Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain
In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overh...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2022-01, Vol.2022, p.1-16 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 16 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2022 |
creator | Sajid, Maimoona Bint E. Ullah, Sameeh Javaid, Nadeem Ullah, Ibrar Qamar, Ali Mustafa Zaman, Fawad |
description | In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model. |
doi_str_mv | 10.1155/2022/7386049 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2623773237</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2623773237</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-e285b64aed940889581c89b78f560e7eb109a935aacd908be30d15e98774c9a03</originalsourceid><addsrcrecordid>eNp9kMFOAjEQhhujiYjefIAmHnWl3W637VEQlQT1gJw33e4AxaXFbYny9u4G4tHLzGTmyz_Jh9A1JfeUcj5ISZoOBJM5ydQJ6lHOSCJzIU7_5lydo4sQ1oQQRlLaQ-vxz7b2Nlq3xK_arKwDPAXduG4RPX6ECCa2p9oa63cBv_kKArYOT1yEurZLcBHPwAXfJEMdoMKzfYiwCXgeuoxh7c2nWWnrLtHZQtcBro69j-ZP44_RSzJ9f56MHqaJYUzEBFLJyzzTUKmMSKm4pEaqUsgFzwkIKClRWjGutakUkSUwUlEOSgqRGaUJ66ObQ-628V87CLFY-13j2pdFmqdMCNaWlro7UKbxITSwKLaN3ehmX1BSdDaLzmZxtNnitwe8NVTpb_s__QvOvHQZ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2623773237</pqid></control><display><type>article</type><title>Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain</title><source>Wiley Open Access</source><source>Alma/SFX Local Collection</source><source>EZB Electronic Journals Library</source><creator>Sajid, Maimoona Bint E. ; Ullah, Sameeh ; Javaid, Nadeem ; Ullah, Ibrar ; Qamar, Ali Mustafa ; Zaman, Fawad</creator><contributor>Basit, Abdul ; Abdul Basit</contributor><creatorcontrib>Sajid, Maimoona Bint E. ; Ullah, Sameeh ; Javaid, Nadeem ; Ullah, Ibrar ; Qamar, Ali Mustafa ; Zaman, Fawad ; Basit, Abdul ; Abdul Basit</creatorcontrib><description>In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2022/7386049</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Algorithms ; Blockchain ; Communication ; Consortia ; Cryptography ; Decision trees ; Digital signatures ; Dijkstra's algorithm ; Eavesdropping ; Genetic algorithms ; Internet of Things ; Machine learning ; Nodes ; Packets (communication) ; Privacy ; Sensors ; Smart cities ; Support vector machines</subject><ispartof>Wireless communications and mobile computing, 2022-01, Vol.2022, p.1-16</ispartof><rights>Copyright © 2022 Maimoona Bint E. Sajid et al.</rights><rights>Copyright © 2022 Maimoona Bint E. Sajid et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-e285b64aed940889581c89b78f560e7eb109a935aacd908be30d15e98774c9a03</citedby><cites>FETCH-LOGICAL-c337t-e285b64aed940889581c89b78f560e7eb109a935aacd908be30d15e98774c9a03</cites><orcidid>0000-0002-5323-6661 ; 0000-0003-3777-8249</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27915,27916</link.rule.ids></links><search><contributor>Basit, Abdul</contributor><contributor>Abdul Basit</contributor><creatorcontrib>Sajid, Maimoona Bint E.</creatorcontrib><creatorcontrib>Ullah, Sameeh</creatorcontrib><creatorcontrib>Javaid, Nadeem</creatorcontrib><creatorcontrib>Ullah, Ibrar</creatorcontrib><creatorcontrib>Qamar, Ali Mustafa</creatorcontrib><creatorcontrib>Zaman, Fawad</creatorcontrib><title>Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain</title><title>Wireless communications and mobile computing</title><description>In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model.</description><subject>Algorithms</subject><subject>Blockchain</subject><subject>Communication</subject><subject>Consortia</subject><subject>Cryptography</subject><subject>Decision trees</subject><subject>Digital signatures</subject><subject>Dijkstra's algorithm</subject><subject>Eavesdropping</subject><subject>Genetic algorithms</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Privacy</subject><subject>Sensors</subject><subject>Smart cities</subject><subject>Support vector machines</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kMFOAjEQhhujiYjefIAmHnWl3W637VEQlQT1gJw33e4AxaXFbYny9u4G4tHLzGTmyz_Jh9A1JfeUcj5ISZoOBJM5ydQJ6lHOSCJzIU7_5lydo4sQ1oQQRlLaQ-vxz7b2Nlq3xK_arKwDPAXduG4RPX6ECCa2p9oa63cBv_kKArYOT1yEurZLcBHPwAXfJEMdoMKzfYiwCXgeuoxh7c2nWWnrLtHZQtcBro69j-ZP44_RSzJ9f56MHqaJYUzEBFLJyzzTUKmMSKm4pEaqUsgFzwkIKClRWjGutakUkSUwUlEOSgqRGaUJ66ObQ-628V87CLFY-13j2pdFmqdMCNaWlro7UKbxITSwKLaN3ehmX1BSdDaLzmZxtNnitwe8NVTpb_s__QvOvHQZ</recordid><startdate>20220118</startdate><enddate>20220118</enddate><creator>Sajid, Maimoona Bint E.</creator><creator>Ullah, Sameeh</creator><creator>Javaid, Nadeem</creator><creator>Ullah, Ibrar</creator><creator>Qamar, Ali Mustafa</creator><creator>Zaman, Fawad</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-5323-6661</orcidid><orcidid>https://orcid.org/0000-0003-3777-8249</orcidid></search><sort><creationdate>20220118</creationdate><title>Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain</title><author>Sajid, Maimoona Bint E. ; Ullah, Sameeh ; Javaid, Nadeem ; Ullah, Ibrar ; Qamar, Ali Mustafa ; Zaman, Fawad</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-e285b64aed940889581c89b78f560e7eb109a935aacd908be30d15e98774c9a03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Blockchain</topic><topic>Communication</topic><topic>Consortia</topic><topic>Cryptography</topic><topic>Decision trees</topic><topic>Digital signatures</topic><topic>Dijkstra's algorithm</topic><topic>Eavesdropping</topic><topic>Genetic algorithms</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Privacy</topic><topic>Sensors</topic><topic>Smart cities</topic><topic>Support vector machines</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Sajid, Maimoona Bint E.</creatorcontrib><creatorcontrib>Ullah, Sameeh</creatorcontrib><creatorcontrib>Javaid, Nadeem</creatorcontrib><creatorcontrib>Ullah, Ibrar</creatorcontrib><creatorcontrib>Qamar, Ali Mustafa</creatorcontrib><creatorcontrib>Zaman, Fawad</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>ProQuest Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content (ProQuest)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Sajid, Maimoona Bint E.</au><au>Ullah, Sameeh</au><au>Javaid, Nadeem</au><au>Ullah, Ibrar</au><au>Qamar, Ali Mustafa</au><au>Zaman, Fawad</au><au>Basit, Abdul</au><au>Abdul Basit</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2022-01-18</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2022/7386049</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0002-5323-6661</orcidid><orcidid>https://orcid.org/0000-0003-3777-8249</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2022-01, Vol.2022, p.1-16 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2623773237 |
source | Wiley Open Access; Alma/SFX Local Collection; EZB Electronic Journals Library |
subjects | Algorithms Blockchain Communication Consortia Cryptography Decision trees Digital signatures Dijkstra's algorithm Eavesdropping Genetic algorithms Internet of Things Machine learning Nodes Packets (communication) Privacy Sensors Smart cities Support vector machines |
title | Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T17%3A33%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Exploiting%20Machine%20Learning%20to%20Detect%20Malicious%20Nodes%20in%20Intelligent%20Sensor-Based%20Systems%20Using%20Blockchain&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Sajid,%20Maimoona%20Bint%20E.&rft.date=2022-01-18&rft.volume=2022&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2022/7386049&rft_dat=%3Cproquest_cross%3E2623773237%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2623773237&rft_id=info:pmid/&rfr_iscdi=true |