Detection of malicious nodes based on consortium blockchain

被引:0
|
作者
Luo S. [1 ]
Lai L. [1 ]
Hu T. [1 ]
Hu X. [1 ]
机构
[1] College of Computer Science and Engineering, Chongqing University of Technology, Chongqing
基金
中国国家自然科学基金;
关键词
Machine learning; Malicious node detection; Privacy protection; Social Internet of Things;
D O I
10.7717/PEERJ-CS.2108
中图分类号
学科分类号
摘要
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks. © (2024), Luo et al.
引用
收藏
页码:1 / 26
页数:25
相关论文
共 50 条
  • [41] Security Enhancement by Detection and Penalization of Malicious Nodes in Wireless Networks
    Kukreja, Deepika
    Miglani, Mohit
    Dhurandher, S. K.
    Reddy, B. V. R.
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 275 - 280
  • [42] Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
    Gebremariam G.G.
    Panda J.
    Indu S.
    Wireless Communications and Mobile Computing, 2023, 2023
  • [43] Secure Sensor Network SUM Aggregation with Detection of Malicious Nodes
    Choi, Sunoh
    Ghinita, Gabriel
    Bertino, Elisa
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 19 - 27
  • [44] A Multipath Reliable Routing for Detection and Isolation of Malicious Nodes in MANET
    Somasundaram, Dhanalakshmi
    Marimuthu, Rajaram
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 176 - +
  • [45] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [46] A Novel Detection Scheme for Malicious Nodes in Smart Meter System
    Wen, Hong
    Zhang, Xiaochun
    Cai, Lei
    Tang, Jie
    Zhu, Xiping
    Jiang, Yixin
    Guo, Xiaobin
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 379 - +
  • [47] Research on Malicious Network Traffic Communication Based on Blockchain
    Shi, Jinyu
    Fu, Yu
    Wang, Cuicui
    Xu, Lei
    Ye, Xiaoyu
    Yan, Fei
    19TH IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING, BMSB 2024, 2024, : 42 - 46
  • [48] A Blockchain-Based Protocol for Malicious Price Discrimination
    Li-De Xue
    Ya-Jun Liu
    Wei Yang
    Wei-Lin Chen
    Liu-Sheng Huang
    Journal of Computer Science and Technology, 2022, 37 : 266 - 276
  • [49] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [50] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    Frontiers of Computer Science, 2015, 9 (02) : 280 - 296