem, and information concerning individuals, social and private environments. Security-related issues involved in such a communication network are drastically increasing day by day. Therefore, existing authentication and authorization concepts must grow along with technological evolution. This paper presents an artificial intelligence (AI)-assisted Bio-inspired algorithm for secure IoT communication networks (AI-BIAS) to improve future communication. The proposed framework is categorized into two sections: First, the Bio-inspired algorithm-assisted blockchain technology for authentication and authorization in the IoT communication network is presented. Further, the Artificial Intelligence algorithm monitors the proposed IoT communication network. The experimental results show that the proposed model enhances the accuracy ratio of 98.3%, average latency of 26 ms, average cost of 25.7%, authentication time 0.04 ms, multistep prediction’s MAPE, and RMSE values are 0.7645 and 0.9878 when compared to other popular methods.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Manogaran, G., Rawal, B.S., Saravanan, V., Kumar, P.M., Martínez, O.S., Crespo, R.G., Montenegro-Marin, C.E., Krishnamoorthy, S.: Blockchain-based integrated security measure for reliable service delegation in 6G communication environment. Comput. Commun. 161, 248–256 (2020)
Gheisari, M., Najafabadi, H.E., Alzubi, J.A., Gao, J., Wang, G., Abbasi, A.A., Castiglione, A.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1–13 (2021)
Tran, D.N., Nguyen, T.N., Khanh, P.C.P., Trana, D.T.: An IoT-based design using accelerometers in animal behavior recognition systems. IEEE Sens. J. (2021). https://doi.org/10.1109/JSEN.2021.3051194
Amudha, G.: Dilated transaction access and retrieval: improving the information retrieval of blockchain-assimilated internet of things transactions. Wirel. Pers. Commun. (2021). https://doi.org/10.1007/s11277-021-08094-y
Khalid, L.F., Ameen, S.Y.: Secure IoT integration in daily lives: a review. J. Inf. Technol. Inform 1(1), 6–12 (2021)
Kondoro, A., Dhaou, I.B., Tenhunen, H., Mvungi, N.: Real-time performance analysis of secure IoT protocols for microgrid communication. Future Gener. Comput. Syst. 116, 1–12 (2021)
Seyhan, K., Nguyen, T.N., Akleylek, S., Cengiz, K., Islam, S.H.: Bi-GISIS KE: modified key exchange protocol with reusable keys for IoT security. J. Inf. Secur. Appl. 58, 102788 (2021)
Maleh, Y., Shojafar, M., Alazab, M., Romdhani, I. (eds.): Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press, Boca Raton (2020)
Bera, B., Saha, S., Das, A.K., Kumar, N., Lorenz, P., Alazab, M.: Blockchain-envisioned secure data delivery and collection scheme for 5G-based IoT-enabled internet of drones environment. IEEE Trans. Veh. Technol. 69(8), 9097–9111 (2020)
Ahmad, U., Song, H., Bilal, A., Alazab, M., Jolfaei, A.: Secure passive keyless entry and start system using machine learning. In: International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, pp. 304–313. Springer, Cham (2018, December)
Gandhi, U.D., Kumar, P.M., Varatharajan, R., Manogaran, G., Sundarasekar, R., Kadu, S.: HIoTPOT: surveillance on IoT devices against recent threats. Wirel. Pers. Commun. 103(2), 1179–1194 (2018)
Wei, T., Feng, W., Chen, Y., Wang, C.X., Ge, N., Lu, J.: Hybrid satellite-terrestrial communication networks for the maritime Internet of Things: key technologies, opportunities, and challenges. IEEE Internet Things J. 8(11), 8910–8934 (2021)
Al-Naji, F.H., Zagrouba, R.: Secure IoT based on Blockchain: quantitive evaluation and analysis of the correlation between block mining time and blockchain efficiency. Int. J. Appl. Eng. Res. 15(4), 377–384 (2020)
Mendoza, D., Gaona-García, P.A., Vargas, F., Montenegro, C.: Communication infrastructure for monitoring the heart rate of patients on the cloud using IoT devices. Int. Inf. Inst. (Tokyo) Inf. 21(1), 131–138 (2018)
Jamshed, M.A., Pervaiz, H., Ahmed, S.H., Alam, A.S.: Cooperative communication techniques in wireless-powered backscatter communication: preambles and technical perspective. In: Wireless-Powered Backscatter Communications for Internet of Things, pp. 1–24. Springer, Cham (2020)
Sengupta, J., Ruj, S., Bit, S.D.: A comprehensive survey on attacks, security issues, and blockchain solutions for IoT and IIoT. J. Netw. Comput. Appl. 149, 102481 (2020)
Garg, S., Kaur, K., Kaddoum, G., Gagnon, F., Ahmed, S.H., Jayakody, D.N.K.: LiSA: a lightweight and secure authentication mechanism for smart metering infrastructure. In: 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2019, December)
Patwary, A.A.N., Fu, A., Battula, S.K., Naha, R.K., Garg, S., Mahanti, A.: FogAuthChain: a secure location-based authentication scheme in fog computing environments using Blockchain. Comput. Commun. 162, 212–224 (2020)
Thaseen, I.S., Chitturi, A.K., Al-Turjman, F., Shankar, A., Ghalib, M.R., Abhishek, K.: An intelligent long-short-term memory ensemble with a genetic algorithm for network anomaly identification. Trans. Emerg. Telecommun. Technol. (2020). https://doi.org/10.1002/ett.4149
Luhach, R., Jha, C.K., Luhach, A.K.: Research and analysis of open security issues in communication for wireless sensor network. In: International Conference on Smart Trends for Information Technology and Computer Communications, pp. 135–142. Springer, Singapore (2016, August)
Nguyen, C.H., Pham, T.L., Nguyen, T.N., Ho, C.H., Nguyen, T.A.: The linguistic summarization and the interpretability, scalability of fuzzy representations of multilevel semantic structures of worddomains. Microprocess. Microsyst. 81, 103641 (2021)
Ogudo, K.A., Muwawa Jean Nestor, D., Ibrahim Khalaf, O., DaeiKasmaei, H.: A device performance and data analytics concept for smartphones’ IoT services and machine-type communication in cellular networks. Symmetry 11(4), 593 (2019)
Miraz, M.H., Ali, M.: Integration of blockchain and IoT: an enhanced security perspective. Ann. Emerg. Technol. Comput. (AETiC) 4(4), 52–63 (2020)
Prasad, S.K., Rachna, J., Khalaf, O.I., Le, D.N.: Map matching algorithm: real-time location tracking for smart security application. Telecommun. Radio Eng. 79(13), 1189–1203 (2020)
Shala, B., Trick, U., Lehmann, A., Ghita, B., Shiaeles, S.: Blockchain and trust for secure, end-user-based, and decentralized IoT service provision. IEEE Access 8, 119961–119979 (2020)
Muthanna, A., Ateya, A.A., Khakimov, A., Gudkova, I., Abuarqoub, A., Samouylov, K., Koucheryavy, A.: Secure and reliable IoT networks using fog computing with software-defined networking and blockchain. J. Sens. Actuator Netw. 8(1), 15 (2019)
Kumar, V.V., Devi, M., Raja, P.V., Kanmani, P., Priya, V., Sudhakar, S., Sujatha, K.: Design peer-to-peer protocol with sensible and secure IoT communication for future internet architecture. Microprocess. Microsyst. 78, 103216 (2020)
Pacheco, J., Benitez, V.H., Pan, Z.: Security framework for IoT end nodes with neural networks. Int. J. Mach. Learn. Comput. 9(4), 381–386 (2019)
Haseeb, K., Islam, N., Almogren, A., Din, I.U.: Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things. IEEE Access 7, 185496–185505 (2019)
Abidi, M.H., Alkhalefah, H., Moiduddin, K., Alazab, M., Mohammed, M.K., Ameen, W., Gadekallu, T.R.: Optimal 5G network slicing using machine learning and deep learning concepts. Comp. Stand. and Inter. 76, 1–15 (2021)
Acknowledgements
The authors are grateful to the Taif University Researchers Supporting Project number (TURSP-2020/36), Taif University, Taif, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Research involving human and/or animal participants
This article does not contain any studies with human participants or animals performed by any authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alroobaea, R., Arul, R., Rubaiee, S. et al. AI-assisted bio-inspired algorithm for secure IoT communication networks. Cluster Comput 25, 1805–1816 (2022). https://doi.org/10.1007/s10586-021-03520-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03520-z