• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于联盟区块链的恶意节点检测

Detection of malicious nodes based on consortium blockchain.

作者信息

Luo Song, Lai Lianghai, Hu Tan, Hu Xin

机构信息

College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China.

出版信息

PeerJ Comput Sci. 2024 Jun 12;10:e2108. doi: 10.7717/peerj-cs.2108. eCollection 2024.

DOI:10.7717/peerj-cs.2108
PMID:38983233
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11232615/
Abstract

With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks.

摘要

随着技术的发展,越来越多的设备接入互联网。据统计,物联网(IoT)设备已达数百亿台,形成了庞大的物联网系统。社交物联网(SIoT)是物联网系统的重要延伸。由于SIoT系统中存在异构性且可用资源有限,它面临着日益严重的安全问题,这阻碍了SIoT信息的交互。联盟链结合SIoT系统中的信任问题,逐渐成为提高SIoT数据交互安全性的重要目标。恶意节点检测是解决信任问题的关键要点之一。在本文中,我们聚焦于联盟链网络。根据联盟链上节点的信息特征,可以分析出结合联盟链网络的SIoT恶意节点检测应具备隐私保护、主观性、不确定性、轻量级、动态及时性等特点。针对上述特点以及现有恶意节点检测方法的不足,我们提出了一种基于块间延迟的算法。我们采用无监督聚类算法,包括K均值和DBSCAN,对从联盟链截获的数据集进行分析和比较。结果表明,DBSCAN表现出最佳的聚类性能。最后,我们将获取的数据上传至链上。我们得出结论,所提出的算法在检测SIoT与联盟链网络组合中的恶意节点方面非常有效。

相似文献

1
Detection of malicious nodes based on consortium blockchain.基于联盟区块链的恶意节点检测
PeerJ Comput Sci. 2024 Jun 12;10:e2108. doi: 10.7717/peerj-cs.2108. eCollection 2024.
2
An Advanced Algorithm for Higher Network Navigation in Social Internet of Things Using Small-World Networks.一种基于小世界网络的社交物联网中更高网络导航的先进算法。
Sensors (Basel). 2019 Apr 29;19(9):2007. doi: 10.3390/s19092007.
3
Evolutionary game model based on cumulative prospect theory for information management mechanism in SIoT.基于累积前景理论的物联网信息管理机制进化博弈模型
Heliyon. 2023 May 26;9(6):e16590. doi: 10.1016/j.heliyon.2023.e16590. eCollection 2023 Jun.
4
Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things.基于分层范式和物联网的恶意车辆检测
Sensors (Basel). 2023 Jul 20;23(14):6554. doi: 10.3390/s23146554.
5
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology.利用基于区块链的软件定义网络和6G网络技术实现高效的物联网网络攻击消耗
Sensors (Basel). 2023 Dec 7;23(24):9690. doi: 10.3390/s23249690.
6
MarketTrust: blockchain-based trust evaluation model for SIoT-based smart marketplaces.MarketTrust:基于区块链的物联网智能市场信任评估模型
Sci Rep. 2023 Jul 18;13(1):11571. doi: 10.1038/s41598-023-38078-w.
7
IoT-Chain and Monitoring-Chain Using Multilevel Blockchain for IoT Security.使用多级区块链实现物联网安全的物联网链与监测链
Sensors (Basel). 2022 Oct 28;22(21):8271. doi: 10.3390/s22218271.
8
A Hypergraph-Based Blockchain Model and Application in Internet of Things-Enabled Smart Homes.基于超图的区块链模型及其在物联网智能家居中的应用。
Sensors (Basel). 2018 Aug 24;18(9):2784. doi: 10.3390/s18092784.
9
Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques.利用机器学习技术检测云计算中的恶意带宽消耗。
Comput Intell Neurosci. 2022 Sep 5;2022:4003403. doi: 10.1155/2022/4003403. eCollection 2022.
10
Massive Data Storage Solution for IoT Devices Using Blockchain Technologies.利用区块链技术的物联网设备海量数据存储解决方案。
Sensors (Basel). 2023 Feb 1;23(3):1570. doi: 10.3390/s23031570.

本文引用的文献

1
Blockchain technology and application: an overview.区块链技术与应用:概述
PeerJ Comput Sci. 2023 Nov 29;9:e1705. doi: 10.7717/peerj-cs.1705. eCollection 2023.
2
Machine learning: Trends, perspectives, and prospects.机器学习:趋势、观点和展望。
Science. 2015 Jul 17;349(6245):255-60. doi: 10.1126/science.aaa8415.