A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications
| dc.contributor.author | Lakhan, Abdullah | |
| dc.contributor.author | Mohammed, Mazin Abed | |
| dc.contributor.author | Abdulkareem, Karrar Hameed | |
| dc.contributor.author | Deveci, Muhammet | |
| dc.contributor.author | Marhoon, Haydar Abdulameer | |
| dc.contributor.author | Nedoma, Jan | |
| dc.contributor.author | Martinek, Radek | |
| dc.date.accessioned | 2024-11-27T09:55:11Z | |
| dc.date.available | 2024-11-27T09:55:11Z | |
| dc.date.issued | 2024 | |
| dc.description.abstract | The Intelligent Transport System (ITS) is an emerging paradigm that offers numerous services at the infrastructure level for vehicle applications. Vehicle-to-infrastructure (V2I) is an advanced form of ITS where diverse vehicle services are deployed on the roadside unit. V2I consists of distributed computing nodes where transport applications are parallel processed. Many research challenges exist in the presented V2I paradigms regarding security, cyber-attacks, and application processing among heterogeneous nodes. These cyber-attacks, Sybil attacks, and their attempts cause a lack of security and degrade the V2I performance in the presented paradigms. This paper presents a new secure blockchain framework that handles cyber-attacks, as mentioned earlier. This paper formulates this complex problem as a combinatorial problem, encompassing concave and convex problems. The convex function minimizes the given constraints, such as time and security risk, and the concave function improves performance and accuracy. Therefore, numerous constraints, such as time, energy, malware detection accuracy, and application deadlines, require optimization for the considered problem. Combining the jointly non-dominated sorting genetic algorithm (NSGA-II) and long short -term memory (LSTM) schemes is the best way to meet the problem's limitations. In this study, the paper designed a malware dataset with known and unknown malware. The different kinds of malware lists (e.g., cyber-attacks) are considered in the form of known and unknown malware lists with the characteristics, size of code, where malware comes from, attack on which data, and current status of the workload after being attacked by the malware. Our main idea is to present blockchain, NSGA-II, and LSTM schemes that handle phishing, routing, Sybil, and 51% of cyber-attacks without compromising application performance. Simulation results show that the study reduces delay and energy, improves accuracy, and minimizes security risks for vehicular applications. | cs |
| dc.description.firstpage | art. no. 111576 | cs |
| dc.description.source | Web of Science | cs |
| dc.description.volume | 290 | cs |
| dc.identifier.citation | Knowledge-Based Systems. 2024, vol. 290, art. no. 111576. | cs |
| dc.identifier.doi | 10.1016/j.knosys.2024.111576 | |
| dc.identifier.issn | 0950-7051 | |
| dc.identifier.issn | 1872-7409 | |
| dc.identifier.uri | http://hdl.handle.net/10084/155359 | |
| dc.identifier.wos | 001205872900001 | |
| dc.language.iso | en | cs |
| dc.publisher | Elsevier | cs |
| dc.relation.ispartofseries | Knowledge-Based Systems | cs |
| dc.relation.uri | https://doi.org/10.1016/j.knosys.2024.111576 | cs |
| dc.rights | © 2024 The Author(s). Published by Elsevier B.V. | cs |
| dc.rights.access | openAccess | cs |
| dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | cs |
| dc.subject | security | cs |
| dc.subject | concave and convex | cs |
| dc.subject | cyber-attacks | cs |
| dc.subject | blockchain | cs |
| dc.subject | cloud | cs |
| dc.subject | LSTM | cs |
| dc.subject | V2I | cs |
| dc.subject | vehicular | cs |
| dc.subject | NSGA-II | cs |
| dc.title | A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications | cs |
| dc.type | article | cs |
| dc.type.status | Peer-reviewed | cs |
| dc.type.version | publishedVersion | cs |
Files
Original bundle
1 - 1 out of 1 results
Loading...
- Name:
- 0950-7051-2024v290an111576.pdf
- Size:
- 3.25 MB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 out of 1 results
Loading...
- Name:
- license.txt
- Size:
- 718 B
- Format:
- Item-specific license agreed upon to submission
- Description:
Collections
Publikační činnost VŠB-TUO ve Web of Science / Publications of VŠB-TUO in Web of Science
OpenAIRE
Publikační činnost Katedry kybernetiky a biomedicínského inženýrství / Publications of Department of Cybernetics and Biomedical Engineering (450)
Publikační činnost Katedry telekomunikačních technologií / Publications of Department of Telecommunications (440)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals
OpenAIRE
Publikační činnost Katedry kybernetiky a biomedicínského inženýrství / Publications of Department of Cybernetics and Biomedical Engineering (450)
Publikační činnost Katedry telekomunikačních technologií / Publications of Department of Telecommunications (440)
Články z časopisů s impakt faktorem / Articles from Impact Factor Journals