Detection of malicious nodes based on consortium blockchain

被引:0
|
作者
Luo S. [1 ]
Lai L. [1 ]
Hu T. [1 ]
Hu X. [1 ]
机构
[1] College of Computer Science and Engineering, Chongqing University of Technology, Chongqing
基金
中国国家自然科学基金;
关键词
Machine learning; Malicious node detection; Privacy protection; Social Internet of Things;
D O I
10.7717/PEERJ-CS.2108
中图分类号
学科分类号
摘要
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks. © (2024), Luo et al.
引用
收藏
页码:1 / 26
页数:25
相关论文
共 50 条
  • [21] Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
    Khashan, Osama A.
    KNOWLEDGE-BASED SYSTEMS, 2024, 304
  • [22] Machine Learning-based Malicious Users Detection in Blockchain-Enabled CR-IoT Network for Secured Spectrum Access
    Miah, Md Sipon
    Hossain, Md Shamim
    Armada, Ana Garcia
    2022 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2022,
  • [23] Malicious Code Detection Based on Code Semantic Features
    Zhang, Yu
    Li, Binglong
    IEEE ACCESS, 2020, 8 : 176728 - 176737
  • [24] Network-based detection of Android malicious apps
    Shree Garg
    Sateesh K. Peddoju
    Anil K. Sarje
    International Journal of Information Security, 2017, 16 : 385 - 400
  • [25] Network-based detection of Android malicious apps
    Garg, Shree
    Peddoju, Sateesh K.
    Sarje, Anil K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (04) : 385 - 400
  • [26] Detection of Malicious Executable Files Based on Clustering of Activities
    R. A. Ognev
    E. V. Zhukovskii
    D. P. Zegzhda
    Automatic Control and Computer Sciences, 2021, 55 : 1092 - 1098
  • [27] Malicious PDF document detection based on mixed feature
    Du X.
    Lin Y.
    Sun Y.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (02): : 118 - 128
  • [28] Detection of Malicious Executable Files Based on Clustering of Activities
    Ognev, R. A.
    Zhukovskii, E., V
    Zegzhda, D. P.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1092 - 1098
  • [29] Detecting Malicious Accounts on the Ethereum Blockchain with Supervised Learning
    Kumar, Nitesh
    Singh, Ajay
    Handa, Anand
    Shukla, Sandeep Kumar
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2020), 2020, 12161 : 94 - 109
  • [30] PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data
    Liang, Wei
    Yang, Yang
    Yang, Ce
    Hu, Yonghua
    Xie, Songyou
    Li, Kuan-Ching
    Cao, Jiannong
    IEEE TRANSACTIONS ON RELIABILITY, 2023, 72 (02) : 586 - 598