Professional Documents
Culture Documents
1.A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System
1.A Privacy-Preserving-Based Secure Framework Using Blockchain-Enabled Deep-Learning in Cooperative Intelligent Transport System
9, SEPTEMBER 2022
Abstract— Cooperative Intelligent Transport System (C-ITS) Index Terms— Blockchain technology, cooperative intelligent
is a promising technology that aims to improve the tradi- transport system (C-ITS), deep-learning, intrusion detection
tional transport management systems. In C-ITS infrastructure system, privacy-preservation.
Autonomous Vehicles (AVs) communicate wirelessly with other
AVs, Road Side Units (RSUs) and Traffic Command Cen-
I. I NTRODUCTION
tres (TCCs) using an open channel Internet. However, the use
of the Internet brings inherent vulnerabilities related to privacy
(e.g., adversary performing inference and data poisoning attacks),
and security (e.g., AVs can be compromised using advanced
C OOPERATIVE Intelligent Transport Systems (C-ITS)
are networks designed to facilitate improved road-safety,
driver comfort through enhanced traffic management. The
hacking techniques) issues and prevents the faster realization
of C-ITS applications. To address these challenges, this paper concept behind C-ITS is pervasive vehicle accessibility to
presents a privacy-preserving-based secure framework to provide provide them with a clear understanding of traffic patterns
both privacy and security in C-ITS infrastructure. The proposed on the road [1]. The Trusted Authority (TA), Autonomous
framework provides two level of security and privacy using vehicles (AVs), Road Side Units (RSUs) and Traffic Command
blockchain and deep learning modules. First, a blockchain Centres (TCCs) are the major components of C-ITS [2]. The
module is designed to securely transmit the C-ITS data between
AVs–RSUs-TCCs, and a smart contract-based enhanced Proof of TA is responsible to register and authenticate every other
Work (ePoW) technique is designed to verify data integrity and components that participates in the C-ITS paradigm. The
mitigate data poisoning attacks. Second, a deep-learning module AVs also called as smart vehicles, comes with integrated
is designed that includes Long-Short Term Memory-AutoEncoder global positioning system, sensors and On-Board Unit (OBU)
(LSTM-AE) technique for encoding C-ITS data into a new format for data storage and processing [3]. The aim of AVs is
to prevent inference attacks. The encoded data is used by the
proposed Attention-based Recurrent Neural Network (A-RNN), to minimize driver requirements, reduce traffic fatalities and
for intrusive events recognition in C-ITS infrastructure. The travel expenses, and boosting traffic flow. In addition to vehicle
proposed A-RNN is trained using Truncated Backpropagation to vehicle communication, infrastructure RSUs are positioned
Through Time (BPTT) algorithm. The framework is further at different geographical locations to disseminate data from
validated and tested using two publicly available ToN-IoT and vehicles to central TCCs [4]. The centralized TCCs assists in
CICIDS-2017 datasets. The proposed framework is compared
with peer privacy-preserving intrusion detection techniques, and traffic control at the city level, ensuring accurate emergency
the result shows the effectiveness of the proposed framework warning alerts and traffic data processing for efficient path
over several state-of-the-art techniques in both blockchain and assessment [5].
non-blockchain systems. With the current advancement in fog computing, the com-
munication environment of C-ITS uses fog paradigm for faster
Manuscript received 17 March 2021; revised 19 June 2021 and 10 July response. In the fog-cloud computing-based C-ITS environ-
2021; accepted 15 July 2021. Date of publication 3 August 2021; date of
current version 12 September 2022. This work was supported in part by the ment, there are different types of communications, “vehicle-
Ph.D. scholarship provided by Ministry of Education, India and in part by to-vehicle (V2V)”, “vehicle-to-roadside unit”, “roadside-unit-
CPDS Grant provided by NIT Raipur, India. The Associate Editor for this to-fog server” and “fog server-to-cloud server” as shown
article was S. H. Ahmed. (Corresponding author: Neeraj Kumar.)
Randhir Kumar, Prabhat Kumar, Rakesh Tripathi, and Govind P. Gupta in Fig. 1. Fog computing is a form of cloud computing
are with the National Institute of Technology at Raipur, Raipur 492010, that delivers a range of services to the network’s edge [6].
India (e-mail: rkumar.phd2018.it@nitrr.ac.in; pkumar.phd2019.it@nitrr.ac.in; It provides end-users with data, storage, computation, and
rtripathi.it@nitrr.ac.in; gpgupta.it@nitrr.ac.in).
Neeraj Kumar is with the Department of Computer Science and Engineering, application resources, comparable to cloud computing. It also
Thapar University, Patiala 147001, India, also with the School of Computer has other advantages, such as reduced bandwidth, reduced
Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand latency, and improved security. As a consequence, fog com-
248001, India, and also with the Department of Computer Science and
Information Engineering, Asia University, Taizhong 41354, Taiwan (e-mail: puting is a promising technique for C-ITS applications [7].
neeraj.kumar@thapar.edu). Due to the connectivity of C-ITS entities with Internet,
Mohammad Mehedi Hassan is with the College of Computer and Informa- it usually brings inherent vulnerabilities related to security
tion Sciences, King Saud University, Riyadh 11543, Saudi Arabia (e-mail:
mmhassan@ksu.edu.sa). and privacy [8]. First, security issues arises as a result of
Digital Object Identifier 10.1109/TITS.2021.3098636 the rapid evolution of hacking techniques, and due to the
1558-0016 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16493
incorporation of insecure devices and applications with trans- users Intrusion Detection Systems (IDSs) can be used in C-ITS
portation networks. As a consequence, attacks on C-ITS can environment.
cause infrastructure disruption, emergency response delays,
casualties, and even risks to national security. There are two A. Contribution
kinds of attacks in C-ITS, namely: physical and cyber. Physical
In this paper, we propose a blockchain-enabled
attacks are those that tries to directly temper the hardware
deep-learning framework for providing privacy and security
components while cyber attacks are typically carried out using
to C-ITS data. The major contributions of the paper are
malware or malicious software or by obtaining access to
summarized as follows:
network systems components [9], [10].
• A new privacy-preserving-based secure framework is
Second, privacy issues involve compromising sensitive
information using active and passive attacks [11]. In the developed by integrating blockchain and deep-learning
latter category, attackers tries to alter data. For example, techniques. The underlying framework provides two-level
in data poisoning attacks, the attacker tries to manipulate the privacy and two-level security to C-ITS data and provides
input data used during the training or operation (test) time a generalized way for secure communications of C-ITS
of machine learning-based data analytic or Intrusion Detec- data between AVs–RSUs-TCCs.
• In first level of data security and privacy, a blockchain
tion Systems (IDS). Thus, the output will be very different
compared to the expected results and therefore, can impact and smart contract-based module is designed to enable
the performance of overall security systems [12]. In passive immutable C-ITS data exchange, and to authenticate
attacks, the attacker tries to sniff private information about the and prevent data poisoning attacks. Furthermore, data
target model or its training data [13]. For example in inference is encrypted and stored in IPFS (Inter-Planetary File
attacks, the attacker tries to infer whether an input is part of System) distributed storage system, which can efficiently
the model’s training dataset [14], [15] and then tries to gain reduce communication overhead and computation over-
knowledge about end users. As a result, privacy preservation in head while ensuring privacy preserving.
• In second level of data privacy and security, a deep-
C-ITS environment, including data privacy and entity privacy,
is of great importance and also a challenge [16]. Therefore, learning-based module is designed. This module includes
to protect the privacy and security of user data, the blockchain a Long-Short Term Memory-AutoEncoder (LSTM-AE)
and intrusion detection techniques can be adopted in C-ITS technique for encoding C-ITS data into a new for-
environment. mat to prevent inference attacks and an IDS using
Blockchain is a peer to peer distributed decentralized data- Attention-based Recurrent Neural Network (A-RNN) is
base that maintains information transparency and build trust proposed to handle the multiclass attack detection issue,
among participants via blockchain’s decentralized, secure, including benign and attack types such as DoS, DDoS
tamper-proof and traceable characteristics, and therefore and so on. For training an A-RNN, we use Truncated
can be considered to promote secure and privacy-preserved Backpropagation Through Time (BPTT) algorithm.
• Different from most of the traditional IDSs, and consid-
data exchange ecosystem for C-ITS [17]. In conventional
blockchain applications, the privacy of data can be breached ering the limited resources of OBUs and RSUs, the pro-
due the distributed nature of blockchain. However, deploying posed IDS is mounted on fog nodes to collect and analyse
smart contracts i.e., a self-enforcing and self-verifying agree- network data from RSUs.
• The proposed IDS is rigorously evaluated on two publicly
ments i.e., programmable code, that are stored permanently
across the decentralized network of blockchain can resolve available network datasets namely, ToN-IoT [24], [26]
this issue [18]. Moreover, with the explosive growth of the and CICIDS-2017 [25], [27] before and after applying
AVs, RSUs, and TCCs entities, the large amount of data will the privacy technique. Furthermore, performance is com-
continue to increase. Storing complete data on blockchain pared with peer privacy-preserving intrusion detection
will require huge resources and performing operations such approaches.
as; search and verify will become too complex [19], [20]. The rest of the paper is organized as follows. Section II studies
In consideration to limited storage capacity of each blockchain the related work on privacy-preservation and intrusion detec-
node InterPlanetary File System (IPFS) distributed file system tion techniques. Section III explains the proposed framework
can be adopted to make entire environment scalable. IPFS is and its functional components. Then we evaluate and compare
a content-addressable, decentralized file system in which data the performance in Section IV and finally conclude the paper
are distributed and stored in different IPFS nodes all over with future direction in Section V.
Internet with high integrity and resiliency [21]. Moreover, for
each file storage, IPFS returns a unique hash string that is II. R ELATED W ORK
stored in blockchain network [22]. In this section, we present the relevant related work that
In C-ITS, each participating entity exchanges sensitive has been taken into the consideration to identify gaps in
information about itself and it’s surrounding with other enti- the proposed study. Blockchain-based solutions have been
ties [23]. An intruder or malicious node in the network used in several studies to assert data confidentiality and
can perform malicious activities such as dropping of pack- improve trust among IDSs. For instance, Mollah et al. [17]
ets, information leakage and modification of information, surveyed various ways to integrate blockchain and IDS
etc [24], [25]. Therefore, to deal with intruders and malicious in ITS environment. The authors suggested various other
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
16494 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2022
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16495
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
16496 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2022
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16497
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
16498 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2022
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16499
St +1 = F (Xt +1 , St , θ ) (11)
T
T
LT = lt = l St , Ot∗ (12)
t =1 t =1
Fig. 8. The working architecture of our proposed deep-learning module for
providing privacy and security. In case of RNN, St = (Ot , Ht ), where Ot denotes activation
function of output layer and Ht represents activations of the
b) LSTM auto-encoder: The AutoEncoder (AE) has two hidden recurrent layer. Thus, the system takes the form
parts; encoder and decoder as illustrated in Fig 8. The encoder
uses a deterministic affine mapping function followed by Ht +1 = tanh (W X Xt +1 + W H Ht + B) (13)
nonlinearity to convert the input x t into a hidden representation Ot +1 = WO Ht +1 (14)
yt using below equation [35] lt +1 = l Ot +1 , Ot∗+1 (15)
yt = f (#t + b) (7) we have parameters θ = (WX , WH , B). The aim is to effi-
where # denotes the weight between input x t and hidden ciently calculate ∂LT /∂θ . This computation can be done using
representation yt and b is the bias. The decoder is used to the Backpropagation through time (BPTT) method. It, would
reconstruct the output xt using yt ; however, necessitate processing the entire sequence in both
directions. This necessitates maintaining track of the entire
xt = f # t + b (8) unfolded network, or, in other words, preserving the entire
history of inputs and activations. When very long sequences
where # represents weight between hidden representation yt
are processed with huge networks, this is impracticable since
and xt and b is the bias. xt is the reconstruction of x t . The
processing the entire sequence at each gradient step delays
aim of training an AE is to reduce the reconstruction error as
learning. In order to alleviate the problem truncated BPTT is
much as possible, which can be achieved by reducing the cost
used to train the RNN model [37]. Now, with truncation length
function J .
L < T , the gradient term becomes ∂lt +1 ∂∂F S (Xt +1 , St , θ )
1
p
every L time steps, namely
J= L [x t , xt ] (9) ⎧
p ∂l
i=1 ⎪
⎪ St , Ot∗
⎨ if t is a multiple of L
∂S
where p denotes the number of input features, x t denotes the ∂
lt := (16)
t-th input feature, and xt corresponds to the reconstructed ⎪
⎪ ∂F
⎩ ∂lt +1 (Xt +1 , St , θ ) otherwise.
feature. The reconstruction error of the input signal x t is ∂S
represented by L [x t , xt ], which can be measured using mean This allows for online use of RNN: for example, at time
square error or cross entropy. The mean square error of L < T , the gradient estimate from the first subsequence
the input feature x t , (t = 1, 2, . . . , p) and the recovered t = 1 . . . , L is independent of anything. Further, in our
patch feature xt , (t = 1, 2, . . . , p) is used in this analysis. model, we introduce an attention mechanism to improve
Correspondingly, L [x t , xt ] can be computed as; the attack detection performance. For each hidden state Ht
L [x t , xt ] = x t − xt 2 (10) acquired at time step t by the RNN, the attention layer
is used to learn a weight t . With respect to the output
The LSTM-AE model incorporates the LSTM network with sequence H = (H1 , H2 , . . . H N ), the weighting vector a
the AE, which means LSTM does the encoding and decoding. H = (H1 , H2 , . . . H N ) is determined. The weighted sum
The LSTM-AE is forced to learn the most salient features of these N hidden states is used to calculate the attention
of the training data by constraining the latent space to be vector S:
smaller in dimension than the input. In summary, we have
used LSTM-AE to convert the authenticated C-ITS data into
N
S= t Ht (17)
new format to prevent inference attack, in which the attacker
t =1
tries to infer whether an input is part of the model’s training
dataset and then tries to gain knowledge about end users. where the weighting factors t is calculated as
2) Attention-Based Recurrent Neural Network (A-RNN):
exp UtT UW
The encoded data from LSTM-AE is used by the proposed t = T (18)
A-RNN-based IDS. In this work, for training an A-RNN, t exp Ut UW
we use Truncated Backpropagation Through Time (BPTT) Ut = tanh (WW Ht + BW ) (19)
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
16500 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2022
TABLE I
A DOPTED LSTM-AE PARAMETERS
TABLE II
A DOPTED A-RNN-BASED IDS PARAMETERS
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16501
TABLE III
R ESULTS OF C LASS -W ISE P REDICTION (%) O BTAINED F ROM A-RNN-BASED IDS U SING T O N-I OT D ATASET
TABLE IV
R ESULTS OF C LASS -W ISE P REDICTION (%) O BTAINED F ROM A-RNN-BASED IDS U SING CICIDS-2017 D ATASET
Fig. 10. The accuracy vs loss for LSTM-AE technique using ToN-IoT dataset. Fig. 11. The accuracy vs loss for LSTM-AE technique using CICIDS-
2017 dataset.
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
16502 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 23, NO. 9, SEPTEMBER 2022
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.
KUMAR et al.: PRIVACY-PRESERVING-BASED SECURE FRAMEWORK 16503
[23] P. Kumar, G. P. Gupta, and R. Tripathi, “Design of anomaly-based Rakesh Tripathi (Senior Member, IEEE) received
intrusion detection system using fog computing for IoT network,” Autom. the Ph.D. degree in computer science and engi-
Control Comput. Sci., vol. 55, no. 2, pp. 137–147, Mar. 2021. neering from the Indian Institute of Technology
[24] A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, Guwahati, India. He is currently an Assistant Pro-
“TON_IoT telemetry dataset: A new generation dataset of IoT and fessor with the Department of Information Tech-
IIoT for data-driven intrusion detection systems,” IEEE Access, vol. 8, nology, National Institute of Technology, Raipur,
pp. 165130–165150, 2020. India. He has over ten years of experience in acad-
[25] I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, “Toward generating emic. He has published over 20 refereed articles.
a new intrusion detection dataset and intrusion traffic characterization,” His research interests include distributed systems,
in Proc. 4th Int. Conf. Inf. Syst. Secur. Privacy, 2018, pp. 108–116. network security, and blockchain. He served as a
[26] N. Moustafa. (2019). TON_IOT Datasets. Accessed: Feb. 10, 2020. reviewer for several journals.
[Online]. Available: http://dx.doi.org/10.21227/fesz-dm97
[27] I. Sharafaldin. (2017). CIC-IDS2017 Datasets. Accessed: Mar. 15, 2019. Govind P. Gupta (Member, IEEE) received the
[Online]. Available: http://205.174.165.80/CICDataset/CIC-IDS- Ph.D. degree from the Indian Institute of Technol-
2017/Dataset/ ogy, Roorkee, India, in 2014. He is currently an
[28] G. Tripathi, M. A. Ahad, and M. Sathiyanarayanan, “The role of Assistant Professor with the Department of Informa-
blockchain in internet of vehicles (IoV): Issues, challenges and opportu- tion Technology, National Institute of Technology,
nities,” in Proc. Int. Conf. Contemp. Comput. Informat. (IC I), Dec. 2019, Raipur, India. His research interests include effi-
pp. 26–31. cient protocol design for wireless sensor networks,
[29] S. Kuutti, R. Bowden, Y. Jin, P. Barber, and S. Fallah, “A survey of the Internet of Things, and SDN. He is a Professional
deep learning applications to autonomous vehicle control,” IEEE Trans. Member of ACM.
Intell. Transp. Syst., vol. 22, no. 2, pp. 712–733, Feb. 2021.
[30] A. S. M. S. Hosen et al., “Blockchain-based transaction validation
protocol for a secure distributed IoT network,” IEEE Access, vol. 8,
pp. 117266–117277, 2020. Neeraj Kumar (Senior Member, IEEE) received
[31] Y. Wang, W. Meng, W. Li, J. Li, W.-X. Liu, and Y. Xiang, “A fog-based the Ph.D. degree in CSE from Shri Mata Vaishno
privacy-preserving approach for distributed signature-based intrusion Devi University, Katra, Jammu and Kashmir, India.
detection,” J. Parallel Distrib. Comput., vol. 122, pp. 26–35, Dec. 2018. He was a Post-Doctoral Research Fellow with
[32] H. Sedjelmaci, S. M. Senouci, and N. Ansari, “Intrusion detection Coventry University, Coventry, U.K. He is currently
and ejection framework against lethal attacks in UAV-aided networks: working as a Full Professor with the Department of
A Bayesian game-theoretic methodology,” IEEE Trans. Intell. Transp. Computer Science and Engineering, Thapar Insti-
Syst., vol. 18, no. 5, pp. 1143–1153, May 2017. tute of Engineering and Technology (Deemed to
[33] L. Yang, A. Moubayed, I. Hamieh, and A. Shami, “Tree-based intelligent be University), Patiala, Punjab, India. He is also
intrusion detection system in internet of vehicles,” in Proc. IEEE Global with the School of Computer Science, University of
Commun. Conf. (GLOBECOM), Dec. 2019, pp. 1–6. Petroleum and Energy Studies, Dehradun, Uttarak-
[34] S. Garg, K. Kaur, G. Kaddoum, F. Gagnon, N. Kumar, and Z. Han, “Sec- hand, India. He is an Adjunct Professor with King Abdulaziz University,
IoV: A multi-stage anomaly detection scheme for internet of vehicles,” Jeddah, Saudi Arabia, and Asia University, Taiwan. He has published more
in Proc. ACM MobiHoc Workshop Pervas. Syst. IoT Era (PERSIST-IoT), than 500 technical research papers in leading journals and conferences from
2019, pp. 37–42. IEEE, Elsevier, Springer, and John Wiley. Some of his research findings
[35] P. Kumar, R. Tripathi, and G. P. Gupta, “P2IDF: A privacy-preserving are published in top cited journals such as IEEE T RANSACTIONS ON
based intrusion detection framework for software defined Internet of K NOWLEDGE AND D ATA E NGINEERING (TKDE), IEEE T RANSACTIONS ON
Things-fog (SDIoT-Fog),” in Proc. Adjunct Int. Conf. Distrib. Comput. I NDUSTRIAL E LECTRONICS (TIE), IEEE T RANSACTIONS ON D EPENDABLE
Netw., Jan. 2021, pp. 37–42. AND S ECURE C OMPUTING (TDSC), IEEE T RANSACTIONS ON I NFORMA -
[36] M. A. Ferrag and L. Maglaras, “DeepCoin: A novel deep learning and TION F ORENSICS AND S ECURITY (TIFS), IEEE T RANSACTIONS ON S ER -
blockchain-based energy exchange framework for smart grids,” IEEE VICES C OMPUTING (TSC), IEEE T RANSACTIONS ON S MART G RID (TSG),
Trans. Eng. Manage., vol. 67, no. 4, pp. 1285–1297, Nov. 2020. IEEE T RANSACTIONS ON P OWER S YSTEMS (TPS), IEEE T RANSACTIONS
[37] M. A. Ferrag and L. Maglaras, “DeliveryCoin: An IDS and blockchain- ON I NTELLIGENT T RANSPORTATION S YSTEMS (TITS), IEEE T RANSAC -
based delivery framework for drone-delivered services,” Computers, TIONS ON C ONSUMER E LECTRONICS (TCE), IEEE T RANSACTIONS ON
vol. 8, no. 3, p. 58, Aug. 2019. I NDUSTRIAL I NFORMATICS (TII), IEEE T RANSACTIONS ON V EHICULAR
[38] P. Kumar, G. P. Gupta, and R. Tripathi, “Toward design of an intelligent T ECHNOLOGY (TVT), IEEE T RANSACTIONS ON M ULTIMEDIA (TMuM),
cyber attack detection system using hybrid feature reduced approach IEEE N ETWORK (Netw.), IEEE C OMMUNICATIONS L ETTERS (Comm.),
for IoT networks,” Arabian J. Sci. Eng., vol. 46, no. 4, pp. 3749–3778, IEEE W IRELESS C OMMUNICATIONS (WC), IEEE I NTERNET OF T HINGS
Apr. 2021. J OURNAL (IoTJ), IEEE S YSTEMS J OURNAL (SJ), FGCS, JNCA, JPDC,
Information Sciences, and ComCom. He is an Associate Editor of IEEE
Communications Magazine, IEEE N ETWORK, IEEE T RANSACTIONS ON
Randhir Kumar (Student Member, IEEE) is cur- S USTAINABLE C OMPUTING, Journal of Network and Computer Applications
rently pursuing the Ph.D. degree with the Depart- (Elsevier), and International Journal of Communication Systems (Wiley).
ment of Information Technology, National Institute He is one of highly cited authors in Web of Science in 2019 and 2020.
of Technology, Raipur. He has published more than
25 research articles in the areas of blockchain tech- Mohammad Mehedi Hassan (Senior Member,
nology and its framework. His research interests IEEE) received the Ph.D. degree in computer
include blockchain technology, information security, engineering from Kyung Hee University, Seoul,
and Web mining. South Korea, in February 2011. He is currently
an Associate Professor with the Information Sys-
tems Department, College of Computer and Infor-
mation Sciences, King Saud University, Riyadh,
Prabhat Kumar (Student Member, IEEE) is cur- Saudi Arabia. He has authored and coauthored
rently pursuing the Ph.D. degree in information around more than 180 publications, including ref-
technology with the National Institute of Technol- ereed IEEE/ACM/Springer/Elsevier journals, confer-
ogy, Raipur, India. He earned his Ph.D. scholarship ence papers, books, and book chapters. His research
position as a talented student. He has over ten pub- interests include edge/cloud computing, the Internet of Things, cyber security,
lications in high ranked journals and conferences. deep learning, artificial intelligence, body sensor networks, 5G networks, and
His research interests are security and privacy of social networks. He was a recipient of a number of awards, including the Best
Internet of Things, software-defined networking, and Journal Paper Award from the IEEE S YSTEMS J OURNAL in 2018, the Best
blockchain. Paper Award from CloudComp Conference in 2014, and the Excellence in
Research Award from King Saud University (two times in a row, 2015 and
2016).
Authorized licensed use limited to: VNR Vignana Jyothi Inst of Eng & Tech. Downloaded on March 10,2023 at 19:48:02 UTC from IEEE Xplore. Restrictions apply.