Enhancing Cyber-Physical System Security through AI-Driven Intrusion Detection and Blockchain Integration
DOI:
https://doi.org/10.22399/ijcesen.1168Keywords:
Cyber-Physical Systems (CPS), Blockchain Security, Deep learning, Decentralized Security, Cybersecurity in CPSAbstract
Cyber-Physical Systems (CPS) play a critical role in modern industries, smart grids, healthcare, and autonomous transportation. However, their increasing connectivity makes them vulnerable to cyber threats. This research proposes an AI-driven Intrusion Detection System (AI-IDS) integrated with Blockchain Technology to enhance CPS security. The AI-IDS employs deep learning models for anomaly detection, leveraging graph-based machine learning and federated learning to improve real-time threat mitigation. Additionally, blockchain ensures data integrity, access control, and decentralized security through smart contracts and consensus mechanisms. The framework is validated using real-world CPS datasets, demonstrating improved detection accuracy, reduced false alarms, and resilience against adversarial attacks. This hybrid approach enhances scalability, trustworthiness, and real-time defense in cyber-physical environments
References
Liu, X., Wang, X., & Wang, Y. (2023). Intrusion Detection in Cyber-Physical Systems: A Deep Learning Approach. IEEE Transactions on Industrial Informatics, 19(2), 1234-1248.
Al-Rimy, B., Maarof, M., & Shaid, S. (2022). A Review of AI-Based Intrusion Detection in CPS: Challenges and Opportunities. Journal of Cyber Security and Privacy, 4(1), 56-72.
Zhang, Y., Chen, L., & Yang, Z. (2023). Federated Learning for Cyber-Physical Systems Security: A Decentralized Approach. ACM Transactions on Cybersecurity, 15(3), 211-225.
Khan, M. A., & Gani, A. (2022). Graph Neural Networks for Anomaly Detection in Cyber-Physical Systems. Future Generation Computer Systems, 134, 205-220.
Gupta, R., & Kumar, P. (2023). Enhancing CPS Security Using Hybrid Deep Learning Models. IEEE Access, 11, 20345-20358.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System. Bitcoin Whitepaper, Available at: https://bitcoin.org/bitcoin.pdf.
Wood, G. (2015). Ethereum: A Secure Decentralized Generalized Transaction Ledger. Ethereum Whitepaper, Available at: https://ethereum.org/whitepaper.
Zhang, T., Sun, Y., & Li, J. (2023). Blockchain-Based Secure Access Control for Cyber-Physical Systems. IEEE Transactions on Dependable and Secure Computing, 20(1), 12-25.
Rani, S., & Singh, J. (2022). Smart Contracts for Cyber-Physical Security: A Blockchain-Based Framework. ACM Computing Surveys, 54(6), 123-140.
Rahman, H., & Liu, W. (2023). Integrating AI and Blockchain for Anomaly Detection in CPS. Sensors, 23(3), 1052-1070.
S. M. Kurian, S. J. Devaraj, and V. P. Vijayan, (2021). Brain tumour detection by gamma DeNoised wavelet segmented entropy classifier, CMC-Computers, Materials & Continua, 69(2);2093–2109. DOI: https://doi.org/10.32604/cmc.2021.018090
N.Sasirekha .,K R Kashwan, (2016)International Journal of Digital Content Technology and its Applications 10(2);61-77.
N.Sasirekha .,K R Kashwan ,Improved Segmentation of MRI Brain Images by Denoising and Contrast Enhancement, Indian Journal of Science and Technology 8(22) DOI:10.17485/ijst/2015/v8i22/73050 DOI: https://doi.org/10.17485/ijst/2015/v8i22/73050
Saeidifar, M., Yazdi, M. & Zolghadrasli, (2021) A. Performance Improvement in Brain Tumor Detection in MRI Images Using a Combination of Evolutionary Algorithms and Active Contour Method. J Digit Imaging 34, 1209–1224 DOI: https://doi.org/10.1007/s10278-021-00514-6
Shivhare, S.N., N. Kumar, and N. Singh, (2019). A hybrid of active contour model and convex hull for automated brain tumor segmentation in multimodal MRI. Multimedia Tools and Applications 78(24);34207-34229. DOI: https://doi.org/10.1007/s11042-019-08048-4
Maheshwari, R. U., Jayasutha, D., Senthilraja, R., & Thanappan, S. (2024). Development of Digital Twin Technology in Hydraulics Based on Simulating and Enhancing System Performance. Journal of Cybersecurity & Information Management, 13(2). DOI: https://doi.org/10.54216/JCIM.130204
Paulchamy, B., Uma Maheshwari, R., Sudarvizhi AP, D., Anandkumar AP, R., & Ravi, G. (2023). Optimized Feature Selection Techniques for Classifying Electrocorticography Signals. Brain‐Computer Interface: Using Deep Learning Applications, 255-278. DOI: https://doi.org/10.1002/9781119857655.ch11
Paulchamy, B., Chidambaram, S., Jaya, J., & Maheshwari, R. U. (2021). Diagnosis of Retinal Disease Using Retinal Blood Vessel Extraction. In International Conference on Mobile Computing and Sustainable Informatics: ICMCSI 2020 (pp. 343-359). Springer International Publishing. DOI: https://doi.org/10.1007/978-3-030-49795-8_34
Maheshwari, U. Silingam, K. (2020). Multimodal Image Fusion in Biometric Authentication. Fusion: Practice and Applications, 79-91. DOI: https://doi.org/10.54216/FPA.010203 DOI: https://doi.org/10.54216/FPA.010203
Prasada, P., & Prasad, D. S. (2024). Blockchain-Enhanced Machine Learning for Robust Detection of APT Injection Attacks in the Cyber-Physical Systems. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.539 DOI: https://doi.org/10.22399/ijcesen.539
V. Ananthakrishna, & Chandra Shekhar Yadav. (2025). QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications. International Journal of Computational and Experimental Science and Engineering, 11(1). https://doi.org/10.22399/ijcesen.718 DOI: https://doi.org/10.22399/ijcesen.718
Alkhatib, A., Albdor , L., Fayyad, S., & Ali, H. (2024). Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children’s Toys: Securing IoT Children’s Toys. International Journal of Computational and Experimental Science and Engineering, 10(4). https://doi.org/10.22399/ijcesen.417 DOI: https://doi.org/10.22399/ijcesen.417
R.Uma Maheshwari (2021). Encryption and decryption using image processing techniques. International Journal of Engineering Applied Sciences and Technology, 5(2),219-222 DOI: https://doi.org/10.33564/IJEAST.2021.v05i12.037
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.