Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City
Rajeev Kumar Gupta,
Vedant Chawla,
Rajesh Kumar Pateriya,
Piyush Kumar Shukla,
Saoucene Mahfoudh and
Syed Bilal Hussain Shah ()
Additional contact information
Rajeev Kumar Gupta: Computer Science and Engineering Department, Pandit Deendayal Energy University, Gandhinagar 382007, India
Vedant Chawla: Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal 462003, India
Rajesh Kumar Pateriya: Computer Science and Engineering Department, Maulana Azad National Institute of Technology, Bhopal 462003, India
Piyush Kumar Shukla: Computer Science & Engineering Department, University Institute of Technology, Rajiv Gandhi Proudyogiki Vishwavidyalaya (Technological University of Madhya Pradesh), Bhopal 462033, India
Saoucene Mahfoudh: School of Engineering, Computing and Informatics, Dar Al-Hekma University, Jeddah 22246, Saudi Arabia
Syed Bilal Hussain Shah: School of Engineering, Computing and Informatics, Dar Al-Hekma University, Jeddah 22246, Saudi Arabia
Sustainability, 2023, vol. 15, issue 3, 1-14
Abstract:
The threat of cyber-attacks is ever increasing in today’s society. There is a clear need for better and more effective defensive tools. Intrusion detection can be defined as the detection of anomalous behavior either in the host or in the network. An intrusion detection system can be used to identify the anomalous behavior of the system. The two major tasks of intrusion detection are to monitor data and raise an alert to the system administrators when an intrusion takes place. The current intrusion detection system is incapable of tackling sophisticated attacks which take place on the entire network containing large number of nodes while maintaining a low number of login attempts on each node in the system. A collaborative intrusion detection system (CIDS) was designed to remove the inefficiency of the current intrusion detection system which failed to detect coordinated distributed attacks. The main problem in the CIDS is the concept of trust. Hosts in the network need to trust the data sent by other peers in the network. To bring in the concept of trust and implement the proof-of-concept, blockchain was used. Pluggable authentication modules (PAM) were also used to track login activity securely before an intruder could modify the login activity. To implement blockchain, an Ethereum-based private blockchain was used.
Keywords: sustainable smart city; intrusion detection system; collaborative intrusion detection system; authentication; blockchain (search for similar items in EconPapers)
JEL-codes: O13 Q Q0 Q2 Q3 Q5 Q56 (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2071-1050/15/3/2133/pdf (application/pdf)
https://www.mdpi.com/2071-1050/15/3/2133/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jsusta:v:15:y:2023:i:3:p:2133-:d:1044750
Access Statistics for this article
Sustainability is currently edited by Ms. Alexandra Wu
More articles in Sustainability from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().