خلاصه
1. مقدمه
2. بررسی ادبیات
3. روش پیشنهادی
4. نتایج شبیه سازی
5. نتیجه گیری ها
منابع
Abstract
1. Introduction
2. Literature Review
3. Proposed Methodology
4. Simulation Results
5. Conclusions
References
چکیده
امنیت و حریم خصوصی در اینترنت اشیا (IoT) چالش های مهم دیگر، در درجه اول به دلیل مقیاس گسترده و استقرار شبکه های IoT است. راه حل های مبتنی بر بلاک چین از حفاظت و حریم خصوصی غیرمتمرکز پشتیبانی می کنند. در این مطالعه، یک معماری شبکه خانه هوشمند مبتنی بر بلاک چین خصوصی برای تخمین تشخیص نفوذ با یک مدل سیستم ماشین یادگیری عمیق متوالی در زمان واقعی ترکیب شده (RTS-DELM) پیشنهاد شده است. این مطالعه روش RTS-DELM اجرا شده در خانه های هوشمند مبتنی بر بلاک چین را برای شناسایی هرگونه فعالیت مخرب بررسی می کند. رویکرد ادغام داده ها و تکنیک ادغام سطح تصمیم نیز برای دستیابی به دقت افزایش یافته اجرا می شود. این مطالعه مولفهها و ویژگیهای کلیدی متعدد چارچوب شبکه خانه هوشمند را به طور گستردهتری بررسی میکند. تکنیک Fused RTS-DELM به سطح بسیار قابل توجهی از پایداری با نرخ خطای کم برای هرگونه فعالیت نفوذی در شبکههای خانه هوشمند دست مییابد. یافتههای شبیهسازی نشان میدهد که این تکنیک پیشنهادی با موفقیت شبکههای خانه هوشمند را برای نظارت و شناسایی فعالیتهای مضر یا مزاحم بهینه میکند.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
Security and privacy in the Internet of Things (IoT) other significant challenges, primarily because of the vast scale and deployment of IoT networks. Blockchain-based solutions support decentralized protection and privacy. In this study, a private blockchain-based smart home network architecture for estimating intrusion detection empowered with a Fused Real-Time Sequential Deep Extreme Learning Machine (RTS-DELM) system model is proposed. This study investigates the methodology of RTS-DELM implemented in blockchain-based smart homes to detect any malicious activity. The approach of data fusion and the decision level fusion technique are also implemented to achieve enhanced accuracy. This study examines the numerous key components and features of the smart home network framework more extensively. The Fused RTS-DELM technique achieves a very significant level of stability with a low error rate for any intrusion activity in smart home networks. The simulation findings indicate that this suggested technique successfully optimizes smart home networks for monitoring and detecting harmful or intrusive activities.
Introduction
A smart home is connected to the Internet, allowing users to manage a variety of smart gadgets, each of which serves an important purpose in the home for the user and their family. The IoT is the foundation of an intelligent home network, connecting disparate intelligent devices such as smartphones, smart computers, and wearable devices. Citizens’ lives can be made easier and safer by making their homes more open and secure. The smart home provides useful resources such as monitoring habits and even safety tests, which have compelled consumers and system developers to conduct extensive research.
Blockchain-type systems and unified “cloud-like” computing networks can be used to solve these problems. Blockchain was developed in 2008 by Satoshi Nakamoto and includes a time-stamped set of malicious evidence documentation managed by a network of autonomous networks [1]. Blockchain architecture consists of a series of blocks linked together by simple cryptography. The three main concepts underlying the operation of blockchain technologies are inflexibility, decentralization, and transparency. The three roles have been remarkably effective, exposing them to a wide range of digital currency technologies, such as the functionality of mobile vehicles, mobile phones, and embedded systems. While the blockchain platform is secure and anonymous, there are some issues with its current implementation. For example, Sybil attacks by generations of false identities to manipulate the community have become more complex.
Conclusions
In this study, the idea of a smart contract in blockchain technology is employed to validate the user’s identity for accessibility to centralized smart home services. The most significant benefit of this research is the demonstration of how easy it is to receive facilities and how secure the resources are. There is no need to have redundant authentication because no other third-party users can access smart home systems, even if another user tries to access an already used resource. Intrusion detection in smart homes, especially in the context of assessment and prediction, remains a key concern. In the meantime, recent advances in the blockchain and machine learning sectors have demonstrated tremendous promise to accomplish these aims. Discussing the need for an efficient approach, this study provided a compact and efficient mechanism for intrusion prevention. An RTS-DELM approach was developed, and also data fusion techniques were presented to optimize multi-sensor networks. Numerous measures were used to assess the feasibility of the proposal. The consistency of RTS-DELM findings showed that the proposed method is more successful than others. The suggested RTS-DELM solution obtained an exceptionally high rate of success, showing 95.28% accuracy. The findings obtained are encouraging, and we will continue to investigate more applications for the device through the deployment of more datasets and varying frameworks.