物联网学报 ›› 2020, Vol. 4 ›› Issue (2): 58-69.doi: 10.11959/j.issn.2096-3750.2020.00172
所属专题: 区块链
修回日期:
2020-05-03
出版日期:
2020-06-30
发布日期:
2020-06-12
作者简介:
黄豪杰(1997- ),男,湖北天门人,深圳大学电子与信息工程学院硕士生,主要研究方向为物联网、区块链、数据挖掘等|吴晓晓(1982- ),女,湖北鄂州人,博士,深圳大学助理教授,主要研究方向为社交网络中的数据挖掘算法、5G 通信网络关键技术研究、信道编码理论等|李刚强(1991- ),男,河南驻马店人,深圳大学电子与信息工程学院博士生,主要研究方向为社交网络中的数据挖掘算法、分布式协议、机器学习等
基金资助:
Haojie HUANG1,Xiaoxiao WU1,2(),Gangqiang LI1
Revised:
2020-05-03
Online:
2020-06-30
Published:
2020-06-12
Supported by:
摘要:
随着物联网中分布式设备数量的爆发式增长,设备之间的协作和优化算法的安全问题成为物联网系统研究的前沿问题。物联网中的分布式算法依赖于单个智能体的本地计算和近邻间通信来迭代地解决一类广泛的、受约束的优化问题,但是容易遭受来自内部恶意节点的数据注入攻击。针对现有的检测方法大部分为本地运行,并且存在数据封闭、单点故障、检测过程不透明等问题,考虑使用区块链技术和智能合约对网络中存在的恶意节点进行检测。所提方法基于区块链技术的去中心化和多地备份特性实现了数据共享,避免了单点故障问题。另外,利用智能合约的合约代码、执行过程及结果公开透明且合约代码与结果不可篡改等特性保证检测过程可追溯和可验证。最后,采用平均共识算法并基于树莓派平台对所提方法进行验证分析。
中图分类号:
黄豪杰,吴晓晓,李刚强. 基于区块链智能合约的物联网恶意节点检测和定位[J]. 物联网学报, 2020, 4(2): 58-69.
Haojie HUANG,Xiaoxiao WU,Gangqiang LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network[J]. Chinese Journal on Internet of Things, 2020, 4(2): 58-69.
表1
数据存储合约部署交易"
键 | 值 |
Transaction Hash | 0x6fa0a65054d5a87c224bd70f611a39fa62f7341bf72ddf1b2dc6cfaabad4ea38 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | StorageData.(constructor) |
Gas | 417972 |
Transaction cost | 417972 |
Hash | 0x6fa0a65054d5a87c224bd70f611a39fa62f7341bf72ddf1b2dc6cfaabad4ea38 |
Input | 0x6080…0029 |
Decoded input | ] |
Decoded output | ] |
表2
节点状态数据上传交易"
键 | 值 |
Transaction Hash | 0xf557bbec590e6342bf8845e88cb679690a1adc81251249b5762e582e5fe96e2d |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | StorageData.storageData(bytes32,uint256,uint256[]) 0xf49bdcfa72aba6ed35d05e85f8326509138a1259 |
Gas | 219872 |
Hash | 0xf557bbec590e6342bf8845e88cb679690a1adc81251249b5762e582e5fe96e2d |
Input | 0xcf77…026b |
“bytes32 nodeName”:“0x6e6f646531” | |
Decoded input | “uint256 round”:“1”, |
“uint256[]data”:[“5933”,“13002”,“1630”,“11271”,“619”] | |
Decoded output | ] |
表3
检测合约部署交易"
键 | 值 |
Transaction hash | 0x546bcb4a4d69fc183336b6a227e9d02c636433e0c54537ffc3d05f3eb66a8c63 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | Detection.(constructor) |
Gas | 924166 |
Transaction cost | 924166 |
Hash | 0x546bcb4a4d69fc183336b6a227e9d02c636433e0c54537ffc3d05f3eb66a8c63 |
Input | 0x6080…d029 |
Decoded input | ] |
Decoded output | ] |
表4
检测合约调用交易"
键 | 值 |
Transaction hash | 0xbc390e24901488da9f6788722b62087998e2611ad936deef44f71dac3224bda6 |
From | 0x1c3edeff3e9967295084690d561bdc31fc0099b5 |
To | Detection.detection(bytes32) 0xef653c4d683b88ff99f7a75040fea3cc6411e690 |
Gas | 215661 |
Hash | 0xbc390e24901488da9f6788722b62087998e2611ad936deef44f71dac3224bda62d |
Input | 0x53cb13f36e6f646532 |
Decoded input | “bytes32 nodeName”:“0x6e6f646532” |
Decoded output | “0”:“bytes32[]:0x6e6f646531,0x6e6f646533,0x6e6f646535,0x6e6f646538”“1”:“bool[]:true,false,false,false” |
[1] | 孙玉 . 我国物联网产业发展趋势[J]. 物联网学报, 2017,1(3): 1-5. |
SUN Y . Development trend of IoT industry in China[J]. Chinese Journal on Internet of Things, 2017,1(3): 1-5. | |
[2] | IHS Markit . The Internet of things:a movement,not a market[R]. 2017. |
[3] | TSITSIKLIS J N . Problems in decentralized decision making and computation[R]. 1984. |
[4] | DUCHI J C , AGARWAL A , WAINWRIGHT M J . Dual averaging for distributed optimization:convergence analysis and network scaling[J]. IEEE Transactions on Automatic Control, 2011,57(3): 592-606. |
[5] | SAYED A H . Adaptation,learning,and optimization over networks[J]. Foundations and Trends in Machine Learning, 2014,7(4-5): 311-801. |
[6] | SUNDARAM S , GHARESIFARD B . Consensus-based distributed optimization with malicious nodes[C]// 53rd Annual Allerton Conference on Communication,Control,and Computing. IEEE, 2015: 244-249. |
[7] | WU S X , WAI H T , SCAGLIONE A ,et al. Data injection attack on decentralized optimization[C]// 2018 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP). IEEE, 2018: 3644-3648. |
[8] | GENTZ R , WU S X , WAI H T ,et al. Data injection attacks in randomized gossiping[J]. IEEE Transactions on Signal and Information Processing over Networks, 2016,2(4): 523-538. |
[9] | GENTZ R , WAI H T , SCAGLIONE A ,et al. Detection of data injection attacks in decentralized learning[C]// 2015 49th Asilomar Conference on Signals,Systems and Computers. IEEE, 2015: 350-354. |
[10] | LI G , WU S X , ZHANG S ,et al. Neural networks-aided insider attack detection for the average consensus algorithm[J]. IEEE Access, 2020,8: 51871-51883. |
[11] | BOLOUKI S , NEDI? A , BA?AR T , . On the steady-state range of averaging dynamics[C]// American Control Conference. IEEE, 2016: 6447-6452. |
[12] | KAILKHURA B , BRAHMA S , VARSHNEY P K . Consensus based detection in the presence of data falsification attacks[J]. arXiv:1504.03413, 2015 |
[13] | SU L , VAIDYA N . Byzantine multi-agent optimization:part I[J]. arXiv:1506.04681, 2015 |
[14] | YAN Q , LI M , JIANG T ,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks[C]// 2012 Proceedings IEEE INFOCOM. IEEE, 2012: 900-908. |
[15] | 谢晋阳, 李平, 谢桂芳 . 基于特征节点分析的恶意节点检测算法研究[J]. 计算机工程与科学, 2015,37(1): 78-83. |
XIE J Y , LI P , XIE G F . Study on the malicious nodes detection algorithm based on feature nodes analysis[J]. Computer Engineering &Science, 2015,37(1): 78-83. | |
[16] | 王欣, 胡平, 景波 . 基于度量阈值裁决的WSN恶意节点筛选算法[J]. 计算机工程与设计, 2017,38(5): 1142-1147,1172. |
WANG X , HU P , JING B . Malicious node filtering algorithm of wireless sensor network based on metric threshold decision[J]. Computer Engineering and Design, 2017,38(5): 1142-1147,1172. | |
[17] | 季薇, 李炳星, 郑宝玉 . 基于信誉与共识的分布式智能入侵防御方案[J]. 系统工程与电子技术, 2018,40(3): 665-670. |
JI W , LI B X , ZHENG B Y . Distributed international registration intrusion prevention scheme based on reputation and consensus[J]. Systems Engineering and Electronics, 2018,40(3): 665-670. | |
[18] | BOGNER A , . Seeing is understanding:anomaly detection in blockchains with visualized features[C]// International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of International Symposium on Wearable Computers. ACM, 2017: 5-8. |
[19] | SHINDE K , TODKARI S V . Securing wireless sensor network against pollution attack with block chain[J]. International Journal for Modern Trends in Science and Technology, 2019: 2455-3778. |
[20] | SILVA B N , KHAN M , HAN K . Internet of things:a comprehensive review of enabling technologies,architecture,and challenges[J]. IETE Technical Review, 2018,35(2): 205-220. |
[21] | CUI W , WU S , WANG Y ,et al. A gossip-based TDOA distributed localization algorithm for wireless sensor networks[C]// 2nd International Symposium on Instrumentation and Measurement,Sensor Network and Automation. IEEE, 2013: 783-788. |
[22] | DIMAKIS A G , KAR S , MOURA J M F ,et al. Gossip algorithms for distributed signal processing[J]. Proceedings of the IEEE, 2010,98(11): 1847-1864. |
[23] | 吴俊宏, 谢胤喆, 王玥 ,等. 基于改进Gossip算法的多微网孤岛系统分布式电力交易策略[J]. 现代电力, 2019,36(2): 88-94. |
WU J H , XIE Y Z , WANG Y ,et al. Distributed electronics trading strategical off interconnected microgrids in islanding mode based on improved gossip algorithm[J]. Modern Electric Power, 2019,36(2): 88-94. | |
[24] | DAVIES R . The Internet of things opportunities and challenges[J]. European Parliamentary Research Service, 2015 |
[25] | BILAL M . A review of Internet of things architecture,technologies and analysis smartphone-based attacks against 3D printers[J]. arXiv:1708.04560, 2017 |
[26] | BOYD S , GHOSH A , PRABHAKAR B ,et al. Randomized gossip algorithms[J]. IEEE Transactions on Information Theory, 2006,52(6): 2508-2530. |
[27] | 中国信息通信研究院. 区块链白皮书(2019)[S]. 2019. |
China Academy of Information and Communications Technology. Blockchain white paper (2019)[S]. 2019. | |
[28] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2019. |
[29] | CACHIN C , . Architecture of the hyperledger blockchain fabric[C]// Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016,310:4. |
[30] | BUTERIN V . Ethereum white paper:a next generation smart contract& decentralized application platform[J]. First Version, 2014,53: 1-36. |
[31] | SZABO N . Smart contracts:building blocks for digital markets[J]. EXTROPY:the Journal of Transhumanist Thought, 1996,18(16):2. |
[32] | AURORA L . IDEX:a real-time and high-throughput Ethereum smart contract exchange[S]. 2019. |
[33] | MCCORRY P , SHAHANDASHTI S F , HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// International Conference on Financial Cryptography and Data Security. Springer, 2017: 357-375. |
[34] | FAWCETT T . An introduction to ROC analysis[J]. Pattern Recognition Letters, 2006,27(8): 861-874. |
[35] | Ethereum Foundation. Solidity documentation:Release 0.4.12[R]. 2017. |
[1] | 吴靖, 李晟, 张景, 辛明, 陶若文, 周舟, 潘力佳, 施毅. 面向物联网的新型柔性传感器[J]. 物联网学报, 2023, 7(2): 1-14. |
[2] | 梁峻阁, 宋怡然, 孙杨帆, 计樱莹, 潘力佳, 施毅. 基于可穿戴与可植入技术的人体健康物联网研究进展[J]. 物联网学报, 2023, 7(2): 26-34. |
[3] | 耿光磊, 高博, 熊轲, 樊平毅, 陆杨, 王煜炜. 联邦学习赋能6G网络综述[J]. 物联网学报, 2023, 7(2): 50-66. |
[4] | 卫浓钰, 江子龙, 陈芳炯. 基于位置信息和能量均衡的声电协同网络AODV[J]. 物联网学报, 2023, 7(1): 27-36. |
[5] | 申滨, 李银波, 梁枭伟. 基于增强加权质心定位的认知物联网用户频谱接入控制[J]. 物联网学报, 2023, 7(1): 93-108. |
[6] | 蒋伟进, 周文颖, 李恩, 罗田甜, 杨莹. 基于区块链技术的云制造服务架构及共识算法研究[J]. 物联网学报, 2023, 7(1): 159-173. |
[7] | 汪静, 何乐生, 李忠红, 李路迟, 杨航. 物联网轻量级认证加密算法ASCON的软硬件协同设计[J]. 物联网学报, 2022, 6(4): 139-148. |
[8] | 蒋伟进, 罗田甜, 杨莹, 李恩, 周文颖. 物联网环境下基于区块链技术的私有数据访问控制模型[J]. 物联网学报, 2022, 6(4): 169-182. |
[9] | 邢方圆, 贺诗波, 孙铭阳, 陈积明. 基于“云-管-边-端”物联网架构的碳排放监测[J]. 物联网学报, 2022, 6(4): 53-64. |
[10] | 沈传年. 区块链跨链技术研究综述[J]. 物联网学报, 2022, 6(4): 183-196. |
[11] | 张在琛, 尤肖虎, 党建, 吴亮, 朱秉诚, 陈绩, 汪磊. 无线光通信与物联网[J]. 物联网学报, 2022, 6(3): 1-13. |
[12] | 黄诺, 刘伟杰, 龚晨. 面向工业物联网的拍赫兹通信[J]. 物联网学报, 2022, 6(3): 37-46. |
[13] | 孙君, 赵尚维康. 工业物联网中基于Sarsa算法的节能计算卸载方案[J]. 物联网学报, 2022, 6(3): 82-90. |
[14] | 刘杨, 李崔灿, 彭木根. 低功耗水下物联网:愿景与关键技术[J]. 物联网学报, 2022, 6(2): 1-9. |
[15] | 杨靖, 谢金凤, 陈怡. 我国智慧城市场景中物联网终端评测与认证体系研究[J]. 物联网学报, 2022, 6(2): 26-37. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|