Your browser doesn't support javascript.
loading
Detection of malicious nodes based on consortium blockchain.
Luo, Song; Lai, Lianghai; Hu, Tan; Hu, Xin.
Afiliación
  • Luo S; College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China.
  • Lai L; College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China.
  • Hu T; College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China.
  • Hu X; College of Computer Science and Engineering, Chongqing University of Technology, Chongqing, China.
PeerJ Comput Sci ; 10: e2108, 2024.
Article en En | MEDLINE | ID: mdl-38983233
ABSTRACT
With the development of technology, more and more devices are connected to the Internet. According to statistics, Internet of Things (IoT) devices have reached tens of billions of units, which forms a massive Internet of Things system. Social Internet of Things (SIoT) is an essential extension of the IoT system. Because of the heterogeneity present in the SIoT system and the limited resources available, it is facing increasing security issues, which hinders the interaction of SIoT information. Consortium chain combined with the trust problem in SIoT systems has gradually become an important goal to improve the security of SIoT data interaction. Detection of malicious nodes is one of the key points to solve the trust problem. In this article, we focus on the consortium chain network. According to the information characteristics of nodes on the consortium chain, it can be analyzed that the SIoT malicious node detection combined with the consortium chain network should have the privacy protection, subjectivity, uncertainty, lightweight, dynamic timeliness and so on. In response to the features above and the concerns of existing malicious node detection methods, we propose an algorithm based on inter-block delay. We employ unsupervised clustering algorithms, including K-means and DBSCAN, to analyze and compare the data set intercepted from the consortium chain. The results indicate that DBSCAN exhibits the best clustering performance. Finally, we transmit the acquired data onto the chain. We conclude that the proposed algorithm is highly effective in detecting malicious nodes on the combination of SIoT and consortium chain networks.
Palabras clave

Texto completo: 1 Base de datos: MEDLINE Idioma: En Revista: PeerJ Comput Sci Año: 2024 Tipo del documento: Article

Texto completo: 1 Base de datos: MEDLINE Idioma: En Revista: PeerJ Comput Sci Año: 2024 Tipo del documento: Article