SecureFLACF: Secure Federated Learning Access Control Framework with Blockchain-Infused Intrusion Detection System for IIoT
DOI:
https://doi.org/10.13052/jmm1550-4646.2155Keywords:
Zero-knowledge proof, industrial internet of things, federated learning, access control, intrusion detection system, blockchainAbstract
The industrial internet of things (IIoT) expanded fast as physical devices and systems were connected to the internet. However, this interconnectedness made IIoT systems vulnerable to hackers. Intrusion detection systems (IDSs) were put in place to detect and prevent such assaults. Nonetheless, attackers might circumvent IDSs by forging identities or interfering with recorded data. The article intended to improve IIoT security by achieving system confidentiality, integrity, availability, scalability, performance, and security. For IIoT security, the article developed a secure federated learning access control framework (SecureFLACF) linked with a blockchain-based IDS. SecureFLACF used blockchain to secure data collected by IDS, AES-256 encryption to secure stored data, zero-knowledge proof (ZKP) to validate user identities and manage data access, and a federated learning access control framework (FLACF) to train a machine learning model for intrusion detection. SecureFLACF developed as a viable solution for improving IIoT security, providing strong assurances for IDS data and access control using blockchain’s tamper-proof structure and AES-256 encryption. Furthermore, FLACF’s design allows private machine learning model training, ensuring data privacy as well as model fidelity. The framework’s usefulness was highlighted by its application in real-world circumstances, making it a cost-effective option for organisations of all sizes. This method not only strengthened IIoT systems against a wide range of cyber threats, but also stressed their dependability as a safeguard. SecureFLACF exhibited considerable promise for improving IIoT security across several dimensions by encapsulating practicability, cost-effectiveness, and dependability.
Downloads
References
Yin W. Zero-Knowledge Proof Intelligent Recommendation System to Protect Students’ Data Privacy in the Digital Age. Applied Artificial Intelligence. 2023 Dec 31;37(1):2222495.
Pandya S, Srivastava G, Jhaveri R, Babu MR, Bhattacharya S, Maddikunta PK, Mastorakis S, Piran MJ, Gadekallu TR. Federated learning for smart cities: A comprehensive survey. Sustainable Energy Technologies and Assessments. 2023 Feb 1;55:102987.
Jiang R, Han S, Yu Y, Ding W. An access control model for medical big data based on clustering and risk. Information Sciences. 2023 Apr 1;621:691–707.
Vivekrabinson K, Muneeswaran K. Fault-tolerant based group key servers with enhancement of utilizing the contributory server for cloud storage applications. IETE Journal of Research. 2023 Jul 4;69(5): 2487–502.
Xu J, Hong N, Xu Z, Zhao Z, Wu C, Kuang K, Wang J, Zhu M, Zhou J, Ren K, Yang X. Data-Driven Learning for Data Rights, Data Pricing, and Privacy Computing. Engineering. 2023 Feb 9.
Meisami S, Meisami S, Yousefi M, Aref MR. Combining Blockchain and IOT for Decentralized Healthcare Data Management. arXiv preprint arXiv:2304.00127. 2023 Mar 31.
Beuselinck C, Elfers F, Gassen J, Pierk J. Private firm accounting: the European reporting environment, data and research perspectives. Accounting and Business Research. 2023 Jan 2;53(1):38–82.
Selvarajan S, Srivastava G, Khadidos AO, Khadidos AO, Baza M, Alshehri A, Lin JC. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing. 2023 Mar 16;12(1):38.
Zhao K, Hu J, Shao H, Hu J. Federated multi-source domain adversarial adaptation framework for machinery fault diagnosis with data privacy. Reliability Engineering & System Safety. 2023 Aug 1;236:109246.
Atutxa A, Astorga J, Barcelo M, Urbieta A, Jacob E. Improving efficiency and security of IIoT communications using in-network validation of server certificate. Computers in Industry. 2023 Jan 1;144:103802.
Xing Z, Zhang Z, Li M, Liu J, Zhu L, Russello G, Asghar MR. Zero-Knowledge Proof-based Practical Federated Learning on Blockchain. arXiv preprint arXiv:2304.05590. 2023 Apr 12.
Tanveer M, Badshah A, Alasmary H, Chaudhry SA. CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things. Internet of Things. 2023 Aug 9:100902.
Wang Z, Taram M, Moghimi D, Swanson S, Tullsen D, Zhao J. NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems. In32th USENIX Security Symposium (USENIX Security 23) 2023.
Kumar R, Varna A, Tokunaga C, Taneja S, De V, Mathew S. 15.5 A 100Gbps Fault-Injection Attack Resistant AES-256 Engine with 99.1-to-99.99% Error Coverage in Intel 4 CMOS. In2023 IEEE International Solid-State Circuits Conference (ISSCC) 2023 Feb 19 (pp. 1–3). IEEE.
Gerodimos A, Maglaras L, Ferrag MA, Ayres N, Kantzavelou I. IoT: Communication protocols and security threats. Internet of Things and Cyber-Physical Systems. 2023 Jan 4.
Mekala SH, Baig Z, Anwar A, Zeadally S. Cybersecurity for industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Computer Communications. 2023 Jun 25.
Jiang R, Han S, Yu Y, Ding W. An access control model for medical big data based on clustering and risk. Information Sciences. 2023 Apr 1;621:691–707.
Neubauer M, Reiff C, Walker M, Oechsle S, Lechler A, Verl A. Cloud-based evaluation platform for software-defined manufacturing: Cloud-basierte Evaluierungsplattform für Software-defined Manufacturing. at-Automatisierungstechnik. 2023 May 25;71(5):351–63.
Sánchez-Zumba A, Avila-Pesantez D. Cybersecurity for Industrial IoT, Threats, Vulnerabilities, and Solutions: A Brief Review. InInternational Congress on Information and Communication Technology 2023 (pp. 1101–1112). Springer, Singapore.
Tanveer M, Badshah A, Alasmary H, Chaudhry SA. CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things. Internet of Things. 2023 Aug 9:100902.
Liu HY, Wadood SA, Xia Y, Liu Y, Guo H, Guo BL, Gan RY. Wheat authentication: An overview on different techniques and chemometric methods. Critical Reviews in Food Science and Nutrition. 2023 Jan 2;63(1):33–56.
Wu B, Liu Z, Gu Q, Tsai FS. Underdog mentality, identity discrimination and access to peer-to-peer lending market: Exploring effects of digital authentication. Journal of International Financial Markets, Institutions and Money. 2023 Mar 1;83:101714.
Darbandeh FG, Safkhani M. SAPWSN: A secure authentication protocol for wireless sensor networks. Computer Networks. 2023 Jan 1;220:109469.
Sabir S, Guleria V. Multi-layer security based multiple image encryption technique. Computers and Electrical Engineering. 2023 Mar 1;106:108609.
Alfadel M, Costa DE, Shihab E. Empirical analysis of security vulnerabilities in python packages. Empirical Software Engineering. 2023 May;28(3):59.
Riegler M, Sametinger J, Vierhauser M, Wimmer M. A model-based mode-switching framework based on security vulnerability scores. Journal of Systems and Software. 2023 Jun 1;200:111633.
Marchisio A, Nanfa G, Khalid F, Hanif MA, Martina M, Shafique M. SeVuc: A study on the Security Vulnerabilities of Capsule Networks against adversarial attacks. Microprocessors and Microsystems. 2023 Feb 1;96:104738.
Ma T. Cybersecurity and Ethereum Security Vulnerabilities Analysis. Highlights in Science, Engineering and Technology. 2023 Feb 28;34:375–81.
Cinar AC, Kara TB. The current state and future of mobile security in the light of the recent mobile security threat reports. Multimedia Tools and Applications. 2023 Jan 30:1–3.
Alqarawi G, Alkhalifah B, Alharbi N, El Khediri S. Internet-of-Things Security and Vulnerabilities: Case Study. Journal of Applied Security Research. 2023 Jul 3;18(3):559–75.
Filus K, Domańska J. Software vulnerabilities in TensorFlow-based deep learning applications. Computers & Security. 2023 Jan 1;124:102948.
Silvestri S, Islam S, Papastergiou S, Tzagkarakis C, Ciampi M. A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors. 2023 Jan 6;23(2):651.
Hintaw AJ, Manickam S, Aboalmaaly MF, Karuppayah S. MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT). IETE Journal of Research. 2023 Aug 18;69(6):3368–97.
Ali FA, Sukri MK, Jali MZ, Al-Fatih M, Yusof MA. Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance. Journal of Advanced Research in Applied Sciences and Engineering Technology. 2023 Feb 18;29(3):198–205.
Vahidi S, Ghafouri M, Au M, Kassouf M, Mohammadi A, Debbabi M. Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: A survey on challenges and opportunities. IEEE Communications Surveys & Tutorials. 2023 Mar 8.
Peter O, Pradhan A, Mbohwa C. Industrial internet of things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies. Procedia Computer Science. 2023 Jan 1;217:856–65.
Milić SD, Đurović Ž, Stojanović MD. Data science and machine learning in the IIoT concepts of power plants. International Journal of Electrical Power & Energy Systems. 2023 Feb 1;145:108711.
Zhang F, Wang H, Zhou L, Xu D, Liu L. A blockchain-based security and trust mechanism for AI-enabled IIoT systems. Future Generation Computer Systems. 2023 Sep 1;146:78–85.
Peter O, Pradhan A, Mbohwa C. Industrial internet of things (IIoT): opportunities, challenges, and requirements in manufacturing businesses in emerging economies. Procedia Computer Science. 2023 Jan 1;217:856–65.
Singamaneni KK, Dhiman G, Juneja S, Muhammad G, AlQahtani SA, Zaki J. A novel QKD approach to enhance IIOT privacy and computational knacks. Sensors. 2022 Sep 6;22(18):6741.
Ferrag MA, Friha O, Hamouda D, Maglaras L, Janicke H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access. 2022 Apr 8;10:40281–306.
Yazdinejad A, Dehghantanha A, Parizi RM, Hammoudeh M, Karimipour H, Srivastava G. Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks. IEEE Transactions on Industrial Informatics. 2022 Apr 19;18(11):8356–66.
Yang L, Shami A. A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems. IEEE Transactions on Industrial Informatics. 2022 Oct 4;19(2):2107–16.
Khan IA, Keshk M, Pi D, Khan N, Hussain Y, Soliman H. Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems. Ad Hoc Networks. 2022 Sep 1;134:102930.
Mustafa Hilal A, Alzahrani JS, Abunadi I, Nemri N, Al-Wesabi FN, Motwakel A, Yaseen I, Sarwar Zamani A. Intelligent Deep Learning Model for Privacy Preserving IIoT on 6G Environment. Computers, Materials & Continua. 2022 Jul 1;72(1).
Guo Z, Gao Z, Liu Q, Chakraborty C, Hua Q, Yu K, Wan S. RNS-based adaptive compression scheme for the block data in the blockchain for IIoT. IEEE Transactions on Industrial Informatics. 2022 Jun 14;18(12):9239–49.
Lakshmanna K, Kavitha R, Geetha BT, Nanda AK, Radhakrishnan A, Kohar R. Deep learning-based privacy-preserving data transmission scheme for clustered IIoT environment. Computational Intelligence and Neuroscience. 2022 Jun 8;2022.
Yang Y, Yang X, Heidari M, Khan MA, Srivastava G, Khosravi M, Qi L. ASTREAM: Data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment. IEEE Transactions on Network Science and Engineering. 2022 Mar 8.
Lakhan A, Mohammed MA, Kadry S, AlQahtani SA, Maashi MS, Abdulkareem KH. Federated learning-aware multi-objective modeling and blockchain-enable system for IIoT applications. Computers and Electrical Engineering. 2022 May 1;100:107839.
Tanveer M, Badshah A, Alasmary H, Chaudhry SA. CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things. Internet of Things. 2023 Aug 9:100902.
Li R, Qin Y, Wang C, Li M, Chu X. A blockchain-enabled framework for enhancing scalability and security in IIoT. IEEE Transactions on Industrial Informatics. 2022 Sep 28.
Zhou Z, Tian Y, Xiong J, Ma J, Peng C. Blockchain-enabled secure and trusted federated data sharing in IIoT. IEEE Transactions on Industrial Informatics. 2022 Oct 17.
Mantravadi S, Møller C, Chen LI, Schnyder R. Design choices for next-generation IIoT-connected MES/MOM: An empirical study on smart factories. Robotics and Computer-Integrated Manufacturing. 2022 Feb 1;73:102225.
Ahmed I, Anisetti M, Ahmad A, Jeon G. A Multilayer Deep Learning Approach for Malware Classification in 5G-Enabled IIoT. IEEE Transactions on Industrial Informatics. 2022 Sep 9;19(2):1495–503.
Babbar H, Rani S, AlQahtani SA. Intelligent edge load migration in sdn-iiot for smart healthcare. IEEE Transactions on Industrial Informatics. 2022 May 11;18(11):8058–64.
Zhang Y, Li B, Wu J, Liu B, Chen R, Chang J. Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT. IEEE Internet of Things Journal. 2022 May 30;9(22):22501–15.
Ikram ST, Priya V, Anbarasu B, Cheng X, Ghalib MR, Shankar A. Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier. The Journal of Supercomputing. 2022 May;78(8):10725–56.
Chen H, Jeremiah SR, Lee C, Park JH. A Digital Twin-Based Heuristic Multi-Cooperation Scheduling Framework for Smart Manufacturing in IIoT Environment. Applied Sciences. 2023 Jan 21;13(3):1440.



