Skip to main content

Advertisement

Log in

Anomaly detection via blockchained deep learning smart contracts in industry 4.0

  • S.I. : Emerging applications of Deep Learning and Spiking ANN
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

The complexity of threats in the ever-changing environment of modern industry is constantly increasing. At the same time, traditional security systems fail to detect serious threats of increasing depth and duration. Therefore, alternative, intelligent solutions should be used to detect anomalies in the operating parameters of the infrastructures concerned, while ensuring the anonymity and confidentiality of industrial information. Blockchain is an encrypted, distributed archiving system designed to allow for the creation of real-time log files that are unequivocally linked. This ensures the security and transparency of transactions. This research presents, for the first time in the literature, an innovative Blockchain Security Architecture that aims to ensure network communication between traded Industrial Internet of Things devices, following the Industry 4.0 standard and based on Deep Learning Smart Contracts. The proposed smart contracts are implementing (via computer programming) a bilateral traffic control agreement to detect anomalies based on a trained Deep Autoencoder Neural Network. This architecture enables the creation of a secure distributed platform that can control and complete associated transactions in critical infrastructure networks, without the intervention of a single central authority. It is a novel approach that fuses artificial intelligence in the Blockchain, not as a supportive framework that enhances the capabilities of the network, but as an active structural element, indispensable and necessary for its completion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bassi L (2017) Industry 4.0: hope, hype or revolution? In: 2017 IEEE 3rd international forum on research and technologies for society and industry (RTSI), Modena, 2017, pp 1–6

  2. Lee J, Bagheri B, Kao H-A (2015) A cyber-physical systems architecture for industry 4.0-based manufacturing systems, vol 3, 2015, pp 18–23

  3. Gilchrist A (2016) Industry 4.0: the industrial internet of things, Publisher: A press, Release Date: June 2016, ISBN: 9781484220474

  4. Xu LD, Xu EL, Li L (2018) Industry 4.0: state of the art and future trends. Int J Prod Res 56(8):2941–2962

    Article  Google Scholar 

  5. Zhou K, Liu T, Zhou L (2015) Industry 4.0: towards future industrial opportunities and challenges. In: 2015 12th international conference on fuzzy systems and knowledge discovery (FSKD), Zhangjiajie, 2015, pp 2147–2152

  6. El Hamdi S, Abouabdellah A, Oudani M (2019) Industry 4.0: fundamentals and main challenges. In: 2019 international colloquium on logistics and supply chain management (LOGISTIQUA), Montreuil—Paris, France, 2019, pp 1–5

  7. Culot G, Fattori F, Podrecca M, Sartor M (2019) Addressing industry 4.0 cybersecurity challenges. IEEE Eng Manag Rev 47(3):79–86

    Article  Google Scholar 

  8. Sklyar V, Kharchenko V (2019) ENISA documents in cybersecurity assurance for industry 4.0: IIoT threats and attacks scenarios. In: 2019 10th IEEE international conference on intelligent data acquisition and advanced computing systems: technology and applications (IDAACS), Metz, France, 2019, pp 1046–1049

  9. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: Internet of Threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J 6(5):8182–8201

    Article  Google Scholar 

  10. Sample C, Schaffer K (2013) An overview of anomaly detection. IT Prof 15(1):8–11

    Article  Google Scholar 

  11. Dixit M, Tiwari A, Pathak H, Astya R (2018) An overview of deep learning architectures, libraries and its applications areas. In: 2018 international conference on advances in computing, communication control and networking (ICACCCN), Greater Noida (UP), India, 2018, pp 293–297

  12. Chen CLP (2015) Deep learning for pattern learning and recognition. In: 2015 IEEE 10th jubilee international symposium on applied computational intelligence and informatics, Timisoara, 2015, pp 17–17

  13. Schmidhuber J Deep learning in neural networks: an overview. arXiv:1404.7828v4 [cs.NE]

  14. Chatterjee R, Chatterjee R (2017) An overview of the emerging technology: blockchain. In: 2017 3rd international conference on computational intelligence and networks (CINE), Odisha, 2017, pp 126–127

  15. Mermer GB, Zeydan E, Arslan SS (2018) An overview of blockchain technologies: principles, opportunities and challenges. In: 2018 26th signal processing and communications applications conference (SIU), Izmir, 2018, pp 1–4

  16. Zhao S, Li S, Yao Y (2019) Blockchain enabled industrial internet of things technology. IEEE Trans Comput Soc Syst 6(6):1442–1453

    Article  Google Scholar 

  17. Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst 49(11):2266–2277

    Article  Google Scholar 

  18. Mohanta BK, Panda SS, Jena D (2018) An overview of smart contract and use cases in blockchain technology. In: 2018 9th international conference on computing, communication and networking technologies (ICCCNT), Bangalore, 2018, pp 1–4

  19. Abbas QE, Sung-Bong J (2019) A survey of blockchain and its applications. In: 2019 international conference on artificial intelligence in information and communication (ICAIIC), Okinawa, Japan, 2019, pp 001–003

  20. Andersen MP, Kolb J, Chen K, Fierro G, Culler DE, Popa RA (2017) WAVE: a decentralized authorization system for IoT via blockchain smart contracts. Technical report no. UCB/EECS-2017-234, Dec 29, 2017

  21. Schmidhuber Jürgen (2015) Deep learning in neural networks: an overview. Neural Netw 61:85–117

    Article  Google Scholar 

  22. Goodfellow I, Bengio Y, Courville A (2016) Deep learning. MIT Press. http://www.deeplearningbook.org. Accessed 22 Feb 2019

  23. Zou H, Hastie T (2005) Regularization and variable selection via the elastic net. J R Stat Soc Ser B (Stat Methodol) 67(2):301–320

    Article  MathSciNet  Google Scholar 

  24. Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. In: 2018 wireless telecommunications symposium (WTS), Phoenix, AZ, 2018, pp 1–5

  25. Fernández-Saúco IA, Acosta-Mendoza N, Gago-Alonso A, García-Reyes EB (2019) Computing anomaly score threshold with autoencoders pipeline. In: Vera-Rodriguez R, Fierrez J, Morales A (eds) Progress in pattern recognition, image analysis, computer vision, and applications. CIARP 2018. Lecture notes in computer science, vol 11401. Springer, Cham

    Google Scholar 

  26. Falco G, Caldera C, Shrobe H (2018) IIoT cybersecurity risk modeling for SCADA Systems. IEEE Internet Things J 5(6):4486–4495

    Article  Google Scholar 

  27. Al-Dalky R, Abduljaleel O, Salah K, Otrok H, Al-Qutayri M (2014) A modbus traffic generator for evaluating the security of SCADA systems. In: 2014 9th international symposium on communication systems, networks & digital sign (CSNDSP), Manchester, 2014, pp 809–814

  28. Fachkha C (2019) Cyber threat investigation of SCADA modbus activities. In: 2019 10th IFIP international conference on new technologies, mobility and security (NTMS), CANARY ISLANDS, Spain, 2019, pp 1–7

  29. Grooby S, Dargahi T, Dehghantanha A (2019) Protecting IoT and ICS platforms against advanced persistent threat actors: analysis of APT1, silent chollima and molerats. In: Dehghantanha A, Choo KK (eds) Handbook of big data and IoT security. Springer, Cham

    Google Scholar 

  30. Pan S, Morris T, Adhikari U (2015) Developing a hybrid intrusion detection system using data mining for power systems. IEEE Trans Smart Grid. https://doi.org/10.1109/tsg.2015.2409775

    Article  Google Scholar 

  31. Pan S, Morris T, Adhikari U (2015) Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data. IEEE Trans Ind Inform 1:1. https://doi.org/10.1109/tii.2015.2420951

    Article  Google Scholar 

  32. Pan S, Morris T, Adhikari U (2015) A specification-based intrusion detection framework for cyber-physical environment in electric power system. Int J Netw Secur 17(2):174–188

    Google Scholar 

  33. Beaver J, Borges R, Buckner M, Morris T, Adhikari U, Pan S (2014) Machine learning for power system disturbance and cyber-attack discrimination. In: Proceedings of the 7th international symposium on resilient control systems, Aug 19–21, 2014, Denver, CO, USA

  34. Wenzhu S, Wenting H, Zufeng X, Jianping C (2019) Overview of one-class classification. In: 2019 IEEE 4th international conference on signal and image processing (ICSIP), Wuxi, China, 2019, pp 6–10

  35. Zhang Shichao, Zhang Chengqi, Yang Qiang (2003) Data preparation for data mining. Appl Artif Intell 17(5–6):375–381

    Article  Google Scholar 

  36. Mao J, Jain AK, Duin PW (2000) Statistical pattern recognition: a review. IEEE Trans Pattern Anal Mach Intell 22(1):4–37

    Article  Google Scholar 

  37. Fawcett T (2006) An introduction to ROC analysis. Pattern Recognit Lett 27(8):861–874

    Article  MathSciNet  Google Scholar 

  38. Demertzis K, Kikiras P, Tziritas N, Sanchez SL, Iliadis L (2018) The next generation cognitive security operations center: network flow forensics using cybersecurity intelligence. Big Data Cogn Comput 2:35

    Article  Google Scholar 

  39. Demertzis K, Tziritas N, Kikiras P, Sanchez SL, Iliadis L (2019) The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn Comput 3:6

    Article  Google Scholar 

  40. Demertzis K, Iliadis L, Kikiras P, Tziritas N (2019) Cyber-typhon: an online multi-task anomaly detection framework. In: MacIntyre J, Maglogiannis I, Iliadis L, Pimenidis E (eds) Artificial intelligence applications and innovations. AIAI 2019. IFIP advances in information and communication technology, vol 559. Springer, Cham

  41. Korda N, Szorenyi B, Li S (2016) Distributed clustering of linear bandits in peer to peer networks. In: ICML’16: proceedings of the 33rd international conference on international conference on machine learning, vol 48, June 2016, pp 1301–1309

  42. Li S, Karatzoglou A, Gentile C (2016) Collaborative filtering bandits. In: Proceedings of the 39th international ACM SIGIR conference on research and development in information retrieval (SIGIR’16). Association for Computing Machinery, New York, NY, USA, pp 539–548. https://doi.org/10.1145/2911451.2911548

  43. Hao F, Park D-S, Li S, Lee HM (2016) Mining λ-maximal cliques from a fuzzy graph. Sustainability 8:553

    Article  Google Scholar 

  44. Gentile C, Li S, Zappella G (2014) Online clustering of bandits. In: Proceedings of the 31st international conference on international conference on machine learning, vol 32 (ICML’14). JMLR.org, II–757–II–765

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lazaros Iliadis.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Demertzis, K., Iliadis, L., Tziritas, N. et al. Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Comput & Applic 32, 17361–17378 (2020). https://doi.org/10.1007/s00521-020-05189-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-020-05189-8

Keywords

Navigation