1
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model.

          Related collections

          Most cited references58

          • Record: found
          • Abstract: not found
          • Article: not found

          Blockchain based hybrid network architecture for the smart city

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN

                Bookmark

                Author and article information

                Contributors
                (View ORCID Profile)
                (View ORCID Profile)
                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8677
                1530-8669
                January 18 2022
                January 18 2022
                : 2022
                : 1-16
                Affiliations
                [1 ]Department of Computer Science, COMSATS University Islamabad, Islamabad 44000, Pakistan
                [2 ]School of Information Technology, Illinois State University USA, Normal, IL 61761, USA
                [3 ]School of Computer Science, University of Technology Sydney, Ultimo, NSW 2007, Australia
                [4 ]Department of EE, University of Engineering and Technology Peshawar, Bannu 28100, Pakistan
                [5 ]Department of Computer Science, College of Computer, Qassim University, Buraydah 52571, Saudi Arabia
                [6 ]Department of ECE, COMSATS University Islamabad, Islamabad 44000, Pakistan
                Article
                10.1155/2022/7386049
                710aa362-8f8c-4494-87bf-abc186ea506c
                © 2022

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article