Quantum-Resistant Blockchain for Autonomous Cybersecurity Threat Mitigation in AI-Driven IoT Networks

Abstract

The fast growth of IoT networks and the rise in cyberattacks have created a need for strong security systems. This paper presents a simple and effective framework called Quantum-Resistant Blockchain to protect AI-powered IoT networks. The framework uses Post-Quantum Cryptography (PQC) to keep data safe from future quantum computer attacks. It also uses TLS for secure communication and AES for storing data safely. To detect threats, it has an Intrusion Detection System (IDS) and checks device behavior for anything unusual. Access to important data is controlled by Role-Based Access Control (RBAC) using a Django app. Real-time monitoring and regular software updates add extra layers of security. Tests show that the system detects cyber threats with 95% accuracy, has quick blockchain transactions, and works well with current IoT systems. This research offers a strong, scalable, and future-proof solution to keep IoT networks safe.

Country : India

1 S.V.S. Ganga Devi2 Thavalam Nikitha3 Kundharupu Chinni Krishna

  1. Professor & Head, Department of C.S.E. (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P, India
  2. UG Scholar, Department of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P, India
  3. UG Scholar, Department of C.S.E (Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle-517325, A.P, India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 301-307

doi.org/10.47001/IRJIET/2025.INSPIRE49

References

  1. J. Jang, K. Kim, S. Yoon, S. Lee, M. Ahn and D. Shin, "Mission Impact Analysis by Measuring the Effect on Physical Combat Operations Associated With Cyber Asset Damage," in IEEE Access, vol. 11, pp.
  2. S. Ghosh, A. Zaboli, J. Hong and J. Kwon,"AnA Holistic Approach to Threat Assessment Involving Autonomous Vehicles Perception System, in IEEE Access, vol. 11, pages.
  3. Z. -S. Chen et al., "Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement," in IEEE Access, vol. 12, pp.
  4. F. Aldauiji, O. Batarfi and M. Bayousef, "Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art," in IEEE Access, vol. 10, pp.
  5. S. C. Phillips, S. Taylor, M. Boniface, S. Modafferi and M. Surridge, "Knowledge-Based Automation Cybersecurity Risk Assessment of Cyber-Physical "Systems" in IEEE Access, vol. 12, pp.
  6. S. H. Javed et al., "APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System," in IEEE Access, vol. 11, pp.
  7. M. Alajmi, H. A. Mengash, H. Alqahtani, S. S. Aljameel, M. A. Hamza and A. S. Salama, "Automated Threat Detection Using Flamingo Search Algorithm With Optimal Deep Learning on Cyber-Physical System Environment," in IEEE Access, vol. 11, pp.
  8. Presekal et al., "Cyber Security of HVDC Systems: A Review of Cyber Threats, Defense, and Testbeds," in IEEE Access, vol. 12, pp.
  9. Mishchenko, D., Oleinikova, I., Erdődi, L., and R. B.Pokhrel, "Multidomain Cyber-Physical Testbed forPower System Vulnerability Assessment, in IEEEAccess, vol. 12, pp.
  10. F. Whitelaw, J. Riley and N. Elmrabit, "A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services," in IEEE Access, vol. 12, pp.
  11. L. Novais, N. Naia, J. Azevedo and J. Cabral, "Let’s Get Cyber-Physical: Validation of Safety-Critical Cyber-Physical Systems," in IEEE Access, vol. 12, pp.
  12. F. -Z. Hannou et al., "Semantic-Based Approach for Cyber-Physical Cascading Effects Within Healthcare Infrastructures," in IEEE Access, vol. 10, pp.
  13. G. B. Gaggero, A. Armellin, G. Portomauro and M. Marchese, "Industrial Control System-Anomaly Detection Dataset (ICS-ADD) for Cyber-Physical Security Monitoring in Smart Industry Environments," in IEEE Access, vol. 12, pp.
  14. M. U. Rana, O. Ellahi, M. Alam, J. L. Webber, A. Mehbodniya and S. Khan, "Offensive Security: Improvement of Cyber Threat Intelligence Through "Counterintelligence and Counterattack," in IEEE Access, vol. 10, pp.
  15. A.Presekal, A. Ştefanov, V. S. Rajkumar, I. Semertzis and P. Palensky, "Advanced Persistent Cyber-Physical Power Threat Kill Chain "Systems," in IEEE Access, vol. 12, pp.
  16. "Quantum-Resistant Cryptographic Methods," IEEE Transactions on Security, 2023.
  17. Researcher, "Blockchain-Based Security for IoT," Journal of Cybersecurity, 2022.
  18. Expert, "AI-Driven Anomaly Detection in IoT," ACM Computing Surveys, 2021.