Skip to main content
Top

2019 | OriginalPaper | Chapter

The Blockchain Random Neural Network in Cybersecurity and the Internet of Things

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) enables increased connectivity between devices; however, this benefit also intrinsically increases cybersecurity risks as cyber attackers are provided with expanded network access and additional digital targets. To address this issue, this paper presents a holistic digital and physical cybersecurity user authentication method based on the Blockchain Random Neural Network. The Blockchain Neural Network connects increasing neurons in a chain configuration providing an additional layer of resilience against Cybersecurity attacks in the IoT. The proposed user access authentication covers holistically its digital access through the seven OSI layers and its physical user identity such as passport before the user is accepted in the IoT network. The user’s identity is kept secret codified in the neural weights, although in case of cybersecurity breach, its physical identity can be mined and the attacker identified, therefore enabling a safe decentralized confidentiality. The validation results show that the addition of the Blockchain Neural Network provides a user access control algorithm with increased cybersecurity resilience and decentralized user access and connectivity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference International Telecommunication Union. Overview of the Internet of Things. Y.2060, 1–22 (2012) International Telecommunication Union. Overview of the Internet of Things. Y.2060, 1–22 (2012)
2.
go back to reference Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication, pp. 180–187 (2015) Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: IEEE Symposium on Computers and Communication, pp. 180–187 (2015)
3.
go back to reference Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: IEEE International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 32–37 (2017) Deogirikar, J., Vidhate, A.: Security attacks in IoT: a survey. In: IEEE International Conference on IoT in Social, Mobile, Analytics and Cloud, pp. 32–37 (2017)
4.
go back to reference Granjal, J., Monteiro, E., Sá Silva, J.: Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef Granjal, J., Monteiro, E., Sá Silva, J.: Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294–1312 (2015)CrossRef
5.
go back to reference Huh, S., Cho, S., Kim, S.: Managing IoT devices using Blockchain platform. In: International Conference on Advanced Communication Technology, pp. 464–467 (2017) Huh, S., Cho, S., Kim, S.: Managing IoT devices using Blockchain platform. In: International Conference on Advanced Communication Technology, pp. 464–467 (2017)
7.
go back to reference Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: securing a Blockchain applied to smart contracts. In: International Conference on Consumer Electronics, pp. 467–468 (2016) Watanabe, H., Fujimura, S., Nakadaira, A., Miyazaki, Y., Akutsu, A., Kishigami, J.: Blockchain contract: securing a Blockchain applied to smart contracts. In: International Conference on Consumer Electronics, pp. 467–468 (2016)
8.
go back to reference Yuan, Y., Wang, F.-Y.: Towards Blockchain-based intelligent transportation systems. In: International Conference on Intelligent Transportation Systems, pp. 2663–2668 (2016) Yuan, Y., Wang, F.-Y.: Towards Blockchain-based intelligent transportation systems. In: International Conference on Intelligent Transportation Systems, pp. 2663–2668 (2016)
9.
go back to reference Biswas, K., Muthukkumarasamy, V.: Securing smart cities using Blockchain technology. In: International Conference High Performance Computing and Communications/SmartCity/Data Science and Systems, pp. 1392–1393 (2016) Biswas, K., Muthukkumarasamy, V.: Securing smart cities using Blockchain technology. In: International Conference High Performance Computing and Communications/SmartCity/Data Science and Systems, pp. 1392–1393 (2016)
12.
go back to reference Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014)CrossRef Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014)CrossRef
13.
go back to reference Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Comput. Soc. 0018–9162, 51–58 (2011)CrossRef Roman, R., Najera, P., Lopez, J.: Securing the Internet of Things. IEEE Comput. Soc. 0018–9162, 51–58 (2011)CrossRef
14.
go back to reference Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146–164 (2015)CrossRef
15.
go back to reference Zhou, L., Chao, H.: Multimedia traffic security architecture for the Internet of Things. IEEE Netw. 0890–8044, 35–40 (2011)CrossRef Zhou, L., Chao, H.: Multimedia traffic security architecture for the Internet of Things. IEEE Netw. 0890–8044, 35–40 (2011)CrossRef
16.
go back to reference Gelenbe, E., Domanska, J., Czàchorski, T., Drosou, A., Tzovaras, D.: Security for Internet of Things: the SerIoT project. In: IEEE International Symposium on Networks, Computers and Communications, pp. 1–5 (2018) Gelenbe, E., Domanska, J., Czàchorski, T., Drosou, A., Tzovaras, D.: Security for Internet of Things: the SerIoT project. In: IEEE International Symposium on Networks, Computers and Communications, pp. 1–5 (2018)
18.
go back to reference Pointcheval, D.: Neural networks and their cryptographic applications. Livre des resumes In: Eurocode Institute for Research in Computer Science and Automation, pp. 1–7 (1994) Pointcheval, D.: Neural networks and their cryptographic applications. Livre des resumes In: Eurocode Institute for Research in Computer Science and Automation, pp. 1–7 (1994)
19.
go back to reference Kinzel, W., Kanter, I.: Interacting neural networks and cryptography secure exchange of information by synchronization of neural networks. In: Advances in Solid State Physic, vol. 42, 383–391 (2002) Kinzel, W., Kanter, I.: Interacting neural networks and cryptography secure exchange of information by synchronization of neural networks. In: Advances in Solid State Physic, vol. 42, 383–391 (2002)
21.
go back to reference Volna, E., Kotyrba, M., Kocian, V., Janosek, M.: Cryptography based on the neural network. In: European Conference on Modelling and Simulation, pp. 1–6 (2012) Volna, E., Kotyrba, M., Kocian, V., Janosek, M.: Cryptography based on the neural network. In: European Conference on Modelling and Simulation, pp. 1–6 (2012)
22.
go back to reference Yayık, A., Kutlu, Y.: Neural network based cryptography. Int. J. Neural Mass Parallel Comput. Inf. Syst. 24(2), 177–192 (2014) Yayık, A., Kutlu, Y.: Neural network based cryptography. Int. J. Neural Mass Parallel Comput. Inf. Syst. 24(2), 177–192 (2014)
23.
go back to reference Schmidt, T., Rahnama, H., Sadeghian, A.: A review of applications of artificial neural networks in cryptosystems. In: World Automation Congress, pp. 1–6 (2008) Schmidt, T., Rahnama, H., Sadeghian, A.: A review of applications of artificial neural networks in cryptosystems. In: World Automation Congress, pp. 1–6 (2008)
24.
go back to reference Xu, D., Xiao, L., Sun, L., Lei, M.: Game theoretic study on Blockchain based secure edge networks. In: IEEE International Conference on Communications in China, pp. 1–5 (2017) Xu, D., Xiao, L., Sun, L., Lei, M.: Game theoretic study on Blockchain based secure edge networks. In: IEEE International Conference on Communications in China, pp. 1–5 (2017)
25.
go back to reference Cha, S.-C., Yeh, K.-H.: An ISO/IEC 15408-2 compliant security auditing system with Blockchain technology. In: IEEE Conference on Communications and Network Security, pp. 1–2 (2018) Cha, S.-C., Yeh, K.-H.: An ISO/IEC 15408-2 compliant security auditing system with Blockchain technology. In: IEEE Conference on Communications and Network Security, pp. 1–2 (2018)
26.
go back to reference Gai, K., Raymond, K.-K., Zhu, L.: Blockchain-enabled reengineering of cloud datacenters. IEEE Cloud Comput. 5(6), 21–25 (2018)CrossRef Gai, K., Raymond, K.-K., Zhu, L.: Blockchain-enabled reengineering of cloud datacenters. IEEE Cloud Comput. 5(6), 21–25 (2018)CrossRef
27.
go back to reference Gupta, Y., Shorey, R., Kulkarni, D., Tew, J.: The applicability of Blockchain in the Internet of Things. In: IEEE International Conference on Communication Systems & Networks, pp. 561–564 (2018) Gupta, Y., Shorey, R., Kulkarni, D., Tew, J.: The applicability of Blockchain in the Internet of Things. In: IEEE International Conference on Communication Systems & Networks, pp. 561–564 (2018)
28.
go back to reference Agrawal, R., Verma, P., Sonanis, R., Goel, U., De, A., Anirudh, S., Shekhar, S.: Continuous security in IoT using Blockchain. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6423–6427 (2018) Agrawal, R., Verma, P., Sonanis, R., Goel, U., De, A., Anirudh, S., Shekhar, S.: Continuous security in IoT using Blockchain. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 6423–6427 (2018)
29.
go back to reference Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1, 502–510 (1989)CrossRef Gelenbe, E.: Random neural networks with negative and positive signals and product form solution. Neural Comput. 1, 502–510 (1989)CrossRef
30.
go back to reference Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5, 154–164 (1993)CrossRef Gelenbe, E.: Learning in the recurrent random neural network. Neural Comput. 5, 154–164 (1993)CrossRef
Metadata
Title
The Blockchain Random Neural Network in Cybersecurity and the Internet of Things
Author
Will Serrano
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-19823-7_4

Premium Partner