Hybrid Blockchain–Machine Learning Framework for Secure and Intelligent Intrusion Detection in Industrial Internet of Things
Keywords:
Blockchain, Intrusion Detection System (IDS), Machine Learning, Optimization AlgorithmAbstract
As a result of the Industrial Internet of Things (IIoT), the industrial ecosystem has been transformed by the exchange of data in real-time and the automation of operations in an intelligent manner. Cybersecurity risks are associated with this connectivity, especially for resource-constrained and heterogeneous IIoT networks. An intrusion detection framework incorporating blockchain technology and machine learning algorithms is proposed in this study to address these challenges. Data sharing and auditability are ensured through decentralized, tamper-resistant blockchain, while evolving threats can be detected through adaptive machine learning. For multiclass classification, the proposed system takes advantage of XGBoost, and for hyperparameter optimization, it uses the HAFSO algorithm. For multiclass classification, the proposed system takes advantage of XGBoost, and for hyperparameter optimization, it uses the HAFSO algorithm.
References
G. Wang, “Sok: Applying blockchain technology in industrial internet of things,” Cryptology ePrint Archive, 2021, Accessed: Oct. 14, 2025. [Online]. Available: https://eprint.iacr.org/2021/776
M. Yli-Ojanperä, S. Sierla, N. Papakonstantinou, and V. Vyatkin, “Adapting an agile manufacturing concept to the reference architecture model industry 4.0: A survey and case study,” Journal of industrial information integration, vol. 15, pp. 147–160, 2019.
H. Lasi, P. Fettke, H.-G. Kemper, T. Feld, and M. Hoffmann, “Industry 4.0,” Bus Inf Syst Eng, vol. 6, no. 4, pp. 239–242, Aug. 2014, doi: 10.1007/s12599-014-0334-4.
P. Kumar, R. Kumar, G. P. Gupta, and R. Tripathi, “A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing,” Trans Emerging Tel Tech, vol. 32, no. 6, p. e4112, Jun. 2021, doi: 10.1002/ett.4112.
M. Borhani, M. Liyanage, A. H. Sodhro, P. Kumar, A. D. Jurcut, and A. Gurtov, “Secure and Resilient Communications in the Industrial Internet,” in Guide to Disaster-Resilient Communication Networks, J. Rak and D. Hutchison, Eds., in Computer Communications and Networks. , Cham: Springer International Publishing, 2020, pp. 219–242. doi: 10.1007/978-3-030-44685-7_9.
M. Shuaib et al., “Identity Model for Blockchain‐Based Land Registry System: A Comparison,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 5670714, Jan. 2022, doi: 10.1155/2022/5670714.
S. Wadhwa, S. Rani, G. Kaur, D. Koundal, A. Zaguia, and W. Enbeyle, “HeteroFL Blockchain Approach‐Based Security for Cognitive Internet of Things,” Wireless Communications and Mobile Computing, vol. 2022, no. 1, p. 5730196, Jan. 2022, doi: 10.1155/2022/5730196.
M. Saeed, M. Aftab, R. Amin, and D. Koundal, “Trust Management Model in IoT: A Comprehensive Survey,” in Innovations in Bio-Inspired Computing and Applications, vol. 419, A. Abraham, A. M. Madureira, A. Kaklauskas, N. Gandhi, A. Bajaj, A. K. Muda, D. Kriksciuniene, and J. C. Ferreira, Eds., in Lecture Notes in Networks and Systems, vol. 419. , Cham: Springer International Publishing, 2022, pp. 675–684. doi: 10.1007/978-3-030-96299-9_64.
J. M. Müller, D. Kiel, and K.-I. Voigt, “What Drives the Implementation of Industry 4.0? The Role of Opportunities and Challenges in the Context of Sustainability,” Sustainability, vol. 10, no. 1, p. 247, Jan. 2018, doi: 10.3390/su10010247.
R. F. Mansour, “Blockchain assisted clustering with Intrusion Detection System for Industrial Internet of Things environment,” Expert Systems with Applications, vol. 207, p. 117995, Nov. 2022, doi: 10.1016/j.eswa.2022.117995.
W. Li, S. Tug, W. Meng, and Y. Wang, “Designing collaborative blockchained signature-based intrusion detection in IoT environments,” Future Generation Computer Systems, vol. 96, pp. 481–489, Jul. 2019, doi: 10.1016/j.future.2019.02.064.
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, S. Garg, and M. M. Hassan, “A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network,” Journal of Parallel and Distributed Computing, vol. 164, pp. 55–68, Jun. 2022, doi: 10.1016/j.jpdc.2022.01.030.
R. Kumar and R. Tripathi, “Data Provenance and Access Control Rules for Ownership Transfer Using Blockchain:,” International Journal of Information Security and Privacy, vol. 15, no. 2, pp. 87–112, Apr. 2021, doi: 10.4018/IJISP.2021040105.
S. A. Latif et al., “AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems,” Computer Communications, vol. 181, pp. 274–283, Jan. 2022, doi: 10.1016/j.comcom.2021.09.029.
S. V. N. Santhosh Kumar, M. Selvi, and A. Kannan, “A Comprehensive Survey on Machine Learning‐Based Intrusion Detection Systems for Secure Communication in Internet of Things,” Computational Intelligence and Neuroscience, vol. 2023, no. 1, p. 8981988, Jan. 2023, doi: 10.1155/2023/8981988.
N. I. Che Mat, N. Jamil, Y. Yusoff, and M. L. Mat Kiah, “A systematic literature review on advanced persistent threat behaviors and its detection strategy,” Journal of Cybersecurity, vol. 10, no. 1, p. tyad023, Jan. 2024, doi: 10.1093/cybsec/tyad023.
P. Alaeifar, S. Pal, Z. Jadidi, M. Hussain, and E. Foo, “Current approaches and future directions for Cyber Threat Intelligence sharing: A survey,” Journal of Information Security and Applications, vol. 83, p. 103786, Jun. 2024, doi: 10.1016/j.jisa.2024.103786.
S. Dong and M. Sarem, “DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks,” IEEE Access, vol. 8, pp. 5039–5048, 2020, doi: 10.1109/ACCESS.2019.2963077.
P. Rani, S. Sachan, A. A. Alwan, J. Jagtap, N. Kaur, and H. Alabdeli, “EECP2-IOT: Energy-Efficient Clustering Protocols for Performance Optimization of Internet of Things-Based Heterogeneous and Homogeneous Wireless Sensor Networks,” in Proceedings of the 3rd International Conference on Internet of Things, Communication and Intelligent Technology, vol. 1366, J. Dong, L. Zhang, and T. Zheng, Eds., in Lecture Notes in Electrical Engineering, vol. 1366. , Singapore: Springer Nature Singapore, 2026, pp. 575–590. doi: 10.1007/978-981-96-2771-4_50.
R. Rehyadd and P. Rani, “Sign-Based Encryption-Enabled Reliable Data Communication for Mobile Ad Hoc Networks,” in 2025 International Conference on Next Generation of Green Information and Emerging Technologies (GIET), Gunupur, India: IEEE, Aug. 2025, pp. 1–7. doi: 10.1109/GIET65294.2025.11234764.
P. Rani et al., “Federated Learning-Based Misbehavior Detection for the 5G-Enabled Internet of Vehicles,” IEEE Trans. Consumer Electron., vol. 70, no. 2, pp. 4656–4664, May 2024, doi: 10.1109/TCE.2023.3328020.
S. Mishra, A. Albarakati, and S. K. Sharma, “Cyber Threat Intelligence for IoT Using Machine Learning,” Processes, vol. 10, no. 12, p. 2673, Dec. 2022, doi: 10.3390/pr10122673.
P. Rani, J. Kumar, S. Singh, P. Dey, and L. H. Jasim, “Decoding the Aspects of Intelligent Traffic Management,” in Artificial Intelligence Technologies for Smart and Sustainable Urban Transportation, 1st ed., P. Raj, S. Yadav, M. K. Mishra, S. P. Yadav, and V. H. C. Albuquerque, Eds., Wiley, 2025, pp. 287–300. doi: 10.1002/9781394346776.ch17.
K. Yang, J. Ren, Y. Zhu, and W. Zhang, “Active Learning for Wireless IoT Intrusion Detection,” IEEE Wireless Commun., vol. 25, no. 6, pp. 19–25, Dec. 2018, doi: 10.1109/MWC.2017.1800079.
J. H. Jeon, K.-H. Kim, and J.-H. Kim, “Block chain based data security enhanced IoT server platform,” in 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand: IEEE, Jan. 2018, pp. 941–944. doi: 10.1109/ICOIN.2018.8343262.
S. Suhail, C. S. Hong, M. A. Lodhi, F. Zafar, A. Khan, and F. Bashir, “Data trustworthiness in IoT,” in 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand: IEEE, Jan. 2018, pp. 414–419. doi: 10.1109/ICOIN.2018.8343151.
Z. Shahbazi and Y.-C. Byun, “Integration of Blockchain, IoT and Machine Learning for Multistage Quality Control and Enhancing Security in Smart Manufacturing,” Sensors, vol. 21, no. 4, p. 1467, Feb. 2021, doi: 10.3390/s21041467.
P. Rani and R. Sharma, “Intelligent transportation system for internet of vehicles based vehicular networks for smart cities,” Computers and Electrical Engineering, vol. 105, p. 108543, Jan. 2023, doi: 10.1016/j.compeleceng.2022.108543.
J. Sengupta, S. Ruj, and S. Das Bit, “A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT,” Journal of Network and Computer Applications, vol. 149, p. 102481, Jan. 2020, doi: 10.1016/j.jnca.2019.102481.
A. Singh et al., “Resilient wireless sensor networks in industrial contexts via energy-efficient optimization and trust-based secure routing,” Peer-to-Peer Netw. Appl., vol. 18, no. 3, p. 132, May 2025, doi: 10.1007/s12083-025-01946-5.

