{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T00:06:44Z","timestamp":1773187604091,"version":"3.50.1"},"reference-count":45,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDT"],"published-print":{"date-parts":[[2024,6,7]]},"abstract":"<jats:p>\u201cInternet-of-Things (IoT)\u201d systems and components are highly noticed by cybercriminals including the affiliated or the nation-state sponsored threat actors as become a united part of the linked ecosystem and the society. But, the difficulties in protecting the systems and the devices are combined of scale and multiple deployments, the speed-paced cyber threats landscape, and more parameters. With the enhanced internet services, cyber security grows one of the highest research issues of the latest digital world. It is very important to develop a cyber security model to identify the various types of attacks. To overcome these problems, a quantum-inspired blockchain-assisted cyber security model is obtained in the IoT platform. Firstly, the required information is obtained from quality online information resources. Then, the information is stored in the quantum-inspired blockchain with optimal key, where the key optimization is performed with the help of the Fitness-based Jellyfish Chameleon Swarm Algorithm (FJCSA). Then, the stored data are recovered and finally, fed to the intrusion detection stage to verify whether it is affected by any unauthorized entities. The intrusion detection is done with the support of \u201cAdaptive Attention-based Long Short Term Memory (LSTM) with Adaboost (AALSTM-Ab)\u201d, where the parameters are optimized by using the FJCSA. Furthermore, the experimental results of the developed model are validated by comparing the performance of various recently implemented blockchain-based cyber security approaches with respect to several positive and negative performance measures. From the result analysis, the accuracy and precision rate of the recommended model are 95.50% and 91.40%.<\/jats:p>","DOI":"10.3233\/idt-230579","type":"journal-article","created":{"date-parts":[[2024,6,18]],"date-time":"2024-06-18T15:53:11Z","timestamp":1718725991000},"page":"1203-1232","source":"Crossref","is-referenced-by-count":1,"title":["Efficient quantum inspired blockchain-based cyber security framework in IoT using deep learning and huristic algorithms"],"prefix":"10.1177","volume":"18","author":[{"given":"Vimala Josphine","family":"C","sequence":"first","affiliation":[{"name":"Artificial Intelligence and Datascience, R.M.K Engineering College, Kavaraipettai, Gummidipoondi taluk, Chennai, India"}]},{"given":"Theodore Kingslin","family":"M","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, R.M.K College of Engineering and Technology, Puduvoyal, Gummidipoondi taluk, Chennai, India"}]},{"given":"Fatima Vincy","family":"R","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Easwari Engineering College, Ramapuram, Chennai, India"}]},{"given":"Mohana","family":"M","sequence":"additional","affiliation":[{"name":"Artificial Intelligence and Data Science, Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai, India"}]},{"given":"S.","family":"Babitha","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Hindustan Institute of Technology and Science, Padur, India"}]}],"member":"179","reference":[{"key":"10.3233\/IDT-230579_ref1","doi-asserted-by":"crossref","first-page":"99573","DOI":"10.1109\/ACCESS.2019.2930345","article-title":"An efficient forensics architecture in software-defined networking-IoT using blockchain technology","volume":"7","author":"Pourvahab","year":"2019","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-230579_ref2","doi-asserted-by":"crossref","first-page":"36623","DOI":"10.1007\/s11042-021-11465-z","article-title":"Blockchain-based synergistic solution to current cybersecurity frameworks","volume":"81","author":"Yadav","year":"2022","journal-title":"Multimedia Tools Appl"},{"key":"10.3233\/IDT-230579_ref3","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s10586-020-03058-6","article-title":"A decentralized lightweight blockchain-based authentication mechanism for IoT systems","volume":"23","author":"Khalid","year":"2020","journal-title":"Cluster Comput"},{"key":"10.3233\/IDT-230579_ref4","doi-asserted-by":"crossref","first-page":"30677","DOI":"10.1007\/s11042-020-09867-6","article-title":"A new blockchain-based personal privacy protection scheme","volume":"80","author":"Gao","year":"2021","journal-title":"Multimedia Tools Appl"},{"key":"10.3233\/IDT-230579_ref5","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1007\/s40565-018-0425-1","article-title":"Cyber-secure decentralized energy management for IoT-enabled active distribution networks","volume":"6","author":"LI","year":"2018","journal-title":"J Mod Power Syst Clean Energy"},{"key":"10.3233\/IDT-230579_ref6","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1007\/s40747-022-00667-z","article-title":"Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security","volume":"8","author":"Attkan","year":"2022","journal-title":"Complex Intell Syst"},{"key":"10.3233\/IDT-230579_ref7","doi-asserted-by":"crossref","first-page":"36751","DOI":"10.1007\/s11042-022-13503-w","article-title":"A novel blockchain federated safety-as-a-service scheme for industrial IoT using machine learning","volume":"81","author":"Hasan","year":"2022","journal-title":"Multimedia Tools Appl"},{"key":"10.3233\/IDT-230579_ref8","doi-asserted-by":"crossref","unstructured":"Hatefi Z, Bayat M, Alaghband MR, Hamian N, Pournaghi SM. A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party. J Ambient Intell Hum Comput. 2022.","DOI":"10.1007\/s12652-021-03672-1"},{"key":"10.3233\/IDT-230579_ref9","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1007\/s12083-020-00971-w","article-title":"Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things","volume":"14","author":"Sankar","year":"2021","journal-title":"Peer-to-Peer Networking Appl"},{"key":"10.3233\/IDT-230579_ref10","doi-asserted-by":"crossref","unstructured":"Thorat VA. Cloud intrusion detection using modified crow search optimized based neural network. Journal of Networking and Communication Systems. 2021; 4(2).","DOI":"10.46253\/jnacs.v4i2.a2"},{"key":"10.3233\/IDT-230579_ref11","doi-asserted-by":"crossref","first-page":"9810","DOI":"10.1007\/s11227-021-03653-3","article-title":"Efficient data management techniques based on hierarchical IoT privacy using block chains in cloud environments","volume":"77","author":"Jeong","year":"2021","journal-title":"The Journal of Supercomputing"},{"key":"10.3233\/IDT-230579_ref12","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1007\/s12063-021-00245-5","article-title":"Evaluate the barriers of blockchain technology adoption in sustainable supply chain management in the manufacturing sector using a novel Pythagorean fuzzy-CRITIC-CoCoSo approach","volume":"15","author":"Han","year":"2022","journal-title":"Oper Manage Res"},{"key":"10.3233\/IDT-230579_ref13","doi-asserted-by":"crossref","first-page":"12175","DOI":"10.1007\/s00500-021-05883-2","article-title":"A control-driven autonomous authentication scheme for peer-to-peer control systems assisted industrial Internet of things","volume":"25","author":"Alkhalaf","year":"2021","journal-title":"Soft Comput"},{"key":"10.3233\/IDT-230579_ref14","doi-asserted-by":"crossref","first-page":"103801","DOI":"10.1016\/j.compind.2022.103801","article-title":"Secure intelligent fuzzy blockchain framework: Effective threat detection in IoT networks","volume":"144","author":"Yazdinejad","year":"2023","journal-title":"Comput Ind"},{"key":"10.3233\/IDT-230579_ref15","doi-asserted-by":"crossref","first-page":"102217","DOI":"10.1016\/j.tre.2020.102217","article-title":"Cybersecurity in logistics and supply chain management: An overview and future research directions","volume":"146","author":"Cheung","year":"2021","journal-title":"Transportation Research Part E: Logistics and Transportation Review"},{"key":"10.3233\/IDT-230579_ref16","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/j.jpdc.2019.08.005","article-title":"LSB: A Lightweight Scalable Blockchain for IoT security and anonymity","volume":"134","author":"Dorri","year":"2019","journal-title":"J Parallel Distrib Comput"},{"key":"10.3233\/IDT-230579_ref17","doi-asserted-by":"crossref","first-page":"108290","DOI":"10.1016\/j.compeleceng.2022.108290","article-title":"Privacy-preserving ledger for blockchain and Internet of Things-enabled cyber-physical systems","volume":"103","author":"Singh","year":"2022","journal-title":"Comput Electr Eng"},{"key":"10.3233\/IDT-230579_ref18","doi-asserted-by":"crossref","unstructured":"Zhang G, Xie H, Yang Z, Tao X, Liu W. BDKM: A blockchain-based secure deduplication scheme with reliable key management. Neural Process Lett. 2022; 54: 2657-2674.","DOI":"10.1007\/s11063-021-10450-9"},{"key":"10.3233\/IDT-230579_ref19","doi-asserted-by":"crossref","unstructured":"Padm K. Intrusion detection using naive bayes ant colony optimization algorithm in a wireless communication network. Int J Networking and Communication Systems. 2022; 5(1).","DOI":"10.46253\/jnacs.v5i1.a3"},{"key":"10.3233\/IDT-230579_ref20","doi-asserted-by":"crossref","unstructured":"Abd El-Latif AA, Abd-El-Atty B, Mehmood I, Muhammad K, Venegas-Andraca SE, Peng J. Quantum-inspired blockchain-based cybersecurity: Securing smart edge utilities in IoT-based smart cities. Information Processing and Management. 2021; 58: 102549.","DOI":"10.1016\/j.ipm.2021.102549"},{"key":"10.3233\/IDT-230579_ref21","doi-asserted-by":"crossref","first-page":"102909","DOI":"10.1016\/j.jnca.2020.102909","article-title":"The blockchain random neural network for cyber secure IoT and 5G infrastructure in smart cities","volume":"175","author":"Serrano","year":"2021","journal-title":"J Network Comput Appl"},{"issue":"8","key":"10.3233\/IDT-230579_ref22","doi-asserted-by":"crossref","first-page":"5522","DOI":"10.1109\/TII.2020.3040968","article-title":"A blockchain-based deep learning approach for cyber security in next generation industrial cyber-physical systems","volume":"7","author":"Rathore","year":"2021","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"10.3233\/IDT-230579_ref23","doi-asserted-by":"crossref","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","article-title":"PPSF: A privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities","volume":"8","author":"Kumar","year":"2021","journal-title":"IEEE Trans Network Sci Eng"},{"key":"10.3233\/IDT-230579_ref24","first-page":"12","article-title":"DeepBlockScheme: A deep learning-based blockchaindriven scheme for secure smart city","volume":"11","author":"EL-Azzaoui","year":"2021","journal-title":"Hum -centric Comput Inf Sci"},{"key":"10.3233\/IDT-230579_ref25","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.jpdc.2021.03.011","article-title":"Secure blockchain enabled Cyber\u2013physical systems in healthcare using deep belief network with ResNet model","volume":"153","author":"Nguyen","year":"2021","journal-title":"J Parallel Distrib Comput"},{"key":"10.3233\/IDT-230579_ref26","doi-asserted-by":"crossref","first-page":"15644","DOI":"10.1109\/ACCESS.2022.3149046","article-title":"FBASHI: Fuzzy and blockchain-based adaptive security for healthcare IoTs","volume":"10","author":"Zulkifl","year":"2022","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-230579_ref27","first-page":"4","article-title":"DBTP2SF: A deep blockchain-based trustworthy privacy-preserving secured framework in industrial internet of things systems","volume":"32","author":"Kumar","year":"2021","journal-title":"Trans Emerging Telecommun Technol"},{"key":"10.3233\/IDT-230579_ref28","first-page":"13","article-title":"A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems","author":"Selvarajan","year":"2023","journal-title":"Sci Rep"},{"key":"10.3233\/IDT-230579_ref29","doi-asserted-by":"crossref","unstructured":"Aluvalu R, Senthil Kumaran VN, Thirumalaisamy M, Basheer S, aldhahri. Selvarajan S Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Comput Sci. 2023.","DOI":"10.7717\/peerj-cs.1308"},{"key":"10.3233\/IDT-230579_ref30","first-page":"12","article-title":"Lin JCW An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems","author":"Selvarajan","year":"2023","journal-title":"J Cloud Comput"},{"issue":"4","key":"10.3233\/IDT-230579_ref31","first-page":"413","article-title":"Blockchain-based secure architecture for electronic healthcare record management","volume":"16","author":"Mondal","year":"2022","journal-title":"GMSARN International Journal"},{"key":"10.3233\/IDT-230579_ref32","first-page":"255","article-title":"Multimedia Security: Algorithms for Intelligent Systems book series (AIS)","author":"Giri","year":"2021","journal-title":"Algorithms for Intelligent Systems"},{"key":"10.3233\/IDT-230579_ref33","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-981-15-8711-5_13","article-title":"Use of blockchain and internet of things for securing data in healthcare systems","author":"Banotra","year":"2021","journal-title":"Multimedia Security"},{"key":"10.3233\/IDT-230579_ref34","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1007\/978-981-15-8711-5_14","article-title":"Asset security in data of internet of things using blockchain technology","author":"Banotra","year":"2021","journal-title":"Multimedia Security"},{"key":"10.3233\/IDT-230579_ref35","doi-asserted-by":"crossref","first-page":"114685","DOI":"10.1016\/j.eswa.2021.114685","article-title":"Chameleon swarm algorithm: A bio-inspired optimizer for solving engineering design problems","volume":"174","author":"Braik","year":"2021","journal-title":"Expert Syst Appl"},{"key":"10.3233\/IDT-230579_ref36","first-page":"125535","article-title":"A novel metaheuristic optimizer inspired by behavior of jellyfish in ocean","author":"Chou","year":"2021","journal-title":"Appl Math Comput"},{"key":"10.3233\/IDT-230579_ref37","doi-asserted-by":"crossref","unstructured":"Yang S, Liu F, Xia S. A method of intrusion detection based on Attention-LSTM neural network. 2020.","DOI":"10.1145\/3409073.3409096"},{"key":"10.3233\/IDT-230579_ref38","first-page":"38","article-title":"Steve may bank, adaboost-based algorithm for network intrusion detection","author":"Hu","year":"2008","journal-title":"IEEE"},{"key":"10.3233\/IDT-230579_ref39","first-page":"19","article-title":"Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems","volume":"7","author":"Rao","year":"2016","journal-title":"Int J Ind Eng Computations"},{"key":"10.3233\/IDT-230579_ref40","doi-asserted-by":"crossref","unstructured":"Brammya G, Praveena S, Ninu Preetha NS, Ramya R, Rajakumar BR, Binu D. Deer hunting optimization algorithm: A new nature-inspired meta-heuristic paradigm. 2019; 24.","DOI":"10.1093\/comjnl\/bxy133"},{"key":"10.3233\/IDT-230579_ref41","doi-asserted-by":"crossref","first-page":"21954","DOI":"10.1109\/ACCESS.2017.2762418","article-title":"A deep learning approach for intrusion detection using recurrent neural networks","volume":"5","author":"Yin","year":"2017","journal-title":"IEEE Access"},{"key":"10.3233\/IDT-230579_ref42","doi-asserted-by":"crossref","first-page":"16062","DOI":"10.1109\/ACCESS.2021.3051074","article-title":"Deep belief network integrating improved kernel-based extreme learning machine for network intrusion detection","volume":"9","author":"Wang","year":"2021","journal-title":"IEEE Access"},{"issue":"12","key":"10.3233\/IDT-230579_ref43","doi-asserted-by":"crossref","first-page":"20828","DOI":"10.3934\/mbe.2023922","article-title":"SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures","volume":"20","author":"Selvarajan","year":"2023","journal-title":"Math Biosci Eng"},{"key":"10.3233\/IDT-230579_ref44","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1007\/s10207-023-00748-1","article-title":"A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)","volume":"23","author":"Rabie","year":"2024","journal-title":"Int J Inf Secur"},{"key":"10.3233\/IDT-230579_ref45","doi-asserted-by":"crossref","unstructured":"Ghosh S, Banerjee A, Sufian A, Gupta SK, Alsamhi, SH, Saif A. Efficient selfish node detection using SVM in IoT-MANET environment. Trans Emerging Telecommun Technol. 2023; 34(12).","DOI":"10.1002\/ett.4858"}],"container-title":["Intelligent Decision Technologies"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDT-230579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T20:33:06Z","timestamp":1741638786000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDT-230579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,7]]},"references-count":45,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/idt-230579","relation":{},"ISSN":["1872-4981","1875-8843"],"issn-type":[{"value":"1872-4981","type":"print"},{"value":"1875-8843","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,7]]}}}