Skip to main content
Computational Intelligence and Neuroscience logoLink to Computational Intelligence and Neuroscience
. 2022 Jun 8;2022:8927830. doi: 10.1155/2022/8927830

Deep Learning-Based Privacy-Preserving Data Transmission Scheme for Clustered IIoT Environment

Kuruva Lakshmanna 1, R Kavitha 2, B T Geetha 3, Ashok Kumar Nanda 4, Arun Radhakrishnan 5,, Rachna Kohar 6
PMCID: PMC9200536  PMID: 35720880

Abstract

The Industrial Internet of Things (IIoT) has received significant attention from several leading industries like agriculture, mining, transport, energy, and healthcare. IIoT acts as a vital part of Industry 4.0 that mainly employs machine learning (ML) to investigate the interconnection and massive quantity of the IIoT data. As the data are generally saved at the cloud server, security and privacy of the collected data from numerous distributed and heterogeneous devices remain a challenging issue. This article develops a novel multi-agent system (MAS) with deep learning-based privacy preserving data transmission (BDL-PPDT) scheme for clustered IIoT environment. The goal of the BDL-PPDT technique is to accomplish secure data transmission in clustered IIoT environment. The BDL-PPDT technique involves a two-stage process. Initially, an enhanced moth swarm algorithm-based clustering (EMSA-C) technique is derived to choose a proper set of clusters in the IIoT system and construct clusters. Besides, multi-agent system is used to enable secure inter-cluster communication. Moreover, multi-head attention with bidirectional long short-term memory (MHA-BLSTM) model is applied for intrusion detection process. Furthermore, the hyperparameter tuning process of the MHA-BLSTM model can be carried out by the stochastic gradient descent with momentum (SGDM) model to improve the detection rate. For examining the promising performance of the BDL-PPDT technique, an extensive comparison study takes place and the results are assessed under varying measures. A significant amount of capital is required. It goes without saying that one of the most obvious industrial IoT concerns is the high cost of adoption. Secure data storage and management connectivity failures are common among IoT devices due to the massive amount of data they create. The simulation results demonstrate the enhanced outcomes of the BDL-PPDT technique over the recent methods. Despite the fact that the offered BDL-PPDT technique has an accuracy of just 98.15 percent, it produces the best feasible outcome. Because of the data analysis conducted as detailed above, it was determined that the BDL-PPDT technique outperformed the other current techniques on a range of different criteria and was thus recommended.

1. Introduction

Industrial Internet of Things (IIoT) employs actuators and sensors with communication and computation capabilities to transform the way the information is exchanged, analyzed, transformed, and collected into decisions [1]. This pervasive capability results in advanced Industry 4.0 (called Industrial Internet) application for enhanced efficiency and productivity in large industries like healthcare, energy, agriculture, mining, and transportation. The innovative Industry 4.0 features, namely, ML-based quality control and predictive maintenance and run-time reasoning, need to be simplified by distributed data acquisition [2]. In IIoT-based systems like open banking and smart healthcare, ML and data methods trained with the local boundary should be interacted with the branches or users to make organization-wider knowledge [3]. Often, vendors desired to limit their internal insight on product improvements and development with the organizational boundary for increasing business values against their contender. Furthermore, industries like open banking and smart healthcare are vastly convoluted with human-specific sensitive information [4]. ML model is trained on sensitive information that could expose confidential or private data to the attackers [5]. Therefore, trustworthiness and privacy are the key elements of ML in IIoT system. The Internet of Things is one of the primary drivers of the Industry 4.0 movement, since it enables greater automation, data collection, and analytics, as well as workflow and process optimization. The intelligence enabled by the Internet of Things enables devices to work cooperatively to produce outputs on an assembly line. MAS as a popular technique to offer trusts with distributed and decentralized settings might be employed in lots of potential applications, namely, supply chain management, IIoT, and healthcare [6]. The Internet of Things is a major driver of the Industry 4.0 movement since it enables increased automation, data collection, and analytics, as well as workflow and process optimization. The Internet of Things' intelligence enables devices to operate together on an assembly line to produce outputs. A multi-agent system (MAS or “self-organized system”) is a computerized system that is built of numerous intelligent agents that communicate with one another. Multi-agent systems are capable of resolving problems that a solo agent or a monolithic system would find difficult or impossible to solve. Methodical, functional, or procedural techniques, algorithmic search, or reinforcement learning can all be considered forms of intelligence. Among them, it is the mainstream application field, where blockchain is regarded as enabling technology for various applications. IIoT setup is a well-developed and also comprehensive deployment that can increase multiple challenges involving ensuring confidentiality, improving data accountability, availability, integrity, and availability (CIA). Blockchain can address this requirement and acts as a significant role by providing secure and verifiable solutions to store and share data [7]. IIoT application has requirements of similar kinds to guarantee trust and data integrity between several shareholders related to dissimilar parts of the logistic chain (e.g., storage, acquiring raw material, processing to customer, transportation, and industrial deployment). Also, in this application, requirements such as monitoring and maintaining history of each procedure are vital. The conventional security method has a number of constraints and does not fit for intelligent grid systems; for example, secured end-to-end encryption method could produce higher false alarm rate and interrupt analytical approach [8]. There is a considerable range of potential smart grid risks, like passive and active attacks. Another way of the attack is the smart grids, namely, sniffing the information from the CPS through open source data, and in active attack, the hackers can change the information through data poisoning attack or inference attack [9]. In data poisoning attacks, attackers attempt to change the standard information.

This article develops a novel MAS with deep learning-based privacy-preserving data transmission (BDL-PPDT) scheme for clustered IIoT environment. This research proposes a unique multi-agent system (MAS) method for clustered IIoT environments using deep learning-based privacy preserving data transmission (BDL-PPDT). The BDL-PPDT technique's objective is to achieve secure data transfer in a clustered IIoT environment. The BDL-PPDT technique involves the design of an enhanced moth swarm algorithm-based clustering (EMSA-C) technique for cluster head (CH) selection. In addition, blockchain technology (BCT) is applied for accomplishing secure inter-cluster communication. Furthermore, a new multi-head attention with bidirectional long short-term memory (MHA-BLSTM) model is used to find intrusions. To increase the detection rate, the stochastic gradient descent with momentum (SGDM) model can be used to tune the MHA-BLSTM model's hyperparameters. Finally, the stochastic gradient descent with momentum (SGDM)-based hyperparameter tuning process takes place. To inspect the significant performance of the BDL-PPDT technique, a wide-ranging comparative analysis is made and the results are inspected in terms of different measures.

2. Related Works

Sodhro et al. [10] proposed sustainable, secure, efficient, and reliable blockchain-driven methods. The presented method handles key arbitrarily by presenting the chain of blocks with a smaller amount of cores, less power drain, computation bit, and transmission. Next is an analytic hierarchy process (AHP) based smart decision-making method for the blockchaindriven that is more secured, reliable, sustainable, interoperable, and concurrent IIoT. Rahman et al. [11] presented a blockchain-based architecture to provision a verifiable query and privacy-preserving facilities to end-user in IIoT system. The architecture employs blockchain to save broad information as off-chain data and to save IoT information as on-chain data and provision search service to the user by performing a query in off-chain and on-chain data as well as generate an effective result.

Zhang et al. [12] developed a medical data privacy protection architecture-based blockchain (MPBC). In this method, they secure confidentiality by including different privacy noises to federated learning. Additionally, the increasing amount of healthcare data can make blockchain storage challenges. Thus, a storage mode is presented for reducing the storage burden of blockchain. The new information is locally stored and the hash values are estimated by IPFS and are saved in blockchain. Deebak and Al-Turjman [13] introduced a privacy-preserving smart contract with blockchain and artificial intelligence (PPSC-BCAI) architecture which facilitates system activities, human interaction, security risks, fraudulent claims, and service alerts. In order to examine the data sharing and transaction, an XGBoost is employed.

Weng et al. [14] proposed a secure, fair, and distributed DL architecture called DeepChain to resolve this problem. DeepChain provides a value-driven incentive method based on blockchain for forcing the participant to perform properly. In the meantime, DeepChain ensures data privacy for all the participants and provides auditability for the entire training procedure. Arachchige et al. [15] presented an architecture called PriModChain which forces trustworthiness and privacy on IIoT information by amalgamating federated ML, differential privacy, smart contracts, and Ethereum blockchain. The possibility of PriModChain based on resilience, privacy, security, reliability, and safety is estimated by the simulation technologically advanced in Python with socket programming on a multipurpose computer.

Kumar and Tripathi [16] designed a deep blockchain-based trustworthy privacy-preserving secured framework (DBTP2SF) for IIoT. This architecture contains two-phase privacy-preservation model, anomaly detection module, and trust management module. In the two-phase privacy model, a BC-enabled improved proof of work method is concurrently employed with AE, to convert cyber physical information to a novel form which avoids poisoning and inference attacks.

3. The Proposed Model

In this study, an effective BDL-PPDT technique has been developed to accomplish secure data transmission in clustered IIoT environment. The BDL-PPDT technique has presented a new EMSA-C technique to choose a proper set of clusters in the IIoT system and construct clusters. Next, the MHA-BLSTM with SGDM model is utilized for intrusion detection and the hyperparameter tuning process is made by the SGDM model resulting in improved detection performance. Figure 1 illustrates the overall process of BDL-PPDT manner.

Figure 1.

Figure 1

Working process of BDL-PPDT approach.

3.1. Process Involved in EMSA-C Technique

The nocturnal behaviors of moth are the motivation for the MSA [17]. In the model, the exploration and exploitation tradeoff considers a divider of candidate solutions generating the population:

  1. Onlooker (to exploit the optimal region discovered by the prospector).

  2. Pathfinder (to explore novel region of the searching space).

  3. Prospector (to exploit the novel regions attained by the pathfinder).

With other meta-heuristics models, this one begins with population initialization:

xij=r and·ujlj+lj,i,2,n,j,2,d, (1)

whereas u and l represent maximum and minimum bounds of the searching space, χi denotes the candidate solution, n indicates the population size, d signifies the dimensionality of problems, and rand means an arbitrary number drawn from a uniform distribution. For generating pathfinder crossover, it is essential to estimate the variation coefficient and dispersal degree at iteration t:

σjt=1/npi=1npxijtPjt2Pjt, (2)
μt=1dj=1dσjt, (3)

whereas np represents the amount of pathfinders

Pjt=1npi=1npxiij. (4)

In the MSA, the crossover point represents minimum dispersal value, as follows:

jcp if  σjtμt. (5)

Form this, nccp crossover point is employed for creating a novel sub‐trial pathfinder vector vp=vp1,vp2,,vpnc from the novel pathfinder χp=χp1,χp2,,χpnc:

vpt=xr1t+Lp1t·xr2txr3t+Lp2t·xr4txr5t, (6)
r1r2r3r4r5p1,2,,np. (7)

For each of the independent variables [18], the variables Lpl and Lp2 are calculated using the Lévy stable distribution. There should only be one set of indexes r selected from the pathfinder solution, in which Lpl and Lp2 represent independent variable calculated from the Lévy α‐stable distribution [18]. The set of indexes r should be only chosen from the pathfinder solution, and position is upgraded by the mutated variable extracted from the sub‐trail vector as follows:

Vpjt=vpjrif jcp,xpjtif jcp. (8)

Lastly, MSA employs a selection approach among the original and trial pathfinders as follows:

xpt+1=xpti if fVptfxpt,vpt otherwise. (9)

The possibility of choosing the next pathfinder is determined by

pp=fitpp=1npfitp. (10)

That employs the luminescence intensity estimated as follows:

fitp=11+fp if fp0,1+fp otherwise. (11)

From the pathfinder, nf individual is chosen as prospector; this value is modified dynamically as follows:

nf=roundnnp×1tT, (12)

where T represents the maximal iteration number. The MSA enables the moth to move in a spiral manner over a pathfinder using equation (12):

xit+1=xitxpt·eθ·cos2πθ+xptp1,2,,np;inp+1,np+2,,nf. (13)

Let θ ∈ [r, 1] be an arbitrary value employed for giving the spiral formation to the prospector path, while r=−1 − (t/T·).

The onlooker is the moth with the minimum luminescent intensity moving toward the shiniest source of light; in MSA, the onlooker is employed for intensifying the exploitation process. Further, the onlooker is separated into Gaussian walk and associative learning using immediate memory. Initially, the onlooker in the real iteration is attained as follows:

xit+1=xit+ε1+ε2·bestgtε3·xit,i,2,,no, (14)

whereas ε2 and ε3 represent uniformly distributed random value, bestg denotes the optimal candidate solution, no=round(nu/2) indicates the amount of onlookers performing a Gaussian movement, nu shows the amount of onlookers, and ε1 means an arbitrary value estimated by

ε1randomsizedNbesttxitbestgt. (15)

The behavior of the moth considered short-term memory and associative learning is upgraded as follows:

xit+1=xit+0.001·G+1gG·ε2·bestpxit+2gG·ε3·bestptxit,i1,2,,nm, (16)

with nm=nuno being the amount of onlookers performing short-term memory and associative learning; 1 − (g/G) indicates a cognitive factor, 2g/G represent a social factor, besrp indicates the optimal light source from the pathfinder, and G ~ N(xitχimin, χimaxχit).

To improve the performance of the MSA, the EMSA is derived by the use of OBL concept. The efficient implementation of OBL contributes approximation of the opposite and current populations in the same generation for identifying optimum candidate solutions of a given problem. Object-based learning (OBL) is a student-centered learning approach that uses objects to facilitate deep learning. Objects may take many forms, small or large, but the method typically involves students handling or working at close quarters with and interrogating physical artefacts. The OBL models have been efficiently used in different meta-heuristics employed for improving convergence speed. The models of the opposite amount should be described in OBL.

Consider NN[x, y] to denote real numbers. The opposite numbers N0 are given by

No=x+yN. (17)

In d-dimension searching region, the depiction may be extended as follows:

Nio=xi+yiNi, (18)

whereas (N1, N2,…Nd) indicates d-dimension searching region and Ni[xi, yi],  i=1,2,…, d. From the OBO, the approach of OBL is employed in this initiation procedure of MSA method and for all iterations in the application of jump rate.

Consider an IoT network of n sensor deployed arbitrarily. In order to be CH selective, the projected SSA executes squirrel population that was utilized by generating suitable clusters and maintaining the lower power employment of systems. Consider X=(X1, X2,…, Xn) stands for the population vector of IoT with n sensors, where Xi(j) ∈ {0,1}. The CH and normal nodes were signified as one and zero. The fundamental population of NP solution has inspired arbitrarily by representing 0 s as well as 1 s and representing as follows:

Xij=1,ifr and popt,0,otherwise, (19)

where popt stands for the recommended percentage of CHs and r and refers to uniform arbitrary values in zero and one. An arbitrarily located sensor node has been decided as K clusters: C1, C2,…, CK. The CH selective has responsible to decrease the cost of FF. Therefore, FF to CH selective was showcased as follows:

fobjCH=i=12wi×f, (20)

with ∑i=12wi=1. The maximum stability period is given by decreasing the Standard Deviation (SD) of the RE of node which is a significant issue. Therefore, SD (σRE) is applicable to measure the control of uniformly distributed load in sensor node and illustrated as follows:

f1=σRE=1nj1nμREEnodej2, (21)

where μRE=(1/n)∑i=1nE(nodei), E(nodei) stands for the RE of ith node, and n depicts the node count. A final objective was dependent upon clustering quality in that function of cluster isolation and cohesion has been implemented. Once the proportion of cohesion for separating was minimal, afterward optimum clustering was executed. It is accomplished by utilizing FF ratio of overall Euclidean distance of CH to CM and restricted Euclidean distance of 2 varying CHs.

f2=Qc=k=1KnodejCkdnodej,CHkminCc,Ck,CcCkdCHc,CHk. (22)

3.2. Secure Inter-Cluster Communication via Blockchain

Generally, blockchain is assumed as a collection of blocks; also, a single block comprises of hash value of the existing block, information about the transaction (Ethereum, bitcoin), timestamp, and previous block. Furthermore, blockchain is determined as common and distributed digital ledger utilized to save the transaction data under different points. Therefore, when an attacker tries to derive information, it is not possible as every block has cryptographic value of the earlier block [19]. Now, each transaction is attained under the application of cryptographic hash values, viz. confirmed by all the miners. It consists of blocks of each transaction and captures same value of the comprehensive ledger. Figure 2 illustrates the framework of blockchain. The blockchain offers the facility to share detailed ledgers in protective, confidential, and shared manner. Decentralized storage is the other source in blockchain, and the massive number of information data is linked and stored from existing blocks to earlier blocks through smart contract code. LitecoinDB, Swarm, SiacoinDB, MoneroDB, BigchainDB, Interplanetary File System (IPFS), and various factors were employed for decentralized dataset.

Figure 2.

Figure 2

Structure of blockchain.

3.3. Intrusion Detection Process

During the intrusion detection process, the MHA-BLSTM with SGDM model is utilized. LSTM is a variant of RNN that could resolve gradient disappearance problems by presenting memory cell state, input gate i, output gate 0, and forget gate f. LSTM could enhance the memory model of NN for receiving training and input data that is appropriate to model time series data, such as text, owing to the design characteristics. BiLSTM is an integration of backward and forward LSTM. The greatest benefit of the model is that the sequence context data are taken fully into account. An LSTM unit contains controlling gate, along with IG it, a forget gate ft, outcome gate 0t, and a memory cell state ct, that affects the unit capacity to update and store data. The IG outcome value lies between 0-1 according to the input ht−1 and wt. Once the outcome is 1, it implies that the cell state data are retained completely, and once the outcome is 0, it is abandoned completely. Then, the IG determines which value needs updating, and the  tanh  layer creates a novel candidate value vector ct˜ that is added to the cell state. Next, both are integrated for updating the cell state ct; lastly, the outcome layer decides the outcome value based on the cell state. Among other, Wf, Uf, bf, Wi, Ui, bj, Wc, Uc, bc, and W0, U0, b0 represent the internal training parameter in the LSTM, σ(·) indicates sigmoid activation function, and ⊙ implies dot multiplication.

ft=σWfwt+Ufht1+bf, (23)
it=σWiwt+Uiht1+bi, (24)
ct˜=tanhWcwc+Ucht1+bc, (25)
ct=itct¯+ftct1, (26)
0t=σW0wt+U0ht1+b0, (27)
ht=ottanh  ct. (28)

The abovementioned method is the computation method of LSTM. As previously mentioned, BiLSTM comprises backward and forward LSTM. LSTM in BiLSTM reads the input from w1 to en for generating ht, and other LSTM reads the input from en to w1 for generating ht1:

ht=LSTMwt,ht1,ct1,t1,m+n, (29)
ht=LSTMwt,ht1,ct1,tm+n,1. (30)

The reverse and forward context representations generated using ht and ht are linked to the long vector,

ht=htht. (31)

Lastly, the output [h1,…hi,…hm, l1,…ljln] of the entire sentence is attained, whereas hi and lj are exploited to signify the output of emoticons and words, correspondingly. Furthermore, set each intermediate layer in BiLSTM for returning the comprehensive output sequence, thus ensuring that the output of all the hidden layers retains the longer‐distance data as possible.

Attention mechanism is used to improve the effects of RNN-based model, and also it consists of dot-product attention and additive attention [20]. The calculation of attention is separated into 3 stages. Initially, utilize F attention function to score key and query to get si; next, utilize softmax function to standardize the scoring results si, for obtaining the weight ai. Lastly, estimate attention that is the weighted average of each value and weight ai. Multi-head attention mechanism has enhanced the classical attention method; thus, all the heads could extract the features of key and query in distinct subsets. More precisely, this feature comes from Q and K that is the projection of key and query in the subspaces. Note that in the multi-head attention model, the attention functions can be the scaled dot-product function that is similar to the classical attention mechanism, excepting the regulating scaling factors [2127]. In this work, h should be debugged continuously for determining the appropriate values. Lastly, the result, i.e., returned in every head, is linearly converted and concatenated to attain multi-head attention. Eventually, transmit the vector from the preceding layer to the densely connected layer. They utilize ReLU function as the activation function for completing the nonlinear transformation. Finally, execute the softmax function on the output of the preceding layer and attain intrusion detection output.

For optimally adjusting the hyperparameter of the MHA-BLSTM model, the SGDM is applied. SGDM is a first-order momentum depending on SGD. The 1st-order momentum represents the exponential moving of the gradient direction at all the moments, nearly equivalent to sum of the gradient vector at the current Tj moment. And, the Tj is denoted by

Tj=11βi. (32)

In another word, the descendant direction at t time is described using the descending direction accumulated before as well as gradient direction of the existing point. The empirical value of β1 is 0.9, which implies the direction of decline is particularly the before accumulated direction of decline.

4. Results and Discussion

In this section, a detailed experimental validation of the BDL-PPDT technique takes place under varying numbers of IoT sensor nodes and rounds. The results are examined in varying aspects. An extensive throughput analysis of the BDL-PPDT technique with other methods is given in Table 1 and Figure 3. The results reported that the BDL-PPDT technique has demonstrated enhanced throughput under every IoT sensor node. For instance, with 100 IoT sensor nodes, the BDL-PPDT technique has offered improved throughput of 99.71 Mbps whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have accomplished decreased NSAN of 69.98 Mbps, 84.17 Mbps, 88.89 Mbps, 88.68 Mbps, and 98.16 Mbps, respectively. Moreover, with 500 IoT sensor nodes, the BDL-PPDT technique has accomplished raised throughput of 89.72 Mbps, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have led to lessening NSAN of 51.48 Mbps, 55.31 Mbps, 62.24 Mbps, 70.42 Mbps, and 85.05 Mbps, respectively.

Table 1.

Result analysis of BDL-PPDT technique with existing approaches.

Packet delivery ratio (%)
IoT sensor nodes DEEC PHC HNS CHSES RDAC-BC BDL-PPDT
100 94.74 94.57 96.80 95.48 98.11 99.72
200 91.93 94.61 96.26 96.44 98.87 99.23
300 92.21 94.32 95.84 96.22 97.10 98.97
400 91.86 91.89 92.53 95.88 96.50 98.84
500 91.45 92.76 94.39 93.53 97.69 98.16

Throughput (Mbps)
IoT sensor nodes DEEC PHC HNS CHSES RDAC-BC BDL-PPDT

100 69.98 84.17 88.89 88.68 98.16 99.71
200 63.40 76.46 83.26 84.32 94.27 98.42
300 61.05 68.33 75.50 76.67 92.03 93.80
400 54.68 60.53 68.89 71.76 88.97 91.57
500 51.48 55.31 62.24 70.42 85.05 89.72

Figure 3.

Figure 3

Throughput analysis of BDL-PPDT technique with existing approaches.

Figure 4 offers the detailed PDR analysis of the BDL-PPDT technique under several IoT sensor nodes. From the results, it can be observed that the BDL-PPDT technique has reported enhanced PDR under every IoT sensor node. For instance, with 100 IoT sensor nodes, the BDL-PPDT technique has gained an increased PDR of 99.72%, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have reached to decrease PDR of 94.74%, 94.57%, 96.80%, 95.48%, and 98.11%, respectively. Besides 500 IoT sensor nodes, the BDL-PPDT technique has exhibited a maximum PDR of 98.16%, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have depicted minimum PDR of 91.45%, 92.76%, 94.39%, 93.53%, and 97.69%, respectively.

Figure 4.

Figure 4

PDR analysis of BDL-PPDT technique with existing approaches.

A brief comparative NLT analysis of the BDL-PPDT technique is illustrated in Table 2 and Figure 5. From the results, it is evident that the BDL-PPDT technique has provided supreme NLT under every IoT sensor node. For instance, with 100 IoT sensor nodes, the BDL-PPDT technique has given superior NLT of 1793 rounds, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have offered inferior NLT of 1386, 1492, 1529, 1588, and 1612 rounds, respectively. Eventually, with 500 IoT sensor nodes, the BDL-PPDT technique has exhibited higher NLT of 3633 rounds, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have attained lower NLT of 3103, 3326, 3289, 3463, and 3547 rounds, respectively.

Table 2.

Comparative analysis of BDL-PPDT technique with varying IoT sensor nodes.

Energy consumption (mJ)
IoT sensor nodes DEEC PHC HNS CHSES RDAC-BC BDL-PPDT
100 0.2058 0.1690 0.1425 0.1165 0.0756 0.0470
200 0.4164 0.3315 0.2576 0.2761 0.1496 0.1176
300 0.5478 0.5684 0.4784 0.4635 0.2343 0.2017
400 0.7226 0.6687 0.6027 0.6048 0.3570 0.2872
500 0.8872 0.8277 0.7007 0.7351 0.4084 0.3654

Network lifetime (rounds)
IoT sensor nodes DEEC PHC HNS CHSES RDAC-BC BDL-PPDT
100 1386 1492 1529 1588 1612 1793
200 1725 1807 1864 1918 2077 2218
300 2305 2271 2389 2405 2613 2756
400 2718 2789 2853 2885 3191 3362
500 3103 3326 3289 3463 3547 3633

Figure 5.

Figure 5

NLT analysis of BDL-PPDT technique with existing approaches.

The ECM analysis of the BDL-PPDT technique with other methods under distinct IoT sensor nodes is represented in Figure 6. The results inferred that the BDL-PPDT technique has managed to offer minimal ECM under all IoT sensor nodes. For instance, with 100 IoT sensor nodes, the BDL-PPDT technique has achieved minimal ECM of 0.0470 mJ, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have obtained maximum ECM of 0.2058 mJ, 0.1690 mJ, 0.1425 mJ, 0.1165 mJ, and 0.0756 mJ, respectively. Furthermore, with 500 IoT sensor nodes, the BDL-PPDT technique has offered a least ECM of 0.3654 mJ, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have reached to an increased ECM of 0.8872 mJ, 0.8277 mJ, 0.7007 mJ, 0.7351 mJ, and 0.4084 mJ, respectively.

Figure 6.

Figure 6

ECM analysis of BDL-PPDT technique with existing approaches.

A brief comparative number of alive sensor node (NASN) analysis of the BDL-PPDT technique takes place in Table 3 and Figure 7. From the results, it can be noticed that the BDL-PPDT technique has accomplished maximum NASN under every round. For instance, with 800 rounds, the BDL-PPDT technique has provided higher NASN of 499, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have gained lower NSAN of 384, 394, 436, 458, and 495 nodes, respectively. Besides, with 3500 rounds, the BDL-PPDT technique has resulted in improved NASN of 210, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have led to reduced NSAN of 12, 19, 28, 30, and 138 nodes, respectively.

Table 3.

NASN analysis of the BDL-PPDT technique with different rounds.

No. of alive sensor nodes
No. of rounds DEEC PHC HNS CHSES RDAC-BC BDL-PPDT
400 404 406 451 476 500 500
800 384 394 436 458 495 499
1200 361 357 418 427 492 497
1600 322 359 390 412 486 492
2000 304 338 395 403 479 489
2400 205 227 288 259 451 470
2800 62 151 190 184 386 387
3200 20 32 37 50 309 320
3500 12 19 28 30 138 210

Figure 7.

Figure 7

NASN analysis of BDL-PPDT technique with varying rounds.

The number of dead sensor node (NDSN) analysis of the BDL-PPDT technique with other methods under distinct rounds is given in Table 4 and Figure 8. The results implied that the BDL-PPDT technique has attained effective outcomes with the lower NDSN under all rounds. For instance, with 800 rounds, the BDL-PPDT technique has achieved minimal NDSN of 1, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have obtained maximum NDSN of 116, 106, 64, 42, and 5 nodes, respectively [2831]. At the same time, with 3500 rounds, the BDL-PPDT technique has offered a least NDSN of 290, whereas the DEEC, PHC, HNS, CHSES, and RDAC-BC techniques have reached to an increased NDSN of 488, 481, 472, 470, and 362 nodes, respectively.

Table 4.

NDSN analysis of the BDL-PPDT technique with different rounds.

No. of dead sensor nodes
No. of rounds DEEC PHC HNS CHSES RDAC-BC BDL-PPDT
400 96 94 49 24 0 0
800 116 106 64 42 5 1
1200 139 143 82 73 8 3
1600 178 141 110 88 14 8
2000 196 162 105 97 21 11
2400 295 273 212 241 49 30
2800 438 349 310 316 114 113
3200 480 468 463 450 191 180
3500 488 481 472 470 362 290

Figure 8.

Figure 8

NDSN analysis of BDL-PPDT technique with varying rounds.

Here, the intrusion detection performance analysis of the BDL-PPDT technique is provided in Table 5 and Figure 9 [21, 22]. The results are tested using the KDDCup99 dataset [23] comprising different classes and 41 features. The results show that the DNN model has gained lower outcomes with the accuy of 91.64%, whereas the LSTM-RNN and GRU-RNN techniques have resulted in moderately reasonable accuy of 93.39% and 92.63%, respectively [3538]. Moreover, the DBN and CNID models have accomplished considerable accuy values of 95.22% and 98.54%, respectively. However, the presented BDL-PPDT technique has reached to maximum outcome with the accuy of 98.15%. The abovementioned result analysis implied that the BDL-PPDT technique has outperformed the other existing techniques in terms of different measures.

Table 5.

Comparative analysis of BDL-PPDT technique with different measures.

Methods Accuracy Precision Recall F1-score Far
DNN model 91.64 97.85 91.99 94.67 8.56
LSTM-RNN 93.39 98.11 94.41 96.12 6.81
GRU-RNN 92.63 97.52 93.45 95.34 7.57
DBN model 95.22 97.55 96.50 97.11 3.98
CNID 98.54 99.98 97.56 98.49 0.02
BDL-PPDT 98.15 99.99 98.64 98.96 0.01

Figure 9.

Figure 9

Accuracy analysis of BDL-PPDT technique with existing approaches.

5. Conclusion

In this study, an effective BDL-PPDT technique has been developed to accomplish secure data transmission in clustered IIoT environment. The BDL-PPDT technique has presented a new EMSA-C technique to choose a proper set of clusters in the IIoT system and construct clusters. Next, the MHA-BLSTM with SGDM model is utilized for intrusion detection and the hyperparameter tuning process is made by the SGDM model resulting in improved detection performance. To inspect the significant performance of the BDL-PPDT technique, a wide-ranging comparative analysis is made and the results are inspected in terms of different measures. The experimental outcome pointed out the improved performance of the BDL-PPDT technique over the recent methods in terms of different measures. In the future, hyperparameter tuning process of the MHA-BLSTM model can be done by the meta-heuristic algorithms to improve the overall performance. Even though the BDL-PPDT method has an accuracy rate of just 98.15 percent, it still gives the best possible result. Because of the data analysis above, it was found that the BDL-PPDT technique outperformed the other current techniques on a wide range of different factors, and so it was recommended that people use it. Meta-heuristic methods will be utilized in the future to modify the hyperparameters of the MHA-BLSTM model, resulting in an overall improvement in overall performance.

Data Availability

The article contains all of the data.

Conflicts of Interest

The authors state that they do not have any conflicts of interest.

References

  • 1.Kim N. Y., Rathore S., Ryu J. H., Park J. H., Park J. H. A survey on cyber physical system security for iot: issues, challenges, threats, solutions. J Inf Process Syst . 2018;14(6):1361–1384. [Google Scholar]
  • 2.Rene Beulah J., Prathiba L., N Murthy G. L., Fantin Irudaya Raj E., Arulkumar N. Blockchain with deep learning-enabled secure healthcare data transmission and diagnostic model. International Journal of Modeling, Simulation, and Scientific Computing . 2020 doi: 10.1142/S1793962322410069. [DOI] [Google Scholar]
  • 3.Lu R., Zhu H., Liu X., Liu J. K., Shao J. Toward efficient and privacy-preserving computing in big data era. IEEE Network . 2014;28(4):46–50. doi: 10.1109/mnet.2014.6863131. [DOI] [Google Scholar]
  • 4.Zhang Y., Qiu M., Tsai C.-W., Hassan M. M., Alamri A. Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Systems Journal . 2015;11(1):88–95. [Google Scholar]
  • 5.Madhan E. S., Neelakandan S., Annamalai R. A novel approach for vehicle type classification and speed prediction using deep learning. Journal of Computational and Theoretical Nanoscience . 2020;17(5):2237–2242. doi: 10.1166/jctn.2020.8877. [DOI] [Google Scholar]
  • 6.Hossain M. S., Al-Hammadi M., Muhammad G. Automatic fruit classification using deep learning for industrial applications. IEEE Transactions on Industrial Informatics . 2019;15(2):1027–1034. doi: 10.1109/tii.2018.2875149. [DOI] [Google Scholar]
  • 7.Paulraj D. An automated exploring and learning model for data prediction using balanced CA-svm. Journal of Ambient Intelligence and Humanized Computing . 2020;12:1–12. [Google Scholar]
  • 8.Iqbal R., Maniak T., Doctor F., Karyotis C. Fault detection and isolation in industrial processes using deep learning approaches. IEEE Transactions on Industrial Informatics . 2019;15(5):3077–3084. doi: 10.1109/tii.2019.2902274. [DOI] [Google Scholar]
  • 9.Peres R. S., Dionisio Rocha A., Leitao P., Barata J. Idarts - towards intelligent data analysis and real-time supervision for industry 4.0. Computers in Industry . 2018;101:138–146. doi: 10.1016/j.compind.2018.07.004. [DOI] [Google Scholar]
  • 10.Sodhro A. H., Pirbhulal S., Muzammal M., Zongwei L. Towards blockchain-enabled security technique for industrial internet of things based decentralized applications. Journal of Grid Computing . 2020;18(4):615–628. doi: 10.1007/s10723-020-09527-x. [DOI] [Google Scholar]
  • 11.Rahman M. S., Khalil I., Moustafa N., Kalapaaking A. P., Bouras A. A blockchain-enabled privacy-preserving verifiable query framework for securing cloud-assisted industrial internet of things systems. IEEE Transactions on Industrial Informatics . 2021;18(7) [Google Scholar]
  • 12.Zhang H., Li G., Zhang Y., Gai K., Qiu M. Blockchain-based privacy-preserving medical data sharing scheme using federated learning. Proceedings of the International Conference on Knowledge Science, Engineering and Management; August 2021; Tokyo, Japan. pp. 634–646. [DOI] [Google Scholar]
  • 13.Deebak B. D., Al-Turjman F. Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements. Journal of Information Security and Applications . 2021;58 doi: 10.1016/j.jisa.2021.102749.102749 [DOI] [Google Scholar]
  • 14.Weng J., Weng J., Zhang J., Li M., Zhang Y., Luo W. Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing . 2019;18(5):p. 1. doi: 10.1109/tdsc.2019.2952332. [DOI] [Google Scholar]
  • 15.Arachchige P. C. M., Bertok P., Khalil I., Liu D., Camtepe S., Atiquzzaman M. A trustworthy privacy preserving framework for machine learning in industrial iot systems. IEEE Transactions on Industrial Informatics . 2020;16(9):6092–6102. doi: 10.1109/tii.2020.2974555. [DOI] [Google Scholar]
  • 16.Kumar R., Tripathi R. DBTP2SF: a deep blockchain‐based trustworthy privacy‐preserving secured framework in industrial internet of things systems. Transactions on Emerging Telecommunications Technologies . 2021;32(4) doi: 10.1002/ett.4222.e4222 [DOI] [Google Scholar]
  • 17.Mohamed A.-A. A., Mohamed Y. S., El-Gaafary A. A. M., Hemeida A. M. Optimal power flow using moth swarm algorithm. Electric Power Systems Research . 2017;142:190–206. doi: 10.1016/j.epsr.2016.09.025. [DOI] [Google Scholar]
  • 18.Neelakandan S., Berlin M. A., Tripathi S., Devi V. B., Bhardwaj I., Arulkumar N. IoT-based traffic prediction and traffic signal control system for smart city. Soft Computing . 2021;25(18):12241–12248. doi: 10.1007/s00500-021-05896-x. [DOI] [Google Scholar]
  • 19.Cyril C. P. D., Beulah J. R., Subramani N., Mohan P., Harshavardhan A., Sivabalaselvamani D. An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurrent Engineering . 2021;29(4):386–395. doi: 10.1177/1063293x211031485. [DOI] [Google Scholar]
  • 20.Ramalingam C., Mohan P. An efficient applications cloud interoperability framework using I-anfis. Symmetry . 2021;13(2):p. 268. doi: 10.3390/sym13020268. [DOI] [Google Scholar]
  • 21.Han C., Lin Q., Guo J., Sun L., Tao Z. A clustering algorithm for heterogeneous wireless sensor networks based on solar energy supply. Electronics . 2018;7(7):p. 103. doi: 10.3390/electronics7070103. [DOI] [Google Scholar]
  • 22.Sindhu V., Prakash M. A survey on task scheduling and resource allocation methods in fog based IoT applications. Communication and Intelligent Systems . 2020;120:89–97. doi: 10.1007/978-981-15-3325-9_7. [DOI] [Google Scholar]
  • 23.Kamalraj R., Neelakandan S., Ranjith Kumar M., Chandra Shekhar Rao V., Anand R., Singh H. Interpretable filter based convolutional neural network (IF-CNN) for glucose prediction and classification using PD-SS algorithm. Measurement . 2021;183 doi: 10.1016/j.measurement.2021.109804.109804 [DOI] [Google Scholar]
  • 24.Neelakandan S., Arun A., Ram Bhukya R., M Hardas B., Ch Anil Kumar T., Ashok M. An automated word embedding with parameter tuned model for web crawling. Intelligent Automation & Soft Computing . 2022;32(3):1617–1632. doi: 10.32604/iasc.2022.022209. [DOI] [Google Scholar]
  • 25.Asha P., Natrayan L., Geetha B. T., et al. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environmental Research . 2022;205 doi: 10.1016/j.envres.2021.112574.112574 [DOI] [PubMed] [Google Scholar]
  • 26.Venu D., Mayuri A. V. R., Neelakandan S., Murthy G. L. N., Arulkumar N., Shelke N. An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication. Optik . 2022;252 doi: 10.1016/j.ijleo.2021.168545.168545 [DOI] [Google Scholar]
  • 27.Neelakandan S., Annamalai R., Rayen S. J., Arunajsmine J. Social media networks owing to disruptions for effective learning. Procedia Computer Science . 2020;172:145–151. doi: 10.1016/j.procs.2020.05.022. [DOI] [Google Scholar]
  • 28.Neelakandan S., Prakash M., Bhargava S., Mohan K., Robert N. R., Upadhye S. Optimal stacked sparse autoencoder based traffic flow prediction in intelligent transportation systems. Virtual and Augmented Reality for Automobile Industry: Innovation Vision and Applications . 2022;412:111–127. doi: 10.1007/978-3-030-94102-4_6. [DOI] [Google Scholar]
  • 29.Kavitha T., Mathai P. P., Karthikeyan C., et al. Deep learning based capsule neural network model for breast cancer diagnosis using mammogram images. Interdisciplinary Sciences: Computational Life Sciences . 2021;14(1):113–129. doi: 10.1007/s12539-021-00467-y. [DOI] [PubMed] [Google Scholar]
  • 30.Sunitha G., Geetha K., Neelakandan S., Pundir A. K. S., Hemalatha S., Kumar V. Intelligent deep learning based ethnicity recognition and classification using facial images. Image and Vision Computing . 2022;121 doi: 10.1016/j.imavis.2022.104404.104404 [DOI] [Google Scholar]
  • 31.Geetha B. T., Santhosh Kumar P., Sathya Bama B., Neelakandan S., Dutta C., Vijendra Babu D. Green energy aware and cluster based communication for future load prediction in IoT. Sustainable Energy Technologies and Assessments . 2022;52 doi: 10.1016/j.seta.2022.102244.102244 [DOI] [Google Scholar]
  • 32.Oliva D., Esquivel-Torres S., Hinojosa S., et al. Opposition-based moth swarm algorithm. Expert Systems with Applications . 2021;184 doi: 10.1016/j.eswa.2021.115481.115481 [DOI] [Google Scholar]
  • 33.Alzubi O. A., Alzubi J. A., Shankar K., Gupta D. Blockchain and artificial intelligence enabled privacy‐preserving medical data transmission in Internet of Things. Transactions on Emerging Telecommunications Technologies . 2021;32(12) doi: 10.1002/ett.4360.e4360 [DOI] [Google Scholar]
  • 34.Wang S., Zhu Y., Gao W., Cao M., Li M. Emotion-semantic-enhanced bidirectional LSTM with multi-head attention mechanism for microblog sentiment analysis. Information . 2020;11(5):p. 280. doi: 10.3390/info11050280. [DOI] [Google Scholar]
  • 35.Harshavardhan A., Boyapati P., Neelakandan S., Abdul-Rasheed Akeji A. A., Singh Pundir A. K., Walia R. LSGDM with biogeography-based optimization (BBO) model for healthcare applications. Journal of Healthcare Engineering . 2022;2022:1–11. doi: 10.1155/2022/2170839.2170839 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 36.Liu G., Zhang J. CNID: research of network intrusion detection based on convolutional neural network. Discrete Dynamics in Nature and Society . 2020;2020:1–11. doi: 10.1155/2020/4705982.4705982 [DOI] [Google Scholar]
  • 37.Singh H., Ramya D., Saravanakumar R., et al. Artificial intelligence based quality of transmission predictive model for cognitive optical networks. Optik . 2022;257 doi: 10.1016/j.ijleo.2022.168789.168789 [DOI] [Google Scholar]
  • 38.University of California. KDD CUP 1999 Data Set . CA, USA: University of California; 1999. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html . [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The article contains all of the data.


Articles from Computational Intelligence and Neuroscience are provided here courtesy of Wiley

RESOURCES