z-logo
Premium
Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things
Author(s) -
Tukur Yusuf Muhammad,
Thakker Dhavalkumar,
Awan IrfanUllah
Publication year - 2021
Publication title -
transactions on emerging telecommunications technologies
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.366
H-Index - 47
ISSN - 2161-3915
DOI - 10.1002/ett.4158
Subject(s) - computer science , insider , anomaly detection , edge computing , blockchain , cloud computing , enhanced data rates for gsm evolution , single point of failure , internet of things , big data , bandwidth (computing) , computer security , analytics , computer network , data mining , telecommunications , operating system , political science , law
Internet of Things (IoT) platforms are responsible for overall data processing in the IoT System. This ranges from analytics and big data processing to gathering all sensor data over time to analyze and produce long‐term trends. However, this comes with prohibitively high demand for resources such as memory, computing power and bandwidth, which the highly resource constrained IoT devices lack to send data to the platforms to achieve efficient operations. This results in poor availability and risk of data loss due to single point of failure should the cloud platforms suffer attacks. The integrity of the data can also be compromised by an insider, such as a malicious system administrator, without leaving traces of their actions. To address these issues, we propose in this work an edge‐based blockchain enabled anomaly detection technique to prevent insider attacks in IoT. The technique first employs the power of edge computing to reduce the latency and bandwidth requirements by taking processing closer to the IoT nodes, hence improving availability, and avoiding single point of failure. It then leverages some aspect of sequence‐based anomaly detection, while integrating distributed edge with blockchain that offers smart contracts to perform detection and correction of abnormalities in incoming sensor data. Evaluation of our technique using real IoT system datasets showed that the technique remarkably achieved the intended purpose, while ensuring integrity and availability of the data which is critical to IoT success.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here