Detection of malicious nodes based on consortium blockchain

被引:0
|
作者
Luo S. [1 ]
Lai L. [1 ]
Hu T. [1 ]
Hu X. [1 ]
机构
[1] College of Computer Science and Engineering, Chongqing University of Technology, Chongqing
基金
中国国家自然科学基金;
关键词
Machine learning; Malicious node detection; Privacy protection; Social Internet of Things;
D O I
10.7717/PEERJ-CS.2108
中图分类号
学科分类号
摘要
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks. © (2024), Luo et al.
引用
收藏
页码:1 / 26
页数:25
相关论文
共 50 条
  • [31] Detecting malicious nodes via gradient descent and support vector machine in Internet of Things
    Liu, Liang
    Yang, Jingxiu
    Meng, Weizhi
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 77 : 339 - 353
  • [32] Detection of malicious URLs based on word vector representation and ngram
    Quan Tran Hai
    Hwang, Seong Oun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5889 - 5900
  • [33] MDIFL: Robust Federated Learning Based on Malicious Detection and Incentives
    Wu, Ruolan
    Chen, Yuling
    Tan, Chaoyue
    Luo, Yun
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [34] Clustering Malicious DNS Queries for Blacklist-Based Detection
    Satoh, Akihiro
    Nakamura, Yutaka
    Nobayashi, Daiki
    Sasai, Kazuto
    Kitagata, Gen
    Ikenaga, Takeshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (07) : 1404 - 1407
  • [35] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [36] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [37] Frequency Domain Feature Based Robust Malicious Traffic Detection
    Fu, Chuanpu
    Li, Qi
    Shen, Meng
    Xu, Ke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2023, 31 (01) : 452 - 467
  • [38] Malicious Java']JavaScript Code Detection Based on Hybrid Analysis
    He, Xincheng
    Xu, Lei
    Cha, Chunliu
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 365 - 374
  • [39] Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
    Zhang X.
    Li Z.
    Lin J.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (08): : 131 - 141
  • [40] A two-layer consortium blockchain with transaction privacy protection based on sharding technology
    Wang, Junxin
    Wang, Shangping
    Zhang, Qian
    Deng, Yinjuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74