Smart City Gnosys

Smart city article details

Title Harnessing Blockchain With Ensemble Deep Learning-Based Distributed Dos Attack Detection In Iot-Assisted Secure Consumer Electronics Systems
ID_Doc 28753
Authors Alrayes F.S.; Aljebreen M.; Alghamdi M.; Alrslani F.A.F.; Alshuhail A.; Almukadi W.S.; Basheti I.; Sharif M.M.
Year 2024
Published Fractals, 32, 9-10
DOI http://dx.doi.org/10.1142/S0218348X25400444
Abstract Consumer electronics (CE) and the Internet of Things (IoTs) are transforming daily routines by integrating smart technology into household gadgets. IoT allows devices to link and communicate from the Internet with better functions, remote control, and automation of various complex systems simulation platforms. The quick progress in IoT technology has continuously driven the progress of further connected and intelligent CEs, shaping more smart cities and homes. Blockchain (BC) technology is emerging as a promising technology offering immutable distributed ledgers that improve the security and integrity of data. However, even with BC resilience, the IoT ecosystem remains vulnerable to Distributed Denial of Service (DDoS) attacks. In contrast, the malicious actor overwhelms the network with traffic, disrupting services and compromising device functionality. Incorporating BC with IoT infrastructure presents groundbreaking techniques to alleviate these threats. IoT networks can better detect and respond to DDoS attacks in real time by leveraging BC cryptographic techniques and decentralized consensus mechanisms, which safeguard against disruptions and enhance resilience. There must be a reliable mechanism of recognition based on adequate techniques to detect and identify whether these attacks have happened or not in the system. Artificial intelligence (A) is the most common technique that uses machine learning (ML) and deep learning (DL) to recognize cyber threats. This research presents a new Blockchain with Ensemble Deep Learning-based Distributed DoS Attack Detection (BCEDL-DDoSD) approach in the IoT platform. The primary intention of the BCEDL-DDoSD approach is to leverage BC with a DL-based attack recognition process in the IoT platform. BC technology is utilized to enable a secure data transmission process. In the BCEDL-DDoSD approach, Z-score normalization is initially employed to measure the input data. Besides, the selection of features takes place using the Fractal Wombat optimization algorithm (WOA). For attack recognition, the BCDL-DDoSD technique applies an ensemble of three models, namely denoising autoencoder (DAE), gated recurrent unit (GRU), and long short-term memory (LSTM). Lastly, an orca predator algorithm (OPA)-based hyperparameter tuning procedure has been implemented to select the parameter value of DL models. A sequence of simulations is made on the benchmark database to authorize the performance of the BCDL-DDoSD approach. The simulation results showed that the BCDL-DDoSD approach performs better than other DL techniques. © 2024 The Author(s).
Author Keywords Blockchain; Complex Systems; Consumer Electronics; Cyberattacks; Deep Learning; Distributed DoS Attack; IDS; Internet of Things; Orca Predators Algorithm


Similar Articles


Id Similarity Authors Title Published
23639 View0.908Perumal E.; Arulanthu P.; Ramachandran R.; Singh R.Enhanced Metaheuristics With Deep Learning Model For Blockchain Assisted Cyber Security Solution In Internet Of Things Environment2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024 (2024)
2219 View0.884Alotaibi J.A Hybrid Software-Defined Networking Approach For Enhancing Iot Cybersecurity With Deep Learning And Blockchain In Smart CitiesPeer-to-Peer Networking and Applications, 18, 3 (2025)
40871 View0.882Villegas-Ch W.; Govea J.; Gutierrez R.; Mera-Navarrete A.Optimizing Security In Iot Ecosystems Using Hybrid Artificial Intelligence And Blockchain Models: A Scalable And Efficient Approach For Threat DetectionIEEE Access, 13 (2025)
33934 View0.88Shukla P.; Krishna C.R.; Patil N.V.Iot Traffic-Based Ddos Attacks Detection Mechanisms: A Comprehensive ReviewJournal of Supercomputing, 80, 7 (2024)
1280 View0.879Hsu M.-H.; Liu C.-C.A Decentralized Framework For The Detection And Prevention Of Distributed Denial Of Service Attacks Using Federated Learning And Blockchain Technology †Engineering Proceedings, 92, 1 (2025)
12424 View0.877Shah Z.; Ullah I.; Li H.; Levula A.; Khurshid K.Blockchain Based Solutions To Mitigate Distributed Denial Of Service (Ddos) Attacks In The Internet Of Things (Iot): A SurveySensors, 22, 3 (2022)
19238 View0.873Thiruppathi K.; Jaidhar C.D.Detection And Mitigation Of Iot Based Ddos Attack Using Extended Mud Enabled Device Profiling TechniquesCommunications in Computer and Information Science, 2333 CCIS (2025)
18314 View0.871Abdulla H.; Al-Raweshidy H.S.; Awad W.Denial Of Service Detection For Iot Networks Using Machine LearningInternational Conference on Agents and Artificial Intelligence, 3 (2023)
17574 View0.871Ahmadi K.; Javidan R.Ddos Attack Detection In A Real Urban Iot Environment Using Federated Deep LearningProceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023 (2023)
12622 View0.87Babu E.S.; BKN S.; Nayak S.R.; Verma A.; Alqahtani F.; Tolba A.; Mukherjee A.Blockchain-Based Intrusion Detection System Of Iot Urban Data With Device Authentication Against Ddos AttacksComputers and Electrical Engineering, 103 (2022)