Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2023

06-09-2023

A blockchain and stacked machine learning approach for malicious nodes’ detection in internet of things

Authors: Shakira Musa Baig, Muhammad Umar Javed, Ahmad Almogren, Nadeem Javaid, Mohsin Jamil

Published in: Peer-to-Peer Networking and Applications | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) network is extremely useful in many different fields, such as smart cities, the military, healthcare, business, and agriculture, among others. The security of IoT networks has long been a major concern. The nodes of the IoT network are openly accessible and are mostly deployed in hostile environments. Therefore, they are easily exposed to different attacks. It is important to identify malicious nodes and attacks present in the network. The majority of traditional IoT security mechanisms are either centralized or rely on third parties. Thus, they are vulnerable to a single point of failure. Moreover, Machine Learning (ML) based attack detection approaches have low detection accuracy and performance as compared to the deep learning approaches. Besides, the single learner algorithms have intrinsic limitations that directly impact the attack detection systems’ performance. To address the aforementioned issues, a Blockchain Ensemble stacked Machine Learning (BEML) approach has been proposed in this article. The BEML approach is made up of three modules: blockchain, InterPlanetary File System (IPFS) and attack detector. The blockchain module registers network nodes, authenticates data analysts, revokes network nodes, and stores data hashes and credentials’ information of nodes in a secure way. The IPFS module stores the data and generates a unique hash against it. Later on, the hash is used to access and download data from the IPFS. In the third module, the raw data is processed, normalized and balanced using the MinMax scalar and Synthetic Minority Oversampling Technique (SMOTE). Moreover, the single learner ML algorithms: linear discriminant analysis, decision tree, perceptron and ridge, are combined in such a way that they compensate for the weaknesses of each other and result in a stacked ML model. The resulting model has better performance and detection accuracy as compared to the single learner algorithms. This stacked ML model is used to detect and classify the Denial of Service (DoS) attacks present in the network. Based on the predicted attacks, the malicious nodes are identified and their registration is revoked from the network. Finally, for evaluating the the proposed BEML approach’s efficiency, simulations are performed. The results, theoretical analysis and formal security analysis indicate that the BEML approach effectively stores data, efficiently detects attacks and ensures the security of the IoT network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326–2341CrossRef Kumar P, Kumar R, Srivastava G, Gupta GP, Tripathi R, Gadekallu TR, Xiong NN (2021) PPSF: a privacy-preserving and secure framework using blockchain-based machine-learning for IoT-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326–2341CrossRef
2.
go back to reference Azam I, Javaid N, Ahmad A, Abdul W, Almogren A, Alamri A (2017) Balanced load distribution with energy hole avoidance in underwater WSNs. IEEE Access 5:15206–15221CrossRef Azam I, Javaid N, Ahmad A, Abdul W, Almogren A, Alamri A (2017) Balanced load distribution with energy hole avoidance in underwater WSNs. IEEE Access 5:15206–15221CrossRef
3.
go back to reference Javaid N, Hussain SM, Ullah I, Noor MA, Abdul W, Almogren A, Alamri A (2017) Demand side management in nearly zero energy buildings using heuristic optimizations. Energies 10(8):1131CrossRef Javaid N, Hussain SM, Ullah I, Noor MA, Abdul W, Almogren A, Alamri A (2017) Demand side management in nearly zero energy buildings using heuristic optimizations. Energies 10(8):1131CrossRef
4.
go back to reference Cui Z, Fei XUE, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251 Cui Z, Fei XUE, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251
5.
go back to reference Kumar R, Swarnkar M, Singal G, Kumar N (2021) IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis. IEEE Internet Things J 9(2):989–1008CrossRef Kumar R, Swarnkar M, Singal G, Kumar N (2021) IoT Network Traffic Classification Using Machine Learning Algorithms: An Experimental Analysis. IEEE Internet Things J 9(2):989–1008CrossRef
6.
go back to reference Memon RA, Li JP, Ahmed J, Nazeer MI, Ismail M, Ali K (2020) Cloud-based vs. blockchain-based IoT: a comparative survey and way forward. Front Inf Technol Electron Eng 21(4):563-586 Memon RA, Li JP, Ahmed J, Nazeer MI, Ismail M, Ali K (2020) Cloud-based vs. blockchain-based IoT: a comparative survey and way forward. Front Inf Technol Electron Eng 21(4):563-586
7.
go back to reference Gai K, Guo J, Zhu L, Yu S (2020) Blockchain meets cloud computing: a survey. IEEE Communications Surveys & Tutorials 22(3):2009–2030CrossRef Gai K, Guo J, Zhu L, Yu S (2020) Blockchain meets cloud computing: a survey. IEEE Communications Surveys & Tutorials 22(3):2009–2030CrossRef
8.
go back to reference Khalid A, Iftikhar MS, Almogren A, Khalid R, Afzal MK, Javaid N (2021) A blockchain based incentive provisioning scheme for traffic event validation and information storage in VANETs. Inf Process Manag 58(2):102464CrossRef Khalid A, Iftikhar MS, Almogren A, Khalid R, Afzal MK, Javaid N (2021) A blockchain based incentive provisioning scheme for traffic event validation and information storage in VANETs. Inf Process Manag 58(2):102464CrossRef
9.
go back to reference Nouman M, Qasim U, Nasir H, Almasoud A, Imran M, Javaid N (2023) Malicious Node Detection using Machine Learning and Distributed Data Storage using Blockchain in WSNs. IEEE Access Nouman M, Qasim U, Nasir H, Almasoud A, Imran M, Javaid N (2023) Malicious Node Detection using Machine Learning and Distributed Data Storage using Blockchain in WSNs. IEEE Access
10.
go back to reference Sadiq A, Javed MU, Khalid R, Almogren A, Shafiq M, Javaid N (2020) Blockchain based data and energy trading in internet of electric vehicles. IEEE Access 9:7000–7020CrossRef Sadiq A, Javed MU, Khalid R, Almogren A, Shafiq M, Javaid N (2020) Blockchain based data and energy trading in internet of electric vehicles. IEEE Access 9:7000–7020CrossRef
11.
go back to reference Ding X, Guo J, Li D, Wu W (2020) An incentive mechanism for building a secure blockchain-based internet of things. IEEE Trans Netw Sci Eng 8(1):477–487MathSciNetCrossRef Ding X, Guo J, Li D, Wu W (2020) An incentive mechanism for building a secure blockchain-based internet of things. IEEE Trans Netw Sci Eng 8(1):477–487MathSciNetCrossRef
12.
go back to reference Amjad S, Abbas S, Abubaker Z, Alsharif MH, Jahid A, Javaid N (2022) Blockchain based authentication and cluster head selection using DDR-LEACH in internet of sensor things. Sensors 22(5):1972CrossRef Amjad S, Abbas S, Abubaker Z, Alsharif MH, Jahid A, Javaid N (2022) Blockchain based authentication and cluster head selection using DDR-LEACH in internet of sensor things. Sensors 22(5):1972CrossRef
13.
go back to reference Guo S, Hu X, Guo S, Qiu X, Qi F (2019) Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans Industr Inf 16(3):1972–1983CrossRef Guo S, Hu X, Guo S, Qiu X, Qi F (2019) Blockchain meets edge computing: A distributed and trusted authentication system. IEEE Trans Industr Inf 16(3):1972–1983CrossRef
14.
go back to reference Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H (2018) Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet Things J 6(2):2188–2204CrossRef Ferrag MA, Derdour M, Mukherjee M, Derhab A, Maglaras L, Janicke H (2018) Blockchain technologies for the internet of things: Research issues and challenges. IEEE Internet Things J 6(2):2188–2204CrossRef
15.
go back to reference Cui Z, Fei XUE, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251 Cui Z, Fei XUE, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Trans Serv Comput 13(2):241–251
16.
go back to reference Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Industr Inf 18(3):1918–1929CrossRef Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Industr Inf 18(3):1918–1929CrossRef
17.
go back to reference Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J 6(5):7702–7712CrossRef Shen M, Tang X, Zhu L, Du X, Guizani M (2019) Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet Things J 6(5):7702–7712CrossRef
18.
go back to reference Abdelmoumin G, Rawat DB, Rahman A (2021) On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J 9(6):4280–4290CrossRef Abdelmoumin G, Rawat DB, Rahman A (2021) On the performance of machine learning models for anomaly-based intelligent intrusion detection systems for the internet of things. IEEE Internet Things J 9(6):4280–4290CrossRef
19.
go back to reference Arif A, Alghamdi TA, Khan ZA, Javaid N (2022) Towards efficient energy utilization using big data analytics in smart cities for electricity theft detection. Big Data Res 27:100285CrossRef Arif A, Alghamdi TA, Khan ZA, Javaid N (2022) Towards efficient energy utilization using big data analytics in smart cities for electricity theft detection. Big Data Res 27:100285CrossRef
20.
go back to reference Bandara E, Tosh D, Foytik P, Shetty S, Ranasinghe N, De Zoysa K (2021) Tikiri-Towards a lightweight blockchain for IoT. Futur Gener Comput Syst 119:154–165CrossRef Bandara E, Tosh D, Foytik P, Shetty S, Ranasinghe N, De Zoysa K (2021) Tikiri-Towards a lightweight blockchain for IoT. Futur Gener Comput Syst 119:154–165CrossRef
21.
go back to reference Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Hyperledger fabric blockchain for securing the edge internet of things. Sensors 21(2):359CrossRef Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Hyperledger fabric blockchain for securing the edge internet of things. Sensors 21(2):359CrossRef
22.
go back to reference Satamraju KP (2020) Proof of concept of scalable integration of internet of things and blockchain in healthcare. Sensors 20(5):1389CrossRef Satamraju KP (2020) Proof of concept of scalable integration of internet of things and blockchain in healthcare. Sensors 20(5):1389CrossRef
23.
go back to reference Singh R, Dwivedi AD, Srivastava G (2020) Internet of things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention. Sensors 20(14):3951CrossRef Singh R, Dwivedi AD, Srivastava G (2020) Internet of things based blockchain for temperature monitoring and counterfeit pharmaceutical prevention. Sensors 20(14):3951CrossRef
24.
go back to reference Xu C, Qu Y, Luan TH, Eklund PW, Xiang Y, Gao L (2021) A lightweight and attack-proof bidirectional blockchain paradigm for Internet of Things. IEEE Internet Things J 9(6):4371–4384CrossRef Xu C, Qu Y, Luan TH, Eklund PW, Xiang Y, Gao L (2021) A lightweight and attack-proof bidirectional blockchain paradigm for Internet of Things. IEEE Internet Things J 9(6):4371–4384CrossRef
25.
go back to reference Xu X, Zhao H, Yao H, Wang S (2020) A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT. IEEE Internet Things J 8(4):2431–2443CrossRef Xu X, Zhao H, Yao H, Wang S (2020) A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT. IEEE Internet Things J 8(4):2431–2443CrossRef
26.
go back to reference Khalaf OI, Abdulsahib GM (2021) Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Netw Appl 14(5):2858–2873CrossRef Khalaf OI, Abdulsahib GM (2021) Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-to-Peer Netw Appl 14(5):2858–2873CrossRef
27.
go back to reference Goyat R, Kumar G, Saha R, Conti M, Rai MK, Thomas R, Hoon-Kim T (2020) Blockchain-based data storage with privacy and authentication in internet-of-things. IEEE Internet Things J Goyat R, Kumar G, Saha R, Conti M, Rai MK, Thomas R, Hoon-Kim T (2020) Blockchain-based data storage with privacy and authentication in internet-of-things. IEEE Internet Things J
28.
go back to reference Ahmed A, Abdullah S, Bukhsh M, Ahmad I, Mushtaq Z (2022) An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 10:11404–11419CrossRef Ahmed A, Abdullah S, Bukhsh M, Ahmad I, Mushtaq Z (2022) An energy-efficient data aggregation mechanism for IoT secured by blockchain. IEEE Access 10:11404–11419CrossRef
29.
go back to reference Ibrahim RF, Abu Al-Haija Q, Ahmad A (2022) DDoS attack prevention for Internet of Thing devices using Ethereum blockchain technology. Sensors 22(18):6806CrossRef Ibrahim RF, Abu Al-Haija Q, Ahmad A (2022) DDoS attack prevention for Internet of Thing devices using Ethereum blockchain technology. Sensors 22(18):6806CrossRef
30.
go back to reference Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2020) CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J 8(5):3242–3254CrossRef Shafiq M, Tian Z, Bashir AK, Du X, Guizani M (2020) CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine-learning techniques. IEEE Internet Things J 8(5):3242–3254CrossRef
31.
go back to reference Aboelwafa MM, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M (2020) A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J 7(9):8462–8471CrossRef Aboelwafa MM, Seddik KG, Eldefrawy MH, Gadallah Y, Gidlund M (2020) A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J 7(9):8462–8471CrossRef
32.
go back to reference Makkar A, Garg S, Kumar N, Hossain MS, Ghoneim A, Alrashoud M (2020) An efficient spam detection technique for IoT devices using machine learning. IEEE Trans Industr Inf 17(2):903–912CrossRef Makkar A, Garg S, Kumar N, Hossain MS, Ghoneim A, Alrashoud M (2020) An efficient spam detection technique for IoT devices using machine learning. IEEE Trans Industr Inf 17(2):903–912CrossRef
33.
go back to reference Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258CrossRef Liu L, Xu X, Liu Y, Ma Z, Peng J (2021) A detection framework against CPMA attack based on trust evaluation and machine learning in IoT network. IEEE Internet Things J 8(20):15249–15258CrossRef
34.
go back to reference Al-Haija QA, Saleh E, Alnabhan M (2021) Detecting port scan attacks using logistic regression. In 2021 4th International symposium on advanced electrical and communication technologies (ISAECT) (pp. 1-5). IEEE Al-Haija QA, Saleh E, Alnabhan M (2021) Detecting port scan attacks using logistic regression. In 2021 4th International symposium on advanced electrical and communication technologies (ISAECT) (pp. 1-5). IEEE
35.
go back to reference Gadekallu TR, Manoj MK, Kumar N, Hakak S, Bhattacharya S (2021) Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications. IEEE Internet Things Mag 4(3):30–33CrossRef Gadekallu TR, Manoj MK, Kumar N, Hakak S, Bhattacharya S (2021) Blockchain-based attack detection on machine learning algorithms for IoT-based e-health applications. IEEE Internet Things Mag 4(3):30–33CrossRef
36.
go back to reference Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Industr Inf 18(3):1918–1929CrossRef Tian Y, Li T, Xiong J, Bhuiyan MZA, Ma J, Peng C (2021) A blockchain-based machine learning framework for edge services in IIoT. IEEE Trans Industr Inf 18(3):1918–1929CrossRef
37.
go back to reference Zhao Y, Yang X, Yu Y, Qin B, Du X, Guizani M (2021) Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet Things J 9(4):2468–2484CrossRef Zhao Y, Yang X, Yu Y, Qin B, Du X, Guizani M (2021) Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet Things J 9(4):2468–2484CrossRef
38.
go back to reference Jamil F, Kahng HK, Kim S, Kim DH (2021) Towards secure fitness framework based on IoT-enabled blockchain network integrated with machine learning algorithms. Sensors 21(5):1640CrossRef Jamil F, Kahng HK, Kim S, Kim DH (2021) Towards secure fitness framework based on IoT-enabled blockchain network integrated with machine learning algorithms. Sensors 21(5):1640CrossRef
39.
go back to reference Kaur M, Gupta S, Kumar D, Raboaca MS, Goyal SB, Verma C (2023) IPFS: An Off-Chain Storage Solution for Blockchain. In Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1 (pp. 513-525). Singapore: Springer Nature Singapore Kaur M, Gupta S, Kumar D, Raboaca MS, Goyal SB, Verma C (2023) IPFS: An Off-Chain Storage Solution for Blockchain. In Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1 (pp. 513-525). Singapore: Springer Nature Singapore
40.
go back to reference Jamal A, Javed MU, Alrajeh N, Bouk SH, Javaid N (2023) Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. Cluster Computing 1-13 Jamal A, Javed MU, Alrajeh N, Bouk SH, Javaid N (2023) Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. Cluster Computing 1-13
41.
go back to reference Al-Haija QA, Alnabhan M, Saleh E, Al-Omari M (2023) Applications of blockchain technology for improving security in the internet of things (IoT). In Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems (pp. 199-221). Academic Press Al-Haija QA, Alnabhan M, Saleh E, Al-Omari M (2023) Applications of blockchain technology for improving security in the internet of things (IoT). In Blockchain Technology Solutions for the Security of Iot-Based Healthcare Systems (pp. 199-221). Academic Press
42.
go back to reference Albulayhi K, Al-Haija QA (2022) Security and Privacy Challenges in Blockchain Application. In The Data-Driven Blockchain Ecosystem (pp. 207-226). CRC Press Albulayhi K, Al-Haija QA (2022) Security and Privacy Challenges in Blockchain Application. In The Data-Driven Blockchain Ecosystem (pp. 207-226). CRC Press
43.
go back to reference Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. J Sens Almomani I, Al-Kasasbeh B, Al-Akhras M (2016) WSN-DS: A dataset for intrusion detection systems in wireless sensor networks. J Sens
44.
go back to reference Darwish L, Nassr M, Ghosna F, Fardoun HM, Voronkova DK, Anbar M (2023) Malicious Node Detection in Wireless Sensor Networks: Comparative Study. In 2023 5th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE) (Vol. 5, pp. 1-5). IEEE Darwish L, Nassr M, Ghosna F, Fardoun HM, Voronkova DK, Anbar M (2023) Malicious Node Detection in Wireless Sensor Networks: Comparative Study. In 2023 5th International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE) (Vol. 5, pp. 1-5). IEEE
46.
go back to reference Behera B, Kumaravelan G (2020) Performance evaluation of machine learning algorithms in biomedical document classification. Perform Eval 29(5):5704–5716 Behera B, Kumaravelan G (2020) Performance evaluation of machine learning algorithms in biomedical document classification. Perform Eval 29(5):5704–5716
47.
go back to reference Saputra MFA, Widiyaningtyas T, Wibawa AP (2018) Illiteracy classification using K means-Naïve Bayes algorithm. JOIV Int J Inform Vis 2(3):153-158 Saputra MFA, Widiyaningtyas T, Wibawa AP (2018) Illiteracy classification using K means-Naïve Bayes algorithm. JOIV Int J Inform Vis 2(3):153-158
48.
go back to reference Arif A, Javaid N, Aldegheishem A, Alrajeh N (2021) Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities. Concur Comput Pract Exp 33(17):e6316CrossRef Arif A, Javaid N, Aldegheishem A, Alrajeh N (2021) Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities. Concur Comput Pract Exp 33(17):e6316CrossRef
49.
go back to reference Dilmi S, Ladjal M (2021) A novel approach for water quality classification based on the integration of deep learning and feature extraction techniques. Chemom Intell Lab Syst 214:104329CrossRef Dilmi S, Ladjal M (2021) A novel approach for water quality classification based on the integration of deep learning and feature extraction techniques. Chemom Intell Lab Syst 214:104329CrossRef
50.
go back to reference He L, Yang Z, Zhao Z, Lin H, Li Y (2013) Extracting drug-drug interaction from the biomedical literature using a stacked generalization-based approach. PLoS ONE 8(6):e65814CrossRef He L, Yang Z, Zhao Z, Lin H, Li Y (2013) Extracting drug-drug interaction from the biomedical literature using a stacked generalization-based approach. PLoS ONE 8(6):e65814CrossRef
52.
go back to reference Yahaya AS, Javaid N, Zeadally S, Farooq H (2022) Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks. Veh Commun 37:100502 Yahaya AS, Javaid N, Zeadally S, Farooq H (2022) Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks. Veh Commun 37:100502
53.
go back to reference Javaid N, Qasim U, Yahaya AS, Alkhammash EH, Hadjouni M (2022) Non-technical losses detection using autoencoder and bidirectional gated recurrent unit to secure smart grids. IEEE Access Javaid N, Qasim U, Yahaya AS, Alkhammash EH, Hadjouni M (2022) Non-technical losses detection using autoencoder and bidirectional gated recurrent unit to secure smart grids. IEEE Access
54.
go back to reference Asif M, Nazeer O, Javaid N, Alkhammash EH, Hadjouni M (2022) Data Augmentation Using BiWGAN, Feature Extraction and Classification by Hybrid 2DCNN and BiLSTM to Detect Non-Technical Losses in Smart Grids. IEEE Access 10:27467–27483CrossRef Asif M, Nazeer O, Javaid N, Alkhammash EH, Hadjouni M (2022) Data Augmentation Using BiWGAN, Feature Extraction and Classification by Hybrid 2DCNN and BiLSTM to Detect Non-Technical Losses in Smart Grids. IEEE Access 10:27467–27483CrossRef
55.
go back to reference Wang W, Song J, Xu G, Li Y, Wang H, Su C (2020) Contractward: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133–1144CrossRef Wang W, Song J, Xu G, Li Y, Wang H, Su C (2020) Contractward: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans Netw Sci Eng 8(2):1133–1144CrossRef
56.
go back to reference Praitheeshan P, Pan L, Yu J, Liu J, Doss R (2019) Security analysis methods on ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:1908.08605 Praitheeshan P, Pan L, Yu J, Liu J, Doss R (2019) Security analysis methods on ethereum smart contract vulnerabilities: a survey. arXiv preprint arXiv:​1908.​08605
Metadata
Title
A blockchain and stacked machine learning approach for malicious nodes’ detection in internet of things
Authors
Shakira Musa Baig
Muhammad Umar Javed
Ahmad Almogren
Nadeem Javaid
Mohsin Jamil
Publication date
06-09-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01554-1

Other articles of this Issue 6/2023

Peer-to-Peer Networking and Applications 6/2023 Go to the issue

Premium Partner