Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Digital Twins-enabled Zero Touch Network: : A smart contract and explainable AI integrated cybersecurity framework

Published: 18 July 2024 Publication History

Abstract

Data-driven modeling using Artificial Intelligence (AI) is envisioned as a key enabling technology for Zero Touch Network (ZTN) management. Specifically, AI has shown huge potential for automating and modeling the threat detection mechanism of complicated wireless systems. The current data-driven AI systems, however, lack transparency and accountability in their decisions, and assuring the reliability and trustworthiness of the data collected from participating entities is an important obstacle to threat detection and decision-making. To this end, we integrate smart contracts with eXplainable AI (XAI) to design a robust cybersecurity framework for ZTN. The proposed framework uses a blockchain and smart contract-enabled access control and authentication mechanism to ensure trust among the participating entities. Additionally, with the collected data, we designed Digital Twins (DTs) for simulating the attack detection operation in the ZTN environment. Specifically, to provide a platform for analysis and the development of an Intrusion Detection System (IDS), the DTs are equipped with a variety of process-aware attack scenarios. A Self Attention-based Long Short Term Memory (SALSTM) network is used to evaluate the attack detection capabilities of the proposed framework. Furthermore, the explainability of the proposed AI-based IDS is achieved using the SHapley Additive exPlanations (SHAP) tool. The experimental results using N-BaIoT and a self-generated DTs dataset confirm the superiority of the proposed framework over some baseline and state-of-the-art techniques.

Highlights

A new robust cybersecurity framework for ZTN is proposed by integrating smart contracts with eXplainable AI.
To ensure secure communication, a novel blockchain-enabled key establishment and access control mechanism is proposed that authenticates the participating entities in ZTN. The temper-proof property of blockchain ensures high integrity of the data enrichment and builds trust between the participating entities of blockchain network. A smart contract enabled Proof-of-Authority (PoA) consensus mechanism is used to verify and validate the transactions or data.
The authenticated data from smart contract and blockchain-enabled authentication scheme is used to design DT for simulating the attack detection operation in ZTN environment. In particular, the DT is set up with a range of process aware attack scenarios to provide a platform for study and the creation of Intrusion Detection System (IDS). To assess the proposed framework’s ability to identify attacks, a Self Attention-based Long Short Term Memory (SALSTM) network is deployed. Additionally, utilizing the SHapley Additive exPlanations (SHAP) tool, the proposed AI-based IDS is made explainable.
Through experiments using an actual DT simulated dataset and state-of-the-art intrusion dataset (N-BaIoT) is used to evaluate the proposed framework. The outcomes are compared with some baseline and state-of-the-art techniques to show the effectiveness of the proposed cybersecurity framework.

References

[1]
Liyanage M., Pham Q.-V., Dev K., Bhattacharya S., Maddikunta P.K.R., Gadekallu T.R., Yenduri G., A survey on zero touch network and service (ZSM) management for 5G and beyond networks, J. Netw. Comput. Appl. (2022).
[2]
Gallego-Madrid J., Sanchez-Iborra R., Ruiz P.M., Skarmeta A.F., Machine learning-based zero-touch network and service management: A survey, Digit. Commun. Netw. 8 (2) (2022) 105–123.
[3]
Kumar R., Kumar P., Aloqaily M., Aljuhani A., Deep learning-based blockchain for secure zero touch networks, IEEE Commun. Mag. (2022).
[4]
R. Kumar, A. Aljuhani, P. Kumar, A. Kumar, A. Franklin, A. Jolfaei, Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks, in: Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and beyond, 2022, pp. 37–42.
[5]
Aljuhani A., Machine learning approaches for combating distributed denial of service attacks in modern networking environments, IEEE Access 9 (2021) 42236–42264.
[6]
Contreras L.M., Serrano J., Mamatas L., Bernini G., Monti P., Antunes M., Atmojo U., Tocker E., Val I., Sgambelluri A., et al., Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030, 2022.
[7]
Benzaid C., Taleb T., AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions, Ieee Netw. 34 (2) (2020) 186–194.
[8]
Javeed D., Saeed M.S., Ahmad I., Kumar P., Jolfaei A., Tahir M., An intelligent intrusion detection system for smart consumer electronics network, IEEE Trans. Consum. Electron. (2023).
[9]
Mane S., Rao D., Explaining network intrusion detection system using explainable AI framework, 2021, arXiv preprint arXiv:2103.07110.
[10]
Luo Y., Chen X., Ge N., Feng W., Lu J., Transformer-based device-type identification in heterogeneous IoT traffic, IEEE Internet Things J. 10 (6) (2022) 5050–5062.
[11]
Wang M., Zheng K., Yang Y., Wang X., An explainable machine learning framework for intrusion detection systems, IEEE Access 8 (2020) 73127–73141.
[12]
Javeed D., Gao T., Saeed M.S., Khan M.T., FOG-empowered augmented intelligence-based proactive defensive mechanism for IoT-enabled smart industries, IEEE Internet Things J. (2023).
[13]
Abou El Houda Z., Brik B., Khoukhi L., “Why should i trust your ids?”: An explainable deep learning framework for intrusion detection systems in internet of things networks, IEEE Open J. Commun. Soc. 3 (2022) 1164–1176.
[14]
Oseni A., Moustafa N., Creech G., Sohrabi N., Strelzoff A., Tari Z., Linkov I., An explainable deep learning framework for resilient intrusion detection in IoT-enabled transportation networks, IEEE Trans. Intell. Transp. Syst. (2022).
[15]
Alani M.M., Damiani E., Ghosh U., DeepIIoT: An explainable deep learning based intrusion detection system for industrial IOT, in: 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops, ICDCSW, IEEE, 2022, pp. 169–174.
[16]
Roy S., Li J., Pandey V., Bai Y., An explainable deep neural framework for trustworthy network intrusion detection, in: 2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud, IEEE, 2022, pp. 25–30.
[17]
Yaga D., Mell P., Roby N., Scarfone K., Blockchain technology overview, 2019, arXiv preprint arXiv:1906.11078.
[18]
Gadekallu T.R., Pham Q.-V., Nguyen D.C., Maddikunta P.K.R., Deepa N., Prabadevi B., Pathirana P.N., Zhao J., Hwang W.-J., Blockchain for edge of things: Applications, opportunities, and challenges, IEEE Internet Things J. 9 (2) (2021) 964–988.
[19]
Thakur G., Kumar P., Jangirala S., Das A.K., Park Y., et al., An effective privacy-preserving blockchain-assisted security protocol for cloud-based digital twin environment, IEEE Access 11 (2023) 26877–26892.
[20]
Eckhart M., Ekelhart A., Digital twins for cyber-physical systems security: State of the art and outlook, in: Security and Quality in Cyber-Physical Systems Engineering: With Forewords by Robert M. Lee and Tom Gilb, Springer, 2019, pp. 383–412.
[21]
Barricelli B.R., Casiraghi E., Fogli D., A survey on digital twin: Definitions, characteristics, applications, and design implications, IEEE Access 7 (2019) 167653–167671.
[22]
Varghese S.A., Ghadim A.D., Balador A., Alimadadi Z., Papadimitratos P., Digital twin-based intrusion detection for industrial control systems, in: 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events, PerCom Workshops, IEEE, 2022, pp. 611–617.
[23]
Yigit Y., Bal B., Karameseoglu A., Duong T.Q., Canberk B., Digital twin-enabled intelligent ddos detection mechanism for autonomous core networks, IEEE Commun. Stand. Mag. 6 (3) (2022) 38–44.
[24]
Kobayashi K., Almutairi B., Sakib M.N., Chakraborty S., Alam S.B., Explainable, interpretable & trustworthy AI for intelligent digital twin: Case study on remaining useful life, 2023, arXiv preprint arXiv:2301.06676.
[25]
Suhail S., Iqbal M., Hussain R., Jurdak R., ENIGMA: An explainable digital twin security solution for cyber–physical systems, Comput. Ind. 151 (2023).
[26]
Lu Y., Huang X., Zhang K., Maharjan S., Zhang Y., Low-latency federated learning and blockchain for edge association in digital twin empowered 6G networks, IEEE Trans. Ind. Inform. 17 (7) (2020) 5098–5107.
[27]
Ferrag M.A., Kantarci B., Cordeiro L.C., Debbah M., Choo K.-K.R., Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: An anticipatory study, 2023, arXiv preprint arXiv:2303.11745.
[28]
Bitton R., Gluck T., Stan O., Inokuchi M., Ohta Y., Yamada Y., Yagyu T., Elovici Y., Shabtai A., Deriving a cost-effective digital twin of an ICS to facilitate security evaluation, in: Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3–7, 2018, Proceedings, Part I 23, Springer, 2018, pp. 533–554.
[29]
Dave R., IoT security and authentication schemes based on machine learning: Review, 2021, arXiv:2109.02695.
[30]
Porambage P., Gür G., Osorio D.P.M., Liyanage M., Gurtov A., Ylianttila M., The roadmap to 6G security and privacy, IEEE Open J. Commun. Soc. 2 (2021) 1094–1122,.
[31]
Gadekallu T.R., M K M., S S.K., Kumar N., Hakak S., Bhattacharya S., Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications, IEEE Internet Things Mag. 4 (3) (2021),.
[32]
Hochreiter S., Schmidhuber J., Long short-term memory, Neural Comput. 9 (8) (1997) 1735–1780.
[33]
Javeed D., Gao T., Saeed M.S., Kumar P., An intrusion detection system for edge-envisioned smart agriculture in extreme environment, IEEE Internet Things J. (2023).
[34]
Lundberg S.M., Lee S.-I., A unified approach to interpreting model predictions, Advances in Neural Information Processing Systems, vol. 30, 2017.
[35]
Meidan Y., Bohadana M., Mathov Y., Mirsky Y., Shabtai A., Breitenbacher D., Elovici Y., N-baiot—network-based detection of iot botnet attacks using deep autoencoders, IEEE Pervasive Comput. 17 (3) (2018) 12–22.
[36]
Javeed D., Gao T., Kumar P., Jolfaei A., An explainable and resilient intrusion detection system for industry 5.0, IEEE Trans. Consum. Electron. (2023).
[37]
Saha K., Fakir M.M.R., Hashem M.A., An unsupervised self-organizing map assisted deep autoencoder gaussian mixture model for IoT anomaly detection, in: 2021 5th International Conference on Electrical Information and Communication Technology, EICT, IEEE, 2021, pp. 1–6.
[38]
Seong T.B., Ponnusamy V., Jhanjhi N., Annur R., Talib M., A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection, Indonesian J. Electr. Eng. Comput. Sci. 22 (2) (2021) 1165–1176.
[39]
Rahmantyo D.T., Erfianto B., Satrya G.B., Deep residual cnn for preventing botnet attacks on the internet of things, in: 2021 4th International Conference of Computer and Informatics Engineering, IC2IE, IEEE, 2021, pp. 462–466.

Cited By

View all
  • (2024)An Entanglement-Aware Middleware for Digital TwinsACM Transactions on Internet of Things10.1145/36995205:4(1-25)Online publication date: 14-Oct-2024
  • (2024)Special Issue on Digital Twin for Future Networks and Emerging IoT Applications (DT4IoT)Future Generation Computer Systems10.1016/j.future.2024.06.056161:C(81-84)Online publication date: 1-Dec-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Future Generation Computer Systems
Future Generation Computer Systems  Volume 156, Issue C
Jul 2024
339 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 18 July 2024

Author Tags

  1. Blockchain
  2. Digital Twins
  3. Explainable AI
  4. Intrusion Detection System
  5. Zero Touch Network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)An Entanglement-Aware Middleware for Digital TwinsACM Transactions on Internet of Things10.1145/36995205:4(1-25)Online publication date: 14-Oct-2024
  • (2024)Special Issue on Digital Twin for Future Networks and Emerging IoT Applications (DT4IoT)Future Generation Computer Systems10.1016/j.future.2024.06.056161:C(81-84)Online publication date: 1-Dec-2024

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media