15 research outputs found

    F-LSTM: Federated learning-based LSTM framework for cryptocurrency price prediction

    Get PDF
    In this paper, a distributed machine-learning strategy, i.e., federated learning (FL), is used to enable the artificial intelligence (AI) model to be trained on dispersed data sources. The paper is specifically meant to forecast cryptocurrency prices, where a long short-term memory (LSTM)-based FL network is used. The proposed framework, i.e., F-LSTM utilizes FL, due to which different devices are trained on distributed databases that protect the user privacy. Sensitive data is protected by staying private and secure by sharing only model parameters (weights) with the central server. To assess the effectiveness of F-LSTM, we ran different empirical simulations. Our findings demonstrate that F-LSTM outperforms conventional approaches and machine learning techniques by achieving a loss minimal of 2.3×10−4 2.3 \times 10^{-4} . Furthermore, the F-LSTM uses substantially less memory and roughly half the CPU compared to a solely centralized approach. In comparison to a centralized model, the F-LSTM requires significantly less time for training and computing. The use of both FL and LSTM networks is responsible for the higher performance of our suggested model (F-LSTM). In terms of data privacy and accuracy, F-LSTM addresses the shortcomings of conventional approaches and machine learning models, and it has the potential to transform the field of cryptocurrency price prediction

    Blockchain-based secure and intelligent data dissemination framework for UAVs in battlefield applications

    Get PDF
    The modern warfare scenario has immense challenges that can risk personnel's lives, highlighting the need for data acquisition to win a military operation successfully. In this context, unmanned aerial vehicles (UAVs) play a significant role by covertly acquiring reconnaissance data from an enemy location to make the friendly troops aware. The acquired data is mission-critical and needs to be secured from the intruders, which can implicitly manipulate it for their benefit. Moreover, UAVs collect a large amount of data, including high-definition images and surveillance videos; handling such a massive amount of data is a bottleneck on traditional communication networks. To mitigate these issues, this article proposes a blockchain and machine learning (ML)-based secure and intelligent UAV communication underlying sixth-generation (6G) networks, that is, Block-USB. The proposed system refrain the disclosure of highly-sensitive military operations from intruders (either a rogue UAV or a malicious controller). The proposed system uses off-chain storage, that is, Interplanetary file system (IPFS), to improve the blockchain storage capacity. We also present a case study on securing UAV-based military operations by considering multiple scenarios considering controller/UAV malicious. The performance of the proposed system outperforms the traditional baseline 4G/5G and non IPFS-based systems in terms of classification accuracy, communication latency, and data scalability

    A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network

    No full text
    Over the last few decades, the healthcare industry has continuously grown, with hundreds of thousands of patients obtaining treatment remotely using smart devices. Data security becomes a prime concern with such a massive increase in the number of patients. Numerous attacks on healthcare data have recently been identified that can put the patient’s identity at stake. For example, the private data of millions of patients have been published online, posing a severe risk to patients’ data privacy. However, with the advent of Industry 4.0, medical practitioners can digitally assess the patient’s condition and administer prompt prescriptions. However, wearable devices are also vulnerable to numerous security threats, such as session hijacking, data manipulation, and spoofing attacks. Attackers can tamper with the patient’s wearable device and relays the tampered data to the concerned doctor. This can put the patient’s life at high risk. Since blockchain is a transparent and immutable decentralized system, it can be utilized for securely storing patient’s wearable data. Artificial Intelligence (AI), on the other hand, utilizes different machine learning techniques to classify malicious data from an oncoming stream of patient’s wearable data. An amalgamation of these two technologies would make the possibility of tampering the patient’s data extremely difficult. To mitigate the aforementioned issues, this paper proposes a blockchain and AI-envisioned secure and trusted framework (HEART). Here, Long-Short Term Model (LSTM) is used to classify wearable devices as malicious or non-malicious. Then, we design a smart contract that allows only of those patients’ data having a wearable device to be classified as non-malicious to the public blockchain network. This information is then accessible to all involved in the patient’s care. We then evaluate the HEART’s performance considering various evaluation metrics such as accuracy, recall, precision, scalability, and network latency. On the training and testing sets, the model achieves accuracies of 93% and 92.92%, respectively

    A Trustworthy Healthcare Management Framework Using Amalgamation of AI and Blockchain Network

    No full text
    Over the last few decades, the healthcare industry has continuously grown, with hundreds of thousands of patients obtaining treatment remotely using smart devices. Data security becomes a prime concern with such a massive increase in the number of patients. Numerous attacks on healthcare data have recently been identified that can put the patient’s identity at stake. For example, the private data of millions of patients have been published online, posing a severe risk to patients’ data privacy. However, with the advent of Industry 4.0, medical practitioners can digitally assess the patient’s condition and administer prompt prescriptions. However, wearable devices are also vulnerable to numerous security threats, such as session hijacking, data manipulation, and spoofing attacks. Attackers can tamper with the patient’s wearable device and relays the tampered data to the concerned doctor. This can put the patient’s life at high risk. Since blockchain is a transparent and immutable decentralized system, it can be utilized for securely storing patient’s wearable data. Artificial Intelligence (AI), on the other hand, utilizes different machine learning techniques to classify malicious data from an oncoming stream of patient’s wearable data. An amalgamation of these two technologies would make the possibility of tampering the patient’s data extremely difficult. To mitigate the aforementioned issues, this paper proposes a blockchain and AI-envisioned secure and trusted framework (HEART). Here, Long-Short Term Model (LSTM) is used to classify wearable devices as malicious or non-malicious. Then, we design a smart contract that allows only of those patients’ data having a wearable device to be classified as non-malicious to the public blockchain network. This information is then accessible to all involved in the patient’s care. We then evaluate the HEART’s performance considering various evaluation metrics such as accuracy, recall, precision, scalability, and network latency. On the training and testing sets, the model achieves accuracies of 93% and 92.92%, respectively

    Blockchain Adoption to Secure the Food Industry: Opportunities and Challenges

    No full text
    With the growth in food products’ usage, ensuring their quality and safety has become progressively difficult. Specifically, food traceability turns out to be a very critical task for retailers, sellers, consumers, surveillance authorities, and other stakeholders in the food supply chain system. There are requirements for food authenticity verification (correct declaration of cultivation, origin, and variety), quality checks (e.g., justification for higher prices), and preventing food products from fraudsters in the food industry. The ubiquitous and promising technology of blockchain ensures the traceability of food trade networks with high potential and handles the aforementioned issues. Blockchain makes the food industry more transparent at all levels by storing data immutably and enabling quick tracking across the stages of the food supply chain. Hence, commodities, stakeholders, and semi-finished food items can be recognized significantly faster. Motivated by these facts, in this paper, we present an in-depth survey of state-of-the-art approaches to the food industry’s security, food traceability, and food supply chain management. Further, we propose a blockchain-based secure and decentralized food industry architecture to alleviate security and privacy aspects and present a comprehensive solution taxonomy for a blockchain-based food industry. Then, a comparative analysis of existing approaches with respect to various parameters, i.e., scalability, latency, and food quality, is presented, which facilitates the end-user in selecting approaches based on the merits over other approaches. Finally, we provide insights into the open issues and research challenges with concluding remarks

    GRADE: Deep learning and garlic routing-based secure data sharing framework for IIoT beyond 5G

    No full text
    The rise of automation with Machine-Type Communication (MTC) holds great potential in developing Industrial Internet of Things (IIoT)-based applications such as smart cities, Intelligent Transportation Systems (ITS), supply chains, and smart industries without any human intervention. However, MTC has to cope with significant security challenges due to heterogeneous data, public network connectivity, and inadequate security mechanism. To overcome the aforementioned issues, we have proposed a blockchain and garlic-routing-based secure data exchange framework, i.e., GRADE, which alleviates the security constraints and maintains the stable connection in MTC. First, the Long-Short-Term Memory (LSTM)-based Nadam optimizer efficiently predicts the class label, i.e., malicious and non-malicious, and forwards the non-malicious data requests of MTC to the Garlic Routing (GR) network. The GR network assigns a unique ElGamal encrypted session tag to each machine partaking in MTC. Then, an Advanced Encryption Standard (AES) is applied to encrypt the MTC data requests. Further, the Inter-Planetary File System (IPFS)-based blockchain is employed to store the machine's session tags, which increases the scalability of the proposed GRADE framework. Additionally, the proposed framework has utilized the indispensable benefits of the 6G network to enhance the network performance of MTC. Lastly, the proposed GRADE framework is evaluated against different performance metrics such as scalability, packet loss, accuracy, and compromised rate of the MTC data request. The results show that the GRADE framework outperforms the baseline methods in terms of accuracy, i.e., 98.9%, compromised rate, i.e., 18.5%, scalability, i.e., 47.2%, and packet loss ratio, i.e., 24.3%

    Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks

    No full text
    Mobile applications have rapidly grown over the past few decades to offer futuristic applications, such as autonomous vehicles, smart farming, and smart city. Such applications require ubiquitous, real-time, and secure communications to deliver services quickly. Toward this aim, sixth-generation (6G) wireless technology offers superior performance with high reliability, enhanced transmission rate, and low latency. However, managing the resources of the aforementioned applications is highly complex in the precarious network. An adversary can perform various network-related attacks (i.e., data injection or modification) to jeopardize the regular operation of the smart applications. Therefore, incorporating blockchain technology in the smart application can be a prominent solution to tackle security, reliability, and data-sharing privacy concerns. Motivated by the same, we presented a case study on public safety applications that utilizes the essential characteristics of artificial intelligence (AI), blockchain, and a 6G network to handle data integrity attacks on the crime data. The case study is assessed using various performance parameters by considering blockchain scalability, packet drop ratio, and training accuracy. Lastly, we explored different research challenges of adopting blockchain in the 6G wireless network

    Blockchain for Future Wireless Networks: A Decade Survey

    No full text
    The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-service, injection, man-in-the-middle, session hijacking attacks, etc., that deteriorate the security performance of the aforementioned WN-based intelligent services. Toward this goal, various security solutions, such as cryptography, artificial intelligence (AI), access control, authentication, etc., are proposed by the scientific community around the world; however, they do not have full potential in tackling the aforementioned security issues. Therefore, it necessitates a technology, i.e., a blockchain, that offers decentralization, immutability, transparency, and security to protect the WN from security threats. Motivated by these facts, this paper presents a WNs survey in the context of security and privacy issues with blockchain-based solutions. First, we analyzed the existing research works and highlighted security requirements, security issues in a different generation of WN (4G, 5G, and 6G), and a comparative analysis of existing security solutions. Then, we showcased the influence of blockchain technology and prepared an exhaustive taxonomy for blockchain-enabled security solutions in WN. Further, we also proposed a blockchain and a 6G-based WN architecture to highlight the importance of blockchain technology in WN. Moreover, the proposed architecture is evaluated against different performance metrics, such as scalability, packet loss ratio, and latency. Finally, we discuss various open issues and research challenges for blockchain-based WNs solutions

    Classification of Potentially Hazardous Asteroids Using Supervised Quantum Machine Learning

    No full text
    Quantum computing (QC) and quantum machine learning (QML) are emerging technologies with the potential to revolutionize the way we approach complex problems in mathematics, physics, and other fields. The increasing availability of data and computing power has led to a rise in using Artificial Intelligence (AI) to solve real-time problems. In space science, employing AI-based approaches to address various challenges, including the potential risks posed by asteroids, is becoming increasingly necessary. Potentially Hazardous Asteroids (PHAs) can cause significant harm to humans and biodiversity through wind blasts, overpressure shock, thermal radiation, cratering, seismic shaking, ejecta deposition, and even tsunamis. Machine Learning (ML) algorithms have been employed to detect hazardous asteroids based on their parameters. Still, there are limitations to the current techniques, and the results have reached a saturation point. To address this issue, we propose a Quantum Machine Learning (QML)-based approach for asteroid hazard prediction, employing Variational Quantum Circuits (VQC) and PegasosQSVC algorithms. The proposed work aims to leverage the quantum properties of the data to improve the accuracy and precision of asteroid classification. Our study focuses on the impact of PHAs, and the proposed supervised QML-based method aims to detect whether an asteroid with specific parameters is hazardous or not. We compared several classification algorithms and found that the proposed QML-based approach employing VQC and PegasosQSVC outperformed the other methods, with an accuracy of 98.11% and an average F1-score of 92.69%

    Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment

    No full text
    The Internet of Things (IoT) is a key enabler technology that recently received significant attention from the scientific community across the globe. It helps transform everyone’s life by connecting physical and virtual devices with each other to offer staggering benefits, such as automation and control, higher productivity, real-time information access, and improved efficiency. However, IoT devices and their accumulated data are susceptible to various security threats and vulnerabilities, such as data integrity, denial-of-service, interception, and information disclosure attacks. In recent years, the IoT with blockchain technology has seen rapid growth, where smart contracts play an essential role in validating IoT data. However, these smart contracts can be vulnerable and degrade the performance of IoT applications. Hence, besides offering indispensable features to ease human lives, there is also a need to confront IoT environment security attacks, especially data integrity attacks. Toward this aim, this paper proposed an artificial intelligence-based system model with a dual objective. It first detects the malicious user trying to compromise the IoT environment using a binary classification problem. Further, blockchain technology is utilized to offer tamper-proof storage to store non-malicious IoT data. However, a malicious user can exploit the blockchain-based smart contract to deteriorate the performance IoT environment. For that, this paper utilizes deep learning algorithms to classify malicious and non-malicious smart contracts. The proposed system model offers an end-to-end security pipeline through which the IoT data are disseminated to the recipient. Lastly, the proposed system model is evaluated by considering different assessment measures that comprise the training accuracy, training loss, classification measures (precision, recall, and F1 score), and receiver operating characteristic (ROC) curve
    corecore