{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:08:22Z","timestamp":1732039702524},"reference-count":78,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T00:00:00Z","timestamp":1599955200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2021,6]]},"abstract":"Abstract<\/jats:title>With the advancement of blockchain technology, and the proliferation of Internet of things (IoT)\u2010driven devices, the blockchain\u2010IoT applications is changing the perception and working infrastructure of smart networks. Blockchain supports decentralized architecture and provides secure management, authentication, and access to IoT systems by deploying smart contracts provided by Ethereum. The growing demand and expansion of blockchain\u2010IoT systems is generating large volume of sensitive data. Moreover, distributed denial\u2010of\u2010service (DDoS) attacks are the most challenging threats to smart contracts in blockchain\u2010IoT systems. The 2016 decentralized autonomous organization and 2017 parity wallet attacks exposed the critical fault\u2010lines among Ethereum smart contracts. Currently, there is no security mechanism available for smart contracts after its deployment in blockchain\u2010IoT systems. In order to address these challenges, first we use two artificial intelligence techniques, random forest (RF) and XGBoost that gives full autonomy in decision making capabilities in the proposed security framework. Second, for data load balancing and distributed file storage of IoT data, interplanetary file system is suggested. Finally, we are the first to propose a distributed framework based on fog computing to detect DDoS attacks in smart contracts. The performance of the detection system is evaluated using actual IoT dataset, namely, BoT\u2010IoT. The proposed system is evaluated in terms of accuracy (AC), detection rate (DR), and false alarm rate (FAR). The results confirms the superiority of the proposed framework over some of the recent state\u2010of\u2010art techniques in detecting rare attacks. The proposed framework has achieved DR up to 99.99% using RF by using 10 features of BoT\u2010IoT dataset.<\/jats:p>","DOI":"10.1002\/ett.4112","type":"journal-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T11:27:13Z","timestamp":1601033233000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":95,"title":["A Distributed framework for detecting DDoS attacks in smart contract\u2010based Blockchain\u2010IoT Systems by leveraging Fog computing"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0723-0752","authenticated-orcid":false,"given":"Prabhat","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Information Technology National Institute of Technology Raipur India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9375-2970","authenticated-orcid":false,"given":"Randhir","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Information Technology National Institute of Technology Raipur India"}]},{"given":"Govind P.","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Information Technology National Institute of Technology Raipur India"}]},{"given":"Rakesh","family":"Tripathi","sequence":"additional","affiliation":[{"name":"Department of Information Technology National Institute of Technology Raipur India"}]}],"member":"311","published-online":{"date-parts":[[2020,9,13]]},"reference":[{"key":"e_1_2_6_2_1","volume-title":"Internet of Things (IoT) and the Digital Business Environment: A Standpoint Inclusive Cyber Space, Cyber Crimes, and Cybersecurity","author":"Nayyar A","year":"2020"},{"key":"e_1_2_6_3_1","article-title":"Survey on IoT security: challenges and solution using machine learning, artificial intelligence and blockchain technology","volume":"100227","author":"Mohanta BK","year":"2020","journal-title":"Internet of Things"},{"key":"e_1_2_6_4_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7432-3.ch021"},{"key":"e_1_2_6_5_1","first-page":"1","article-title":"Towards building a blockchain framework for IoT","author":"Pavithran D","year":"2020","journal-title":"Clust Comput"},{"key":"e_1_2_6_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.018"},{"key":"e_1_2_6_7_1","doi-asserted-by":"crossref","unstructured":"N.Atzei M.Bartoletti T.Cimoli A survey of attacks on ethereum smart contracts (sok). Paper presented at: Proceedings of the International Conference on Principles of Security and Trust;2017:164\u2010186; Springer New York NY.","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"e_1_2_6_8_1","volume-title":"The Parity Wallet Hack Explained","author":"Palladino S.","year":"2017"},{"key":"e_1_2_6_9_1","volume-title":"Bgp Leaks and Cryptocurrencies","author":"Poinsignon Louis","year":"2018"},{"key":"e_1_2_6_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3741"},{"key":"e_1_2_6_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2701-2"},{"key":"e_1_2_6_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2019.2907110"},{"key":"e_1_2_6_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19081788"},{"key":"e_1_2_6_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.002"},{"key":"e_1_2_6_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2896380"},{"key":"e_1_2_6_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3802"},{"key":"e_1_2_6_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9680-9_27"},{"key":"e_1_2_6_18_1","article-title":"A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT","volume":"102481","author":"Sengupta J","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"e_1_2_6_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020"},{"key":"e_1_2_6_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2895123"},{"key":"e_1_2_6_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"e_1_2_6_22_1","unstructured":"KoroniotisN MoustafaN SitnikovaE.TurnbullB. The Bot\u2010IoT database;2018https:\/\/cloudstor.aarnet.edu.au\/plus\/s\/umT99TnxvbpkkoE. accessed September 10 2019."},{"key":"e_1_2_6_23_1","doi-asserted-by":"publisher","DOI":"10.9774\/GLEAF.2350.2015.de.00007"},{"key":"e_1_2_6_24_1","first-page":"e3935","article-title":"A survey of security and privacy issues in the Internet of Things from the layered context","author":"Deep S","year":"2020","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_6_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-019-02910-8"},{"key":"e_1_2_6_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12040061"},{"key":"e_1_2_6_27_1","first-page":"1","article-title":"A decentralized lightweight blockchain\u2010based authentication mechanism for iot systems","author":"Khalid U","year":"2020","journal-title":"Clust Comput"},{"key":"e_1_2_6_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.006"},{"key":"e_1_2_6_29_1","first-page":"1","article-title":"Hrm smart contracts on the blockchain: emulated vs native","author":"Neiheiser R","year":"2020","journal-title":"Clust Comput"},{"key":"e_1_2_6_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847705"},{"key":"e_1_2_6_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2387-5"},{"key":"e_1_2_6_32_1","unstructured":"ZhuL ZhengB ShenM YuS GaoF LiH ShiK GaiK. Research on the security of blockchain data: a survey; (2018). arXiv:1812.02009."},{"key":"e_1_2_6_33_1","unstructured":"Perakovi\u0107D Peri\u0161aM Cviti\u0107I. Analysis of the IoT impact on volume of ddos attacks. Proceedings of the XXXIII Simpozijum o novim tehnologijama u po\u0161tanskom i telekomunikacionom saobra\u0107aju\u2013PosTel;2015:295\u2010304."},{"key":"e_1_2_6_34_1","doi-asserted-by":"crossref","unstructured":"SaadM SpauldingJ NjillaL KamhouaC ShettyS NyangD MohaisenA. Exploring the attack surface of blockchain: a systematic overview;2019. arXiv:1904.03487.","DOI":"10.1002\/9781119519621.ch3"},{"key":"e_1_2_6_35_1","doi-asserted-by":"crossref","unstructured":"LuuL ChuDH OlickelH SaxenaP HoborA. Making smart contracts smarter. Paper presented at: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security Vienna Austria;2016:254\u2010269.","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_2_6_36_1","unstructured":"HarzD KnottenbeltW. Towards safer smart contracts: a survey of languages and verification methods;2018. arXiv:1809.09805."},{"key":"e_1_2_6_37_1","doi-asserted-by":"crossref","unstructured":"Di AngeloM SalzerG. A survey of tools for analyzing ethereum smart contracts. Paper presented at: Proceedings of the 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON);2019:69\u201078; Newark CA: IEEE.","DOI":"10.1109\/DAPPCON.2019.00018"},{"key":"e_1_2_6_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2738841"},{"key":"e_1_2_6_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.020"},{"key":"e_1_2_6_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2866917"},{"key":"e_1_2_6_41_1","doi-asserted-by":"crossref","unstructured":"YiS QinZ LiQ. Security and privacy issues of fog computing: a survey. Paper presented at: Proceedings of the International Conference on Wireless Algorithms Systems and Applications Qufu China;2015:685\u2010695.","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"e_1_2_6_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.12.013"},{"key":"e_1_2_6_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700622"},{"key":"e_1_2_6_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-55696-2_2"},{"key":"e_1_2_6_45_1","doi-asserted-by":"crossref","unstructured":"KumarR TripathiR Implementation of distributed file storage and access framework using ipfs and blockchain. Paper presented at: Paper presented at: Proceedings of the 2019 5th International Conference on Image Information Processing (ICIIP) Shimla India;2019:246\u2010251; IEEE.","DOI":"10.1109\/ICIIP47207.2019.8985677"},{"key":"e_1_2_6_46_1","doi-asserted-by":"crossref","unstructured":"AliMS DoluiK AntonelliF. Iot data privacy via blockchains and ipfs. Paper presented at: Proceedings of the 7th International Conference on the Internet of Things Linz Austria;2017:1\u20107.","DOI":"10.1145\/3131542.3131563"},{"key":"e_1_2_6_47_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-018-0123-6"},{"key":"e_1_2_6_48_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"e_1_2_6_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.014"},{"key":"e_1_2_6_50_1","doi-asserted-by":"crossref","unstructured":"LiW MengW. Design of intrusion sensitivity\u2010based trust management model for collaborative intrusion detection networks. Paper presented at: Proceedings of the IFIP International Conference on Trust Management;2014:61\u201076l Springer New York NY.","DOI":"10.1007\/978-3-662-43813-8_5"},{"key":"e_1_2_6_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"e_1_2_6_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.02.017"},{"key":"e_1_2_6_53_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010144"},{"key":"e_1_2_6_54_1","first-page":"e3803","article-title":"Dl\u2010ids: a deep learning\u2013based intrusion detection framework for securing IoT","author":"Otoum Y","year":"2019","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_6_55_1","first-page":"e4014","article-title":"An integrated intrusion detection system using correlation\u2010based attribute selection and artificial neural network","author":"Sumaiya Thaseen I","year":"2020","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_6_56_1","first-page":"e3835","article-title":"Fog\u2010cloud distributed intrusion detection and cooperation","author":"Ghribi S","year":"2019","journal-title":"Trans Emerg Telecommun Technol"},{"key":"e_1_2_6_57_1","unstructured":"JanakiramanR WaldvogelM ZhangQ. Indra: a peer\u2010to\u2010peer approach to network intrusion detection and prevention. Paper presented at: Proceedings of the 12th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises WET ICE 2003;2003:226\u2010231; Linz Austria: IEEE."},{"key":"e_1_2_6_58_1","doi-asserted-by":"crossref","unstructured":"LiZ ChenY BeachA\/ Towards scalable and robust distributed intrusion alert fusion with good load balancing. Paper presented at: Proceedings of the 2006 SIGCOMM Workshop on Large\u2010Scale Attack Defense Pisa Italy;2006:115\u2010122.","DOI":"10.1145\/1162666.1162669"},{"key":"e_1_2_6_59_1","unstructured":"DumaC KarresandM ShahmehriN CaronniG. A trust\u2010aware p2p\u2010based overlay for intrusion detection. Paper presented at: Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA'06) Krakow Poland;2006:692\u2010697."},{"key":"e_1_2_6_60_1","doi-asserted-by":"crossref","unstructured":"FungCJ ZhuQ BoutabaR Ba\u015farT. Bayesian decision aggregation in collaborative intrusion detection networks. Paper presented at: Proceedings of the 2010 IEEE Network Operations and Management Symposium\u2010NOMS 2010;2010:349\u2010356; Osaka Japan: IEEE.","DOI":"10.1109\/NOMS.2010.5488489"},{"key":"e_1_2_6_61_1","unstructured":"FungCJ BoutabaR. Design and management of collaborative intrusion detection networks. Paper presented at: Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013);2013:955\u2010961; Ghent Belgium: IEEE."},{"key":"e_1_2_6_62_1","doi-asserted-by":"crossref","unstructured":"LiW MengY KwokLF. Enhancing trust evaluation using intrusion sensitivity in collaborative intrusion detection networks: feasibility and challenges. Paper presented at: Proceedings of the 2013 9th International Conference on Computational Intelligence and Security;2013:518\u2010522; Emei Mountain Sichan Province China: IEEE.","DOI":"10.1109\/CIS.2013.115"},{"key":"e_1_2_6_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1307"},{"key":"e_1_2_6_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2941345"},{"key":"e_1_2_6_65_1","first-page":"2825","article-title":"Scikit\u2010learn: machine learning in Python","volume":"12","author":"Pedregosa F","year":"2011","journal-title":"J Mach Learn Res"},{"key":"e_1_2_6_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"e_1_2_6_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.04.019"},{"key":"e_1_2_6_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.001"},{"key":"e_1_2_6_69_1","doi-asserted-by":"crossref","unstructured":"ChenT GuestrinC. Xgboost: a scalable tree boosting system. Paper presented at: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. San Francisco California;2016:785\u2010794.","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_2_6_70_1","doi-asserted-by":"crossref","unstructured":"KumarR MarchangN TripathiR. Distributed off\u2010chain storage of patient diagnostic reports in healthcare system using IPFS and blockchain. Paper presented at: Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS);2020:1\u20105; Bangalore India: IEEE.","DOI":"10.1109\/COMSNETS48256.2020.9027313"},{"key":"e_1_2_6_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2719619"},{"key":"e_1_2_6_72_1","volume-title":"Security Tip (st04\u2010015) Understanding Denial\u2010of\u2010Service Attacks","author":"CISA","year":"2019"},{"key":"e_1_2_6_73_1","doi-asserted-by":"crossref","unstructured":"BoseA AujlaGS SinghM KumarN CaoH. Blockchain as a service for software defined networks: a denial of service attack perspective. Paper presented at: Proceedings of the 2019 IEEE International Conference on Dependable Autonomic and Secure Computing International Conference on Pervasive Intelligence and Computing International Conference on Cloud and Big Data Computing International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech) Fukuoka Japan;2019:901\u2010906; IEEE.","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00166"},{"key":"e_1_2_6_74_1","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.414"},{"issue":"2","key":"e_1_2_6_75_1","first-page":"71","article-title":"A survey on authentication attacks and countermeasures in a distributed environment","volume":"5","author":"Jesudoss A","year":"2014","journal-title":"Ind J Comput Sci Eng (IJCSE)"},{"key":"e_1_2_6_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2854724"},{"key":"e_1_2_6_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.008"},{"key":"e_1_2_6_78_1","doi-asserted-by":"crossref","unstructured":"MaW QuH ZhaoJ. Estimator with forgetting factor of correntropy and recursive algorithm for traffic network prediction. Paper presented at: Proceedings of the 2013 25th Chinese Control and Decision Conference (CCDC);2013:490\u2010494; Guiyang China: IEEE.","DOI":"10.1109\/CCDC.2013.6560973"},{"key":"e_1_2_6_79_1","doi-asserted-by":"crossref","unstructured":"WijayaDA LiuJ SteinfeldR LiuD. Senarai: a sustainable public blockchain\u2010based permanent storage protocol. Paper presented at: Proceedings of the International Conference on Cryptology and Network Security;2019:235\u2010246; Springer New York NY.","DOI":"10.1007\/978-3-030-31578-8_13"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4112","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.4112","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,30]],"date-time":"2023-08-30T12:26:16Z","timestamp":1693398376000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,13]]},"references-count":78,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["10.1002\/ett.4112"],"URL":"https:\/\/doi.org\/10.1002\/ett.4112","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,13]]},"assertion":[{"value":"2020-04-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}