Detection of malicious nodes based on consortium blockchain

被引:0
|
作者
Luo S. [1 ]
Lai L. [1 ]
Hu T. [1 ]
Hu X. [1 ]
机构
[1] College of Computer Science and Engineering, Chongqing University of Technology, Chongqing
基金
中国国家自然科学基金;
关键词
Machine learning; Malicious node detection; Privacy protection; Social Internet of Things;
D O I
10.7717/PEERJ-CS.2108
中图分类号
学科分类号
摘要
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks. © (2024), Luo et al.
引用
收藏
页码:1 / 26
页数:25
相关论文
共 50 条
  • [1] Detection of malicious nodes based on consortium blockchain
    Luo, Song
    Lai, Lianghai
    Hu, Tan
    Hu, Xin
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [2] Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes
    Alami, Rachid
    Biswas, Anjanava
    Shinde, Varun
    Almogren, Ahmad
    Rehman, Ateeq Ur
    Shaikh, Tahseen
    IEEE ACCESS, 2024, 12 : 188174 - 188185
  • [3] An Optimized Deep Learning Based Malicious Nodes Detection in Intelligent Sensor-Based Systems Using Blockchain
    Darla, Swathi
    Naveena, C.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 1037 - 1045
  • [4] Trust Based Malicious Nodes Detection in MANET
    Gong, Wei
    You, Zhiyang
    Chen, Danning
    Zhao, Xibin
    Gu, Ming
    Lam, Kwok-Yan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 205 - +
  • [5] A blockchain and stacked machine learning approach for malicious nodes’ detection in internet of things
    Shakira Musa Baig
    Muhammad Umar Javed
    Ahmad Almogren
    Nadeem Javaid
    Mohsin Jamil
    Peer-to-Peer Networking and Applications, 2023, 16 : 2811 - 2832
  • [6] A blockchain and stacked machine learning approach for malicious nodes' detection in internet of things
    Baig, Shakira Musa
    Javed, Muhammad Umar
    Almogren, Ahmad
    Javaid, Nadeem
    Jamil, Mohsin
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (06) : 2811 - 2832
  • [7] Security Analyze with Malicious Nodes in Sharding Blockchain Based Fog Computing Networks
    Huang, Xiaoge
    Wang, Yongsheng
    Chen, Qianbin
    Zhang, Jie
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [8] A Novel Blockchain-Based Encryption Model to Protect Fog Nodes from Behaviors of Malicious Nodes
    Alshehri, Mohammed
    Panda, Brajendra
    Almakdi, Sultan
    Alazeb, Abdulwahab
    Halawani, Hanan
    Al Mudawi, Naif
    Khan, Riaz U.
    ELECTRONICS, 2021, 10 (24)
  • [9] Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes
    Alserhani, Faeiz M.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (06) : 3856 - 3882
  • [10] Malicious Blockchain Domain Detection Based on Heterogeneous Information Network
    Han, Jian
    Wang, Zhonghua
    Jiang, Songhao
    Zang, Tianning
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 2597 - 2602