BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology

IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Transactions on Emerging Telecommunications Technologies Pub Date : 2025-01-06 DOI:10.1002/ett.70037
Kavitha Dhanushkodi, Kiruthika Venkataramani, Naghul Pranav K R, Ravikumar Sethuraman
{"title":"BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology","authors":"Kavitha Dhanushkodi,&nbsp;Kiruthika Venkataramani,&nbsp;Naghul Pranav K R,&nbsp;Ravikumar Sethuraman","doi":"10.1002/ett.70037","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.</p>\n </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.70037","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource-constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End-to-End Blockchain (BGHO-E2EB) model, designed to detect and classify cyberattacks within IoT environments. Unlike preventive approaches, the developed model focuses on real-time detection and categorization of attacks, enabling timely responses to emerging threats. The proposed model integrates blockchain technology through Ethereum-based smart contracts to enhance the security and integrity of data exchanges within IoT networks. Additionally, a Gaussian Artificial Hummingbird Algorithm is employed for optimal feature selection, minimizing data dimensionality and computational load. A Bidirectional Long Short-Term Memory (Bi-LSTM) network further improves the model's capability by accurately detecting and categorizing cyber threats based on selected features. The Adam optimizer is used for efficient parameter tuning within the Bi-LSTM network, ensuring high-performance cyberattack detection. The proposed model was evaluated using established IoT security benchmarks, including the UNSW-NB15, BOT-IoT, and NSL-KDD datasets, accomplishing an accuracy of 98.7%, precision of 96.3%, and security level of 99.5%, significantly outperforming traditional methods. These results demonstrate the effectiveness of BGHO-E2EB as a robust tool for detecting and classifying cyberattacks in IoT networks, making it suitable for real-world deployment in dynamic IoT environments where security is paramount.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
8.90
自引率
13.90%
发文量
249
期刊介绍: ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims: - to attract cutting-edge publications from leading researchers and research groups around the world - to become a highly cited source of timely research findings in emerging fields of telecommunications - to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish - to become the leading journal for publishing the latest developments in telecommunications
期刊最新文献
Energy Efficient LoRa-Based AIoT Setup for Human Movement Classification Flight Evolution: Decoding Autonomous UAV Navigation—Fundamentals, Taxonomy, and Challenges Issue Information TwoFish-Integrated Blockchain for Secure and Optimized Healthcare Data Processing in IoT-Edge-Cloud System Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1