Chinese Journal on Internet of Things ›› 2020, Vol. 4 ›› Issue (2): 58-69.doi: 10.11959/j.issn.2096-3750.2020.00172
Special Issue: 区块链
• Topic:Blockchain Empowered IoT • Previous Articles Next Articles
Haojie HUANG1,Xiaoxiao WU1,2(),Gangqiang LI1
Revised:
2020-05-03
Online:
2020-06-30
Published:
2020-06-12
Supported by:
CLC Number:
Haojie HUANG,Xiaoxiao WU,Gangqiang LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network[J]. Chinese Journal on Internet of Things, 2020, 4(2): 58-69.
"
键 | 值 |
Transaction Hash | 0x6fa0a65054d5a87c224bd70f611a39fa62f7341bf72ddf1b2dc6cfaabad4ea38 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | StorageData.(constructor) |
Gas | 417972 |
Transaction cost | 417972 |
Hash | 0x6fa0a65054d5a87c224bd70f611a39fa62f7341bf72ddf1b2dc6cfaabad4ea38 |
Input | 0x6080…0029 |
Decoded input | ] |
Decoded output | ] |
"
键 | 值 |
Transaction Hash | 0xf557bbec590e6342bf8845e88cb679690a1adc81251249b5762e582e5fe96e2d |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | StorageData.storageData(bytes32,uint256,uint256[]) 0xf49bdcfa72aba6ed35d05e85f8326509138a1259 |
Gas | 219872 |
Hash | 0xf557bbec590e6342bf8845e88cb679690a1adc81251249b5762e582e5fe96e2d |
Input | 0xcf77…026b |
“bytes32 nodeName”:“0x6e6f646531” | |
Decoded input | “uint256 round”:“1”, |
“uint256[]data”:[“5933”,“13002”,“1630”,“11271”,“619”] | |
Decoded output | ] |
"
键 | 值 |
Transaction hash | 0x546bcb4a4d69fc183336b6a227e9d02c636433e0c54537ffc3d05f3eb66a8c63 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | Detection.(constructor) |
Gas | 924166 |
Transaction cost | 924166 |
Hash | 0x546bcb4a4d69fc183336b6a227e9d02c636433e0c54537ffc3d05f3eb66a8c63 |
Input | 0x6080…d029 |
Decoded input | ] |
Decoded output | ] |
"
键 | 值 |
Transaction hash | 0xbc390e24901488da9f6788722b62087998e2611ad936deef44f71dac3224bda6 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | Detection.detection(bytes32) 0xef653c4d683b88ff99f7a75040fea3cc6411e690 |
Gas | 215661 |
Hash | 0xbc390e24901488da9f6788722b62087998e2611ad936deef44f71dac3224bda62d |
Input | 0x53cb13f36e6f646532 |
Decoded input | “bytes32 nodeName”:“0x6e6f646532” |
Decoded output | “0”:“bytes32[]:0x6e6f646531,0x6e6f646533,0x6e6f646535,0x6e6f646538”“1”:“bool[]:true,false,false,false” |
[1] | 孙玉 . 我国物联网产业发展趋势[J]. 物联网学报, 2017,1(3): 1-5. |
SUN Y . Development trend of IoT industry in China[J]. Chinese Journal on Internet of Things, 2017,1(3): 1-5. | |
[2] | IHS Markit . The Internet of things:a movement,not a market[R]. 2017. |
[3] | TSITSIKLIS J N . Problems in decentralized decision making and computation[R]. 1984. |
[4] | DUCHI J C , AGARWAL A , WAINWRIGHT M J . Dual averaging for distributed optimization:convergence analysis and network scaling[J]. IEEE Transactions on Automatic Control, 2011,57(3): 592-606. |
[5] | SAYED A H . Adaptation,learning,and optimization over networks[J]. Foundations and Trends in Machine Learning, 2014,7(4-5): 311-801. |
[6] | SUNDARAM S , GHARESIFARD B . Consensus-based distributed optimization with malicious nodes[C]// 53rd Annual Allerton Conference on Communication,Control,and Computing. IEEE, 2015: 244-249. |
[7] | WU S X , WAI H T , SCAGLIONE A ,et al. Data injection attack on decentralized optimization[C]// 2018 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). IEEE, 2018: 3644-3648. |
[8] | GENTZ R , WU S X , WAI H T ,et al. Data injection attacks in randomized gossiping[J]. IEEE Transactions on Signal and Information Processing over Networks, 2016,2(4): 523-538. |
[9] | GENTZ R , WAI H T , SCAGLIONE A ,et al. Detection of data injection attacks in decentralized learning[C]// 2015 49th Asilomar Conference on Signals,Systems and Computers. IEEE, 2015: 350-354. |
[10] | LI G , WU S X , ZHANG S ,et al. Neural networks-aided insider attack detection for the average consensus algorithm[J]. IEEE Access, 2020,8: 51871-51883. |
[11] | BOLOUKI S , NEDI? A , BA?AR T , . On the steady-state range of averaging dynamics[C]// American Control Conference. IEEE, 2016: 6447-6452. |
[12] | KAILKHURA B , BRAHMA S , VARSHNEY P K . Consensus based detection in the presence of data falsification attacks[J]. arXiv:1504.03413, 2015 |
[13] | SU L , VAIDYA N . Byzantine multi-agent optimization:part I[J]. arXiv:1506.04681, 2015 |
[14] | YAN Q , LI M , JIANG T ,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks[C]// 2012 Proceedings IEEE INFOCOM. IEEE, 2012: 900-908. |
[15] | 谢晋阳, 李平, 谢桂芳 . 基于特征节点分析的恶意节点检测算法研究[J]. 计算机工程与科学, 2015,37(1): 78-83. |
XIE J Y , LI P , XIE G F . Study on the malicious nodes detection algorithm based on feature nodes analysis[J]. Computer Engineering &Science, 2015,37(1): 78-83. | |
[16] | 王欣, 胡平, 景波 . 基于度量阈值裁决的WSN恶意节点筛选算法[J]. 计算机工程与设计, 2017,38(5): 1142-1147,1172. |
WANG X , HU P , JING B . Malicious node filtering algorithm of wireless sensor network based on metric threshold decision[J]. Computer Engineering and Design, 2017,38(5): 1142-1147,1172. | |
[17] | 季薇, 李炳星, 郑宝玉 . 基于信誉与共识的分布式智能入侵防御方案[J]. 系统工程与电子技术, 2018,40(3): 665-670. |
JI W , LI B X , ZHENG B Y . Distributed international registration intrusion prevention scheme based on reputation and consensus[J]. Systems Engineering and Electronics, 2018,40(3): 665-670. | |
[18] | BOGNER A , . Seeing is understanding:anomaly detection in blockchains with visualized features[C]// International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of International Symposium on Wearable Computers. ACM, 2017: 5-8. |
[19] | SHINDE K , TODKARI S V . Securing wireless sensor network against pollution attack with block chain[J]. International Journal for Modern Trends in Science and Technology, 2019: 2455-3778. |
[20] | SILVA B N , KHAN M , HAN K . Internet of things:a comprehensive review of enabling technologies,architecture,and challenges[J]. IETE Technical Review, 2018,35(2): 205-220. |
[21] | CUI W , WU S , WANG Y ,et al. A gossip-based TDOA distributed localization algorithm for wireless sensor networks[C]// 2nd International Symposium on Instrumentation and Measurement,Sensor Network and Automation. IEEE, 2013: 783-788. |
[22] | DIMAKIS A G , KAR S , MOURA J M F ,et al. Gossip algorithms for distributed signal processing[J]. Proceedings of the IEEE, 2010,98(11): 1847-1864. |
[23] | 吴俊宏, 谢胤喆, 王玥 ,等. 基于改进Gossip算法的多微网孤岛系统分布式电力交易策略[J]. 现代电力, 2019,36(2): 88-94. |
WU J H , XIE Y Z , WANG Y ,et al. Distributed electronics trading strategical off interconnected microgrids in islanding mode based on improved gossip algorithm[J]. Modern Electric Power, 2019,36(2): 88-94. | |
[24] | DAVIES R . The Internet of things opportunities and challenges[J]. European Parliamentary Research Service, 2015 |
[25] | BILAL M . A review of Internet of things architecture,technologies and analysis smartphone-based attacks against 3D printers[J]. arXiv:1708.04560, 2017 |
[26] | BOYD S , GHOSH A , PRABHAKAR B ,et al. Randomized gossip algorithms[J]. IEEE Transactions on Information Theory, 2006,52(6): 2508-2530. |
[27] | 中国信息通信研究院. 区块链白皮书(2019)[S]. 2019. |
China Academy of Information and Communications Technology. Blockchain white paper (2019)[S]. 2019. | |
[28] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2019. |
[29] | CACHIN C , . Architecture of the hyperledger blockchain fabric[C]// Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016,310:4. |
[30] | BUTERIN V . Ethereum white paper:a next generation smart contract& decentralized application platform[J]. First Version, 2014,53: 1-36. |
[31] | SZABO N . Smart contracts:building blocks for digital markets[J]. EXTROPY:the Journal of Transhumanist Thought, 1996,18(16):2. |
[32] | AURORA L . IDEX:a real-time and high-throughput Ethereum smart contract exchange[S]. 2019. |
[33] | MCCORRY P , SHAHANDASHTI S F , HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// International Conference on Financial Cryptography and Data Security. Springer, 2017: 357-375. |
[34] | FAWCETT T . An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006,27(8): 861-874. |
[35] | Ethereum Foundation. Solidity documentation:Release 0.4.12[R]. 2017. |
[1] | Weijin JIANG, Tiantian LUO, Ying YANG, En LI, Wenying ZHOU. Private data access control model based on block chain technology in the internet of things environment [J]. Chinese Journal on Internet of Things, 2022, 6(4): 169-182. |
[2] | Chuannian SHEN. Review on cross-chain technology research of blockchains [J]. Chinese Journal on Internet of Things, 2022, 6(4): 183-196. |
[3] | Yangqun LI, Dengyin ZHANG. Research and application of Web of things resource management framework [J]. Chinese Journal on Internet of Things, 2022, 6(2): 50-64. |
[4] | Pengliu TAN, Lixuran WAN. A blockchain architecture with master-slave blockchain [J]. Chinese Journal on Internet of Things, 2021, 5(2): 116-124. |
[5] | Cai GUO, Xuran LI, Yanhua CHEN, Hongning DAI. Blockchain technology for Internet of things: an overview [J]. Chinese Journal on Internet of Things, 2021, 5(1): 72-89. |
[6] | Guanjie CHENG,Zhengjie HUANG,Shuiguang DENG. Data management based on blockchain and edge computing for Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(2): 1-9. |
[7] | Zhen GAO,Qimei CUI,Xuefei ZHANG,Xiaofei WANG. Discussions about application of blockchain in IoT systems [J]. Chinese Journal on Internet of Things, 2020, 4(2): 10-17. |
[8] | Sicheng HAN,Xiaorong ZHU,Xiuxian ZHANG. Optimized scalable Byzantine fault tolerance algorithm [J]. Chinese Journal on Internet of Things, 2020, 4(2): 18-25. |
[9] | Wei WANG,Zuguang LI,Qihui WU. Dynamic spectrum sharing access technology based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 26-34. |
[10] | Zhao GUO,Shuaiyin GUO,Shengli ZHANG,Lingyang SONG,Hui WANG. Analysis of cross-chain technology of blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 35-48. |
[11] | Meng LI,Chengxiang SI,Liehuang ZHU. Secure vehicular digital forensics system based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 49-57. |
[12] | Chen TAN,Meijuan CHEN,Ebenezer ACKAH Amuah. Research on distributed identity authentication mechanism of IoT device based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 70-77. |
[13] | Shipeng CHEN,Bin CHEN,Mingjun DAI,Hui WANG. Blockchain-based IoT architecture [J]. Chinese Journal on Internet of Things, 2020, 4(2): 78-83. |
[14] | Yueyue DAI,Ke ZHANG,Yan ZHANG. Blockchain empowered 6G [J]. Chinese Journal on Internet of Things, 2020, 4(1): 111-120. |
[15] | Yang LIU,Feng WEI,Shucheng CUI,Wenjian WANG. Research on the application of LEO satellite communication and Internet of things [J]. Chinese Journal on Internet of Things, 2019, 3(4): 101-108. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|