Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks

被引:27
作者
Abubaker, Zain [1 ]
Javaid, Nadeem [2 ,3 ]
Almogren, Ahmad [4 ]
Akbar, Mariam [1 ]
Zuair, Mansour [5 ]
Ben-Othman, Jalel [6 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Islamabad 44000, Pakistan
[2] COMSATS Univ Islamabad, Dept Comp Sci, Commun Sensors ComSens Res Lab, Islamabad Campus, Islamabad 44000, Pakistan
[3] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[4] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Chair Cyber Secur, Riyadh 11633, Saudi Arabia
[5] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Engn, Chair Cyber Secur, Riyadh 11543, Saudi Arabia
[6] Univ Sorbonne Paris Nord, Villetaneuse, France
关键词
Beyond Fifth Generation; Blockchain; Cascading encryption; Internet of Sensor Things; Localization; Non-repudiation; Random Forest algorithm; Service provisioning; Support Vector Machine; ARCHITECTURE; SYSTEM;
D O I
10.1016/j.comnet.2021.108691
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a blockchained Beyond Fifth Generation (B5G) enabled malicious node detection model is proposed for the Internet of Sensor Things (IoSTs). Moreover, a secure service provisioning scheme using cascading encryption and feature evaluation process is also proposed for the IoSTs. The presence of malicious nodes causes severe issues in the localization and service provisioning, which discourages new entities to join the network. Therefore, it is very important to establish trust between all entities by detecting and removing such nodes. The proposed B5G enabled malicious node detection model uses federated learning for the detection of malicious nodes. The federated learning uses Support Vector Machine (SVM) and Random Forest (RF) classifiers to detect the malicious nodes. The malicious nodes are classified on the bases of their honesty and end-to-end delay. Moreover, the service provider nodes provide services to each other and get the reward. However, the service provisioning in the IoSTs has many issues like a repudiation of service providers as well as the clients. The feature evaluation and cascading encryption mechanisms are used to solve these issues. The digital signature in cascading encryption ensures the non-repudiation of the service provider. On the other hand, feature evaluation of service ensures that the client cannot repudiate about actually demanded services. Moreover, the conformance of services is also ensured by the feature evaluation process. The simulation results show the effectiveness of our proposed non-repudiation model. The SVM and RF classifiers are compared in terms of accuracy, precision, F1 score and recall. The accuracy, precision, F1 score and recall of SVM are 79%, 1, 0.8795 and 0.78, respectively. On the other hand, the accuracy, precision, F1 score and recall of RF classifier are 95%, 0.92, 0.96 and 1, respectively. The results show that RF has better accuracy than RF in malicious nodes detection.
引用
收藏
页数:13
相关论文
共 61 条
[1]   Blockchain applications and architectures for port operations and logistics management [J].
Ahmad, Raja Wasim ;
Hasan, Haya ;
Jayaraman, Raja ;
Salah, Khaled ;
Omar, Mohammed .
RESEARCH IN TRANSPORTATION BUSINESS AND MANAGEMENT, 2021, 41
[2]   Technologies for 5G Networks: Challenges and Opportunities [J].
Al-Falahy, Naser ;
Alani, Omar Y. .
IT PROFESSIONAL, 2017, 19 (01) :12-20
[3]  
Alexander Papageorgiou, 2020, 2020 GLOBAL INTERNET, P1
[4]  
Asmaa M. Morsi, 2020, INT J COMPUT NETW CO, V12, P31
[5]  
Atakli I.M., 2008, Proceedings of the 2008 Spring Simulation Multiconference, 2008, P836, DOI DOI 10.1145/1400549.1400686
[6]  
Axel Moinet, 2017, ARXIV PREPRINT ARXIV
[7]  
Baida Z., 2004, P 6 INT C ELECT COMM, P1
[8]   A Survey on Blockchain for Information Systems Management and Security [J].
Berdik, David ;
Otoum, Safa ;
Schmidt, Nikolas ;
Porter, Dylan ;
Jararweh, Yaser .
INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (01)
[9]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[10]   An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Han, Daojun ;
Zhang, Yushu ;
Chen, Yiran .
INFORMATION SCIENCES, 2021, 556 :305-340