Volume 25 , Issue 1 , PP: 160-171, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Mesfer Al Duhayyim 1 *
Doi: https://doi.org/10.54216/IJNS.250114
The breakthrough technologies of the Internet of Things (IoT) have modernized classical Consumer Electronics (CE) into next-generation CE with high intelligence and connectivity. This connectivity amongst appliances, actuators, sensors, etc., offers automated control in CE and enables better data availability. However, the data traffic has been exponentially increased owing to its decentralization, diversity, and increasing number of CE devices. Furthermore, the static network-based approaches need exclusive management and manual configuration of CE devices. The generalization of a Neutrosophic Hypersoft Set (NHSS) is a concept of a soft set. This architecture is a mixture of neutrosophic sets with hypersoft sets. Therefore, the study introduce a Blockchain with Single-Valued Neutrosophic Hypersoft Sets Assisted Threat Detection (BCSVNHS-TD) technique for Secure IoT Assisted CE. The presented BCSVNHS-TD technique applies BC technology for secure communication among CEs. For threat detection, the BCSVNHS-TD method introduces the SVNHS model. Also, the parameter selection of the SVNHS method takes place using the chicken swarm optimization (CSO) technique. An extensive set of tests was involved for exhibiting the better effiency of the BCSVNHS-TD method. The experimental results emphasized that the BCSVNHS-TD method reaches optimal results over other techniques
Internet of Things , Blockchain , Consumer Electronics , Neutrosophic Set , Chicken Swarm Optimization
[1] Smarandache F., and Abobala, M., " n-Refined Neutrosophic Vector Spaces", International Journal of Neutrosophic Science, Vol. 7, pp. 47-54, 2020.
[2] Tuqa A. H. Al-Tamimi, Luay A. A. Al-Swidi , Ali H. M. Al-Obaidi. "Partner Sets for Generalizations of MultiNeutrosophic Sets." International Journal of Neutrosophic Science, Vol. 24, No. 1, 2024 ,PP. 08-13
[3] Parimala, M., Karthika, M. and Smarandache, F., 2020. A review of fuzzy soft topological spaces, intuitionistic fuzzy soft topological spaces and neutrosophic soft topological spaces. International Journal of Neutrosophic Science, Vol. 10, No. 2, 2020 ,PP. 96-104.
[4] Ashraf, S. and Abdullah, S., 2020. Decision support modeling for agriculture land selection based on sine trigonometric single valued neutrosophic information. International Journal of Neutrosophic Science (IJNS), 9(2), pp.60-73..
[5] Hazra, A., Alkhayyat, A. and Adhikari, M., 2022. Blockchain-aided integrated edge framework of cybersecurity for Internet of Things. IEEE Consumer Electronics Magazine.
[6] Saad, M., Bhutta, M.R., Kim, J. and Chung, T.S., 2024. A Framework for Enhancing Privacy and Anonymity in Blockchain-Enabled IoT Devices. Computers, Materials & Continua, 78(3).
[7] Bagchi, P., Bera, B., Das, A.K., Shetty, S., Vijayakumar, P. and Karuppiah, M., 2023. Post quantum lattice-based secure framework using aggregate signature for ambient intelligence assisted blockchain-based IoT applications. IEEE Internet of Things Magazine, 6(1), pp.52-58.
[8] Mishra, K.N., Bhattacharjee, V., Saket, S. and Mishra, S.P., 2024. Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. Cluster Computing, 27(1), pp.27-52.
[9] Chandrakar, P., Bagga, R., Kumar, Y., Dwivedi, S.K. and Amin, R., 2023. Blockchain based security protocol for device to device secure communication in internet of things networks. Security and Privacy, 6(1), p.e267.
[10] Patel, P., Bhatt, R., Joshi, M., Patil, G., Pal, H. and Qureshi, A.R.K., 2024. Blockchain-Enabled Decentralized Edge Computing in Cyber Security for Intrusion Detection. International Journal of Intelligent Systems and Applications in Engineering, 12(13s), pp.28-40.
[11] Sasikumar, A., Ravi, L., Devarajan, M., Selvalakshmi, A., Almaktoom, A.T., Almazyad, A.S., Xiong, G. and Mohamed, A.W., 2024. Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things. IEEE Access.
[12] Javeed, D., Saeed, M.S., Ahmad, I., Kumar, P., Jolfaei, A. and Tahir, M., 2023. An intelligent intrusion detection system for smart consumer electronics network. IEEE Transactions on Consumer Electronics.
[13] Babu, E.S., SrinivasaRao, B.K.N., Nayak, S.R., Verma, A., Alqahtani, F., Tolba, A. and Mukherjee, A., 2022. Blockchain-based Intrusion Detection System of IoT urban data with device authentication against DDoS attacks. Computers and Electrical Engineering, 103, p.108287.
[14] Kumar, P., Javeed, D., Kumar, R. and Islam, A.N., 2024. Blockchain and explainable AI for enhanced decision making in cyber threat detection. Software: Practice and Experience.
[15] Gupta, B.B., Gaurav, A. and Arya, V., 2023. Secure and Privacy-Preserving Decentralized Federated Learning for Personalized Recommendations in Consumer Electronics using Blockchain and Homomorphic Encryption. IEEE Transactions on Consumer Electronics.
[16] Khandekar, A. and Ahmad, S.F., 2024. Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology. Cluster Computing, pp.1-16.
[17] Almuqren, L., Mahmood, K., Aljameel, S.S., Salama, A.S., Mohammed, G.P. and Alneil, A.A., 2023. Blockchain Assisted Secure Smart Home Network using Gradient Based Optimizer with Hybrid Deep Learning Model. IEEE Access.
[18] Singh, P., Kumar, A. and Chopra, M., 2023. Real‐World Applications of BC Technology in Internet of Things. Machine Learning Applications: From Computer Vision to Robotics, pp.97-122.
[19] Jafar, M.N., Saeed, M., Khan, K.M., Alamri, F.S. and Khalifa, H.A.E.W., 2022. Distance and similarity measures using max-min operators of neutrosophic hypersoft sets with application in site selection for solid waste management systems. Ieee Access, 10, pp.11220-11235.
[20] Aandal, R. and Ravi, A., 2024. Design of Z source converter with the genetic-based chicken swarm algorithm for closed loop control of PV integrated grid. Automatika, 65(3), pp.675-690.
[21] Alosaimi, S. and Almutairi, S.M., 2023. An intrusion detection system using BoT-IoT. Applied Sciences, 13(9), p.5427.