A Secure Framework for IoT Applications Using Blockchain and Artificial Intelligence
Article Sidebar
Main Article Content
Abstract - This research addresses key security and privacy challenges in IoT by proposing a multi-layered security framework. It includes formal verification of IoT protocols using the Scyther tool for secure communication, a hybrid intrusion detection system using LSTM and Deep Reinforcement Learning, and an ensemble model combining CNNs with a Quantum Neural Network to improve detection accuracy. Additionally, a blockchain-based system with Improved PCA and a GRU–Deep Belief Network classifier enhances accuracy and reduces false positives. Experiments demonstrate strong performance, with detection accuracy up to 97.26% and improved reliability through blockchain integration.
Downloads
References
National Research Council. 1999. Funding a Revolution: Government Support for Computing Research. Washington, DC: The National Academies Press. https://doi.org/10.17226/6323.
Qi, Lianyong & Khosravi, Mohammad & Xu, Xiaolong & Zhang, Yiwen & Menon, Varun. (2021). Cloud Computing. 10.1007/978-3-030-69992-5.
Beri, Rydhm& Singh, Jaspreet. (2020). Cloud computing.
P, Krishna Sankar& N P, Shangaranarayanee & Saravanan, K. (2020). Cloud Computing.
Manvi, Sunilkumar& Shyam, Gopal. (2021). Cloud Computing: Concepts and Technologies. 10.1201/9781003093671.
Kumar, Abhishek &Sanjeevi kumar, P. &kumar, vishal. (2021). Blockchain Security in Cloud Computing. 10.1007/978-3-030-70501-5.
P, Krishna Sankar& N P, Shangaranarayanee & Saravanan, K. (2020). Cloud Computing.
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/france
FRAUD THE FACTS 2019 | The Definitive Overview of Payment Industry Fraud
John Gantz and David Reinsel, THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadow s, and Biggest Grow th in the Far East, https://www.cs.princeton.edu/courses/archive/spring13/cos598C/idc-the-digital-universe-in-2020.pdf https://www.cloudtp.com/doppler/cloud-economics-getting-bigger-picture/
https://www.vxchnge.com/blog/different-types-of-cloud-computing
Hayes, Patrick & Morgenstern, Leora. (2007). On John McCarthy's 80th Birthday, in Honor of His Contributions. AI Magazine. 28. 93-102. 10.1609/aimag. v28i4.2063.
David W Cearley, Cloud Computing: Key Initiative Overview, Gartner Report, 2010
Peter Mell and Tim Grance, The NIST Definition of Cloud Computing, version 15, National Institute of Standards and Technology (NIST), Information Technology Laboratory, www.csrc.nist.gov, 7 Oct 2009
Dustin Amrhein and Scott Quint, Cloud Computing for the Enterprise: Part 1: Capturing the Cloud, DeveloperWorks, IBM, 8 Apr 2009.
Saurabh Chauhan, Dharamveer Singh, Atul Kumar Singh (2022) “Artificial Intelligence in The Military: An Overview of The Capabilities, Applications, And Challenges”, Journal of Survey in Fisheries Sciences, Vol 9 (2) pp 984-991. https://doi.org/10.53555/sfs.v9i2.2911
Kiran, Dharamveer Singh, Nitin Goyal, (2023) “Analysis Of How Digital Marketing Affect By Voice Search”, Journal of Survey in Fisheries Sciences, Vol. 30 (2) 407-412. https://doi.org/10.53555/sfs.v10i3.2890
Yukti Tyagi, Dharamveer Singh, Ramander Singh, Sudhir Dawra (2024) “Analysis of The Most Recent Trojans On the Android Operating System”, Educational Administration: Theory and Practice, Vol. 30(2) 1320-1327. https://doi.org/10.53555/kuey.v30i2.6846
Shivanee Singh, Dharamveer Singh, Ravindra Chauhan (2023) “Manufacturing Industry: A Sustainability Perspective on Cloud and Edge Computing”, Journal of Survey in Fisheries Sciences, pp 1592-1598. https://doi.org/10.53555/sfs.v10i2.2889

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.