Skip to main content
Log in

Intrusion detection in cyber-physical system using rsa blockchain technology

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Connected cyber and physical elements exchange information through feedback in a cyber-physical system (CPS). Since CPS oversees the infrastructure, it is an integral part of modern living and is viewed as crucial to the development of cutting-edge smart devices. As the number of CPSs rises, so does the need for intrusion detection systems (IDS). The use of metaheuristic methods and Artificial Intelligence for feature selection and classification can offer solutions to some of the problems caused by the curse of dimensionality. In this research, we present a blockchain-based approach to data security in which blocks are generated using the RSA hashing method. Using Differential Evolution (DE), we first select the blockchain-secured data, and then we partition that data into train and testing datasets to use for training and testing our model. It is also permitted for the validated model to use a deep belief network (DBN) to predict attacks. The purpose of the simulation is to evaluate the safety and precision of the classifications. It turns out that the proposed strategy not only improves classification accuracy but also makes the data more resistant to attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Khan R, Mehmood A, Iqbal Z, Maple C, Epiphaniou G (2023) Security and privacy in connected vehicle cyber-physical system using zero-knowledge succinct non-interactive argument of knowledge over blockchain. Appl Sci 13(3):1959

    Article  Google Scholar 

  2. Kariri E (2022) IoT powered agricultural cyber-physical system: Security issue assessment. IETE J Res 1–11

  3. Lakhan A, Mohammed MA, Nedoma J, Martinek R, Tiwari P, Kumar N (2022) Blockchain-Enabled cybersecurity efficient iioht cyber-physical system for medical applications. IEEE Trans Network Sci Eng

  4. Khalil AA, Franco J, Parvez I, Uluagac S, Shahriar H, Rahman MA (2022). A literature review on blockchain-enabled security and operation of cyber-physical systems. In: 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (1774–1779). IEEE

  5. Almajed R, Ibrahim A, Abualkishik AZ, Mourad N, Almansour FA (2022) Using machine learning algorithm for detection of cyber-attacks in cyber-physical systems. Period Eng Nat Sci 10(3):261–275

    Google Scholar 

  6. Evsutin O, Melman A, Abd El-Latif AA (2022) Overview of information hiding algorithms for ensuring security in IoT-based cyber-physical systems. Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions, 81–115

  7. Yuvaraj N, Srihari K, Dhiman G, Somasundaram K, Sharma A, Rajeskannan SMGSMA, Masud M (2021) Nature-inspired-based approach for automated cyberbullying classification on multimedia social networking. Math Probl Eng 2021:1–12

    Article  Google Scholar 

  8. Trivedi RS, Patel SJ (2022) Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS). In: Handbook of Research of Internet of Things and Cyber-Physical Systems (453–490). Apple Academic Press

  9. Ghrabat MJJ, Ma G, Abduljabbar ZA, Al Sibahee MA, Jassim SJ (2019) Greedy learning of deep boltzmann machine (GDBM)’s variance and search algorithm for efficient image retrieval. IEEE Access 7:169142–169159

    Article  Google Scholar 

  10. Hannah S, Deepa AJ, Chooralil VS, BrillySangeetha S, Arshad Raja R, Alene A (2022) Blockchain-based deep learning to process IoT data acquisition in cognitive data. BioMed Res Int 2022

  11. Chang V, Gobinathan B, Pinagapani A, Kannan S, Dhiman G, Rajan AR (2021) Automatic detection of cyberbullying using multi-feature-based artificial intelligence with deep decision tree classification. Comput Electr Eng 92:107186

    Article  Google Scholar 

  12. Afanasev MY, Fedosov YV, Krylova AA, Shorokhov SA (2018). An application of blockchain and smart contracts for machine-to-machine communications in cyber-physical production systems In: 2018 IEEE Industrial Cyber-Physical Systems (ICPS) (13–19). IEEE

  13. Lv P, Wang L, Zhu H, Deng W, Gu L (2019) An IoT-oriented privacy-preserving publish/subscribe model over blockchains. IEEE Access 7:41309–41314

    Article  Google Scholar 

  14. Koumidis K, Kolios P, Ellinas G, Panayiotou CG (2019) Secure event logging using a blockchain of heterogeneous computing resources. In 2019 IEEE Global Communications Conference (GLOBECOM) (1–6). IEEE

  15. Boucher O, Aloqaily M, Tseng L, Boukerche A (2020) Blockchain and fog computing for cyber-physical systems: The case of smart industry. Computer 53(9):36–45

    Article  Google Scholar 

  16. Wang D, Zhao N, Song B, Lin P, Yu FR (2021) Resource management for secure computation offloading in software cyber–physical systems. IEEE Internet Things J 8(11):9294–9304

    Article  Google Scholar 

  17. Zhao Y, Li Y, Mu Q, Yang B, Yu Y (2018) Secure pub-sub: Blockchain-based fair payment with a reputation for reliable cyber-physical systems. IEEE Access 6:12295–12303

    Article  Google Scholar 

  18. Teslya N, Smirnov A (2018) Blockchain-based framework for ontology-oriented robots' coalition formation in cyber-physical systems. In MATEC Web of Conferences 161:03018. EDP Sciences.

  19. Tyagi AK, Sreenath N (2021) Cyber-physical systems: analyses, challenges and possible solutions, internet of things and cyber-physical systems. 1;22–33 ISSN 2667–3452, https://doi.org/10.1016/j.iotcps.2021.12.002

  20. Nair MM, Tyagi AK, Goyal R (2019) Medical cyber-physical systems and its issues. Procedia Comput Sci 165:647–655. https://doi.org/10.1016/j.procs.2020.01.059,ISSN1877-0509

    Article  Google Scholar 

  21. Ahmed E (2021) Intelligent intrusion detection system based on deep learning algorithms. Future Comput Inf J 6(1):1–11

    Google Scholar 

  22. Jiang S, Li Z, Yang M, Li Q, Li X, Zhao L (2021) An intrusion detection system based on GAN and LSTM for industrial IoT networks. Comput Electr Eng 92:107137

    Google Scholar 

  23. Alhalafi A, Alharthi N, Alabdulwahab A, Alshahrani A (2021) A Survey on Intrusion Detection Systems in Blockchain: Opportunities and Challenges. IEEE Access 9:123372–123389

    Google Scholar 

  24. Jia Y, Fan S, Xu J, Wang H (2021) Blockchain-based Intrusion Detection for Industrial Control Systems. IEEE Trans Industr Inf 17(11):7469–7478

    Google Scholar 

  25. Ksiksi T, Darwish A, Al-Mahasneh T, Gharaibeh A (2021) A lightweight blockchain-based intrusion detection system for industrial internet of things. IEEE Access 9:122337–122348

    Google Scholar 

  26. Akay B, Karaboga D (2021) A comprehensive survey on differential evolution: algorithm, variants, and applications. Swarm Evol Comput 61:100866

    Google Scholar 

  27. Saleem S, Saeed R, Shafique M, Riaz M (2021) A Hybrid differential evolution and modified harmony search algorithm for solving nonlinear optimization problems. Eng Appl Artif Intell 105:104202

    Google Scholar 

  28. Gontara S, Boufaied A, Korbaa O (2019) A unified approach for selecting probes and probing stations for fault detection and localization in computer networks. SMC 2071–2076

  29. Jemili F (2022) Intelligent intrusion detection based on fuzzy big data classification. Cluster Comput. https://doi.org/10.1007/s10586-022-03769-y

    Article  Google Scholar 

  30. Zhang G, Chen X, Zhang L, Feng B, Guo X, Liang J, Zhang Y (2022) STAIBT: Blockchain and cp-abe empowered secure and trusted agricultural iot blockchain terminal. Int J Interact Multimed Artif Intell 7, issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence (5):66–75. https://doi.org/10.9781/ijimai.2022.07.004

  31. Zhu X, Deng H (2022) A security situation awareness approach for iot software chain based on markov game model. Int J Interact Multimed Artif Intell 7 issue Special Issue on Multimedia Streaming and Processing in Internet of Things with Edge Intelligence 5:59–65. https://doi.org/10.9781/ijimai.2022.08.002

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farah Jemili.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aljabri, A., Jemili, F. & Korbaa, O. Intrusion detection in cyber-physical system using rsa blockchain technology. Multimed Tools Appl 83, 48119–48140 (2024). https://doi.org/10.1007/s11042-023-17576-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17576-z

Keywords

Navigation