Abstract
With the increasing growth rate of smart home devices and their interconnectivity via the Internet of Things (IoT), security threats to the communication network have become a concern. This paper proposes a learning engine for a smart home communication network that utilizes blockchain-based secure communication and a cloud-based data evaluation layer to segregate and rank data on the basis of three broad categories of Transactions (T), namely Smart T, Mod T, and Avoid T. The learning engine utilizes a neural network for the training and classification of the categories that helps the blockchain layer with improvisation in the decision-making process. The contributions of this paper include the application of a secure blockchain layer for user authentication and the generation of a ledger for the communication network; the utilization of the cloud-based data evaluation layer; the enhancement of an SI-based algorithm for training; and the utilization of a neural engine for the precise training and classification of categories. The proposed algorithm outperformed the Fused Real-Time Sequential Deep Extreme Learning Machine (RTS-DELM) system, the data fusion technique, and artificial intelligence Internet of Things technology in providing electronic information engineering and analyzing optimization schemes in terms of the computation complexity, false authentication rate, and qualitative parameters with a lower average computation complexity; in addition, it ensures a secure, efficient smart home communication network to enhance the lifestyle of human beings.
Keywords: blockchain, consensus protocol, dragonfly algorithm, Levenberg model, smart contract
1. Introduction
The concept of the modern world comes with smart technologies that can operate smart homes to enhance the lifestyle of human beings. Smart home devices are connected via Internet of Things (IoT)-based architecture, in which the appliances, specifically smart appliances, are connected to exchange information [1]. The average growth rate of smart homes and their equipment was more than 30%, from 500 million smart home applications to 700 million appliances per year, in the time interval of 2018–2022 [2,3,4,5].
There are five important aspects related to smart home security and privacy in order to improve the reliability of smart device data transfer. The first is “Authentication”, which helps to verify the communication setup. The second is “Authorization”, which ensures the user’s access rights. The third is “Confidentiality”, which maintains the privacy of data by allowing access to the authorized user. The fourth is “Integration”, which helps minimize data losses and maintains the data in an accurate manner. The fifth is “Availability”, which provides the available service access to authorized users, who are protected from threats. Thus, a smart home network can be sensitive to security threats due to the large number of connected devices [6]. In such cases, a supervised approach to data analysis generated by the IoT network could be quite useful. Swarm intelligence is adequate for solving NP-hard problems. These are mainly used for feature extraction and dimension reduction. Metaheuristic techniques have the potential to address multi-object problems. The population-based metaheuristic algorithm is one of the most effective optimization algorithm architectures. Different types of behaviors are observed in nature, and hence, different algorithms are studied, and the dragonfly algorithm is a powerful data selection tool that can be used to identify patterns and trends in data sets [7]. It is particularly useful for finding outliers and unusual data points. Additionally, some decentralized and deep learning frameworks have also been presented by the research community [8,9,10]. The proposed model represents a significant research contribution to the field of information engineering, as it outperforms existing methods, such as the Fused Real-Time Sequential Deep Extreme Learning Machine (RTS-DELM) system, data fusion techniques, and artificial intelligence Internet of Things technology, in terms of the computation complexity, false authentication rate, and qualitative parameters. With the evolution of blockchain-based communication, the communication data can be kept in a ledger-based record sheet, which is popularly known as a hyperledger in terms of Blockchain [11,12]. This paper focuses on the establishment of a learning engine that is associated with a smart home communication network. To achieve this, a neural-based propagation engine was used for the decision-making of smart transactions, moderate transactions, and to-be-blocked transactions, as shown in Figure 1.
As shown in Figure 1, there are four layers in the application architecture. The first architecture is the IoT layer, in which the users use multiple types of devices and communicate via the application layer. The application layer provides a user Interface (UI) to the user in order to submit and process any request generated by the devices for communication access. The application layer may contain home care, hospitals, city services, data, and marketplaces. This communication generates a bulk amount of data that is aggregated by the blockchain layer. This layer generates the ledger of the communication details and generates a lot of information regarding the transaction that has been made. The transactions are made through Smart Contracts that are established and evaluated in the blockchain layer [13,14,15]. Additionally, the layer creates data in terms of Quality of Service (QoS) parameters, such as Throughput and Bit Error Rate (BER). The blockchain layer is further connected to the Cloud Layer, which stores and processes the data that are generated by the blockchain layer. The cloud layer incorporates the class generator that divides all the data into three segments, namely “SMART T”, “MOD T”, and “AVO-T”, where T represents transactions and MOD and AVO stand for “moderate” and “avoidance”. In the application architecture, the system incorporates a swarm-based data selection algorithm to remove data redundancy, which is further fed to the neural engine for systematic learning. The cloud layer assists the blockchain layer in the decision-making for the transaction. In our article, Random Forest is abbreviated as RF; Naive Bayes is abbreviated as NB; and the proposed result is abbreviated as P. The contributions of the paper are as follows.
-
(a)
The proposed algorithm outperforms the Fused Real-Time Sequential Deep Extreme Learning Machine (RTS-DELM) system, the data fusion technique, and artificial intelligence Internet of Things technology in providing electronic information engineering and analysis optimization schemes in terms of the computation complexity, false authentication rate, and qualitative parameters with a lower average computation complexity; in addition, it ensures a secure, efficient smart home communication network to enhance the lifestyle of human beings.
-
(b)
Application of a secure blockchain layer for user authentication and the generation of a ledger for the communication network.
-
(c)
Application of a cloud-based data evaluation layer to segregate and process data to generate a rank model based on three broad categories of transactions.
-
(d)
Utilization and enhancement of an SI-based algorithm for the preciseness of the training in the cloud layer.
-
(e)
Utilization of a neural engine for the training and classification of the categories that help the blockchain layer with improvisation in the decision-making of the blockchain layer.
The rest of the paper is organized in the following manner. Section 2 illustrates the related work that has been performed in the enhancement of the smart home-based application architecture. Section 3 incorporates the proposed work that supports machine learning (ML), blockchain, and swarm-based application architecture for the enhancement of the smart home network. Section 4 contains the experimental results and discussion, and finally, the paper is concluded in Section 5.
2. Related Work
This literature review provides an overview of recent studies on smart home technologies. While conducting the literature review, the authors investigated the concept of peer-to-peer energy trading among smart homes. Peer-to-peer energy represents the communication among the attached devices with routing topology [2]. The next review was on a blockchain-based smart home network security model based on a decentralized network that used fused machine learning. The author’s aim of fusing network security with machine learning was to reuse the calculations and the distributions that were made in the communication between smart devices. The target was to reduce the computation delay and provide security via a cloud platform [3]. The author proposed a data security model for smart homes that used blockchain technology via blockchain interpretation; the security of the overall system was enhanced, as it kept a record of communication and every linked communication. The model introduced an encrypted communication index termed the hash value. The hash was maintained in an open-source ledger for the virtualization of the entire concept; in this, the difficulty target could be used to control the working phase of machines for new block generation [4].
The machine learning intelligence approach was evaluated on the basis of energy consumption and was proposed by the author to reduce the expenses of smart homes [16]. It aims to find the resources that are used the least as well as those that are highly used. The authors relied on the training and classification mechanism to provide an understanding of the system [11]. While conducting the review, the author introduced smart home networks developed on the basis of the occupancy detection model using interoperable building automation technologies. The model implemented propagational neural networks for the recognition of occupancies via a detection mechanism. The cloud was utilized for data centralization and monitoring purposes. It is often observed that security is one of the major concerns in blockchain-based IoT frameworks and architecture, along with power and performance efficacy. The communication aspect and the channel modeling through which the data are transferred from one end to another are also an area of discussion in the same context. The efficiency aspect was the main focus of these papers, as they proposed different optimization algorithms to reduce energy consumption and improve the efficiency of smart homes and IoT devices [12]. The author proposed an optimization algorithm based on the bat algorithm with inertia weight to optimize energy consumption and improve the comfort level of smart homes. The proposed algorithm used a feedback mechanism to adjust the parameters of the algorithm and adapt to changes in the environment. The paper mentioned the security measures taken to protect the smart home system from unauthorized access [13].
The author conducted a study on a bio-inspired algorithm called the NBA algorithm, which can optimize energy consumption in wireless sensor networks (WSN) for IoT applications. The algorithm proposed by the author was based on the behavior of honeybees and used a pheromone trail mechanism to guide the search for optimal solutions. The paper mentioned the security measures taken to protect the WSN from attacks, such as jamming and eavesdropping, but it did not discuss them in detail. The paper also proposed a communication protocol based on the message queuing telemetry transport (MQTT) protocol to improve the efficiency of IoT devices [14]. Therefore, the author proposed task management for IoT, and this mechanism was based on predictive optimization to improve the IoT energy efficiency and scalability in smart residential buildings. The proposed mechanism used a machine learning algorithm to predict the energy consumption of IoT devices and schedule their tasks accordingly to reduce energy consumption. The paper briefly mentioned the security measures taken to protect IoT devices from attacks. The paper also proposed a communication protocol based on the Zigbee protocol to improve the efficiency of IoT devices [15]. The contributions and possibilities of the work frame are summarized in Table 1.
Table 1.
Author/Citation | Implemented Technology | Methodology | Findings |
---|---|---|---|
Alam et al. (2019) [2] | Smart home | Peer-to-peer energy trading with routing topology | Cost saving is not directly proportional to the increase in the usage of renewable resources |
Tchagna Kouanou et al. (2022) [5] | Smart home data security using Blockchain technology | Blockchain interpretation was used to keep communication records | Enhancing security of the overall system via encrypted communication index |
Mansouri et al. (2023) [8] | Hierarchical decentralized framework technology | Deep learning-based forecaster and risk-aware information gap decision theory were employed to design efficient smart homes | The smart prosumer’s illustrated reduced energy requirements |
Alzoubi et al. (2022) [11] | Machine learning technology | Involved bat optimization technique for reduced energy consumption of the smart home | Using machine learning for intelligent evaluation of energy consumption and finding the least used and highly used resources |
Rivera et al. (2015) [12] | Automation technology | Built smart homes using interoperable automation using neural networks | Designed efficient smart homes with reduced energy consumption |
Vanus et al. (2022) [17] | Occupancy detection for smart homes | Propagational neural networks | Developed an occupancy detection model and utilized the cloud for data centralization and monitoring purposes |
The evaluation parameters of the work frame are summarized in Table 2.
Table 2.
Author | Statistical Measure | Number of Collected Packets | File Size (Bytes) | Amount of Data Collected (Bytes) | Average Data Transfer Rate (B/s) |
---|---|---|---|---|---|
Alam et al. (2019) [2] | Mean | 4958 | 8,318,400 | 4,119,314 | 4.1 |
Vanus et al. (2022) [17] | Median | 2048 | 1,200,000 | 1,167,360 | 6.5 |
Qamar et al. (2022) [13] | Median | 1000 | 1,048,576 | 982,254 | 6.5 |
Kumar et al. (2022) [14] | Mean | 50 | 10,111 | 3424 | 0.5 |
Khanpara et al. (2023) [15] | Mean | 15,360 | 1,094,430 | 748,408 | 4.5 |
Malek et al. (2022) [18] | Mean | 1000 | 32,000 | 15,814 | 6.2 |
Devassy et al. (2022) [19] | Mean | 100 | 15,423 | 4846 | 0.6 |
3. Methodology
The proposed work incorporated the smart home architecture with a machine learning framework that included a Levenberg-based system model for the training and classification of class-generated data. The proposed work is divided into two sections: the blockchain layer and the cloud layer.
3.1. The Blockchain Layer
The blockchain layer in the proposed context was utilized to generate the transactions that were made by the user and utility layer. Blockchain is a revolutionary technology that has the potential to revolutionize many industries and sectors. It is a digital ledger that records and verifies transactions, replacing manual processes with automated ones. This makes it easier, faster, and more secure for businesses to complete transactions without relying on a third-party intermediary. In this article, we explore how blockchain technology is used to facilitate transactions across multiple industries, including finance, healthcare, the public sector, and more. We discuss the various benefits of using blockchain in everyday life and provide an overview of the different types of blockchains available today. Finally, we outline some key tips on how to begin using blockchains for your business [18,19]. In a blockchain transaction, each block is chained to the previous block, creating a permanent and public record of all transactions. This allows for secure and transparent transactions, as each block contains a timestamp and unique hash that can be verified by the network. Blockchain technology has the potential to revolutionize the way we conduct business and interact with the world. By creating a secure and transparent record of all transactions, blockchain could help to reduce fraud, improve efficiency, and create new opportunities for businesses and individual. A hash generator is a mathematical function that takes an input of any size and produces an output of a fixed size. The most common type of hash function is the cryptographic hash function, which is used in security applications to protect data from tampering. Cryptographic hash functions are one-way functions, meaning that it is mathematically infeasible to reverse the function and obtain the original input [20]. This makes them ideal for storing data in a secure manner, as any attempt to change the data results in a different hash value being generated. There are many different types of cryptographic hash functions, but the most popular ones are SHA-1 and SHA-256. These functions are used by thousands of websites and applications to protect data and are part of the reason why blockchains are so secure.
The proposed blockchain layer was implemented using the Firebase blockchain platform to host the data. The architecture of the blockchain in Firebase was as follows. Firebase is a cloud-based platform that provides various tools and services for app development. It offers several features, such as real-time databases, cloud storage, authentication, and hosting. In order to use these features in a web or mobile application, the application needs to be configured with a Firebase project [21,22]. The configuration information is stored in a JavaScript object, commonly known as a firebaseConfig object. The given code represents the configuration details of a Firebase project. The firebaseConfig object contains several properties, such as apiKey, authDomain, databaseURL, projectId, storageBucket, appId, and measurementId. These properties hold unique values that are specific to a particular Firebase project. These values are used by the Firebase SDKs to establish a connection between the app and the Firebase services [23,24]. The pseudo-code represents the steps to initialize the firebaseConfig object and set the values for its properties.
- The firebaseConfig object was initialized with the following properties:
- apiKey
- authDomain
- databaseURL
- projectId
- storageBucket
- appId
- measurementId
The value of the apiKey property was set to “AIzaSyD11_9I9_5yLJu0UCGa6SdiYFQTAiWoOe0”.
The value of the authDomain property was set to “subhita-block-chain.firebaseapp.com”.
The value of the databaseURL property was set to “https://subhita-block-chain-default-rtdb.firebaseio.com” (accessed on 14 April 2023).
The value of the projectId property was set to “subhita-block-chain”.
The value of the storageBucket property was set to “subhita-block-chain.appspot.com”.
The value of the appId property was set to “1:1038363801308:web:338b2f2XXXX”.
The value of the measurementId property was set to “G-38V0GXXXX”.
3.2. The Cloud Layer
The cloud layer is made of up three subsections: data separation, data selection, and decision-making with training and classification. The subsections are illustrated below.
3.2.1. Data Separation
The blockchain layer aggregates the data in the form of a ledger, as illustrated in Section 3.1. The proposed work used the K-means clustering algorithm followed by statistical analysis of the separated data to label them as classes. This section is represented in Figure 2.
The collected data were separated into three classes, whereas the naming convention was performed using Fuzzy Logic. Algorithm 1 illustrates the architecture of the data separation.
Algorithm 1: Data Separation Algorithm |
|
Algorithm 1 took all the aggregated data as the input and, as illustrated earlier, divided all the data into 3 groups. The overall work model is presented in Figure 3.
3.2.2. The Data Selection for Ranking
The fuzzy inference engine provided a labeled set based on the evaluated QoS services of the transactions in the blockchain layer. In order to generate a reputation system to assist the blockchain layer, the proposed work utilized the dragonfly algorithm in order to select a data record against its class label. To do so, the proposed work utilized the dragonfly algorithm based on the studied literature that was presented in Section 2.
The dragonfly algorithm is a powerful data selection tool that can be used to identify patterns and trends in data sets. It is particularly useful for finding outliers and unusual data points. The algorithm works by partitioning the data set into small subsets and then iteratively selecting the best subset of data points from each subset. The dragonfly algorithm is fast and efficient, and it can be applied to any type of data set [25,26]. The dragonfly algorithm is a swarm-based algorithm that uses the attraction index for the selection and rejection of the prey. This method is based on the principle of selecting the best data points by considering their distance from the center of the data set. This can be achieved by either using a Euclidean distance or a Manhattan distance [27]. The dragonfly algorithm is able to handle both types of distances, and it also has the ability to consider multiple dimensions when making its calculations [28].
The AI can be calculated using Equation (1). The fuzzy inference engine provides a labeled set based on the evaluated QoS services of the transactions in the blockchain layer. In order to generate a reputation system to assist the blockchain layer, the proposed work utilized the dragonfly algorithm in order to select a data record against its class label. To do so, the proposed work utilized the dragonfly algorithm based on the existing literature [29] to compute the next state of the fly using Equation (1):
(1) |
where is the next state of the firefly, is the current state of the firefly, ∝ is the randomization parameter {0–1}, rij is the distance of the distribution xi − xjh; here, i and j are the fireflies, β is the attractive index, and γ is the change in the attraction index. Here, xgct is the group centroid of the labeled route. The intended dragonfly algorithms is illustrated in Algorithm 2.
Algorithm 2: Dragonfly Algorithm |
|
The selected dragonflies were passed to the Neural Engine for the purpose of ranking on the basis of their score generated in the training section. After the completion of the training 30% of all the data underwent rigorous testing in which each identity was tested at least once. Once the data were classified, their classification scores were treated as the rank of the transition. A ground truth value found close to the original value in each case is observed as better option. Neural networks are a type of machine learning algorithm inspired by the structure and function of the human brain. They are used in a variety of applications, from image and speech recognition to fraud detection and financial forecasting. In recent years, neural networks have been applied to the field of blockchain to enhance security in smart homes. The training and classification of blockchain comprise three security categories, namely Smart T, Mod T, and Avoid T for smart homes, which can be achieved through a neural network. The neural network is trained using a dataset of examples, and each example is labeled as either Smart T, Mod T, or Avoid T. The neural network learns to recognize patterns in the data that are associated with each of the three categories and then uses this knowledge to classify new examples [30,31]. The process of training a neural network involves adjusting the weights of its connections between neurons in order to minimize the loss function. The loss function measures the difference between the predicted output of the neural network and the true output. The goal of training is to minimize this difference, which is achieved by adjusting the weights of the connections [32,33,34]. This is achieved using an optimization algorithm, such as stochastic gradient descent, which adjusts the weights in the direction that reduces the loss function the most [35,36]. Once the neural network has been trained, it can be used for classification.
Figure 4 illustrates that the proposed work utilized four parameters, namely the sender id, the receiver id, the evaluated Throughput, and BER, as the input for the Levenberg model, in which the total number of supplied layers in the model was determined to be two, and there were a total of 12 active neurons per layer. The neurons were propagated for the minimum gradient, which was the Mean Squared Error in the case of the proposed work. The total number of supplied epochs per iteration was 100, and the gradient is attained between 5–15 epochs on average. The ground truth values for the data records were the class labels generated by the fuzzy inference engine. To classify a new example, the input was fed into the neural network, which generated an output. This output was a probability distribution over the three categories, indicating the probability that the input belonged to each category. The category with the highest probability was chosen as the classification. The proposed work was evaluated on the basis of QoS and the quantitative parameters that are illustrated in the next section.
4. Results and Discussion
The proposed model of a smart home network was designed in the Matlab Simulation and Google Colab, and the blockchain ledger was created to evaluate the effects of QoS and quantitative parameters, namely the overall computation complexity, false detection rate, precision, recall, and f-measure, along with classification accuracy. In order to do so, the proposed work performed 20,000 simulations with the following system model to collect the Throughput and BER of each simulation, which were fed to the learning mechanism. The proposed work was tested for more than 1000 iterations, and on average, the convergence of the global optimum was found to be close to the global optimum.
The system specifications with reference to blockchain and cloud computing technology are summarized in Table 3. Additionally, the system and system model specifications are stated in Table 4.
Table 3.
Number of data centers | 2 |
Number of PMs to handle | 10 |
Cloud Type | Xen |
Blockchain Type | Firebase |
Table 4.
System Information | |
RAM | 4 GB |
Processor | intel core i3 530 |
Memory | DDR3 |
HD Capacity | 500 GB |
System Model Information | |
Number of Users | 50–500 |
Simulation Area | 4000 m2 |
Channel of Communication | Rayleigh channel |
Interpolation measurement | Lagrange interpolation |
Channel Capacity | 96,000 symbols per second |
Channel gain | 0.0023 units |
Evaluation Parameters | Throughput, BER |
The proposed work was compared with two state-of-the-art algorithms in terms of QoS and evaluated for multiple classifiers with quantitative parameters. The training and classification model was used on the transaction record and categorized it by providing a label of Smart T, Mod T, or Avoid T. The neural network learns to recognize patterns in the data that are associated with each of the three categories and then uses this knowledge to classify new examples. The computation complexity can increase significantly as the number of devices and transactions in the network increases. Additionally, in a proof-of-work (PoW) blockchain, the process of mining can be very computationally intensive, which can be a challenge for resource-constrained IoT devices.
Table 5 presents the value of the computation complexity and the comparison with other state-of-the-art techniques for similar types of environments.
Table 5.
Total Test Samples | Fused Real-Time Sequential Deep Extreme Learning Machine System [3] | Data Fusion Technique [11] | Internet of Things for Electronic Information Engineering and Optimization Schemes [17] | Proposed Technique |
---|---|---|---|---|
500 | 0.85991282 | 0.8780829 | 0.84910773 | 0.76528091 |
1000 | 2.11021973 | 1.9531654 | 2.04723132 | 1.87965372 |
1500 | 1.78525512 | 1.7024945 | 1.82948338 | 1.67876619 |
2000 | 2.05459249 | 2.1310947 | 2.19553898 | 2.03360384 |
2500 | 3.74510098 | 3.6378217 | 3.52360793 | 3.46864933 |
3000 | 3.34175878 | 3.4041558 | 3.48210032 | 3.26647149 |
3500 | 4.86868341 | 5.0819671 | 4.60406431 | 4.44362262 |
4000 | 4.22346545 | 4.2047017 | 4.47550357 | 4.06799277 |
4500 | 4.91378696 | 4.7681754 | 5.12593208 | 4.50671531 |
5000 | 6.0492668 | 6.4493703 | 6.17813064 | 5.77015973 |
The average computation complexity of the proposed algorithm across all test samples was lower than that of the other algorithms. This can be seen by comparing the average value of the ‘Computation Complexity Proposed’ column to the average values of the other columns. For example, the average computation complexity of the proposed algorithm for all test samples was 3.544, while the average computation complexity of the algorithm based on blockchain and fused machine learning was 3.944, indicating an improvement of 10.14% by the proposed algorithm over that in the existing study. The percent improvement of the proposed algorithm over the other algorithms varied depending on the number of test samples. For example, for 500 test samples, the proposed algorithm had a computation complexity of 0.765, which was 11.1% lower. However, for 5000 test samples, the percent improvement over the existing study dropped to 7.07%. The reason for the improved performance of the proposed algorithm is attributed to its efficient data selection, as indicated in the table by the decreasing values of proposed computation complexity with increasing test samples. The proposed work was also evaluated for the false authentication rate against the same set of algorithms. The authentication rate in Figure 5 represents the total number of false detections while applying authentication over the users.
The proposed algorithm showed lower numbers of false authentications compared with the other algorithms. This was reflected in the % improvement values, which show the percent reduction in false authentications compared with each of the other algorithms. For example, in a total test sample size of 500, the proposed algorithm had 18 false authentications, while the next-best algorithm had 19 false authentications. This represents a % improvement of 5.26% for the proposed algorithm. Similarly, in a total test sample size of 5000, the proposed algorithm had 173 false authentications, while the other had 185 false authentications. This represents a % improvement of 6.49% for the proposed algorithm. As illustrated in this section, the proposed work was also evaluated for qualitative parameters. Table 6 presents the qualitative analysis.
Table 6.
Precision | Recall | F-Measure | |||||||
---|---|---|---|---|---|---|---|---|---|
Total Test Samples | RF | NB | P | RF | NB | P | RF | NB | P |
500 | 0.98 | 0.98 | 0.98 | 0.89 | 0.97 | 0.97 | 0.93 | 0.97 | 0.98 |
1000 | 0.97 | 0.97 | 0.97 | 0.93 | 0.99 | 0.99 | 0.95 | 0.98 | 0.98 |
1500 | 0.96 | 0.96 | 0.97 | 0.94 | 0.96 | 0.96 | 0.95 | 0.96 | 0.96 |
2000 | 0.97 | 0.97 | 0.97 | 0.93 | 0.99 | 0.99 | 0.95 | 0.98 | 0.98 |
2500 | 0.96 | 0.95 | 0.96 | 0.99 | 0.99 | 0.99 | 0.97 | 0.97 | 0.97 |
3000 | 0.98 | 0.98 | 0.98 | 0.94 | 1 | 1 | 0.96 | 0.99 | 0.99 |
3500 | 0.97 | 0.97 | 0.97 | 0.91 | 0.99 | 0.99 | 0.94 | 0.98 | 0.98 |
4000 | 0.98 | 0.98 | 0.99 | 0.95 | 0.98 | 0.98 | 0.96 | 0.98 | 0.98 |
4500 | 0.95 | 0.95 | 0.96 | 0.95 | 0.99 | 0.99 | 0.95 | 0.97 | 0.97 |
5000 | 0.93 | 0.96 | 0.98 | 0.93 | 0.92 | 0.95 | 0.93 | 0.92 | 0.97 |
In terms of precision, the proposed method performed consistently well, with an average precision of around 0.97–0.98. The NB and RF methods had similar precision scores for most cases, but the RF method had lower precision for some test sample sizes, particularly for larger test samples. For recall, the proposed method performed well, with an average score of around 0.98–0.99. The NB and RF methods also performed well but with slightly lower scores than the proposed method. In terms of the F-measure, the proposed method again performed consistently well, with an average score of around 0.96–0.99. The NB and RF methods had similar F-measure scores in most cases, but the RF method had a lower F-measure for some test sample sizes, particularly for larger test samples. The performance of the proposed work was further compared for the prediction accuracy of false authentications. Figure 6 shows the comparative analysis of the proposed work performed against the existing works in terms of the prediction of false authentications. It was observed that the proposed work exhibited a high accuracy of 96.54%, which is a little higher than that exhibited by Farooq (95.28%) and Alzoubi (92%), thus justifying the effectiveness of the proposed work in smart home networks.
The proposed work reduced the computation complexity in terms of overall computation, which will help to transfer more data in the network. The network is capable of running other real-time datasets as well if they are designated to work on a similar aspect.
5. Conclusions
This research paper proposed an architecture that incorporates IoT, blockchain, cloud, and artificial intelligence techniques for a secure and efficient communication network. The paper provides a detailed description of the proposed architecture and its components, including the user interface, ledger generation, data evaluation, and decision-making techniques. The contributions of this paper are the secure application of the blockchain layer and cloud-based data evaluation layer and the efficient utilization of the artificial intelligence-based algorithm. In order to incorporate efficient communication and security aspects, the paper designed an updated dragonfly algorithm that supports the training layer to pick the best samples for the three classes designed, namely “SMART T”, “MOD-T”, and “AVO-T”. Specifically, for all test samples, the proposed algorithm had an average computation complexity of 3.544, while the existing algorithm had an average computation complexity of 3.944, indicating an improvement of 10.14% by the proposed algorithm. The percent improvement varied depending on the number of test samples, with the proposed algorithm showing a lower computation complexity than the existing algorithm based on blockchain and fused machine learning for all test sample sizes but with a decreasing percent improvement as the number of test samples increased. The improved performance of the proposed algorithm is attributed to its efficient data selection, which is indicated by the decreasing values of proposed computation complexity with increasing test samples. In the case of false authentication analysis for a sample size of 5000, the proposed algorithm had 173 false authentications, while the existing work of Farooq, Alzoubi, and Zhang had 177, 181, and 185 false authentications, respectively. This represents a maximum % improvement of 6.49% for the proposed algorithm. Furthermore, the proposed work exhibited a high prediction accuracy of 96.54% for identifying false authentications, thus proving the ability of the proposed work to handle security in smart home networks in comparison with existing works. Furthermore, this research provides future possibilities for the integration of these techniques with other technologies, such as 5G and edge computing, for more secure and efficient communication networks. Overall, the proposed architecture has potential applications in various fields, such as home care, hospitals, city services, and data marketplaces.
Acknowledgments
We acknowledge the support from Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R138), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Author Contributions
Conceptualization, S.M., D.A., K., S.V., M.K., N.Z.J., R.M.G. and S.K.R.; Methodology, S.M., D.A., K., S.V., M.K., N.Z.J., R.M.G. and S.K.R.; Software, S.M., D.A., K., S.V., M.K., N.Z.J., R.M.G. and S.K.R.; Validation, S.M., D.A., K., S.V., M.K., N.Z.J. and S.K.R.; Formal analysis, S.M., D.A., K., S.V., M.K., N.Z.J. and S.K.R.; Investigation, S.M., D.A., K., S.V., M.K., N.Z.J. and R.M.G.; Resources, S.M., D.A., K., S.V., M.K. and N.Z.J.; Data curation, S.M., D.A., K., M.K. and R.M.G.; Writing—original draft, S.M.; Writing—review & editing, D.A., K., S.V., M.K., N.Z.J., R.M.G. and S.K.R.; Visualization, N.Z.J.; Supervision, S.M. and N.Z.J.; Funding acquisition, K., S.V., N.Z.J., R.M.G. and S.K.R. All authors have read and agreed to the published version of the manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
Funding Statement
Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R138), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Ali Y., Shah S.W., Khan W.A. Machine Tools: An Industry 4.0 Perspective. CRC Press; Boca Raton, FL, USA: 2023. Security at the Internet of Things; pp. 31–48. [DOI] [Google Scholar]
- 2.Alam M.R., St-Hilaire M., Kunz T. Peer-to-Peer Energy Trading among Smart Homes. Appl. Energy. 2019;238:1434–1443. doi: 10.1016/j.apenergy.2019.01.091. [DOI] [Google Scholar]
- 3.Farooq M.S., Khan S., Rehman A., Abbas S., Khan M.A., Hwang S.O. Blockchain-Based Smart Home Networks Security Empowered with Fused Machine Learning. Sensors. 2022;22:4522. doi: 10.3390/s22124522. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 4.Sood M., Verma S., Panchal V.K., Kavita . Analysis of Computational Intelligence Techniques for Path Planning. In: Smys S., Iliyasu A.M., Bestak R., Shi F., editors. New Trends in Computational Vision and Bio-Inspired Computing, Proceedings of the International Conference on Computational Vision and Bio Inspired Computing (ICCVBIC 2018), Coimbatore, India, 29–30 November 2018. Springer; Cham, Germany: 2018. [Google Scholar]
- 5.Tchagna Kouanou A., Tchito Tchapga C., Sone Ekonde M., Monthe V., Mezatio B.A., Manga J., Simo G.R., Muhozam Y. Securing Data in an Internet of Things Network Using Blockchain Technology: Smart Home Case. SN Comput. Sci. 2022;3:167. doi: 10.1007/s42979-022-01065-5. [DOI] [Google Scholar]
- 6.Ch R., Gadekallu T.R., Abidi M.H., Al-Ahmari A. Computational System to Classify Cyber Crime Offenses Using Machine Learning. Sustainability. 2020;12:4087. doi: 10.3390/su12104087. [DOI] [Google Scholar]
- 7.Singh A.P., Kumar G., Dhillon G.S., Taneja H. Hybridization of Chaos Theory and Dragonfly Algorithm to Maximize Spatial Area Coverage of Swarm Robots. Evol. Intell. 2023:1–14. doi: 10.1007/s12065-023-00823-5. [DOI] [Google Scholar]
- 8.Mansouri S.A., Rezaee Jordehi A., Marzband M., Tostado-Véliz M., Jurado F., Aguado J.A. An IoT-Enabled Hierarchical Decentralized Framework for Multi-Energy Microgrids Market Management in the Presence of Smart Prosumers Using a Deep Learning-Based Forecaster. Appl. Energy. 2023;333:120560. doi: 10.1016/j.apenergy.2022.120560. [DOI] [Google Scholar]
- 9.Mansouri S.A., Ahmarinejad A., Javadi M.S., Heidari R., Catalão J.P.S. Improved Double-Surface Sliding Mode Observer for Flux and Speed Estimation of Induction Motors. IET Electr. Power Appl. 2020;14:1002–1010. doi: 10.1049/iet-epa.2019.0826. [DOI] [Google Scholar]
- 10.Mansouri S.A., Nematbakhsh E., Jordehi A.R., Marzband M., Tostado-Véliz M., Jurado F. An Interval-Based Nested Optimization Framework for Deriving Flexibility from Smart Buildings and Electric Vehicle Fleets in the TSO-DSO Coordination. Appl. Energy. 2023;341:121062. doi: 10.1016/j.apenergy.2023.121062. [DOI] [Google Scholar]
- 11.Alzoubi A. Machine Learning for Intelligent Energy Consumption in Smart Homes. Int. J. Comput. Inf. Manuf. 2022;2:62–75. doi: 10.54489/ijcim.v2i1.75. [DOI] [Google Scholar]
- 12.Rivera J., Meulen R. Competition Is Increasing to Be the IoT Gateway to the Connected Home. Gartner; Stamford, CT, USA: 2015. [Google Scholar]
- 13.Qamar R., Zardari B.A., Arain A.A., Hussain Z., Burdi A. A Comparative Study of Distributed Denial of Service Attacks on the Internet of Things by Using Shallow Neural Network. Quaid-E-Awam Univ. Res. J. Eng. Sci. Technol. Nawabshah. 2022;20:61–73. [Google Scholar]
- 14.Kumar V., Malik N., Singla J., Jhanjhi N.Z., Amsaad F., Razaque A. Light Weight Authentication Scheme for Smart Home Iot Devices. Cryptography. 2022;6:37. doi: 10.3390/cryptography6030037. [DOI] [Google Scholar]
- 15.Khanpara P., Lavingia K., Trivedi R., Tanwar S., Verma A., Sharma R. A Context-Aware Internet of Things-Driven Security Scheme for Smart Homes. Secur. Priv. 2023;6:e269. doi: 10.1002/spy2.269. [DOI] [Google Scholar]
- 16.Khanna A., Gupta D., Bhattacharyya S., Hassanien A.E., Anand S., Jaiswal A., editors. International Conference on Innovative Computing and Communications. Springer; Singapore: 2022. Advances in Intelligent Systems and Computing. [Google Scholar]
- 17.Vanus J., Martinek R., Danys L., Nedoma J., Bilik P. Occupancy Detection in Smart Home Space Using Interoperable Building Automation Technologies. Hum.-Cent. Comput. Inf. Sci. 2022;12:47. doi: 10.22967/HCIS.2022.12.047. [DOI] [Google Scholar]
- 18.Malek M.R.A., Aziz N.A.A., Alelyani S., Mohana M., Baharudin F.N.A., Ibrahim Z. Comfort and Energy Consumption Optimization in Smart Homes Using Bat Algorithm with Inertia Weight. J. Build. Eng. 2022;47:103848. doi: 10.1016/j.jobe.2021.103848. [DOI] [Google Scholar]
- 19.Devassy D., Immanuel Johnraja J., Paulraj G.J.L. NBA: Novel Bio-Inspired Algorithm for Energy Optimization in WSN for IoT Applications. J. Supercomput. 2022;78:16118–16135. doi: 10.1007/s11227-022-04505-4. [DOI] [Google Scholar]
- 20.Maksoud A., Al-Beer H.B., Mushtaha E., Yahia M.W. Self-Learning Buildings: Integrating Artificial Intelligence to Create a Building That Can Adapt to Future Challenges. IOP Conf. Ser. Earth Environ. Sci. 2022;1019:12047. doi: 10.1088/1755-1315/1019/1/012047. [DOI] [Google Scholar]
- 21.Zhang H., Cheng S. Application of Internet of Things Technology Based on Artificial Intelligence in Electronic Information Engineering. Mob. Inf. Syst. 2022;2022:2888925. doi: 10.1155/2022/2888925. [DOI] [Google Scholar]
- 22.Gupta R., Verma S., Janjua K. Custom Application Development in Cloud Environment: Using Salesforce; Proceedings of the 2018 4th International Conference on Computing Sciences (ICCS); Jalandhar, India. 30–31 August 2018; pp. 23–27. [DOI] [Google Scholar]
- 23.Gandam A., Sidhu J.S., Verma S., Jhanjhi N.Z., Nayyar A., Abouhawwash M., Nam Y. An efficient post-processing adaptive filtering technique to rectifying the flickering effects. PLoS ONE. 2021;16:e0250959. doi: 10.1371/journal.pone.0250959. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 24.Ghosh G., Kavita, Anand D., Verma S., Rawat D.B., Shafi J., Marszałek Z., Woźniak M. Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map. Symmetry. 2021;13:1447. doi: 10.3390/sym13081447. [DOI] [Google Scholar]
- 25.Singh D., Verma S., Singla J. A Neuro-fuzzy based Medical Intelligent System for the Diagnosis of Hepatitis B; Proceedings of the 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM); Dubai, United Arab Emirates. 19–21 January 2021; pp. 107–111. [DOI] [Google Scholar]
- 26.Dash S., Verma S., Kavita, Jhanjhi N.Z., Masud M., Baz M. Curvelet Transform Based on Edge Preserving Filter for Retinal Blood Vessel Segmentation. Comput. Mater. Contin. 2022;71:2459–2476. doi: 10.32604/cmc.2022.020904. [DOI] [Google Scholar]
- 27.EL-Hasnony I.M., Elhoseny M., Hassan M.K. Intelligent Neighborhood Indexing Sequence Model for Healthcare Data Encoding. J. Intell. Syst. Internet Things. 2019:15–25. doi: 10.54216/JISIoT.000102. [DOI] [Google Scholar]
- 28.Singh D., Verma S., Singla J. A Comprehensive Review of Intelligent Medical Diagnostic Systems; Proceedings of the 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI) (48184); Tirunelveli, India. 15–17 June 2020; pp. 977–981. [DOI] [Google Scholar]
- 29.Ghosh G., Kavita, Verma S., Jhanjhi N.Z., Talib M.N. Secure Surveillance System Using Chaotic Image Encryption Technique. IOP Conf. Ser. Mater. Sci. Eng. 2020;993:012062. doi: 10.1088/1757-899X/993/1/012062. [DOI] [Google Scholar]
- 30.Ramisetty S., Kavita, Varma S. The Amalgamative Sharp Wireless Sensor Networks Routing and with Enhanced Machine Learning. J. Comput. Theor. Nanosci. 2019;16:3766–3769. doi: 10.1166/jctn.2019.8247. [DOI] [Google Scholar]
- 31.Saracevic M., Wang N., Zukorlic E.E., Becirovic S. New Model of Sustainable Supply Chain Finance Based on Blockchain Technology. Am. J. Bus. Oper. Res. 2021;3:61–76. doi: 10.54216/AJBOR.030201. [DOI] [Google Scholar]
- 32.Mafarja M., Heidari A.A., Faris H., Mirjalili S., Aljarah I. Dragonfly Algorithm: Theory, Literature Review, and Application in Feature Selection. Stud. Comput. Intell. 2020;811:47–67. doi: 10.1007/978-3-030-12127-3_4. [DOI] [Google Scholar]
- 33.Ravi N., Verma S., Kavita, Zaman N.Z., Talib M.N. Securing VANET Using Blockchain Technology. J. Phys. Conf. Ser. 2021;1979:012035. doi: 10.1088/1742-6596/1979/1/012035. [DOI] [Google Scholar]
- 34.Gupta V. Ideas on ad hoc networks and power aware networks. IJFRCSCE. 2018;4:2554–4248. [Google Scholar]
- 35.Maseleno A. Design of Optimal Machine Learning based Cybersecurity Intrusion Detection Systems. J. Cybersecur. Inf. Manag. 2019:32–43. doi: 10.54216/JCIM.000103. [DOI] [Google Scholar]
- 36.Elsharkawy M., Al Masri A.N. A Novel Image Encryption with Deep Learning Model for Secure Content based Image Retrieval. J. Cybersecur. Inf. Manag. 2019:54–64. doi: 10.54216/JCIM.000105. [DOI] [Google Scholar]