Download PDFOpen PDF in browserBlockchain Reinforced Task Distribution and Secure Deduplication Using Adaptive Deep Reinforcement Learning in Cluster Based Fog IoTEasyChair Preprint 1143016 pages•Date: December 1, 2023AbstractThe fog-assisted Internet-of-Things (IoT) is gaining interest due to its large number of devices, which can lead to more duplicate data transmission over the internet. This paper proposes task distribution and secure deduplication over Cluster-based IoT, implementing four layers: IoT Devices Layer, Fog Layer, Cloud Layer, and Service Layer. In the IoT devices layer, devices sense air pollutants and are authenticated to the cloud server using Edwards Curve-based Elliptic Curve Cryptography (EC-ECC). Adaptive Rewards Optimized Deep Reinforcement Learning (ARO-DRL) is used for cluster-head selection at the first layer. In the fog layer, SHA-3 is proposed for duplicate verification, and the Emperor Penguin Optimization Algorithm is used to choose the best fog node. Packet Scrutinization Algorithm is used in the fog node to analyze packet features, including DDoS attack packets. A proxy server is deployed between the cloud server and fog node for queue modeling. In the cloud layer, a hybrid cloud environment is used to protect organizations' data in a highly secure manner. IoT devices are divided into sensitive and nonsensitive devices, with sensitive data encrypted using RC6, AES, and Fiestel encryption schemes. The overall environment is assumed to be decentralized, with security invoked to IoT devices to provision Quality of Service (QoS) by avoiding attackers. Experiments were conducted and analyzed using NS3 with Java programming, and simulation results showed improvements in average latency, user satisfaction, network lifetime, energy consumption, and security strength. Keyphrases: Blockchain, Fog Assisted Internet of Things, NS3 with Java, Secure Clustering, Secure Deduplication, task allocation
|