2022
DOI: 10.1155/2022/7386049
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Abstract: In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the G… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(17 citation statements)
references
References 57 publications
(53 reference statements)
0
9
0
Order By: Relevance
“…The lifetime of the first node is the smallest for both LEACH and HMGEAR, and the largest for LEACH-RMCV and HMGEAR-RMCV. The reason is that the proposed clustering method effectively uses the network's total energy and ulti- That is why nodes consume less energy and have less computational cost as given in [5], [52]. Ropsten environment is used for PoW while Rinkeby is used for PoA [53].…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The lifetime of the first node is the smallest for both LEACH and HMGEAR, and the largest for LEACH-RMCV and HMGEAR-RMCV. The reason is that the proposed clustering method effectively uses the network's total energy and ulti- That is why nodes consume less energy and have less computational cost as given in [5], [52]. Ropsten environment is used for PoW while Rinkeby is used for PoA [53].…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Blockchain is an emerging technology that is used in industries and other domains. This technology is useful in the area of energy, education, health, etc., [5], [52]. However, it is still vulnerable to various attacks.…”
Section: Security Analysismentioning
confidence: 99%
“…After calculation of trust of each message, we come to know that these nodes send less trustworthy data packets and are considered as malicious. For performing secure routing and successfully sending all the packets to the destination, malicious nodes are detected and revoked from the network [35].…”
Section: Malicious Nodes' Detectionmentioning
confidence: 99%
“…The security analysis is performed through the Oyente tool that detects the attacks, which is possible on the smart contract, as shown in Figure 17. The attacks are discussed as follows [35].…”
Section: Smart Contract Analysismentioning
confidence: 99%
“…The proposed approach is further compared with Mohar et al [70], and Kumar et al [71] performed an average localization error of 0.43 with four beacon nodes using a hybrid scalable, secure collaborative localization technique for WSNs. Sajid et al [72] presented models based on genetic algorithms are presented for identifying malicious nodes, specifically the GA-SVM and GA-DT. After a rogue node has been identified, the Dijkstra algorithm is used to determine the most efficient route through the network.…”
mentioning
confidence: 99%