Next Article in Journal
Parameter Identification of Structures with Different Connections Using Static Responses
Next Article in Special Issue
Lightweight Hybrid Deep Learning Architecture and Model for Security in IIOT
Previous Article in Journal
Analysis of Gut Microbiome Structure Based on GMPR+Spectrum
Previous Article in Special Issue
Designing the Controller-Based Urban Traffic Evaluation and Prediction Using Model Predictive Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment

1
Department of Information Systems, College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia
2
Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
3
Department of Information Systems, College of Computing and Information System, Umm Al-Qura University, Mecca 24382, Saudi Arabia
4
Department of Computer Science, College of Science & Arts at Mahayil, King Khalid University, Abha 62529, Saudi Arabia
5
Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
6
Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
7
Department of Computer Science, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo 11835, Egypt
8
Department of Management Information System, College of Business Administration, Taibah University, Medina 42353, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(12), 5893; https://doi.org/10.3390/app12125893
Submission received: 4 May 2022 / Revised: 4 June 2022 / Accepted: 7 June 2022 / Published: 9 June 2022
(This article belongs to the Special Issue Machine Learning for Blockchain and IoT Systems in Smart Cities)

Abstract

:
Currently, the amount of Internet of Things (IoT) applications is enhanced for processing, analyzing, and managing the created big data from the smart city. Certain other applications of smart cities were location-based services, transportation management, and urban design, amongst others. There are several challenges under these applications containing privacy, data security, mining, and visualization. The blockchain-assisted IoT application (BIoT) is offering new urban computing to secure smart cities. The blockchain is a secure and transparent data-sharing decentralized platform, so BIoT is suggested as the optimum solution to the aforementioned challenges. In this view, this study develops an Optimal Machine Learning-based Intrusion Detection System for Privacy Preserving BIoT with Smart Cities Environment, called OMLIDS-PBIoT technique. The presented OMLIDS-PBIoT technique exploits BC and ML techniques to accomplish security in the smart city environment. For attaining this, the presented OMLIDS-PBIoT technique employs data pre-processing in the initial stage to transform the data into a compatible format. Moreover, a golden eagle optimization (GEO)-based feature selection (FS) model is designed to derive useful feature subsets. In addition, a heap-based optimizer (HBO) with random vector functional link network (RVFL) model was utilized for intrusion classification. Additionally, blockchain technology is exploited for secure data transmission in the IoT-enabled smart city environment. The performance validation of the OMLIDS-PBIoT technique is carried out using benchmark datasets, and the outcomes are inspected under numerous factors. The experimental results demonstrate the superiority of the OMLIDS-PBIoT technique over recent approaches.

1. Introduction

The smart city is regarded as a technological structure utilized by the distinct city shareholders for achieving distinct objectives such as good governance, enhancing day-to-day living circumstances, maximizing resource usage, or building new commercial chances [1]. The supporters of the smart city, whether they are technology providers, researchers, or managers, have performed various designs, improvement studies, and standardization in response to the difficulties of smart city advancement referring to security, scalability, connectivity, or heterogeneity [2]. The Internet of Things (IoT) technology provides less cost and potential solutions for the advancement of smart cities owing to its greater suitability in an infinite number of cases. Specifically, the intelligent IoT gadgets could consistently combine multiple fields of a smart city phenomenon, interchanging a continual flow of data for granting quality services to the public as a supreme objective [3]. Thus, we refer to the IoT gadgets as brilliant, which means they are capable of communicating autonomously, demanding less or no human involvement.
Invaders will fix their places in smart cities for many reasons. Malevolent people might consider smart cities as play areas wherein they make a trail of their hacking skills through playing with existing technologies for individual fulfillment [4]. For cyber-criminals, the interconnectivity of systems and devices in a smart city can be operated for any feasible unauthorized accessibility of monetary properties, personal properties, delicate data, and causing damages or loss to the common public [5]. State-sponsored actors might exploit the ubiquity of smart city technologies for launching their hacktivist or espionage camps. In a few very dire situations, smart applications might be exploited for performances of terror [6]. Thus, engineers and researchers must grant legal methods and solutions to aid local administrations and metropolitan or urban developers in creating highly secured smart cities [7].
Security is not just a necessity for the further usage of blockchain (BC); it could participate in data dispersal since it operates in a quicker mode. However, according to the author’s knowledge, autonomous mathematical evidence for quicker solutions is now not available [8]. Once after the existence of the mathematical evidence, an ideal ambiance is possible where speedy and trusted nodes are linked in the network and could avail the advantage from 5G with the help of particular fog layers of clouds. As a result, a BC-oriented decentralized system is one of the resolutions [9]. One such benefit of utilizing BC technologies is that it has capability of storing data in an absolute way that does not need a centralized database. Furthermore, it could offer a means for tracking and executing transactions amid several members in a trusted ambiance [10]. With the use of strong encryption with public private key sets, BC further grants higher levels of security to its members. Figure 1 depicts the process of BC in IoT with smart cities environment.
This study develops an Optimal Machine Learning-based Intrusion Detection System for Privacy Preserving BIoT with Smart Cities Environment, called OMLIDS-PBIoT technique. The proposed OMLIDS-PBIoT model can be applied to accomplish security in several areas of smart cities such as traffic management, emergency response, smart healthcare, air quality monitoring, disaster management, waste management, air quality monitoring, etc. The presented OMLIDS-PBIoT technique employs data pre-processing in the initial stage to transform the data into compatible format. Additionally, a golden eagle optimization (GEO)-based feature selection (FS) model is designed to derive useful feature subsets. In addition, heap-based optimizer (HBO) with random vector functional link network (RVFL) model was utilized for intrusion classification. In addition, BC technology is exploited for secure data transmission in the IoT-enabled smart city environment. The performance validation of the OMLIDS-PBIoT technique is performed utilizing benchmark datasets, and the outcomes are valued in many aspects.

2. Literature Review

This section offers a brief review of security-based solutions for the IoT enabled smart city environment. Kumar et al. [11] introduce a Privacy Preserving and Secure Framework (PPSF) to IoT-driven smart cities. The suggested PPSF depends on two chief processes: one is a dual-level secrecy scheme, and another one is IDS. Firstly, in a dual-level secrecy scheme, a BC unit is devised for sending the IoT data securely, and a Principal Component Analysis (PCA) approach was implemented to convert original IoT data as to innovative outline. In the IDS, a Gradient Boosting Anomaly Detector (GBAD) was implied for training purposes. Meng et al. [12] recommend a BC-enabled single character frequency-related ESM, which could create a provable database of malicious payloads by means of BCs. In the valuation, we examine the act of the methods below flooding and character padding assaults in a real and simulated IoT network ambiance.
Bediya and Kumar [13] debated most feasible assaults on IoT network systems and distributed denial of service (DDoS) assault is such a risky one amongst them. BC technology could be used for developing a structure in order to protect or preserve IoT systems, and BC is a brand-new technology utilized in transacting processes of cryptocurrency. Rathore et al. [14] suggest a decentralized security substructure depends on Software Defined Networking (SDN) paired with BC technologies for IoT network from the smart cities, which hinges on the three main technologies of Fog, SDN, and BC, as well as mobile edge computing (MEC) for detecting assaults in the IoT network with higher effectiveness. Therefore, in the suggested substructure, SDN is accountable for continual observing and interpretation of traffic data in the whole IoT network for providing an optimum attack recognition method.
Botello et al. [15] suggest BlockSIEM, a BC-related and dispersed Security Information and Event Management (SIEM) solution structure for the safety of the above-mentioned smart city services. These security events were produced by IoT sentinels, which take responsibility for protecting groups of IoT gadgets. In [16], several various problems and distinct assault vectors are conferred, including the feasible results. To alleviate numerous assaults, BlockSDN, a BC as a service structure, for SDN is suggested. The substructure of permissioned BC is provided, pursued by two assault scenarios: one is a malware imperiled switch at data plane, and another one is DDoS assault at the control planes. Peneti et al. [17] inaugurates the BC-defined network system having a grey wolf enhanced modular neural network (NN) technique for managing the smart ambiance security. At the time of this process, translation, application, and construction, layers were formed, where user-authenticated related blocks are devised for handling the privacy and security property. After this, optimizing NN is implied for maintaining the computational resource utilization and latency in IoT-empowered smart applications.
The authors in [18] introduced a new AI-based multimodal fusion model to recognize intrusions in the industry 4.0 environment. This model involves improved fish swarm optimization-based feature selection (IFSO-FS) approach to choose optimal subset of features. In addition, the IFSO technique is derived by the use of the Levy Flight (LF) concept into the searching mechanism of the conventional FSO model. Additionally, the weighted voting-based ensemble technique is used for fusion procedure. The authors in [19] presented a hybrid metaheuristic-based energy efficiency resource allocation (HMEERA) technique for cloud platform. The HEERA technique carries out the feature extraction and principal component analysis (PCA)-based feature reduction. It also uses hybrid Group Teaching Optimization Algorithm (GTOA) with rat swarm optimizer (RSO) algorithm to allot the resources in an optimal way.
Though several models are available in the literature, it is still needed to design effective IDS models for smart city environment. In addition, most of the research works have chosen the parameter values based on the trial-and-error method, which is labor intensive and ineffective. Therefore, parameter optimization can be considered as the NP hard problem and can be solved by the use of metaheuristic algorithms. In this work, we have used the HBO algorithm for optimal parameter tuning process.

3. The Proposed Model

In this study, an effective OMLIDS-PBIoT technique was developed with the utilization of the BC and ML models for accomplishing security in the smart city environment. The presented OMLIDS-PBIoT technique employs different stages of subprocesses, namely pre-processing, GEO-FS, RVFL-based classification, and HBO-based parameter optimization. Moreover, BC technology is exploited for secure data transmission in the IoT enabled smart city environment.

3.1. Blockchain Technology

In this work, the BC technology is used to assure secure data transmission in the smart city environment. BC is a decentralized P2P network through which every transaction is authenticated by the registered node and recorded in an immutable and distributed ledger. In such case, the consensus approach is the center of the BC technique, since it ensures network reliability. Especially, no centralized authority exists to authenticate the produced event; all the transactions should be authenticated by the BC node via mutual agreement (viz., consensus) [20]. A few common types of consensuses are given in the following:
  • Proof of Work (PoW): a transaction is authorized when the node accepts its P2P network.
  • Proof of Stake (PoS): the node that has further wealth has great possibility to create a block and participate in the consensus.
  • Proof of Importance (PoI): the node that can generate a block is the one with the maximum number of transactions.
  • Proof of Authority (PoA): explicitly few nodes are permitted to generate new blocks and protect the BC. It should be apparent that the abovementioned algorithm features potential drawbacks and possible advantages, depending mainly on the fundamental P2P network architecture.
PoS and PoW are explicitly portrayed as the more commonly used algorithms to achieve the consensus between the P2P nodes. Nonetheless, it has become evident that PoW needs high computation resources, whereas PoS is most demonstrated for attacking because the mining cost is almost zero. PoA and PoI are valid alternatives since they have better performance and are energy-friendly. Moreover, BC presents two techniques to construct a network, such as permissionless and permissioned BCs. Especially, permissionless BC (that is, public BC) allows a potential candidate to turn into a node and belong to the network. A node on this BC may execute other tasks as long as they pose the physical ability (for example, validate transactions, mine blocks, etc.). Consecutively, permissioned BC (that is, private BC) restricts the access of a node that belongs to the network and executing task. An appropriate characteristic of BC is that it is likely to select the levels of decentralization on the network, that is, partially decentralized or fully centralized. Specifically, open permissioned BC is partially decentralized, because all the entities have the capacity to read the saved information, whereas closed permissioned BC is completely centralized. After all, the saved information is perceptible to the participating node.

3.2. Data Pre-Processing

During this case, min-max normalized has been executed for scaling the data s to unit variance. It is commonly utilized to compute the similarity degree among points. Assume that A is data, which is mapped from the dataset range from Amin to Amax, employing in Equation (1):
A n o r m a l i z e d = A A m i n A m a x   A m i n
The employ of min-max normalization ensures that the feature was exacted as to similar scales.

3.3. Process Involved in GEO-FS Technique

In this study, the GEO-FS technique is exploited to choose an optimal subset of features from the preprocessed data. GEO is a novel meta-heuristic approach, which was established very recently for solving global optimized problems. The GEO technique was simulated and mathematically processed by the intelligence of golden eagle (GE) dependent upon adjusting the speed of its spiral tracking [21]. The GE is a specific type of swarm that has a superior propensity for cruising around and searching for prey initially to hunt. By controlling these two elements, i.e., cruise propensity and attack propensity, the GEO was rapidly capable of hunting an optimum accessible prey from the possible region.
The GE from cruise and hunt is a unique feature, i.e., it follows in a spiral trajectory, representing that prey was commonly on one side of the eagles. This allows them to control target prey wisely and use boulders for determining an appropriate angle of attack. Simultaneously, it can be checking other regions for optimum food. The hunting technique of GEs mostly dependent upon the subsequent feature.
The mathematical designs of GEs for mimicking the movement to search for the prey are mostly explained as:
  • The spiral movement of GEs: In GEO, all the GE retains from their memory the optimum visited place previously. The eagle is an attraction near the cruising and nearing attack of the prey concurrently in order to search for optimum food. At all iterations, all the GEs j arbitrarily select prey, which is fixed by another GE l , and circles around optimum place stayed by GE l so far. The GE j also has the chosen features for circling their memory; therefore, it can be l { 1 , 2 ,   , N G E } , whereas N G E stands for the number of GEs.
  • Prey selection: At all the iterations, all the GEs can choose a prey for executing the cruising as well as attacking functions. Additionally, all the GEs select the chosen prey in the memory of the entire flock. Thus, the cruising and attacking vectors are calculated based on the chosen prey. Next, it verifies their memory when the novel place was superior to the preceding place. Subsequently, the memory was upgraded with novel determining.
  • Attack: The attack is defined by utilizing a vector deriving from the actual place of GE j and ending from the place of prey from the eagle’s memory as:
    A j = X l X j ,
    where A j implies the attack vector of GEs j , X 1 denotes the optimum place visited by eagle l so far, and X j signifies the present place of eagles j .
  • Cruise: The cruise vector is a perpendicular vector to attack vectors and tangent to circle. It is also well-known as linear speed of GEs for attacking the prey. The target point on cruise vector was provided under:
    C j = d f , f j a f a j ,
    where d signifies the hyperplane formula from n -dimension space, a j , a f A j , whereas A j = [ a 1 , a 2 , , a n ] signifies the attack vectors.
  • Moving to novel places: Moving to novel places of GEs was mostly dependent upon the attacking and cruising vectors. Thus, the step vector of GEs j in iteration t was projected by the subsequent formula:
    x j = r 1 p a A j A j + r 2 p c C j c j
    In which p a t denotes the attack co-efficient at iteration t and p c t implies the cruise co-efficient at iteration t and controlling that the GE was affected by cruising and attacking. r 1 and r 2 imply the random vectors.
    A novel place of GEs is then provided as:
    x j t + 1 = x j r + x j t
    When the fitness function j offers superior to the preceding places after their memory is upgraded with novel places.
  • The transition from exploration to exploitation: The GEO technique utilizes the attacking co-efficient p a and the cruising co-efficient p c for switching from the state of exploration to exploitation. p a and p c is calculated utilizing the subsequent linear expression:
    p a = p a 0 + t T | p a T p a 0 | ,
    p c = p c 0 + t T | p c T p c 0 | ,
    where p a 0 and p c 0 are correspondingly the primary values to propensity for attacking p a and for propensity for cruising p c ,   t signifies the present iteration, T denotes the maximal count of iterations, p a T and p a T are correspondingly the last values to propensity for attacking p a and to propensity for cruising p c .
The fitness function (FF) of the GEO-FS technique assumes the classifier accuracy and the number of chosen features. It maximizes the classifier accuracy and minimizing the set size of chosen features. Thus, the subsequent FF utilized for evaluating individual solutions is demonstrated in Equation (8).
F i t n e s s = α × E r r o r R a t e + ( 1 α ) × # S F # A l l _ F
where E r r o r R a t e implies the classifier error rate utilizing the chosen features. E r r o r R a t e is computed as the percentage of inappropriate classification (by 5-ANN classifier) to the number of classifiers developed, formulated as a value amongst zero and one [22]. ( E r r o r R a t e implies the complement of classifier accuracy), # S F denotes the number of chosen features, and # A l l _ F denotes the entire number of elements from the original dataset. α denotes utilized for controlling the significance of classifier quality as well as subset length. During the experiments, α is fixed to 0.9.

3.4. Process Involved in HBO-RVFL Technique

At this stage, the chosen features are passed into the RVFL model to classify data. The basic framework of RVFL is generally the same as the artificial neural network that comprises hidden, output, and input layers [23]. However, the major difference between RVFL and ANN is that RVFL directly connects the output and input layers. This connection supports RVFL by an appropriate mechanism to prevent the over-fitting problems that take place in ANN. The training RVFL begins with the employment of the input data that comprise target y i and sample x i , to the input state. Next, the output of the hidden node is computed by the subsequent formula:
O j ( α j x i + β j ) = 1 1 + e ( α j x i + β j ) ,   β j [ 0 ,   S ] ,   α j [ S ,   S ]
From the above equation, α j represents the value of weight, which connects the hidden and input nodes. S and β j denote the scale bias and factor, correspondingly.
Then, last output is calculated by the Equation (11):
Z = F w ,   w R n + P ,   F = [ F 1 ,   F 2 ]
F 1 = [ x 11 x 1 n x N 1 x N n ]   F 2 = [ G 1 ( α 1 x 1 + β 1 ) G P ( α P x 1 + β P ) G 1 ( α 1 x N + β 1 ) G P ( α P x N + β P ) ]
Here, w is upgraded by the subsequent equation:
w = F Z
In Equation (12), indicates the Moore–Penrose pseudo-inverse. Figure 2 demonstrates the structure of RVFL technique.
To optimally adjust the parameters related to the RVFL method, the HBO algorithm has been utilized. The presented algorithm is stimulated by the corporate rank hierarchy (CRH), which declares that a team could arrange in a hierarchal manner to fulfill organization goals [24]. The HBO algorithm is categorized as interaction between colleagues, interaction between subordinates, self-contribution of employees, and the immediate supervisor. In the CRH approach, the population is established as a CRH, while the heap node is established as a searching agent. The agent location of every search is upgraded by:
x i k ( t + 1 ) = B k + γ ( 2 r 1 ) | B k x i k ( t ) |
The k - th components of λ vector λ is signified as:
λ k = 2 r 1
γ is evaluated by using Equation (15):
γ = | 2 ( t m o d t c ) 1 4 C |
The (C) parameter in Equation (16) controls the variation. However, this will complete in T iteration as in the following:
C = T m a x / 25
Additionally, the interaction between colleagues is modeled. As expressed in Equation (17), the location of every agent ( x i ) is upgraded by randomly designated colleague S r :
x i k ( t + 1 ) = { S r k + γ λ k | S r k x i k ( t ) | , f ( S r < f ( χ i ( t ) ) x i k + γ λ k | S r k x i k ( t ) | , f ( S r f ( χ i ( t ) )
In Equation (17), the fitness of the searching agent is denoted as f .
Further modeled is the self-contribution of all the employees, whereby the location of every agent is upgraded based on the following equation:
x i k ( t + 1 ) = x i k ( t )
At last, the updating position equation has been taking place. The roulette wheel probability, p 1 ,   p 2 , and p 3 , are designated to balance the exploitation and exploration stages.
The searching agent upgrades the location by utilizing Equation (18). Selection of the proportion p 1 is implemented by Equation (19):
p 1 = 1 t τ   max  
The searching agent upgrades their location by Equation (11). Selection of the proportion p 2 is implemented by Equation (20):
p 2 = p 1 + 1 p 1 2
The searching agent upgrades their location by Equation (19). Selection of the proportion p 3 is implemented by Equation (21):
p 3 = p 2 + 1 p 1 2 = 1
Therefore, the common position updating method of the HBO algorithm is expressed by the following equation:
x i k ( t + 1 ) = { x i k ( t ) ,   p p 1 B k + γ λ k | B k x i k ( t ) | ,   p 1 < p < p 2 S r k + γ λ k | S r k x i k ( t ) | , p 2 < p p 3   a n d   f ( S r < f ( x i ( t ) ) x γ k + γ λ k | S r k x i k ( t ) | , p 2 < p p 3   a n d   f ( S r f ( x i ( t ) ) )
The HBO approach grows an FF for achieving superior classifier performances. It solves a positive integer for demonstrating the best performance of candidate results. During this study, the minimized classifier error rate has been regarded that FF is offered in Equation (23).
f i t n e s s ( x i ) = C l a s s i f i e r E r r o r R a t e ( x i ) = n u m b e r   o f   m i s c l a s s i f i e d   s a m p l e s T o t a l   n u m b e r   o f   s a m p l e s × 100

4. Performance Validation

This section inspects the experimental validation of the OMLIDS-PBIoT technique using two benchmark datasets such as NSL-KDD and UNSW-NB15 datasets.
The FS outcomes of the GEO-FS system on the test dataset are displayed in Table 1. The experimental values implied the GEO-FS method has accomplished enhanced performance over other models. For instance, on test NSL-KDD dataset, the OMLIDS-PBIoT technique has accomplished least good cost of 0.002218 with the selection of 13 features. Additionally, on test UNSW-NB15 dataset, the OMLIDS-PBIoT technique has established minimum best cost of 0.003095 with the selection of 20 features.
A detailed intrusion detection of the outcomes of the OMLIDS-PBIoT technique on the NSL-KDD dataset are portrayed in Table 2 and Figure 3. The outcomes denoted by the OMLIDS-PBIoT technique have classified samples under all classes effectively. For example, the OMLIDS-PBIoT technique has recognized samples under DoS attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.30%, 99.50%, 99.64%, and 99.57% respectively. Additionally, the OMLIDS-PBIoT technique has recognized samples under R2L attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.53%, 98.52%, 99.18%, and 99.21% correspondingly. At the same time, the OMLIDS-PBIoT technique has recognized samples under U2R attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.89%, 99.12%, 98.45%, and 99.54% individually. Moreover, the OMLIDS-PBIoT technique has recognized samples under normal attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 98.65%, 98.84%, 98.74%, and 99.07%, correspondingly.
The training accuracy (TA) and validation accuracy (VA) attained by the OMLIDS-PBIoT technique on NSL-KDD dataset is demonstrated in Figure 4. The experimental outcome implied that the OMLIDS-PBIoT technique has gained maximum values of TA and VA. In specific, the VA seemed to be higher than TA.
The training loss (TL) and validation loss (VL) achieved by the OMLIDS-PBIoT technique on NSL-KDD dataset are established in Figure 5. The experimental outcome inferred that the OMLIDS-PBIoT technique has accomplished least values of TL and VL. In specific, the VL seemed to be lower than TL.
A detailed intrusion detection outcome of the OMLIDS-PBIoT technique on the UNSW-NB15 dataset is displayed in Table 3 and Figure 6. The outcomes exposed that the OMLIDS-PBIoT technique has classified samples under all classes effectively. For example, the OMLIDS-PBIoT model has recognized samples under DoS attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.69%, 99.33%, 99.54%, and 99.74%, correspondingly. Eventually, the OMLIDS-PBIoT technique has recognized samples under Generic attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.58%, 99.78%, 98.78%, and 99.67%, correspondingly. In the meantime, the OMLIDS-PBIoT technique has recognized samples under U2R attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.609%, 99.43%, 98.58%, and 99.54%, correspondingly. Furthermore, the OMLIDS-PBIoT technique has recognized samples under normal attack with p r e c n , r e c a l , F 1 s c o r e , and a c c u y of 99.73%, 99.48%, 98.60%, and 99.65%, correspondingly.
The TA and VA gained by the OMLIDS-PBIoT technique on UNSW-NB15 dataset are shown in Figure 7. The experimental outcome implied that the OMLIDS-PBIoT technique has gained maximal values of TA and VA. Particularly, the VA seemed to be higher than TA.
The TL and VL achieved by the OMLIDS-PBIoT techniques on UNSW-NB15 dataset are established in Figure 8. The experimental outcome inferred that the OMLIDS-PBIoT technique has accomplished the least values of TL and VL. Specifically, the VL seemed to be less than TL.
Table 4 portrays an extensive comparison study of the OMLIDS-PBIoT technique with recent models in terms of different measures [18]. Figure 9 offers a comparative p r e c n and r e c a l examination of the OMLIDS-PBIoT technique with existing models on test data. The results implied that the AKNN-IDS model has obtained lower p r e c n and r e c a l values of 0.9219 and 0.9376, respectively. Meanwhile, the DPCDBN-IDS and DT-IDS models have shown slightly improved values of p r e c n and r e c a l . Moreover, the PTDSAE-IDS, AB-IDS, and RF-IDS models have obtained moderately closer values of p r e c n and r e c a l . In line with this, the DBN-IDS, LSTM-IDS, and RNN-IDS models have accomplished reasonable p r e c n and r e c a l values. Though the AIMMFIDS model has shown near-optimal performance with p r e c n and r e c a l of 0.9946 and 0.9907, the presented OMLIDS-PBIoT technique has accomplished higher p r e c n and r e c a l of 0.9962 and 0.9950, respectively.
Figure 10 provides a comparative F 1 s c o r e and a c c u y inspection of the OMLIDS-PBIoT technique with existing techniques on test data. The results implied that the AKNN-IDS methodology has obtained lower F 1 s c o r e and a c c u y values of 0.9292 and 0.9199, respectively. In the meantime, the DPCDBN-IDS and DT-IDS methodologies have shown slightly improved values of F 1 s c o r e and a c c u y . Next, the PTDSAE-IDS, AB-IDS, and RF-IDS algorithms have gained moderately closer values of F 1 s c o r e and a c c u y . In accordance with this, the DBN-IDS, LSTM-IDS, and RNN-IDS methods have accomplished reasonable F 1 s c o r e and a c c u y values. Even though the AIMMFIDS system has displayed near-optimal performance with F 1 s c o r e and a c c u y of 0.9898 and 0.9936, the presented OMLIDS-PBIoT technique has accomplished higher F 1 s c o r e and a c c u y of 0.9931 and 0.9960, correspondingly.
Finally, a detailed computation time inspection of the OMLIDS-PBIoT technique with recent models takes place in Table 5. The results implied that the AKNN-IDS, DT-IDS, AB-IDS, and RF-IDS, models have shown the least performance with maximum values of TRT. Additionally, the LSTM-IDS, RNN-IDS, PTDSAE-IDS, and DPCDBN-IDS models have demonstrated moderately closer values of TRT and TST. In line with this, the DBN-IDS model has shown a reasonable TRT of 61 s. At the same time, the AIMMFIDS model has demonstrated considerable TRT of 55 s. However, the OMLIDS-PBIoT technique has accomplished superior performance with minimal TRT of 35 s.
At the same time, the AKNN-IDS, DT-IDS, AB-IDS, and RF-IDS, models have displayed the least performance with maximal values of TST. Following this, the LSTM-IDS, RNN-IDS, PTDSAE-IDS, and DPCDBN-IDS methodologies have illustrated moderately closer values of TST and TST. In compliance with this, the DBN-IDS method has shown reasonable TST of 34 s. Meanwhile, the AIMMFIDS model has demonstrated considerable TST of 25 s. However, the OMLIDS-PBIoT technique has accomplished superior performance with a minimum TST of 20 s. From the detailed outcomes and discussion, it is clear that the OMLIDS-PBIoT technique has resulted in more enhanced outcomes than other models.

5. Conclusions

In this study, an effective OMLIDS-PBIoT technique was advanced with the utilization of the BC and ML models for accomplishing security in the smart city environment. The presented OMLIDS-PBIoT technique employs different stages of subprocesses, namely pre-processing, GEO-FS, RVFL-based classification, and HBO-based parameter optimization. Moreover, BC technology is exploited for secure data transmission in the IoT-enabled smart city environment. The performance validation of the OMLIDS-PBIoT technique is performed using benchmark datasets, and the outcomes are inspected under numerous aspects. The experimental outcomes demonstrated the superiority of the OMLIDS-PBIoT technique over recent approaches. Thus, the OMLIDS-PBIoT technique could be exploited as a proficient tool to accomplish security in the smart city environment in sectors such as healthcare, smart buildings, transportation, etc. In upcoming days, the performance of the OMLIDS-PBIoT technique could be enhanced using hybrid DL classification methods.

Author Contributions

Conceptualization, A.A.-Q. and S.S.A.; methodology, F.A.; software, R.M.; validation, A.A.-Q. and M.O.; investigation, R.M.; resources, F.N.A.-W.; writing—original draft preparation, F.N.A.-W.; M.A.D. and M.A.-S.; writing—review and editing, N.N. and M.O.; visualization, M.O.; supervision, F.N.A.-W.; project administration, S.S.A.; funding acquisition, F.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups Project under grant number (71/43). Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022R77), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia. The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: 22UQU4210118DSR19.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable to this article as no datasets were generated during the current study.

Conflicts of Interest

The authors declare that they have no conflict of interest. The manuscript was written through contributions of all authors.

References

  1. Li, D.; Cai, Z.; Deng, L.; Yao, X.; Wang, H.H. Information security model of block chain based on intrusion sensing in the IoT environment. Clust. Comput. 2019, 22, 451–468. [Google Scholar] [CrossRef]
  2. Rathee, G.; Iqbal, R.; Waqar, O.; Bashir, A.K. On the design and implementation of a blockchain enabled e-voting application within iot-oriented smart cities. IEEE Access 2021, 9, 34165–34176. [Google Scholar] [CrossRef]
  3. Mukherjee, P.; Barik, R.K.; Pradhan, C. A comprehensive proposal for blockchain-oriented smart city. In Security and Privacy Applications for Smart City Development; Springer: Cham, Switzerland, 2021; pp. 55–87. [Google Scholar]
  4. Banerjee, M.; Lee, J.; Choo, K.K.R. A blockchain future for internet of things security: A position paper. Digit. Commun. Netw. 2018, 4, 149–160. [Google Scholar] [CrossRef]
  5. Singh, S.K.; Azzaoui, A.E.; Kim, T.W.; Pan, Y.; Park, J.H. DeepBlockScheme: A deep learning-based blockchain driven scheme for secure smart city. Hum.-Cent. Comput. Inf. Sci 2021, 11, 12. [Google Scholar]
  6. Liang, C.; Shanmugam, B.; Azam, S.; Karim, A.; Islam, A.; Zamani, M.; Kavianpour, S.; Idris, N.B. Intrusion detection system for the internet of things based on blockchain and multi-agent systems. Electronics 2020, 9, 1120. [Google Scholar] [CrossRef]
  7. Khan, M.A.; Abbas, S.; Rehman, A.; Saeed, Y.; Zeb, A.; Uddin, M.I.; Nasser, N.; Ali, A. A machine learning approach for blockchain-based smart home networks security. IEEE Netw. 2020, 35, 223–229. [Google Scholar] [CrossRef]
  8. Shen, M.; Tang, X.; Zhu, L.; Du, X.; Guizani, M. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J. 2019, 6, 7702–7712. [Google Scholar] [CrossRef]
  9. Singh, S.; Sharma, P.K.; Yoon, B.; Shojafar, M.; Cho, G.H.; Ra, I.H. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustain. Cities Soc. 2020, 63, 102364. [Google Scholar] [CrossRef]
  10. Kumar, P.; Gupta, G.P.; Tripathi, R. TP2SF: A Trustworthy Privacy-Preserving Secured Framework for sustainable smart cities by leveraging blockchain and machine learning. J. Syst. Archit. 2021, 115, 101954. [Google Scholar] [CrossRef]
  11. Kumar, P.; Kumar, R.; Srivastava, G.; Gupta, G.P.; Tripathi, R.; Gadekallu, T.R.; Xiong, N.N. PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2326–2341. [Google Scholar] [CrossRef]
  12. Meng, W.; Li, W.; Tug, S.; Tan, J. Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities. J. Parallel Distrib. Comput. 2020, 144, 268–277. [Google Scholar] [CrossRef]
  13. Bediya, A.K.; Kumar, R. A novel intrusion detection system for internet of things network security. J. Inf. Technol. Res. 2021, 14, 20–37. [Google Scholar] [CrossRef]
  14. Rathore, S.; Kwon, B.W.; Park, J.H. BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network. J. Netw. Comput. Appl. 2019, 143, 167–177. [Google Scholar] [CrossRef]
  15. Botello, J.V.; Mesa, A.P.; Rodríguez, F.A.; Díaz-López, D.; Nespoli, P.; Mármol, F.G. BlockSIEM: Protecting smart city services through a blockchain-based and distributed SIEM. Sensors 2020, 20, 4636. [Google Scholar] [CrossRef] [PubMed]
  16. Aujla, G.S.; Singh, M.; Bose, A.; Kumar, N.; Han, G.; Buyya, R. Blocksdn: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Netw. 2020, 34, 83–91. [Google Scholar] [CrossRef]
  17. Peneti, S.; Sunil Kumar, M.; Kallam, S.; Patan, R.; Bhaskar, V.; Ramachandran, M. BDN-GWMNN: Internet of things (IoT) enabled secure smart city applications. Wirel. Pers. Commun. 2021, 119, 2469–2485. [Google Scholar] [CrossRef]
  18. Alohali, M.A.; Al-Wesabi, F.N.; Hilal, A.M.; Goel, S.; Gupta, D.; Khanna, A. Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment. Cogn. Neurodyn. 2022. [Google Scholar] [CrossRef]
  19. Al-Wesabi, F.N.; Obayya, M.; Hamza, M.A.; Alzahrani, J.S.; Gupta, D.; Kumar, S. Energy Aware Resource Optimization using Unified Metaheuristic Optimization Algorithm Allocation for Cloud Computing Environment. Sustain. Comput. Inform. Syst. 2022, 35, 100686. [Google Scholar] [CrossRef]
  20. Bach, L.M.; Mihaljevic, B.; Zagar, M. Comparative analysis of blockchain consensus algorithms. In Proceedings of the 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 21–25 May 2018; pp. 1545–1550. [Google Scholar]
  21. Amor, N.; Noman, M.T.; Petru, M.; Sebastian, N. Comfort evaluation of ZnO coated fabrics by artificial neural network assisted with golden eagle optimizer model. Sci. Rep. 2022, 12, 6350. [Google Scholar] [CrossRef]
  22. Hussien, A.G.; Houssein, E.H.; Hassanien, A.E. A binary whale optimization algorithm with hyperbolic tangent fitness function for feature selection. In Proceedings of the 2017 Eighth International Conference on Intelligent Computing and Information Systems (ICICIS), Cairo, Egypt, 5–7 December 2017; pp. 166–172. [Google Scholar]
  23. Shi, Q.; Katuwal, R.; Suganthan, P.N.; Tanveer, M. Random vector functional link neural network based ensemble deep learning. Pattern Recognit. 2021, 117, 107978. [Google Scholar] [CrossRef]
  24. Askari, Q.; Saeed, M.; Younas, I. Heap-based optimizer inspired by corporate rank hierarchy for global optimization. Expert Syst. Appl. 2020, 161, 113702. [Google Scholar] [CrossRef]
Figure 1. Blockchain in IoT with smart cities environment.
Figure 1. Blockchain in IoT with smart cities environment.
Applsci 12 05893 g001
Figure 2. Structure of RVFL.
Figure 2. Structure of RVFL.
Applsci 12 05893 g002
Figure 3. Result analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Figure 3. Result analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Applsci 12 05893 g003
Figure 4. TA and VA analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Figure 4. TA and VA analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Applsci 12 05893 g004
Figure 5. TL and VL analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Figure 5. TL and VL analysis of OMLIDS-PBIoT technique under NSL-KDD dataset.
Applsci 12 05893 g005
Figure 6. Result analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Figure 6. Result analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Applsci 12 05893 g006
Figure 7. TA and VA analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Figure 7. TA and VA analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Applsci 12 05893 g007
Figure 8. TL and VL analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Figure 8. TL and VL analysis of OMLIDS-PBIoT technique under UNSW-NB15 dataset.
Applsci 12 05893 g008
Figure 9. P r e c n and r e c a l analysis of OMLIDS-PBIoT technique with existing approaches.
Figure 9. P r e c n and r e c a l analysis of OMLIDS-PBIoT technique with existing approaches.
Applsci 12 05893 g009
Figure 10. F 1 s c o r e and a c c u y analysis of OMLIDS-PBIoT technique with existing approaches.
Figure 10. F 1 s c o r e and a c c u y analysis of OMLIDS-PBIoT technique with existing approaches.
Applsci 12 05893 g010
Table 1. Results analysis of OMLIDS-PBIoT based FS on applied dataset.
Table 1. Results analysis of OMLIDS-PBIoT based FS on applied dataset.
DatasetBest CostSelected Features
NSL-KDD0.0022181, 2, 5, 6, 8, 21, 23, 26, 29, 31, 33, 34, 37
UNSW-NB150.0030951, 3, 4, 7, 11, 17, 18, 20, 21, 25, 27, 28, 30, 31, 32, 34, 38, 39, 40, 42
Table 2. Result analysis of OMLIDS-PBIoT technique on NSL-KDD dataset.
Table 2. Result analysis of OMLIDS-PBIoT technique on NSL-KDD dataset.
Attack TypePrecisionRecallF1-ScoreAccuracy
DoS99.3099.5099.6499.57
R2L99.5398.5299.1899.21
Probe98.5499.5399.4499.68
U2R99.8999.1298.4599.54
Normal98.6598.8498.7499.07
Average99.1899.1099.0999.41
Table 3. Result analysis of OMLIDS-PBIoT technique on UNSW-NB15 dataset.
Table 3. Result analysis of OMLIDS-PBIoT technique on UNSW-NB15 dataset.
Attack TypePrecisionRecallF1-ScoreAccuracy
Normal99.7299.1199.5499.49
DoS99.6999.3399.5499.74
Shellcode99.7499.6199.7099.50
Backdoor99.5899.7898.7899.67
Generic99.5899.4899.8099.73
Exploits99.4199.3999.5199.63
Fuzzers99.6099.4398.5899.54
Reconnaissance99.7399.6399.4599.53
Analysis99.4199.8099.5599.56
Worms99.7399.4898.6099.65
Average99.6299.5099.3199.60
Table 4. Comparative analysis of OMLIDS-PBIoT method with existing approaches.
Table 4. Comparative analysis of OMLIDS-PBIoT method with existing approaches.
MethodsPrecisionRecallF1-ScoreAccuracy
OMLIDS-PBIoT0.99620.99500.99310.9960
AIMMFIDS0.99460.99070.98980.9936
DBN-IDS0.98670.98830.98970.9874
LSTM-IDS0.98450.98570.98910.9863
RNN-IDS0.98230.98680.98750.9852
PTDSAE-IDS0.97910.98650.98600.9849
DPCDBN-IDS0.95120.94990.95080.9498
AKNN-IDS0.92190.93760.92920.9199
DT-IDS0.96590.92840.95420.9365
AB-IDS0.97420.93210.95680.9587
RF-IDS0.97560.93840.95920.9598
Table 5. TRT and TST analysis of OMLIDS-PBIoT technique with existing algorithms.
Table 5. TRT and TST analysis of OMLIDS-PBIoT technique with existing algorithms.
MethodsTraining Time (s)Testing Time (s)
OMLIDS-PBIoT3520
AIMMFIDS5525
DBN-IDS6134
LSTM-IDS6834
RNN-IDS6935
PTDSAE-IDS7136
DPCDBN-IDS7337
AKNN-IDS7942
DT-IDS8045
AB-IDS8143
RF-IDS8345
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Al-Qarafi, A.; Alrowais, F.; S. Alotaibi, S.; Nemri, N.; Al-Wesabi, F.N.; Al Duhayyim, M.; Marzouk, R.; Othman, M.; Al-Shabi, M. Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment. Appl. Sci. 2022, 12, 5893. https://doi.org/10.3390/app12125893

AMA Style

Al-Qarafi A, Alrowais F, S. Alotaibi S, Nemri N, Al-Wesabi FN, Al Duhayyim M, Marzouk R, Othman M, Al-Shabi M. Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment. Applied Sciences. 2022; 12(12):5893. https://doi.org/10.3390/app12125893

Chicago/Turabian Style

Al-Qarafi, A., Fadwa Alrowais, Saud S. Alotaibi, Nadhem Nemri, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Radwa Marzouk, Mahmoud Othman, and M. Al-Shabi. 2022. "Optimal Machine Learning Based Privacy Preserving Blockchain Assisted Internet of Things with Smart Cities Environment" Applied Sciences 12, no. 12: 5893. https://doi.org/10.3390/app12125893

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop