Araştırma Makalesi
BibTex RIS Kaynak Göster

IIoT Sensör Verilerinin Güvenliği için Derin Öğrenme ve Ethereum Blok Zinciri'nin İnteraktif Kullanımı

Yıl 2024, Cilt: 11 Sayı: 2, 369 - 384, 29.11.2024
https://doi.org/10.35193/bseufbd.1381786

Öz

Endüstriyel Nesnelerin İnterneti (IIoT), birden fazla cihazın ve sensörün bir ağ üzerinden birbirleriyle iletişim kurduğu bir yapıyı ifade eder. İnternetle bağlantılı cihazların sayısı arttıkça, bu cihazlara yönelik saldırıların sayısı da artar. Bu nedenle, fabrikalarda veya işyerlerinde verileri güvence altına almak ve olası tehditlere karşı önlem almak önemli hale gelmiştir. Bu çalışmada, IIoT sensörlerinden toplanan verilerin ağ trafiğine bakılarak saldırı altında olup olmadığını belirlemek için derin öğrenme tabanlı bir mimari kullanıldı. Saldırıya uğramamış veriler Ethereum Blok Zincir ağına kaydedildi. Ethereum blok zincir ağı, sensör verilerinin merkezi bir otoriteye dayanmadan güvenli bir şekilde saklanmasını ve herhangi bir saldırı durumunda veri kaybının önlenmesini sağlamaktadır. Blok zincir ağı üzerinden iletişim süreci sayesinde veri güncelleme ve paylaşımı kolaylaştırıldı. Önerilen derin öğrenme tabanlı saldırı tespit sistemi, normal ve anormal verileri %100 doğrulukla ayırabilmektedir. Anormal verilerinde, hangi saldırı tipine ait oldukları ortalama %95 doğrulukla tanımlandı. Saldırılara maruz kalmayan veriler blok zincir ağında işlendi ve tespit edilen saldırı verileri için uyarı sistemi geliştirildi. Bu çalışma, şirketlerin IIoT sensör verilerinin güvenliğini sağlamak için kullanabileceği bir yöntem sunmaktadır.

Kaynakça

  • Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779-796.
  • Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.
  • Gaber, T., El-Ghamry, A., & Hassanien, A. E. (2022). Injection attack detection using machine learning for smart IoT applications. Physical Communication, 52, 101685.
  • Puri, V., Priyadarshini, I., Kumar, R., & Kim, L. C. (2020, March). Blockchain meets IIoT: An architecture for privacy preservation and security in IIoT. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1-7). IEEE.
  • Tsimenidis, S., Lagkas, T., & Rantos, K. (2022). Deep learning in IoT intrusion detection. Journal of network and systems management, 30, 1-40.
  • Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, 1-27.
  • Şahin, E., & Talu, M. F. (2022). Wy-Net: A New Approach to Image Synthesis With Generative Adversarial Networks. Journal of Scientific Reports-A, (050), 270-290.
  • Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., & Liang, Y. (2021). Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics, 18(6), 4049-4058.
  • Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
  • Taş, R., & Tanrıöver, Ö. Ö. (2020). A systematic review of challenges and opportunities of blockchain for E-voting. Symmetry, 12(8), 1328.
  • Kumar, T., Harjula, E., Ejaz, M., Manzoor, A., Porambage, P., Ahmad, I., Liyanage. M., Braeken. A., Ylianttila, M. (2020). BlockEdge: blockchain-edge framework for industrial IoT networks. IEEE Access, 8, 154166-154185.
  • Guo, X., Zhang, G., & Zhang, Y. (2022). A Comprehensive Review of Blockchain Technology-Enabled Smart Manufacturing: A Framework, Challenges and Future Research Directions. Sensors, 23(1), 155.
  • Abdelmaboud, A., Ahmed, A. I. A., Abaker, M., Eisa, T. A. E., Albasheer, H., Ghorashi, S. A., & Karim, F. K. (2022). Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions. Electronics, 11(4), 630.
  • Tapscott, A., & Tapscott, D. (2017). How blockchain is changing finance. Harvard Business Review, 1(9), 2-5.
  • Samuel, O., Omojo, A. B., Mohsin, S. M., Tiwari, P., Gupta, D., & Band, S. S. (2022). An anonymous IoT-based E-health monitoring system using blockchain technology. IEEE Systems Journal.
  • Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). BIoTHR: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857-10872.
  • Fu, X., Wang, H., & Shi, P. (2021). A survey of Blockchain consensus algorithms: mechanism, design and applications. Science China Information Sciences, 64, 1-15.
  • Uddin, M. A., Stranieri, A., Gondal, I., & Balasubramanian, V. (2021). A survey on the adoption of blockchain in iot: Challenges and solutions. Blockchain: Research and Applications, 2(2), 100006.
  • Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, 40281-40306.
  • Babu, E. S., SrinivasaRao, B. K. N., Nayak, S. R., Verma, A., Alqahtani, F., Tolba, A., & Mukherjee, A. (2022). Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks. Computers and Electrical Engineering, 103, 108287.
  • Tahir, M., Sardaraz, M., Muhammad, S., & Saud Khan, M. (2020). A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics. Sustainability, 12(17), 6960.
  • Chen, S., Fu, X., Si, H., Wang, Y., Gao, S., & Wang, C. (2022). Blockchain for Health IoT: A privacy‐preserving data sharing system. Software: Practice and Experience, 52(9), 2026-2044.
  • Senan, E. M., Al-Adhaileh, M. H., Alsaade, F. W., Aldhyani, T. H., Alqarni, A. A., Alsharif, N., ... & Alzahrani, M. Y. (2021). Diagnosis of chronic kidney disease using effective classification algorithms and recursive feature elimination techniques. Journal of Healthcare Engineering, 2021.
  • Wu, J., Zheng, D., Wu, Z., Song, H., & Zhang, X. (2022). Prediction of Buckwheat Maturity in UAV-RGB Images Based on Recursive Feature Elimination Cross-Validation: A Case Study in Jinzhong, Northern China. Plants, 11(23), 3257.
  • Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16, 321-357.
  • Wilson, D. L. (1972). Asymptotic properties of nearest neighbor rules using edited data. IEEE Transactions on Systems, Man, and Cybernetics, (3), 408-421.
  • Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. (2014). Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1), 1929-1958.
  • Ozdemir, D., & Arslan, N. N. (2022). Analysis of Deep Transfer Learning Methods for Early Diagnosis of the Covid-19 Disease with Chest X-ray Images. Düzce Üniversitesi Bilim ve Teknoloji Dergisi, 10(2), 628-640.
  • Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access, 10, 6605-6621.
  • Oliva, G. A., Hassan, A. E., & Jiang, Z. M. (2020). An exploratory study of smart contracts in the Ethereum blockchain platform. Empirical Software Engineering, 25, 1864-1904.
  • Azbeg, K., Ouchetto, O., & Andaloussi, S. J. (2022). BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security. Egyptian Informatics Journal, 23(2), 329-343.
  • Hussien, H. M., Yasin, S. M., Udzir, N. I., Ninggal, M. I. H., & Salman, S. (2021). Blockchain technology in the healthcare industry: Trends and opportunities. Journal of Industrial Information Integration, 22, 100217.
  • Ho, Y., & Wookey, S. (2019). The real-world-weight cross-entropy loss function: Modeling the costs of mislabeling. IEEE access, 8, 4806-4813.
  • Zhang, Z., & Sabuncu, M. (2018). Generalized cross entropy loss for training deep neural networks with noisy labels. Advances in neural information processing systems, 31.
  • He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778).
  • Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., Kaiser, L., Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems.

Interactive Use of Deep Learning and Ethereum Blockchain for the Security of IIoT Sensor Data

Yıl 2024, Cilt: 11 Sayı: 2, 369 - 384, 29.11.2024
https://doi.org/10.35193/bseufbd.1381786

Öz

The Industrial Internet of Things (IIoT) refers to a structure where multiple devices and sensors communicate with each other over a network. As the number of internet-connected devices increases, so does the number of attacks on these devices. Therefore, it has become important to secure the data and prevent potential threats to the data in factories or workplaces. In this study, a deep learning-based architecture was used to determine whether the data collected from IIoT sensors was under attack by looking at network traffic. The data that was not exposed to attacks was stored on the Ethereum Blockchain network. The Ethereum blockchain network ensured that sensor data was stored securely without relying on any central authority and prevented data loss in case of any attack. Thanks to the communication process over the blockchain network, updating and sharing data was facilitated. The proposed deep learning-based intrusion detection system separated normal and anomaly data with 100% accuracy. The anomaly data were identified with an average of 95% accuracy for which attack type they belonged to. The data that was not exposed to attacks was processed on the blockchain network, and an alert system was implemented for the detected attack data. This study presents a method that companies can use to secure IIoT sensor data.

Kaynakça

  • Koroniotis, N., Moustafa, N., Sitnikova, E., & Turnbull, B. (2019). Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems, 100, 779-796.
  • Hasan, M., Islam, M. M., Zarif, M. I. I., & Hashem, M. M. A. (2019). Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet of Things, 7, 100059.
  • Gaber, T., El-Ghamry, A., & Hassanien, A. E. (2022). Injection attack detection using machine learning for smart IoT applications. Physical Communication, 52, 101685.
  • Puri, V., Priyadarshini, I., Kumar, R., & Kim, L. C. (2020, March). Blockchain meets IIoT: An architecture for privacy preservation and security in IIoT. In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA) (pp. 1-7). IEEE.
  • Tsimenidis, S., Lagkas, T., & Rantos, K. (2022). Deep learning in IoT intrusion detection. Journal of network and systems management, 30, 1-40.
  • Khraisat, A., & Alazab, A. (2021). A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity, 4, 1-27.
  • Şahin, E., & Talu, M. F. (2022). Wy-Net: A New Approach to Image Synthesis With Generative Adversarial Networks. Journal of Scientific Reports-A, (050), 270-290.
  • Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., & Liang, Y. (2021). Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics, 18(6), 4049-4058.
  • Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press.
  • Taş, R., & Tanrıöver, Ö. Ö. (2020). A systematic review of challenges and opportunities of blockchain for E-voting. Symmetry, 12(8), 1328.
  • Kumar, T., Harjula, E., Ejaz, M., Manzoor, A., Porambage, P., Ahmad, I., Liyanage. M., Braeken. A., Ylianttila, M. (2020). BlockEdge: blockchain-edge framework for industrial IoT networks. IEEE Access, 8, 154166-154185.
  • Guo, X., Zhang, G., & Zhang, Y. (2022). A Comprehensive Review of Blockchain Technology-Enabled Smart Manufacturing: A Framework, Challenges and Future Research Directions. Sensors, 23(1), 155.
  • Abdelmaboud, A., Ahmed, A. I. A., Abaker, M., Eisa, T. A. E., Albasheer, H., Ghorashi, S. A., & Karim, F. K. (2022). Blockchain for IoT applications: taxonomy, platforms, recent advances, challenges and future research directions. Electronics, 11(4), 630.
  • Tapscott, A., & Tapscott, D. (2017). How blockchain is changing finance. Harvard Business Review, 1(9), 2-5.
  • Samuel, O., Omojo, A. B., Mohsin, S. M., Tiwari, P., Gupta, D., & Band, S. S. (2022). An anonymous IoT-based E-health monitoring system using blockchain technology. IEEE Systems Journal.
  • Ray, P. P., Chowhan, B., Kumar, N., & Almogren, A. (2021). BIoTHR: Electronic health record servicing scheme in IoT-blockchain ecosystem. IEEE Internet of Things Journal, 8(13), 10857-10872.
  • Fu, X., Wang, H., & Shi, P. (2021). A survey of Blockchain consensus algorithms: mechanism, design and applications. Science China Information Sciences, 64, 1-15.
  • Uddin, M. A., Stranieri, A., Gondal, I., & Balasubramanian, V. (2021). A survey on the adoption of blockchain in iot: Challenges and solutions. Blockchain: Research and Applications, 2(2), 100006.
  • Ferrag, M. A., Friha, O., Hamouda, D., Maglaras, L., & Janicke, H. (2022). Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access, 10, 40281-40306.
  • Babu, E. S., SrinivasaRao, B. K. N., Nayak, S. R., Verma, A., Alqahtani, F., Tolba, A., & Mukherjee, A. (2022). Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks. Computers and Electrical Engineering, 103, 108287.
  • Tahir, M., Sardaraz, M., Muhammad, S., & Saud Khan, M. (2020). A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics. Sustainability, 12(17), 6960.
  • Chen, S., Fu, X., Si, H., Wang, Y., Gao, S., & Wang, C. (2022). Blockchain for Health IoT: A privacy‐preserving data sharing system. Software: Practice and Experience, 52(9), 2026-2044.
  • Senan, E. M., Al-Adhaileh, M. H., Alsaade, F. W., Aldhyani, T. H., Alqarni, A. A., Alsharif, N., ... & Alzahrani, M. Y. (2021). Diagnosis of chronic kidney disease using effective classification algorithms and recursive feature elimination techniques. Journal of Healthcare Engineering, 2021.
  • Wu, J., Zheng, D., Wu, Z., Song, H., & Zhang, X. (2022). Prediction of Buckwheat Maturity in UAV-RGB Images Based on Recursive Feature Elimination Cross-Validation: A Case Study in Jinzhong, Northern China. Plants, 11(23), 3257.
  • Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research, 16, 321-357.
  • Wilson, D. L. (1972). Asymptotic properties of nearest neighbor rules using edited data. IEEE Transactions on Systems, Man, and Cybernetics, (3), 408-421.
  • Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. (2014). Dropout: a simple way to prevent neural networks from overfitting. The journal of machine learning research, 15(1), 1929-1958.
  • Ozdemir, D., & Arslan, N. N. (2022). Analysis of Deep Transfer Learning Methods for Early Diagnosis of the Covid-19 Disease with Chest X-ray Images. Düzce Üniversitesi Bilim ve Teknoloji Dergisi, 10(2), 628-640.
  • Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Systematic review of security vulnerabilities in ethereum blockchain smart contract. IEEE Access, 10, 6605-6621.
  • Oliva, G. A., Hassan, A. E., & Jiang, Z. M. (2020). An exploratory study of smart contracts in the Ethereum blockchain platform. Empirical Software Engineering, 25, 1864-1904.
  • Azbeg, K., Ouchetto, O., & Andaloussi, S. J. (2022). BlockMedCare: A healthcare system based on IoT, Blockchain and IPFS for data management security. Egyptian Informatics Journal, 23(2), 329-343.
  • Hussien, H. M., Yasin, S. M., Udzir, N. I., Ninggal, M. I. H., & Salman, S. (2021). Blockchain technology in the healthcare industry: Trends and opportunities. Journal of Industrial Information Integration, 22, 100217.
  • Ho, Y., & Wookey, S. (2019). The real-world-weight cross-entropy loss function: Modeling the costs of mislabeling. IEEE access, 8, 4806-4813.
  • Zhang, Z., & Sabuncu, M. (2018). Generalized cross entropy loss for training deep neural networks with noisy labels. Advances in neural information processing systems, 31.
  • He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 770-778).
  • Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., Kaiser, L., Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems.
Toplam 36 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Derin Öğrenme, Veri Güvenliği ve Korunması
Bölüm Makaleler
Yazarlar

Emrullah Şahin 0000-0002-3390-6285

Naciye Nur Arslan 0000-0002-3208-7986

Fırat Aydemir 0000-0002-8965-1429

Yayımlanma Tarihi 29 Kasım 2024
Gönderilme Tarihi 27 Ekim 2023
Kabul Tarihi 3 Ocak 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 11 Sayı: 2

Kaynak Göster

APA Şahin, E., Arslan, N. N., & Aydemir, F. (2024). Interactive Use of Deep Learning and Ethereum Blockchain for the Security of IIoT Sensor Data. Bilecik Şeyh Edebali Üniversitesi Fen Bilimleri Dergisi, 11(2), 369-384. https://doi.org/10.35193/bseufbd.1381786