浏览全部资源
扫码关注微信
1. 深圳大学电子与信息工程学院,广东 深圳 518060
2. 鹏城实验室,广东 深圳 518055
[ "黄豪杰(1997- ),男,湖北天门人,深圳大学电子与信息工程学院硕士生,主要研究方向为物联网、区块链、数据挖掘等" ]
[ "吴晓晓(1982- ),女,湖北鄂州人,博士,深圳大学助理教授,主要研究方向为社交网络中的数据挖掘算法、5G 通信网络关键技术研究、信道编码理论等" ]
[ "李刚强(1991- ),男,河南驻马店人,深圳大学电子与信息工程学院博士生,主要研究方向为社交网络中的数据挖掘算法、分布式协议、机器学习等" ]
纸质出版日期:2020-06-30,
网络出版日期:2020-06,
移动端阅览
黄豪杰, 吴晓晓, 李刚强. 基于区块链智能合约的物联网恶意节点检测和定位[J]. 物联网学报, 2020,4(2):58-69.
HAOJIE HUANG, XIAOXIAO WU, GANGQIANG LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network. [J]. Chinese journal on internet of things, 2020, 4(2): 58-69.
黄豪杰, 吴晓晓, 李刚强. 基于区块链智能合约的物联网恶意节点检测和定位[J]. 物联网学报, 2020,4(2):58-69. DOI: 10.11959/j.issn.2096-3750.2020.00172.
HAOJIE HUANG, XIAOXIAO WU, GANGQIANG LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network. [J]. Chinese journal on internet of things, 2020, 4(2): 58-69. DOI: 10.11959/j.issn.2096-3750.2020.00172.
随着物联网中分布式设备数量的爆发式增长,设备之间的协作和优化算法的安全问题成为物联网系统研究的前沿问题。物联网中的分布式算法依赖于单个智能体的本地计算和近邻间通信来迭代地解决一类广泛的、受约束的优化问题,但是容易遭受来自内部恶意节点的数据注入攻击。针对现有的检测方法大部分为本地运行,并且存在数据封闭、单点故障、检测过程不透明等问题,考虑使用区块链技术和智能合约对网络中存在的恶意节点进行检测。所提方法基于区块链技术的去中心化和多地备份特性实现了数据共享,避免了单点故障问题。另外,利用智能合约的合约代码、执行过程及结果公开透明且合约代码与结果不可篡改等特性保证检测过程可追溯和可验证。最后,采用平均共识算法并基于树莓派平台对所提方法进行验证分析。
With the explosive growth of the number of distributed devices in the Internet of things (IoT) network
the security of decentralized multi-agent optimization algorithm has become the forefront problem.The distributed algorithms in the IoT network are vulnerable to data injection attacks from internal malicious node because each agent locally estimates its state without any supervision.In general
the detection methods for malicious node run independently in each agent
inducing issues such as closed data
single points of failure
opaque detection processes
and so on.The proposed strategy considered detecting via an aid of blockchain technology and smart contracts in Ethereum to detect malicious node in the network.Based on the decentralized and multiple backup features of blockchain technology
the multi-site backup features of the blockchain technology enabled data sharing and avoided single point failure.In addition
the contract code
execution process and result of the smart contract were open and transparent
and the contract code and result could not be tampered to ensure that the detection process could be traced and verified.Finally
the average consensus algorithm was adopted as an example
and the proposed strategy was verified on a simplified IoT network implemented by Raspberry Pi.
物联网数据注入攻击区块链智能合约恶意节点
Internet of things (IoT)data injection attackblockchainsmart contractmalicious node
孙玉 . 我国物联网产业发展趋势[J]. 物联网学报, 2017,1(3): 1-5.
SUN Y . Development trend of IoT industry in China[J]. Chinese Journal on Internet of Things, 2017,1(3): 1-5.
IHS Markit . The Internet of things:a movement,not a market[R]. 2017.
TSITSIKLIS J N . Problems in decentralized decision making and computation[R]. 1984.
DUCHI J C, AGARWAL A, WAINWRIGHT M J . Dual averaging for distributed optimization:convergence analysis and network scaling[J]. IEEE Transactions on Automatic Control, 2011,57(3): 592-606.
SAYED A H . Adaptation,learning,and optimization over networks[J]. Foundations and Trends in Machine Learning, 2014,7(4-5): 311-801.
SUNDARAM S, GHARESIFARD B . Consensus-based distributed optimization with malicious nodes[C]// 53rd Annual Allerton Conference on Communication,Control,and Computing. IEEE, 2015: 244-249.
WU S X, WAI H T, SCAGLIONE A ,et al. Data injection attack on decentralized optimization[C]// 2018 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). IEEE, 2018: 3644-3648.
GENTZ R, WU S X, WAI H T ,et al. Data injection attacks in randomized gossiping[J]. IEEE Transactions on Signal and Information Processing over Networks, 2016,2(4): 523-538.
GENTZ R, WAI H T, SCAGLIONE A ,et al. Detection of data injection attacks in decentralized learning[C]// 2015 49th Asilomar Conference on Signals,Systems and Computers. IEEE, 2015: 350-354.
LI G, WU S X, ZHANG S ,et al. Neural networks-aided insider attack detection for the average consensus algorithm[J]. IEEE Access, 2020,8: 51871-51883.
BOLOUKI S, NEDIĆ A, BAŞAR T, . On the steady-state range of averaging dynamics[C]// American Control Conference. IEEE, 2016: 6447-6452.
KAILKHURA B, BRAHMA S, VARSHNEY P K . Consensus based detection in the presence of data falsification attacks[J]. arXiv:1504.03413, 2015
SU L, VAIDYA N . Byzantine multi-agent optimization:part I[J]. arXiv:1506.04681, 2015
YAN Q, LI M, JIANG T ,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks[C]// 2012 Proceedings IEEE INFOCOM. IEEE, 2012: 900-908.
谢晋阳, 李平, 谢桂芳 . 基于特征节点分析的恶意节点检测算法研究[J]. 计算机工程与科学, 2015,37(1): 78-83.
XIE J Y, LI P, XIE G F . Study on the malicious nodes detection algorithm based on feature nodes analysis[J]. Computer Engineering &Science, 2015,37(1): 78-83.
王欣, 胡平, 景波 . 基于度量阈值裁决的WSN恶意节点筛选算法[J]. 计算机工程与设计, 2017,38(5): 1142-1147,1172.
WANG X, HU P, JING B . Malicious node filtering algorithm of wireless sensor network based on metric threshold decision[J]. Computer Engineering and Design, 2017,38(5): 1142-1147,1172.
季薇, 李炳星, 郑宝玉 . 基于信誉与共识的分布式智能入侵防御方案[J]. 系统工程与电子技术, 2018,40(3): 665-670.
JI W, LI B X, ZHENG B Y . Distributed international registration intrusion prevention scheme based on reputation and consensus[J]. Systems Engineering and Electronics, 2018,40(3): 665-670.
BOGNER A, . Seeing is understanding:anomaly detection in blockchains with visualized features[C]// International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of International Symposium on Wearable Computers. ACM, 2017: 5-8.
SHINDE K, TODKARI S V . Securing wireless sensor network against pollution attack with block chain[J]. International Journal for Modern Trends in Science and Technology, 2019: 2455-3778.
SILVA B N, KHAN M, HAN K . Internet of things:a comprehensive review of enabling technologies,architecture,and challenges[J]. IETE Technical Review, 2018,35(2): 205-220.
CUI W, WU S, WANG Y ,et al. A gossip-based TDOA distributed localization algorithm for wireless sensor networks[C]// 2nd International Symposium on Instrumentation and Measurement,Sensor Network and Automation. IEEE, 2013: 783-788.
DIMAKIS A G, KAR S, MOURA J M F ,et al. Gossip algorithms for distributed signal processing[J]. Proceedings of the IEEE, 2010,98(11): 1847-1864.
吴俊宏, 谢胤喆, 王玥 ,等. 基于改进Gossip算法的多微网孤岛系统分布式电力交易策略[J]. 现代电力, 2019,36(2): 88-94.
WU J H, XIE Y Z, WANG Y ,et al. Distributed electronics trading strategical off interconnected microgrids in islanding mode based on improved gossip algorithm[J]. Modern Electric Power, 2019,36(2): 88-94.
DAVIES R . The Internet of things opportunities and challenges[J]. European Parliamentary Research Service, 2015
BILAL M . A review of Internet of things architecture,technologies and analysis smartphone-based attacks against 3D printers[J]. arXiv:1708.04560, 2017
BOYD S, GHOSH A, PRABHAKAR B ,et al. Randomized gossip algorithms[J]. IEEE Transactions on Information Theory, 2006,52(6): 2508-2530.
中国信息通信研究院. 区块链白皮书(2019)[S]. 2019.
China Academy of Information and Communications Technology. Blockchain white paper (2019)[S]. 2019.
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2019.
CACHIN C, . Architecture of the hyperledger blockchain fabric[C]// Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016,310:4.
BUTERIN V . Ethereum white paper:a next generation smart contract& decentralized application platform[J]. First Version, 2014,53: 1-36.
SZABO N . Smart contracts:building blocks for digital markets[J]. EXTROPY:the Journal of Transhumanist Thought, 1996,18(16):2.
AURORA L . IDEX:a real-time and high-throughput Ethereum smart contract exchange[S]. 2019.
MCCORRY P, SHAHANDASHTI S F, HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// International Conference on Financial Cryptography and Data Security. Springer, 2017: 357-375.
FAWCETT T . An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006,27(8): 861-874.
Ethereum Foundation. Solidity documentation:Release 0.4.12[R]. 2017.
0
浏览量
981
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构