A multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applications

dc.contributor.authorLakhan, Abdullah
dc.contributor.authorMohammed, Mazin Abed
dc.contributor.authorAbdulkareem, Karrar Hameed
dc.contributor.authorDeveci, Muhammet
dc.contributor.authorMarhoon, Haydar Abdulameer
dc.contributor.authorNedoma, Jan
dc.contributor.authorMartinek, Radek
dc.date.accessioned2024-11-27T09:55:11Z
dc.date.available2024-11-27T09:55:11Z
dc.date.issued2024
dc.description.abstractThe Intelligent Transport System (ITS) is an emerging paradigm that offers numerous services at the infrastructure level for vehicle applications. Vehicle-to-infrastructure (V2I) is an advanced form of ITS where diverse vehicle services are deployed on the roadside unit. V2I consists of distributed computing nodes where transport applications are parallel processed. Many research challenges exist in the presented V2I paradigms regarding security, cyber-attacks, and application processing among heterogeneous nodes. These cyber-attacks, Sybil attacks, and their attempts cause a lack of security and degrade the V2I performance in the presented paradigms. This paper presents a new secure blockchain framework that handles cyber-attacks, as mentioned earlier. This paper formulates this complex problem as a combinatorial problem, encompassing concave and convex problems. The convex function minimizes the given constraints, such as time and security risk, and the concave function improves performance and accuracy. Therefore, numerous constraints, such as time, energy, malware detection accuracy, and application deadlines, require optimization for the considered problem. Combining the jointly non-dominated sorting genetic algorithm (NSGA-II) and long short -term memory (LSTM) schemes is the best way to meet the problem's limitations. In this study, the paper designed a malware dataset with known and unknown malware. The different kinds of malware lists (e.g., cyber-attacks) are considered in the form of known and unknown malware lists with the characteristics, size of code, where malware comes from, attack on which data, and current status of the workload after being attacked by the malware. Our main idea is to present blockchain, NSGA-II, and LSTM schemes that handle phishing, routing, Sybil, and 51% of cyber-attacks without compromising application performance. Simulation results show that the study reduces delay and energy, improves accuracy, and minimizes security risks for vehicular applications.cs
dc.description.firstpageart. no. 111576cs
dc.description.sourceWeb of Sciencecs
dc.description.volume290cs
dc.identifier.citationKnowledge-Based Systems. 2024, vol. 290, art. no. 111576.cs
dc.identifier.doi10.1016/j.knosys.2024.111576
dc.identifier.issn0950-7051
dc.identifier.issn1872-7409
dc.identifier.urihttp://hdl.handle.net/10084/155359
dc.identifier.wos001205872900001
dc.language.isoencs
dc.publisherElseviercs
dc.relation.ispartofseriesKnowledge-Based Systemscs
dc.relation.urihttps://doi.org/10.1016/j.knosys.2024.111576cs
dc.rights© 2024 The Author(s). Published by Elsevier B.V.cs
dc.rights.accessopenAccesscs
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/cs
dc.subjectsecuritycs
dc.subjectconcave and convexcs
dc.subjectcyber-attackscs
dc.subjectblockchaincs
dc.subjectcloudcs
dc.subjectLSTMcs
dc.subjectV2Ics
dc.subjectvehicularcs
dc.subjectNSGA-IIcs
dc.titleA multi-objectives framework for secure blockchain in fog–cloud network of vehicle-to-infrastructure applicationscs
dc.typearticlecs
dc.type.statusPeer-reviewedcs
dc.type.versionpublishedVersioncs

Files

Original bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
0950-7051-2024v290an111576.pdf
Size:
3.25 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 out of 1 results
Loading...
Thumbnail Image
Name:
license.txt
Size:
718 B
Format:
Item-specific license agreed upon to submission
Description: