RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment

被引:0
作者
Daming Li
Zhiming Cai
Lianbing Deng
Xiang Yao
Harry Haoxiang Wang
机构
[1] The Post-Doctoral Research Center of Zhuhai Da Hengqin Science and Technology Development Co.,Macau Big Data Research Centre for Urban Governance
[2] Ltd.,undefined
[3] City University of Macau,undefined
[4] International Postdoctoral Science and Technology Research Institute Co.,undefined
[5] Ltd.,undefined
[6] City University of Macao,undefined
[7] Huazhong University of Science and Technology,undefined
[8] Zhuhai Da Hengqin Science and Technology Development Co.,undefined
[9] Ltd.,undefined
[10] Cornell University,undefined
[11] GoPerception Laboratory,undefined
来源
Cluster Computing | 2019年 / 22卷
关键词
Internet of things; Intrusion detection; Block chain; Information security; Model building; Technical analysis;
D O I
暂无
中图分类号
学科分类号
摘要
Block chain is a decentralized core architecture, which is widely used in emerging digital encryption currencies. It has attracted much attention and has been researched with the gradual acceptance of bitcoin. Block chaining technology has the characteristics of centralization, block data, no tampering and trust, so it is sought after by enterprises, especially financial institutions. This paper expounds the core technology principle of block chain technology, discusses the application of block chain technology, the existing regulatory problems and security problems, so as to provide some help for the related research of block chain technology. Intrusion detection is an important way to protect the security of information systems. It has become the focus of security research in recent years. This paper introduces the history and current situation of intrusion detection system, expounds the classification of intrusion detection system and the framework of general intrusion detection, and discusses all kinds of intrusion detection technology in detail. Intrusion detection technology is a kind of security technology to protect network resources from hacker attack. IDS is a useful supplement to the firewall, which can help the network system to quickly detect attacks and improve the integrity of the information security infrastructure. In this paper, intrusion detection technology is applied to block chain information security model, and the results show that proposed model has higher detection efficiency and fault tolerance.
引用
收藏
页码:451 / 468
页数:17
相关论文
共 48 条
  • [1] Zheng X(2016)The evolution trend of information management of supply chain in China under the information environment Inf. Sci. 10 128-133
  • [2] Ge B(2015)Data integrity protection method for icroorganism sampling robots based on blockchain technology J. Huazhong Univ. Sci. Technol. 43 216-219
  • [3] Zhao H(2015)Block chain thinking: the brain as a decentralized auto nomous corporation IEEE Technol. Soc. Mag. 34 41-52
  • [4] Li XF(2010)The internet of things: a survey Comput. Netw. 54 2787-2805
  • [5] Zhan LK(2004)Distributed decision fusion with a random access channel for sensor network applications IEEE Trans. Instrum. Meas. 53 1239-1320
  • [6] Swan M(2003)Power efficient data gathering and aggregation in wireless sensor networks ACM SIGMOD Record 32 50-89
  • [7] Atzori L(1987)An intrusion -detection model IEEE Trans. Softw. Eng. 13 220-235
  • [8] Iera A(2017)Single image shadow detection and removal based on feature fusion and multiple dictionary learning Multimed. Tools Appl. 38 360-372
  • [9] Morabito G(2016)A novel SVM-kNN-PSO ensemble method for intrusion detection system Appl. Soft Comput. 10 39-192
  • [10] Yuan Y(2017)An intelligent hybrid model for power flow optimization in the cloud-IOT electrical distribution network Clust. Comput. 87 185-1153