A Secure Framework for IoT Applications Using Blockchain and Artificial Intelligence

Article Sidebar

Main Article Content

Tina Yadav
Ravindra Chauhan

Abstract - This research addresses key security and privacy challenges in IoT by proposing a multi-layered security framework. It includes formal verification of IoT protocols using the Scyther tool for secure communication, a hybrid intrusion detection system using LSTM and Deep Reinforcement Learning, and an ensemble model combining CNNs with a Quantum Neural Network to improve detection accuracy. Additionally, a blockchain-based system with Improved PCA and a GRU–Deep Belief Network classifier enhances accuracy and reduces false positives. Experiments demonstrate strong performance, with detection accuracy up to 97.26% and improved reliability through blockchain integration.

A Secure Framework for IoT Applications Using Blockchain and Artificial Intelligence. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(7), 401-404. https://doi.org/10.51583/IJLTEMAS.2025.1407000046

Downloads

References

National Research Council. 1999. Funding a Revolution: Government Support for Computing Research. Washington, DC: The National Academies Press. https://doi.org/10.17226/6323.

Qi, Lianyong & Khosravi, Mohammad & Xu, Xiaolong & Zhang, Yiwen & Menon, Varun. (2021). Cloud Computing. 10.1007/978-3-030-69992-5.

Beri, Rydhm& Singh, Jaspreet. (2020). Cloud computing.

P, Krishna Sankar& N P, Shangaranarayanee & Saravanan, K. (2020). Cloud Computing.

Manvi, Sunilkumar& Shyam, Gopal. (2021). Cloud Computing: Concepts and Technologies. 10.1201/9781003093671.

Kumar, Abhishek &Sanjeevi kumar, P. &kumar, vishal. (2021). Blockchain Security in Cloud Computing. 10.1007/978-3-030-70501-5.

P, Krishna Sankar& N P, Shangaranarayanee & Saravanan, K. (2020). Cloud Computing.

https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/france

FRAUD THE FACTS 2019 | The Definitive Overview of Payment Industry Fraud

John Gantz and David Reinsel, THE DIGITAL UNIVERSE IN 2020: Big Data, Bigger Digital Shadow s, and Biggest Grow th in the Far East, https://www.cs.princeton.edu/courses/archive/spring13/cos598C/idc-the-digital-universe-in-2020.pdf https://www.cloudtp.com/doppler/cloud-economics-getting-bigger-picture/

https://www.vxchnge.com/blog/different-types-of-cloud-computing

Hayes, Patrick & Morgenstern, Leora. (2007). On John McCarthy's 80th Birthday, in Honor of His Contributions. AI Magazine. 28. 93-102. 10.1609/aimag. v28i4.2063.

David W Cearley, Cloud Computing: Key Initiative Overview, Gartner Report, 2010

Peter Mell and Tim Grance, The NIST Definition of Cloud Computing, version 15, National Institute of Standards and Technology (NIST), Information Technology Laboratory, www.csrc.nist.gov, 7 Oct 2009

Dustin Amrhein and Scott Quint, Cloud Computing for the Enterprise: Part 1: Capturing the Cloud, DeveloperWorks, IBM, 8 Apr 2009.

Saurabh Chauhan, Dharamveer Singh, Atul Kumar Singh (2022) “Artificial Intelligence in The Military: An Overview of The Capabilities, Applications, And Challenges”, Journal of Survey in Fisheries Sciences, Vol 9 (2) pp 984-991. https://doi.org/10.53555/sfs.v9i2.2911

Kiran, Dharamveer Singh, Nitin Goyal, (2023) “Analysis Of How Digital Marketing Affect By Voice Search”, Journal of Survey in Fisheries Sciences, Vol. 30 (2) 407-412. https://doi.org/10.53555/sfs.v10i3.2890

Yukti Tyagi, Dharamveer Singh, Ramander Singh, Sudhir Dawra (2024) “Analysis of The Most Recent Trojans On the Android Operating System”, Educational Administration: Theory and Practice, Vol. 30(2) 1320-1327. https://doi.org/10.53555/kuey.v30i2.6846

Shivanee Singh, Dharamveer Singh, Ravindra Chauhan (2023) “Manufacturing Industry: A Sustainability Perspective on Cloud and Edge Computing”, Journal of Survey in Fisheries Sciences, pp 1592-1598. https://doi.org/10.53555/sfs.v10i2.2889

Article Details

How to Cite

A Secure Framework for IoT Applications Using Blockchain and Artificial Intelligence. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(7), 401-404. https://doi.org/10.51583/IJLTEMAS.2025.1407000046