Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Internet of Things Journal Pub Date : 2025-01-28 DOI:10.1109/JIOT.2025.3535792
Bui Duc Manh;Chi-Hieu Nguyen;Dinh Thai Hoang;Diep N. Nguyen;Ming Zeng;Quoc-Viet Pham
{"title":"Privacy-Preserving Cyberattack Detection in Blockchain-Based IoT Systems Using AI and Homomorphic Encryption","authors":"Bui Duc Manh;Chi-Hieu Nguyen;Dinh Thai Hoang;Diep N. Nguyen;Ming Zeng;Quoc-Viet Pham","doi":"10.1109/JIOT.2025.3535792","DOIUrl":null,"url":null,"abstract":"This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet of Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategically deployed at blockchain nodes (BNs) to identify real-time attacks, ensuring high accuracy and minimal delay. To achieve this efficiency, the model training is conducted by a cloud service provider (CSP). Accordingly, BNs send their data to the CSP for training, but to safeguard privacy, the data is encrypted using homomorphic encryption (HE) before transmission. This encryption method allows the CSP to perform computations directly on encrypted data without the need for decryption, preserving data privacy throughout the learning process. To handle the substantial volume of encrypted data, we introduce an innovative packing algorithm in a single-instruction-multiple-data (SIMD) manner, enabling efficient training on HE-encrypted data. Building on this, we develop a novel deep neural network training algorithm optimized for encrypted data. We further propose a privacy-preserving distributed learning approach based on the FedAvg algorithm, which parallelizes the training across multiple workers, significantly improving computation time. Upon completion, the CSP distributes the trained model to the BNs, enabling them to perform real-time, privacy-preserved detection. Our simulation results demonstrate that our proposed method can not only mitigate the training time but also achieve detection accuracy that is approximately identical to the approach without encryption, with a gap of around 0.01%. Additionally, our real implementations on various blockchain consensus algorithms and hardware configurations show that our proposed framework can also be effectively adapted to real-world systems.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 11","pages":"16478-16492"},"PeriodicalIF":8.9000,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10856250/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This work proposes a novel privacy-preserving cyberattack detection framework for blockchain-based Internet of Things (IoT) systems. In our approach, artificial intelligence (AI)-driven detection modules are strategically deployed at blockchain nodes (BNs) to identify real-time attacks, ensuring high accuracy and minimal delay. To achieve this efficiency, the model training is conducted by a cloud service provider (CSP). Accordingly, BNs send their data to the CSP for training, but to safeguard privacy, the data is encrypted using homomorphic encryption (HE) before transmission. This encryption method allows the CSP to perform computations directly on encrypted data without the need for decryption, preserving data privacy throughout the learning process. To handle the substantial volume of encrypted data, we introduce an innovative packing algorithm in a single-instruction-multiple-data (SIMD) manner, enabling efficient training on HE-encrypted data. Building on this, we develop a novel deep neural network training algorithm optimized for encrypted data. We further propose a privacy-preserving distributed learning approach based on the FedAvg algorithm, which parallelizes the training across multiple workers, significantly improving computation time. Upon completion, the CSP distributes the trained model to the BNs, enabling them to perform real-time, privacy-preserved detection. Our simulation results demonstrate that our proposed method can not only mitigate the training time but also achieve detection accuracy that is approximately identical to the approach without encryption, with a gap of around 0.01%. Additionally, our real implementations on various blockchain consensus algorithms and hardware configurations show that our proposed framework can also be effectively adapted to real-world systems.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链的物联网系统中使用AI和同态加密的隐私保护网络攻击检测
这项工作为基于区块链的物联网(IoT)系统提出了一种新的保护隐私的网络攻击检测框架。在我们的方法中,人工智能(AI)驱动的检测模块战略性地部署在区块链节点(bn)上,以识别实时攻击,确保高精度和最小延迟。为了达到这种效率,模型训练由云服务提供商(CSP)进行。因此,bn将数据发送给CSP进行训练,但为了保护隐私,数据在传输前使用同态加密(HE)加密。这种加密方法允许CSP直接在加密数据上执行计算,而不需要解密,在整个学习过程中保护数据隐私。为了处理大量的加密数据,我们引入了一种创新的单指令多数据(SIMD)打包算法,实现了对he加密数据的高效训练。在此基础上,我们开发了一种针对加密数据优化的新型深度神经网络训练算法。我们进一步提出了一种基于fedag算法的隐私保护分布式学习方法,该方法可以跨多个工作者并行训练,显著提高了计算时间。完成后,CSP将训练好的模型分发给bp,使它们能够执行实时的、隐私保护的检测。仿真结果表明,该方法不仅可以减少训练时间,而且可以获得与未加密方法大致相同的检测精度,差距约为0.01%。此外,我们在各种区块链共识算法和硬件配置上的实际实现表明,我们提出的框架也可以有效地适应现实世界的系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
期刊最新文献
Bio-inspired Collaborative Navigation Method of Leader-Follower AUVs Based on Composite Spatial Navigation Cells: Granule cell and Time cell Unlocking Ultra-Low-Power Bluetooth Low Energy Relays with Periodic Advertisements Channel Knowledge Map Assisted Underwater Acoustic Communication Network Using Normal Mode Model Robust Hyperchaotic Attractor Based Image Encryption and FPGA Implementation MTNet: A Mixed Transformer Network for High-Quality 3D Object Detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1