期刊文献+

基于区块链智能合约的物联网恶意节点检测和定位 被引量:9

Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network
下载PDF
导出
摘要 随着物联网中分布式设备数量的爆发式增长,设备之间的协作和优化算法的安全问题成为物联网系统研究的前沿问题。物联网中的分布式算法依赖于单个智能体的本地计算和近邻间通信来迭代地解决一类广泛的、受约束的优化问题,但是容易遭受来自内部恶意节点的数据注入攻击。针对现有的检测方法大部分为本地运行,并且存在数据封闭、单点故障、检测过程不透明等问题,考虑使用区块链技术和智能合约对网络中存在的恶意节点进行检测。所提方法基于区块链技术的去中心化和多地备份特性实现了数据共享,避免了单点故障问题。另外,利用智能合约的合约代码、执行过程及结果公开透明且合约代码与结果不可篡改等特性保证检测过程可追溯和可验证。最后,采用平均共识算法并基于树莓派平台对所提方法进行验证分析。 With the explosive growth of the number of distributed devices in the Internet of things(IoT)network,the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general,the detection methods for malicious node run independently in each agent,inducing issues such as closed data,single points of failure,opaque detection processes,and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology,the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition,the contract code,execution process and result of the smart contract were open and transparent,and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally,the average consensus algorithm was adopted as an example,and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.
作者 黄豪杰 吴晓晓 李刚强 HUANG Haojie;WU Xiaoxiao;LI Gangqiang(College of Electronics and Information Engineering,Shenzhen University,Shenzhen 518060,China;Peng Cheng Laboratory,Shenzhen 518055,China)
出处 《物联网学报》 2020年第2期58-69,共12页 Chinese Journal on Internet of Things
基金 国家自然科学基金资助项目(No.61701315) 深圳市科技研发基金基础研究项目(No.JCYJ20170817101149906)
关键词 物联网 数据注入攻击 区块链 智能合约 恶意节点 Internet of things(IoT) data injection attack blockchain smart contract malicious node
  • 相关文献

参考文献5

二级参考文献30

  • 1Dong Hui-hui,Guo Ya-jun,Yu Zhong-qiang,et al.A wireless sensor networks based on multi-angle trust of node[C]∥Proc of 2009International Forum on Information Technology and Applications,2009:28-31.
  • 2Lindsey S,Raghavendra C,Sivalingam K M.Data gathering algorithms in sensor network using energy metrics[J].IEEE Transactions on Parallel and Distributed Systems,2002,13(9):924-935.
  • 3Ganeriwal S,Balzano L K,Srivastava M B.Reputation-based framework for high integrity sensor networks[J].ACM Transactions on Sensor Networks,2008,4(3):1-37.
  • 4Momani M,Agbinya J,Navarrete G P.A new algorithm of trust formation in wireless sensor networks[C]∥Proc of the1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications(AusWireless’06),2006:1-6.
  • 5da Silva A P R,Martins M H T,Rocha B P S,et al.Decentralized intrusion detection in wireless sensor networks[C]∥Proc of the 1st ACM International Workshop on Quality of Service&Security in Wireless and Mobile Networks,2005:16-23.
  • 6Tseng Chin-Yang,Balasubramanyam P,Ko C,et al.A specification-based intrusion detection system for AODV[C]∥Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks,2003:125-134.
  • 7Buchegger S,Boudec Jean-Yves L.The selfish node:Increasing routing security for mobile ad hoc networks[R].RZ 3354(#93400).Switzerland:IBM Zurich Research Laboratory,2001.
  • 8Buchegger S,Boudec Jean-Yves L.Nodes bearing grudges:Towards routing security,fairness,and robustness in mobile ad hoc networks[C]∥Proc of the 16th Euromicro Conference on Parallel,Distributed and Network-based Processing,2008:403-410.
  • 9Buchegger S,Boudec Jean-Yves L.Performance analysis of the CONFIDANT protocol(Cooperation of nodes:Fairness in dynamic ad-hoc networks)[C]∥Proc of the 3rd ACM International Symposium on Mobile Ad Hoc Networking&Computing(MobiHOC),2002:226-236.
  • 10Zhou Xing-feng.A study on ad hoc network intrusion detection system model based on credibility[D].Nanjing:Nanjing University of Science and Technology,2006.(in Chinese)

共引文献33

同被引文献85

引证文献9

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部