Blockchain transaction model based on malicious node detection network

被引:0
作者
Miao, Xiao-Ai [1 ]
Liu, Tao [2 ]
机构
[1] Qingdao Vocat & Tech Coll Hotel Management, Qingdao 266100, Peoples R China
[2] Shandong Univ Sci & Technol, Qingdao 266590, Peoples R China
关键词
Blockchain; Neural Networks; Malicious node detection; Attention mechanism; Hierarchical network model;
D O I
10.1007/s11042-023-17241-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this day and age, blockchain technology has become very popular. More and more transactions have been completed through the blockchain platform. The blockchain trading platform is fast, low-cost and high security. Many companies use blockchain for online transactions. However, with the increase in transaction volume and transaction scale, malicious users (nodes) appear, and malicious nodes participate in the blockchain network to carry out improper transactions, which brings huge losses to the transaction party. This paper proposes a Blockchain transaction model based on a malicious node detection network to ensure the safety of transaction users and enable the blockchain transaction to be traded in a safe environment. Aiming at the problem of malicious nodes deliberately submitting malicious information or obtaining Bitcoin through malicious behaviors on the blockchain, a malicious node detection model (MNDM) based on a hierarchical neural network is proposed. The hierarchical network model can calculate the key attributes according to the behavior of the nodes to detect abnormal nodes and kick them out of the blockchain system. The proposed model can avoid unnecessary losses caused by malicious nodes participating in data transmission and transactions and stop losses in time. The constructed model is called a hierarchical network model because it has two significant levels and realizes the reduction of parameter volume and the calculation of key information on the levels. Comparative tests are given in this paper. The validity of the model is proved by calculating the accuracy, precision, recall rate, and F1 score of the malicious node detection model.
引用
收藏
页码:41293 / 41310
页数:18
相关论文
共 50 条
  • [31] Fuzzy based malicious node detection and security-aware multipath routing for wireless multimedia sensor network
    Kumar, A. Ranjith
    Sivagami, A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) : 14031 - 14051
  • [32] Malicious Node Detection using ID-Based Authentication Technique
    Gupta, Anurag
    Mohit, Prerna
    Karati, Arijit
    Amin, Ruhul
    Biswas, G. P.
    2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 398 - 403
  • [33] Distributed Energy Transaction Model Based on the Alliance Blockchain in Case of China
    He, Yongxiu
    Xiong, Wei
    Yang, Bin-you
    Zhang, Rui
    Cui, Ming-li
    Feng, Tian-tian
    Sun, Yi-er
    JOURNAL OF WEB ENGINEERING, 2021, 20 (02): : 359 - 385
  • [34] Augmenting Vehicular Ad Hoc Network Security and Efficiency with Blockchain: A Probabilistic Identification and Malicious Node Mitigation Strategy
    Juarez, Ruben
    Bordel, Borja
    ELECTRONICS, 2023, 12 (23)
  • [35] Ceramic Product Copyright Transaction Model Based on Blockchain Smart Contracts
    Li, Chao
    Yu, Feng
    Nie, Yu
    Zhang, Yilai
    Song, Guaghua
    Dai, Chengyang
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VIRTUAL REALITY, AND VISUALIZATION (AIVRV 2021), 2021, 12153
  • [36] Blockchain-Based Model Transaction Platform Design for BIM Trader
    Liu, Chang
    Tan, Zhuoyue
    Li, Lei
    Ni, Ting
    Wang, Xiaoguang
    PROCEEDINGS OF THE SIXTEENTH INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING MANAGEMENT - VOL 1, 2022, 144 : 388 - 399
  • [37] Blockchain based energy transaction in microgrid
    Raju, Leo
    Surabhi, S.
    Vimalan, K. M.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [38] ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network
    Yang, Jingxiu
    Zhou, Lu
    Liu, Liang
    Ma, Zuchao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 494 - 509
  • [39] Intelligent blockchain based attack detection framework for cross-chain transaction
    Madhuri, Surisetty
    Vadlamani, Nagalakshmi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (31) : 76247 - 76265
  • [40] Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm
    Nirmala, B. Vijaya
    Selvaraj, K.
    WIRELESS NETWORKS, 2025, 31 (02) : 1095 - 1116