Blockchain transaction model based on malicious node detection network

被引:0
|
作者
Miao, Xiao-Ai [1 ]
Liu, Tao [2 ]
机构
[1] Qingdao Vocat & Tech Coll Hotel Management, Qingdao 266100, Peoples R China
[2] Shandong Univ Sci & Technol, Qingdao 266590, Peoples R China
关键词
Blockchain; Neural Networks; Malicious node detection; Attention mechanism; Hierarchical network model;
D O I
10.1007/s11042-023-17241-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform. The blockchain trading platform is fast, low-cost and high security. Many companies use blockchain for online transactions. However, with the increase in transaction volume and transaction scale, malicious users (nodes) appear, and malicious nodes participate in the blockchain network to carry out improper transactions, which brings huge losses to the transaction party. This paper proposes a Blockchain transaction model based on a malicious node detection network to ensure the safety of transaction users and enable the blockchain transaction to be traded in a safe environment. Aiming at the problem of malicious nodes deliberately submitting malicious information or obtaining Bitcoin through malicious behaviors on the blockchain, a malicious node detection model (MNDM) based on a hierarchical neural network is proposed. The hierarchical network model can calculate the key attributes according to the behavior of the nodes to detect abnormal nodes and kick them out of the blockchain system. The proposed model can avoid unnecessary losses caused by malicious nodes participating in data transmission and transactions and stop losses in time. The constructed model is called a hierarchical network model because it has two significant levels and realizes the reduction of parameter volume and the calculation of key information on the levels. Comparative tests are given in this paper. The validity of the model is proved by calculating the accuracy, precision, recall rate, and F1 score of the malicious node detection model.
引用
收藏
页码:41293 / 41310
页数:18
相关论文
共 50 条
  • [21] Design of Anti Machine Learning Malicious Node System Based on Blockchain
    Liu, Yuanzhen
    Yang, Yanbo
    Zhang, Jiawei
    Li, Baoshan
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 358 - 373
  • [22] Malicious node and malicious observer node detection system in MANETs
    Durga Devi, Saravanan
    Rukmani Devi, Dhamotharan
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (03):
  • [23] A PSO based malicious node detection and energy efficient clustering in wireless sensor network
    Kumar, Sumit
    Mehfuz, Shabana
    2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 859 - 863
  • [24] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [25] Exploiting Blockchain and RMCV-Based Malicious Node Detection in ETD-LEACH for Wireless Sensor Networks
    Khan, Asad Ullah
    Sajid, Maimoona Bint E.
    Rauf, Abdul
    Saqib, Malik Najmus
    Zaman, Fawad
    Javaid, Nadeem
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [26] Malicious node detection using SVM and secured data storage using blockchain in WSN
    Yadav, Ajit Kumar Singh
    Sivaraju, S. S.
    Radha, B.
    Sushith, Mishmala
    Srithar, S.
    Kanchana, M.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [27] Detection algorithm of malicious transactions based on transaction-profile chart
    Chen, Jin-Fu
    Lu, Yan-Sheng
    Xie, Xiao-Dong
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2008, 14 (06): : 1230 - 1235
  • [28] Blockchain-based distributed electricity transaction model
    Shi, Quan-sheng
    Hao, Yi-xu
    Ren, Hong-bo
    Huang, Xiao-hui
    INTERNATIONAL JOURNAL OF ENERGY RESEARCH, 2022, 46 (08) : 11278 - 11290
  • [29] Study on malicious node detection
    Dhingra, Madhavi
    Jain, S. C.
    Jadon, Rakesh Singh
    MATERIALS TODAY-PROCEEDINGS, 2020, 29 : 348 - 351
  • [30] An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things
    Moka, Moemedi
    Serome, Karabo
    Selvaraj, Rajalakshmi
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (02) : 1217 - 1232