A Predominant Intrusion Detection System in Iiot Using Elcg-Dsa and Lws-Biolstm With Blockchain
A Predominant Intrusion Detection System in Iiot Using Elcg-Dsa and Lws-Biolstm With Blockchain
1
Raas Infotek, Delaware, USA Email: [email protected]
2
Intel, Folsom, California, USA. Email: [email protected]
3
CGI, British Columbia, Canada. Email: [email protected]
4
Surge Technology Solutions Inc, Texas, USA.
Email: [email protected]
5
Wipro, Hyderabad, India. Email: [email protected]
6
Jouf University, Sakakah, Saudi Arabia. Email: [email protected]
Abstract: The growing connectivity of Industrial Internet of Things (IIoT) systems has
increased cyber threats, necessitating early detection of intrusions. However, existing
systems often lack focus on intermediate and continuous multifactor authorization between
IIoT and Industrial Control Systems (ICS). To overcome this, an efficient IDS for IIoT using
an Exponential Linear Congruential Generator - Digital Signature Algorithm (ELCG-DSA)
and Log Wave Sigmoid-Bidirectional Once Long Short-Term Memory (LWS-BiOLSTM)
is proposed. Initially, the industry and vehicle details are registered in the blockchain
network, and the Polychoric Entropy Correlation-Tiger Hashing Algorithm (PEC-Tiger)
generates hash codes through smart contract creation. From the generated hash codes, a
partial digital signature is created by using the ELCG-DSA technique. After login, the
registered details are processed for enhancing security using Montgomery Modulo Curve
Cryptography (MMCC). Then, the details are verified by using PEC-Tiger, and if the hash
code matches, the key generation center is notified for the creation of a fully digital signature.
After verification, the Luus–Jaakola Sequence-based Pelican Optimization Algorithm (LJS-
POA) is applied for load balancing. Next, the data security is verified in the IDS training set,
in which the features are extracted from pre-processed data. Then, the Synthetic Minority
Oversampling Technique (SMOTE) is utilized for data balancing, and LWS-BiOLSTM is
implemented to classify attacks. Furthermore, the attacked data is blocked and non-attacked
data is stored in the ICS through digital signature verification. Thus the experimental results
of the proposed framework outperform the other conventional techniques by achieving
98.78% accuracy and 98.71% security level.
Keywords: Blockchain, Intrusion Detection System (IDS), Deep Learning (DL), IIoT, Hash
Code Generation, Industry Control System, and Digital Signature Creation.
1. INTRODUCTION
The IIoT states the extension as well as application of the IoT in industrial sectors (Saleh,
2024). IIoT involves the integration of sensors, software, and other technologies with
industrial equipment and processes (Singh et al., 2023) to collect, analyze, and exchange
data (Rahman et al., 2023). Additionally, IIoT improves decision-making and operational
efficiency through real-time data collection, analysis, and automation (Altunay &
Albayrak, 2023). But, IIoT introduces security challenges due to the proliferation of
connected devices (Huang et al., 2023). The challenges include vulnerabilities to cyber-
attacks, data breaches, and unauthorized access (Shahjalal et al., 2022). Thus, it poses risks
to sensitive industrial systems and critical infrastructure (Jayalaxmi et al., 2023).
Consequently, there is a pressing need for the detection of intrusions (Kumar et al., 2023)
to monitor network traffic security gaps, ensuring the integrity and security of the IIoT
environment (Ruiz-Villafranca, et al., 2023a). IDS plays a significant role in preserving
the IIoT networks as well as assets’ integrity and security (Ruiz-Villafranca, et al., 2023b).
Several prevailing works had some limitations, which are illustrated as follows,
The outline of this paper is illustrated as follows: Section 2 indicates the literature survey,
Section 3 depicts the proposed framework, Section 4 illustrates the results and discussion,
and Section 5 concludes the paper with future scope.
2. LITERATURE SURVEY
(Rathee et al., 2022) described a blockchain-centric IDS utilizing indirect trust intended
for IIoT systems. The study used the Viterbi algorithm for the blockchain mechanism, and
Industrial Internet of Things (IIoT) systems were employed to gauge the malicious
activities’ probability in the network. The Viterbi as well as indirect methods assessed
system transparency. Results showed improved IIoT performance, with the applied
learning technique reducing computational steps. However, a limitation was that the study
did not address the potential scalability issues and real-time implementation challenges.
(Wu et al., 2021) explained a secure and scalable IIoT system using the convergence of
blockchain as well as edge computing. The study examined cloud capabilities using the
IIoT critical infrastructure method, followed by utilizing a distributed system of blockchain
as well as edge computing paradigms to secure ledger transactions. The convergence
paradigms enabled secure and scalable critical infrastructures. Results indicated higher
effectiveness values for the IIoT blockchain. However, a limitation was the IoT devices’
resource constraints, which stopped the adoption of blockchain in IIoT.
(Dat-Thinh et al., 2022) introduced a multistage IDS using the IoT. Initially, the internet
gateways together with IoT local gateways were deployed by a collaborative IDS.
Subsequently, the IoT network classified the type of each IoT device and identified the
type of attacks targeting them. Finally, the internet gateways managed the two stages.
Results demonstrated a higher accuracy rate, but the applied method faced limitations due
to computational capacity constraints.
(Vargas et al., 2021) explained the identification of security attacks in IIoT networks using
a blockchain and ML model. Initially, IoT device networks integrated preceding solutions
to develop an integral protection system. Subsequently, IIoT identified computational
capabilities, together with threat identification, and activated secure information transfer
mechanisms. A machine learning approach was then employed to contain intruders in the
IoT network. Results showed higher accuracy in calculating malicious traffic time.
However, the performance of the applied method exhibited minimal fluctuation due to load
and scalability issues.
(Salim et al., 2022) explained a blockchain-aided secure Digital Twin (DT) methodology
for detecting botnets earlier in IIoT environments. Initially, the blockchain-enabled digital
framework detected bot creation early in a smart factory environment. Subsequently, DT
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
was considered for a group of edge devices to collect data using a deep learning algorithm.
Smart contracts authenticated data synchronized betwixt the DT and a Packet Auditor (PA)
to detect corrupt device data transmission. Results showed that improved packet inspection
yield was attained. However, the twin framework had limitations regarding precise data
collection periods and storage capacity.
(Alosaimi & Almutairi, 2023) proffered an IDS based on BoT-IoT, focusing on quick and
accurate attack prediction in IoT networks. A novel approach combining DL and three-
level algorithms was utilized. The Bot-IoT dataset was employed for data collection, and
the BoT-IoT method was extended to augment security in other IoT applications. Results
showed higher performance of indicators. However, the high dependence on IoT and its
rapid growth increased security risks, highlighting the crucial need for network security
solutions.
(Tharewal et al., 2022) described an IDS for IIoT regarding deep reinforcement learning.
Initially, the method integrated decision-making abilities to enhance the learning process.
Subsequently, the near-end strategy optimization method was applied for IIoT intrusion
detection. The DRL IDS utilized a feature selection method in terms of light GBM. Results
indicated higher accuracy rates. However, the limitation noted here was the absence of a
distributed architecture in IoT intrusion detection systems.
This section demonstrates the proposed IDS in IIoT using ELCG-DSA and LWS-
BiOLSTM. The proposed model’s block diagram is illustrated in Figure 1.
A Predominant Intrusion Detection System In Iiot Using Elcg-Dsa And Lws-Biolstm With Blockchain
3.1 Registration
Initially, industry and device details are collected from IIoT devices, and then, the details
are registered in the blockchain network for secure transmission. Thus, the registered
details are represented as𝜂𝜗 𝜂𝜗.
Based onℜ𝛽, the Interplanetary File System (IPFS) hash codes are created using the
proposed PEC-Tiger. The tiger hashing algorithm offers quick and efficient generation of
hash codes for large amounts of data and uses Euclidean distance for large data sets, but
it’s not scale-invariant, potentially resulting in the same hash code across different texts.
So instead of Euclidean distance, the proposed framework utilized Polychoric Entropy
Correlation, which eliminates the risk of the same hash code generation for different texts.
The process of the PEC-Tiger approach is illustrated as
• Firstly, the data from𝜂𝜗 are initialized with predefined constants(𝑎, 𝑏, 𝑐) and then,
ℜ𝛽 are divided into 𝑏 number of blocks, which are represented as,
• Subsequently, the Polychoric entropy correlation coefficient (𝑓 ℘ 𝑃𝐸𝐶 ) for 𝑖𝑡ℎ and
𝑗𝑡ℎ block is evaluated to ensure accurate hashing, which is explained as,
𝑠𝑖𝑛ℎ −1 (𝜌𝑝𝑒𝑟 )
𝑓𝑃𝐶𝐶 = (4)
𝜋
(𝑎𝑢𝑝 , 𝑏𝑢𝑝 , 𝑐𝑢𝑝 ) = (𝑎 ⊕ 𝑓𝐶𝑂𝑀 (ℜ𝛽𝐵 ), 𝑏 ⊕ 𝑓𝐶𝑂𝑀 (ℜ𝛽𝐵 ), 𝑐 ⊕ 𝑓𝐶𝑂𝑀 (ℜ𝛽𝐵 )) (6)
• Finally, 𝑎𝑢𝑝 , 𝑏𝑢𝑝 , 𝑐𝑢𝑝 are combined to derive a unique hash, which is demonstrated
as,
Where, 𝜓ℎ𝑎𝑠ℎ 𝐹𝑖𝑛𝑎𝑙 is the final hashed data. Based on𝜓ℎ𝑎𝑠ℎ 𝐹𝑖𝑛𝑎𝑙 , the
partial digital signature is created through login. Once login is successful, the user can
access the data for further usage.
From𝜓ℎ𝑎𝑠ℎ 𝐹𝑖𝑛𝑎𝑙 , the partial digital signature is created by using the ELCG-DSA technique.
The DSA is a secure and efficient signature algorithm, but its limited key lengths make it
less suitable for specific applications. Hence to overcome this, the Exponential Linear
Congruential Generator function is applied, which offers extended periods and improved
randomness, reducing the correlation between generated keys. The process of ELCG-DSA
is illustrated as,
Key Generation: From the key generation center, a private key(𝜅𝑝𝑟𝑖 ) , and its
corresponding public key(𝜅𝑝𝑢𝑏 ) are created by using the exponential linear congruential
generator function, which is elaborated as,
Signature Generation: After key generation, the signatures(𝜉𝑆𝑖𝑔 ) are generated using the
following representation.
After signature creation, 𝜂𝜗are sensed through login to ensure data security, which is done
by using the MMCC technique. ECC enhances security and makes it well-suited for
modern digital security needs; but, the private key generation by using random values
causes problems in private key generation. Hence, to overcome this, a Montgomery
Modulo Curve is utilized by replacing the elliptic curve, which offers efficient and secure
generation of private keys. The process of MMCC is illustrated as,
𝐶𝑦 𝐸𝑏 2 = 𝐸𝑎 3 + 𝐶𝑥 𝐸𝑎 2 + 𝐸𝑎 (11)
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
• Then,𝜅𝑝𝑟𝑖 is chosen from the key generation center, while 𝜅𝑝𝑢𝑏 is derived from𝜂𝜗
using the following representation.
• Now, 𝜂𝜗is encrypted using𝜅𝑝𝑢𝑏 . Then, the resulting cipher text(𝜉ℓ) is illustrated
as,
Where, 𝑟𝑠𝑐 is the random scalar value. Finally, the secured data(𝜉ℓ)are
processed for load balancing through data verification in the edge server, and the
process of data verification is represented as follows.
The data verification is carried out in the edge server by generating hash codes using PEC-
Tiger, as explained in section 3.2. The generated hash codes are then compared with the
corresponding codes stored in IPFS to verify their consistency. If they match, the edge
server notifies the key generation center to create fully digital signatures using ELCG-
DSA, which is explained in section 3.3. Then, the fully digital signatures access the data
from the edge serve 𝜒 𝜓 for load balancing.
Here, load balancing of𝜒 𝜓 is carried out by using the proposed LJS-POA. POA has faster
convergence speed and simple calculations, enabling wider solution space exploration.
However, it faces issues in random position updation, which leads to local optima. So
Luus-Jaakola sequence is included to overcome this issue, which enhances the exploration
phase by systematically sampling the solution space. The process of LJS-POA is illustrated
as follows,
2 2 2
𝑂𝐹(𝜒 𝜓 ) = ∑𝑁 𝜓 𝜓 𝜓
𝑖=1 (𝜒 𝑖,1 + 𝜒 𝑖,2 +⋅⋅⋅ +𝜒 𝑖,𝑀 ) (18)
Where, 𝜕𝑗 is the position of the target, 𝑅is the parameter that can be either
1 or 2, and𝑂𝐹 is the objective function value.
Then, 𝜒 𝜓 𝑖 is updated based onℑ (𝜒 𝜓 𝑖,𝑗 ), which is outlined as,
Where, ℑ(𝑂𝐹𝑖 )is the objective function value based on the current
position.
• Now, the new position(ℑ𝑛𝑒𝑤 (𝜒 𝜓 𝑖,𝑗 )) is evaluated based on the search for optimal
solutions; then, the behavior of each 𝜒 𝜓 𝑖,𝑗 is represented as,
•
ℑ𝑛𝑒𝑤 (𝜒 𝜓 𝑖,𝑗 ) = 𝜒 𝜓 𝑖,𝑗 + 𝐶 ⋅ (1 − 𝐼 ⁄𝐼𝑚𝑎𝑥 ()(2 ⋅ 𝑟 − 1)𝜓 𝑖,𝑗 ) (20)
Where, 𝐶is the constant value, 𝐼and 𝐼𝑚𝑎𝑥 is the current and maximum
iteration, respectively.
Finally, 𝜒 𝜓 𝑖 is updated based onℑ𝑛𝑒𝑤 (𝜒 𝜓 𝑖,𝑗 ), which is illustrated as,
Then, the steps are repeated until convergence, and the balanced data is
represented by𝜎𝜁. The pseudo-code for the proposed LJS-POA is depicted as,
Output: 𝜎𝜁
Begin
Initialize 𝜉ℓ𝑖,𝑗 , 𝜒 𝑝𝑒𝑟 , ℑ(𝜉ℓ𝑖,𝑗 ), ℑ𝑛𝑒𝑤 (𝜉ℓ𝑖,𝑗 ), iteration(𝐼), maximum
iteration(𝐼𝑚𝑎𝑥 ())
Set(𝐼 = 1)
While(𝐼𝑚𝑎𝑥 ())
For each 𝜉ℓdo
Initialize population
𝜉ℓ𝑖,𝑗 = ℏ𝑙𝑜𝑤𝑗 + 𝑟 ∗ (ℏ𝑢𝑝𝑝𝑗 − ℏ𝑙𝑜𝑤𝑗 )
Generate 𝜒 𝑝𝑒𝑟
𝜒 𝑝𝑒𝑟 𝑃 = {𝜒 𝑝𝑒𝑟 1 , 𝜒 𝑝𝑒𝑟 2 , 𝜒 𝑝𝑒𝑟 3 ,⋅⋅⋅, 𝜒 𝑝𝑒𝑟 𝑝 }
Calculate position
ℑ(𝜉ℓ𝑖,𝑗 ) =
𝜉ℓ𝑖,𝑗 + 𝑟 ⋅ (𝜕𝑗 − 𝑅𝜉ℓ𝑖,𝑗 ) + 𝜒 𝑝𝑒𝑟 𝑖 , 𝑂𝐹𝜕 < 𝑂𝐹𝑖
{
𝜉ℓ𝑖,𝑗 − 𝑟 ⋅ (𝜕𝑗 − 𝑅𝜉ℓ𝑖,𝑗 ) + 𝜒 𝑝𝑒𝑟 𝑖 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Update position
ℑ(𝜉ℓ𝑖 ), ℑ(𝑂𝐹𝑖 ) < 𝑂𝐹𝑖
𝜉ℓ𝑖 = {
𝜉ℓ𝑖 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Find new position
ℑ𝑛𝑒𝑤 (𝜉ℓ𝑖,𝑗 ) = 𝜉ℓ𝑖,𝑗 + 𝐶 ⋅ (1 − 𝐼 ⁄𝐼𝑚𝑎𝑥 ()(2 ⋅ 𝑟 −
1)𝑖,𝑗 )
Update new position
ℑ (𝜉ℓ𝑖 ), ℑ𝑛𝑒𝑤 (𝑂𝐹𝑖 ) < 𝑂𝐹𝑖
𝜉ℓ𝑖 = { 𝑛𝑒𝑤
𝜉ℓ𝑖 , 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
End For
End While
Return: Balanced data
End
After load balancing, 𝜎𝜁is processed for testing the data in the IDS training set, in which
the IDS training includes, big-data handling, preprocessing, data balancing, feature
extraction, feature selection, and classification.
3.7 Pre-Processing
Here, data(𝜆𝜗) from the dataset are collected, and the big data handling process is
conducted using the Hadoop Distributed File System (HDFS). HDFS efficiently stores and
manages large volumes of data by providing scalability and high throughput and the data
as depicted as𝜏𝜐. Then,𝜏𝜐is preprocessed to enhance the raw sensor data under Missing
Value Imputation (MVI), Numeralization, and Normalization for the effective detection
and classification of intrusions. This is elaborated as follows,MVI
Initially, the missing values(𝜏𝑚𝑖𝑠 ) in𝜏𝜐 are identified, which contain Not a Number (NaN),
null values, or other placeholder. Then, the nature (𝜀𝜍)of 𝜏𝑚𝑖𝑠 is determined by whether
A Predominant Intrusion Detection System In Iiot Using Elcg-Dsa And Lws-Biolstm With Blockchain
Next, based on𝜀𝜍, for numerical, data if𝜏𝑚𝑖𝑠 is MCAR or MAR, the mean (𝜇⃗) and median
⃗⃗⃗) imputation is considered, and if MNAR, then Regression imputation (𝑅⃗⃗) is
(𝑚
considered. Meanwhile, for categorical data, if 𝜏𝑚𝑖𝑠 is MCAR or MAR, the mode
imputation (𝑚
⃗⃗⃗𝑚𝑖 ) is considered. This can be illustrated as,
𝜏𝜐𝑁
𝜇⃗ = ∑𝑛𝑁=1 (22)
𝑛
𝑚
⃗⃗⃗ = 𝑚𝑒𝑑𝑖𝑎𝑛(𝜏𝜐) (23)
𝑅⃗⃗ = 𝑟𝑒0 + 𝑟𝑒1 𝜏𝜐𝑁1 + 𝑟𝑒2 𝜏𝜐𝑁2 +⋅⋅⋅ +𝑟𝑒𝑝 𝜏𝜐𝑝𝑁 + 𝑒𝑟𝑁 (24)
Where, 𝑟𝑒is the regression coefficients, 𝑝 is the number of 𝑟𝑒 , and 𝑒𝑟 is the error
⃗⃗⃗, 𝑅⃗⃗, and𝑚
term.After filling 𝜏𝑚𝑖𝑠 with calculated𝜇⃗, 𝑚 ⃗⃗⃗𝑚𝑖 , the process ensures that no biases
are introduced for effective imputation of 𝜏𝑚𝑖𝑠 . Then, the data after MVI is depicted as𝜐𝜛.
Numeralization
• Finally, based on the order of𝜍𝐿𝐵 , binary dummy variables are assigned to𝐶𝑎𝑡.
Then, the numeralized data is represented as𝜗𝑛𝑢𝑚 .
Normalization
• Here, 𝜗𝑛𝑢𝑚 are normalized to ensure optimal data utilization for predictive
maintenance and optimization endeavors in IIoT networks. This process is
illustrated as,
• Initially, the numerical columns(𝑛𝑐) from 𝜗𝑛𝑢𝑚 are identified, and then, the scaling
functions are applied to adjust each𝑛𝑐 in𝜗𝑛𝑢𝑚 .
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
• Then, the scaled data(𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 )) is verified whether the changes cause problems.
Finally,𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 )are considered as preprocessed data and ready for further
analysis. After that, 𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 )are processed for data balancing.
Here, 𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 )are balanced by using SMOTE. This technique is applied to address the
class imbalance problem by generating synthetic samples for minority classes. This
process is demonstrated as,
Primarily, the minority class set(ℓ𝜍𝑚𝑖𝑛 ()) of 𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 ) is selected, followed by the
computation of the distances between each data in ℓ𝜍𝑚𝑖𝑛 to identify its k-nearest neighbors.
Then, the sampling rate(𝑠𝑟) is selected for each𝑛 ∈ 𝑚𝑐 according to the imbalanced
proportion of𝑠𝑐𝑎(𝜗𝑛𝑢𝑚 ).
Next, the synthetic instances(𝑛̂) are generated for each𝑛𝜈 ∈ ℓ𝜍̂𝑚𝑖𝑛 , using the following
representation,
𝑛̂ = 𝑟 × |𝑛 − 𝑛𝜈 | + 𝑛; 𝜈 = 1𝑡𝑜𝑠𝑟 (30)
From𝜉ℏ, the features like destination port, forward packet length maximum, and so on are
extracted for intrusion detection as well as classification. Then, the LJS-POA is applied
for feature selection from extracted features and the process is demonstrated in section 3.6.
Moreover, the final optimal solutions are the selected features(ℓ℘) such as, Destination
port, flow duration, flow byte, and so on.
3.10 Classification
Here, ℓ℘are processed for the detection as well as classification of intrusions by using the
LWS-BiOLSTM. Bi-LSTM processes input sequences in both forward and backward
directions, reducing overfitting; however, it requires more memory, and the performance
can be sensitive to random weight initializations. To reduce memory usage, Log Wave
Sigmoid activation function and once initializer is used. Then, the classifier diagram is
depicted in Figure 2.
A Predominant Intrusion Detection System In Iiot Using Elcg-Dsa And Lws-Biolstm With Blockchain
• Input Layer: Initially, eachℓ℘ is represented as a vector at the time step 𝑡. Then,
the input sequence is expressed as,
𝓵℘𝑵 (𝒕) = (𝓵℘𝟏 (𝒕), 𝓵℘𝟐 (𝒕), 𝓵℘𝟑 (𝒕),⋅⋅⋅, 𝓵℘𝒏 (𝒕)) (31)
• Embedding Layer: Next, ℓ℘𝑁 (𝑡)are transformed into dense vector representation
(℘𝑑𝑣
𝑖 ) by capturing the semantic meaning of ℓ℘𝑖 , which is illustrated as,
• Bi-LSTM Layer: This layer consists of two LSTM layers, one processing in the
forward direction(𝛨𝐹𝑜𝑟 ) and the other in the backward direction(𝛨𝐵𝑎𝑐 ). This can
be depicted as,
• Output Layer: Next, 𝛨𝐹𝑜𝑟 and 𝛨𝐵𝑎𝑐 are combined, which represents the output
from the Bi-LSTM layer(𝛰𝐵𝑖 ).
Finally, 𝛰𝐵𝑖 passed through the fully connected layer followed by the log wave sigmoid
activation function (𝛷𝐿𝑊𝑆 ), which is represented as,
1 2
𝛷𝐿𝑊𝑆 (𝛰𝐵𝑖 ) = (1 + 𝛰𝐵𝑖 2 )𝑒 −𝛰𝐵𝑖 (37)
1+𝑒 −𝛰𝐵𝑖
Where, ƛℏillustrates the final output from the output layer,𝜎and𝜛is the
weight and bias values, respectively. Here, 𝜛 are initialized as 1 and then,
ƛℏclassifies the IIoT data as, whether it is attacked or not and the various types
of attacks such as, Brute, Started Query Language (SQL) Injection, Cross-site
Scripting (XSS), Distributed Denial-of-Service (DDoS), PortScan, Bot,
Infiltration, File Transfer Protocol (FTP), and Secure Shell (SSH), which are
illustrated as,
ƛℏ =
{𝐵𝑟𝑢𝑡𝑒, 𝑆𝑄𝐿𝐼𝑛𝑗𝑒𝑐𝑡𝑖𝑜𝑛, 𝑋𝑆𝑆, 𝐷𝐷𝑜𝑆, 𝑃𝑜𝑟𝑡𝑆𝑐𝑎𝑛, 𝐵𝑜𝑡, 𝐼𝑛𝑓𝑖𝑡𝑟𝑎𝑡𝑖𝑜𝑛, 𝐹𝑇𝑃, 𝑆𝑆𝐻}
(38)
Here, the performance analysis of the proposed model and prevailing techniques is
conducted to demonstrate the model’s effectiveness.
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
Figure 3 demonstrates the performance validation of the proposed model and existing
techniques regarding precision, recall, accuracy, and specificity. Here, the proposed LWS-
BiOLSTM obtained a high precision, recall, accuracy, and specificity of 98.78%, 98.52%,
98.78%, and 98.63%, respectively. However, the existing techniques such as Bi-LSTM,
LSTM, RNN, and DN obtained a low average precision, recall, accuracy, and specificity
of 93.51%, 93.74%, 93.36%, and 93.05%, accordingly. The proposed model employed the
Log Wave Sigmoid activation function to reduce memory usage; thus, the effectiveness of
the model was shown.
Table 1 displays the comparison by False Positive Rate (FPR) and False Negative Rate
(FNR) of the proposed LWS-BiOLSTM and prevailing techniques. Here, the proposed
model obtained a low FPR and FNR of 1.5124 and 1.5421, correspondingly. However, the
existing models such as Bi-LSTM, LSTM, RNN, and DNN obtained a high FPR of 3.6632,
A Predominant Intrusion Detection System In Iiot Using Elcg-Dsa And Lws-Biolstm With Blockchain
5.1058, 8.4107, and 10.6307, respectively. Likewise, the existing models obtained high
FNR values. Thus, the outcomes displayed that the proposed model is better at detecting
intrusions due to the usage of the Log Wave Sigmoid activation function and once
initializer.
Hashcode generation time analysis of the proposed model and conventional methods such
as Tiger, whirlpool, Secure Hashing Algorithm 512 (SHA512), and Message Digest
Algorithm 5 (MD5) are shown in Figure 4. Here, the proposed PEC-Tiger algorithm took
a less hashcode generation time of 1254 ms. However, the conventional techniques took a
high average hashcode generation time of 2610 ms. Thus, the proposed model used
Polychoric Entropy Correlation for efficient hashcode generation.
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
Figure 5 shows the graphical demonstration of the proposed system and existing
techniques such as DSA, Simple DSA (SDSA), Qualified DSA (QDSA), and Elliptic
Curve DSA (ECDSA) with respect to digital signature creation time as well as digital
signature verification time. Here, the proposed methodology obtained better outcomes than
the existing techniques. The proposed ELCG-DSA achieved a low digital signature
creation time and digital signature verification time of 2145 ms, and 2214 ms, respectively.
However, the existing SDSA and QDSA attained a high digital signature creation time of
3365 ms and 3845 ms, accordingly. Likewise, the remaining methods attained high digital
signature creation time and digital signature verification time. Here, the proposed model
used the Exponential Linear Congruential Generator function, which effectively reduces
the correlation between generated keys; thus, the model’s effectiveness is proved.
Proposed
1267 1325 98.71
MMCC
(a)
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
(b)
Figure 6: Graphical representation regarding (a) response time and (b) latency
Figures 6 (a) and (b) display the graphical evaluation of the proposed approach and the
prevailing techniques regarding response time and latency. Here, the proposed model
obtained a low response time and latency of 7423 ms and 5698 for 300 numbers of data.
However, the prevailing Whale Optimization Algorithm (WOA) attained a high response
time and latency of 11247 ms and 9481 for 300 numbers of data. Likewise, other prevailing
methods obtained a high response time and latency. Here, the proposed model excellently
performs load balancing with the help of the Luus-Jaakola sequence with POA.
Table 3 displays the comparative assessment of the proposed model and prevailing
methods such as POA, WOA, Dingo Optimization Algorithm (DOA), and Osprey
Optimization Algorithm (OOA) regarding load balancing. Here, the proposed model had
a load balancing of 5896 for 500 numbers of data. But, the prevailing methods had a load
balancing of 7845, 9654, 11547, and 13659, accordingly, for 500 numbers of data. Thus,
the proposed model is superior to the prevailing methodologies due to the usage of the
Luus-Jaakola sequence.
Table 4 shows the comparative evaluation of the proposed model and related works
regarding accuracy, and recall. Here, the proposed model obtained a high accuracy and
recall of 98.78% and 98.52%, accordingly due to the usage of the Log Wave Sigmoid
activation function and once initializer. However, the existing Multi Convolutional Neural
Network (Multi-CNN) and Ensemble classifier obtained low accuracy of 81.33% and
93.4%. Likewise, the existing Regularized Cross-layer Ladder Network (RCLN) Particle
Swarm Optimization (PSO) and Bat Algorithm (BA) obtained a low recall of 96.8% and
97.7%, respectively. Likewise, the existing Federated Learning (FL) attained low accuracy
and recall values. Thus, the outcomes proved that the proposed model is better at detecting
intrusions.
5. CONCLUSION
This paper presents an efficient IDS for IIoT utilizing ELCG-DSA and LWS-BiOLSTM
with blockchain. Here, the proposed research was implemented by utilizing the NSL-KDD
dataset. The proposed LWS-BiOLSTM achieved high accuracy, precision, and recall of
98.78%, 98.78%, and 98.52%, respectively in detecting intrusions, which proved the high
Basava Ramanjaneyulu Gudivaka 1, *, Sri Harsha Grandhi DineshKumar Reddy Basani 3, Raj Kumar
Gudivaka 4, Rajya Lakshmi Gudivaka 5, M M Kamruzzaman 6
effectiveness of the model. Likewise, the proposed PEC-Tiger took a less time of 1254 ms
for hashcode generation, which was less than the existing techniques. Also, the proposed
MMCC achieved a high security level of 98.71%, which demonstrated the high-level
security of the model. Similarly, the proposed LJS-POA has a low response time of 9654
ms for 500 numbers of data. Thus, the experimental outcomes proved that the proposed
methodology was superior in detecting the intrusion.
DECLARATION:
Funding Statement:
Authors did not receive any funding.
Data Availability Statement:
No datasets were generated or analyzed during the current study
Conflict of Interest
There is no conflict of interests between the authors.
Declaration of Interests:
The authors declare that they have no known competing financial interests or personal
relationships that could have appeared to influence the work reported in this paper.
Ethics approval:
Not applicable.
Permission to reproduce material from other sources:
Yes, you can reproduce.
Clinical trial registration:
We have not harmed any human person with our research data collection, which was
gathered from an already published article
Authors’ Contributions
All authors have made equal contributions to this article.
Author Disclosure Statement
The authors declare that they have no competing interests
Future scope: In future, the efforts of this article will be extended by focusing on advanced
medical imaging modalities like Magnetic Resonance Imaging (MRI) to improve the
model’s outcomes.
REFERENCE