Decentralized security and data integrity of blockchain using deep learning techniques

Sazeen Taha Abdulrazzaq, Farooq Safauldeen Omar, Maral A. Mustafa


Since the introduction of blockchain, cryptocurrencies have become very attractive as an alternative digital payment method and a highly speculative investment. With the rise in computational power and the growth of available data, the artificial intelligence concept of deep neural networks had a surge of popularity over the last years as well. With the introduction of the long short-term memory (LSTM) architecture, neural networks became more efficient in understanding long-term dependencies in data such as time series. In this research paper, we combine these two topics, by using LSTM networks to make a prognosis of decentralized blockchain security. In particular, we test if LSTM based neural networks can produce profitable trading signals for different blockchains. We experiment with different preprocessing techniques and different targets, both for security regression and trading signal classification. We evaluate LSTM based networks. As data for training we use historical security data in one-minute intervals from August 2019 to August 2020. We measure the performance of the models via back testing, where we simulate trading on historic data not used for training based on the model’s predictions. We analyze that performance and compare it with the buy and hold strategy. The simulation is carried out on bullish, bearish and stagnating time periods. In the evaluation, we find the best performing target and pinpoint two preprocessing combinations that are most suitable for this task. We conclude that the CNN LSTM hybrid is capable of profitably forecasting trading signals for securing blockchain, outperforming the buy and hold strategy by roughly 30%, while the performance was better. The LTSM method used by current system for encrypting passwords is efficient enough to mitigate modern attacks like man in the middle attack (MITM) and DDOS attack with 95.85% accuracy

Full Text:



I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019, doi: 10.12928/TELKOMNIKA.v17i6.13201.

Wang, A.; Fan, J.; Guo, Y. Application of blockchain in energy interne. Electr. Power Inf. Commun. Technol. 2016, 14, 1–6.

L. Wu, K. Meng, S. Xu, S. Q. Li, M. Ding, and Y. Suo, “Democratic Centralism: A Hybrid Blockchain Architecture and Its Applications in Energy Internet,” Proc. - 1st IEEE Int. Conf. Energy Internet, ICEI 2017, pp. 176–181, 2017, doi: 10.1109/ICEI.2017.38.

T. ai, X.; Sun, H.; Guo, Q. Electricity transactions and congestion management based on blockchain in energy internet. Power Syst. Technol. 2016, 40, 3630–3638.

Z. hang, N.; Wang, Y.; Kang, C.; Chen, J.; Dawei, H. Blockchain technique in the energy internet: Preliminary research framework and typical applications. Proc. CSEE 2016, 36, 4011–4012.

N. Z. Aitzhan and D. Svetinovic, “Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams,” IEEE Trans. Dependable Secur. Comput., vol. 15, no. 5, pp. 840–852, 2018, doi: 10.1109/TDSC.2016.2616861.

Web of Science, also known as ISI Web of Knowledge, Number of publications containing “deep learning” or “blockchain”, see http://www.webofknowledge. com/, [online] accessed Sept. 4, 2020.

Ding, W.; Wang, G.; Xu, A.; Hong, C. Research on key technologies and information security issues of energy blockchain. Proc. CSEE 2018, 38, 1026–1034.

Li, B.; Zhang, J.; Qi, B.; Li, D.; Shi, K.; Cui, G. Blockchain: Supporting technology of demand side resources participating in grid interaction. Electr. Power Constr. 2017, 38, 1–8.

S. Mhanna, G. Verbic, and A. C. Chapman, “Adaptive admm for distributed ac optimal power flow,” IEEE Trans. Power Syst., vol. 34, no. 3, pp. 2025–2035, 2019, doi: 10.1109/TPWRS.2018.2886344.

J. He, L. Liu, W. Li, and M. Zhang, “Development and research on integrated protection system based on redundant information analysis,” Prot. Control Mod. Power Syst., vol. 1, no. 1, pp. 1–13, 2016, doi: 10.1186/s41601-016-0024-y.

S. Liu, X. P. Liu, and A. El Saddik, “Denial-of-Service (dos) attacks on load frequency control in smart grids,” 2013 IEEE PES Innov. Smart Grid Technol. Conf. ISGT 2013, no. February 2019, pp. 1–6, 2013, doi: 10.1109/ISGT.2013.6497846..

H. Wang, Z. Zheng, S. Xie, H. N. Dai, and X. Chen, “Blockchain challenges and opportunities: a survey,” Int. J. Web Grid Serv., vol. 14, no. 4, p. 352, 2018, doi: 10.1504/ijwgs.2018.10016848.

I. A. B. Sawsan Ali Hamid , Rana Alauldeen Abdalrahman , Inam Abdullah Lafta, “Web Services Architecture Model to Support Distributed Systems,” J. SOUTHWEST JIAOTONG Univ. Vol., vol. 54, no. December, pp. 52–57, 2019.

G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong, “A Review of False Data Injection Attacks Against Modern Power Systems,” IEEE Trans. Smart Grid, vol. 8, no. 4, pp. 1630–1638, 2017, doi: 10.1109/TSG.2015.2495133.

B. Durakovic and A. Cosic, “Impact of quality and innovation strategies on business performance of Bosnian B2B and B2C companies,” Sustain. Eng. Innov. ISSN 2712-0562, vol. 1, no. 1, pp. 24–33, 2019, doi: 10.37868/sei.v1i1.96.

Available Online:



  • There are currently no refbacks.

Copyright (c) 2020 Authors

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License