Skip to main content
Erschienen in: Cluster Computing 1/2019

30.03.2018

RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment

verfasst von: Daming Li, Zhiming Cai, Lianbing Deng, Xiang Yao, Harry Haoxiang Wang

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Block chain is a decentralized core architecture, which is widely used in emerging digital encryption currencies. It has attracted much attention and has been researched with the gradual acceptance of bitcoin. Block chaining technology has the characteristics of centralization, block data, no tampering and trust, so it is sought after by enterprises, especially financial institutions. This paper expounds the core technology principle of block chain technology, discusses the application of block chain technology, the existing regulatory problems and security problems, so as to provide some help for the related research of block chain technology. Intrusion detection is an important way to protect the security of information systems. It has become the focus of security research in recent years. This paper introduces the history and current situation of intrusion detection system, expounds the classification of intrusion detection system and the framework of general intrusion detection, and discusses all kinds of intrusion detection technology in detail. Intrusion detection technology is a kind of security technology to protect network resources from hacker attack. IDS is a useful supplement to the firewall, which can help the network system to quickly detect attacks and improve the integrity of the information security infrastructure. In this paper, intrusion detection technology is applied to block chain information security model, and the results show that proposed model has higher detection efficiency and fault tolerance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zheng, X., Ge, B.: The evolution trend of information management of supply chain in China under the information environment. Inf. Sci. 10, 128–133 (2016) Zheng, X., Ge, B.: The evolution trend of information management of supply chain in China under the information environment. Inf. Sci. 10, 128–133 (2016)
2.
Zurück zum Zitat Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. o Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. o
3.
Zurück zum Zitat Ping, Z., Yu, D., Bin, L.: Chinese Block Chain Technology and Application Development White Paper. Ministry of Industry and Information Technology, Beijing (2016) Ping, Z., Yu, D., Bin, L.: Chinese Block Chain Technology and Application Development White Paper. Ministry of Industry and Information Technology, Beijing (2016)
4.
Zurück zum Zitat Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Sebastopol (2015) Swan, M.: Blockchain: Blueprint for a New Economy. O’Reilly Media Inc, Sebastopol (2015)
5.
Zurück zum Zitat Zhao, H., Li, X.F., Zhan, L.K., et al.: Data integrity protection method for icroorganism sampling robots based on blockchain technology. J. Huazhong Univ. Sci. Technol. 43(Z1), 216–219 (2015) Zhao, H., Li, X.F., Zhan, L.K., et al.: Data integrity protection method for icroorganism sampling robots based on blockchain technology. J. Huazhong Univ. Sci. Technol. 43(Z1), 216–219 (2015)
6.
Zurück zum Zitat Swan, M.: Block chain thinking: the brain as a decentralized auto nomous corporation. IEEE Technol. Soc. Mag. 34(4), 41–52 (2015)CrossRef Swan, M.: Block chain thinking: the brain as a decentralized auto nomous corporation. IEEE Technol. Soc. Mag. 34(4), 41–52 (2015)CrossRef
7.
Zurück zum Zitat Godsiff, P.: Bitcoin: bubble or blockchain. In: The 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KESAMSTA), vol. 38, pp. 191–203 (2015) Godsiff, P.: Bitcoin: bubble or blockchain. In: The 9th KES International Conference on Agent and Multi-Agent Systems: Technologies and Applications (KESAMSTA), vol. 38, pp. 191–203 (2015)
8.
Zurück zum Zitat Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: The 9th International Conference on Network and System Security, New York, pp. 358–379 (2015) Wilson, D., Ateniese, G.: From pretty good to great: enhancing PGP using Bitcoin and the blockchain. In: The 9th International Conference on Network and System Security, New York, pp. 358–379 (2015)
9.
Zurück zum Zitat Kypriotaki, K.N., Zamani, E.D., Giaglis, G.M.: From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networks and block chains. In: The 17th International Conference on Enterprise Information Systems (ICEIS2015), pp. 280–290 (2015) Kypriotaki, K.N., Zamani, E.D., Giaglis, G.M.: From Bitcoin to decentralized autonomous corporations: extending the application scope of decentralized peer-to-peer networks and block chains. In: The 17th International Conference on Enterprise Information Systems (ICEIS2015), pp. 280–290 (2015)
10.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefMATH Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefMATH
11.
12.
Zurück zum Zitat International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things (2005) International Telecommunication Union. ITU Internet Reports 2005: The Internet of Things (2005)
13.
Zurück zum Zitat Petrovic, D., Shah, R.C., Ramchandran, K.: Data funneling: routing with aggregation and compression for wireless sensor networks. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA’03). Seattle, USA, pp. 140–168 (2003) Petrovic, D., Shah, R.C., Ramchandran, K.: Data funneling: routing with aggregation and compression for wireless sensor networks. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA’03). Seattle, USA, pp. 140–168 (2003)
14.
Zurück zum Zitat Yuan, Y., Kam, M.: Distributed decision fusion with a random access channel for sensor network applications. IEEE Trans. Instrum. Meas. 53(4), 1239–1320 (2004)CrossRef Yuan, Y., Kam, M.: Distributed decision fusion with a random access channel for sensor network applications. IEEE Trans. Instrum. Meas. 53(4), 1239–1320 (2004)CrossRef
15.
Zurück zum Zitat Tan, H., Korpeoglu, I.: Power efficient data gathering and aggregation in wireless sensor networks. ACM SIGMOD Record 32(4), 50–89 (2003)CrossRef Tan, H., Korpeoglu, I.: Power efficient data gathering and aggregation in wireless sensor networks. ACM SIGMOD Record 32(4), 50–89 (2003)CrossRef
16.
Zurück zum Zitat Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania (1980) Anderson, J.P. Computer security threat monitoring and surveillance. Technical Report, James P Anderson Co., Fort Washington, Pennsylvania (1980)
17.
Zurück zum Zitat Denning, D.E.: An intrusion -detection model. IEEE Trans. Softw. Eng. 13(2), 220–235 (1987) Denning, D.E.: An intrusion -detection model. IEEE Trans. Softw. Eng. 13(2), 220–235 (1987)
20.
Zurück zum Zitat Desai, A.S., Gaikwad, D.P.: Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA. In: 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), pp. 291–294 (2016) Desai, A.S., Gaikwad, D.P.: Real time hybrid intrusion detection system using signature matching algorithm and fuzzy-GA. In: 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology (ICAECCT), pp. 291–294 (2016)
21.
Zurück zum Zitat Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)CrossRef Aburomman, A.A., Reaz, M.B.I.: A novel SVM-kNN-PSO ensemble method for intrusion detection system. Appl. Soft Comput. 38, 360–372 (2016)CrossRef
23.
Zurück zum Zitat Anwar, S., Mohamad Zain, J., Zolkipli, M.F., Inayat, Z., Khan, S., Anthony, B., Chang, V.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10(2), 39 (2017)CrossRef Anwar, S., Mohamad Zain, J., Zolkipli, M.F., Inayat, Z., Khan, S., Anthony, B., Chang, V.: From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms 10(2), 39 (2017)CrossRef
24.
Zurück zum Zitat Haider, W., Hu, J., Slay, J., Turnbull, B.P., Xie, Y.: Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87, 185–192 (2017)CrossRef Haider, W., Hu, J., Slay, J., Turnbull, B.P., Xie, Y.: Generating realistic intrusion detection system dataset based on fuzzy qualitative modeling. J. Netw. Comput. Appl. 87, 185–192 (2017)CrossRef
25.
Zurück zum Zitat Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143–1153 (2017)CrossRef Sedjelmaci, H., Senouci, S.M., Ansari, N.: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: a Bayesian game-theoretic methodology. IEEE Trans. Intell. Transp. Syst. 18(5), 1143–1153 (2017)CrossRef
27.
Zurück zum Zitat Bostani, H., Sheikhan, M.: Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept. Pattern Recogn. 62, 56–72 (2017)CrossRef Bostani, H., Sheikhan, M.: Modification of supervised OPF-based intrusion detection systems using unsupervised learning and social network concept. Pattern Recogn. 62, 56–72 (2017)CrossRef
29.
Zurück zum Zitat Wang, H., Wang, J.: An effective image representation method using kernel classification. In: IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 853–858 (2014) Wang, H., Wang, J.: An effective image representation method using kernel classification. In: IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI), pp. 853–858 (2014)
30.
Zurück zum Zitat Nair, R., Nayak, C., Watkins, L., Fairbanks, K.D., Memon, K., Wang, P., Robinson, W.H.: The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system. In: Cybersecurity for Industry 4.0, pp. 195–223. Springer, New York (2017) Nair, R., Nayak, C., Watkins, L., Fairbanks, K.D., Memon, K., Wang, P., Robinson, W.H.: The resource usage viewpoint of industrial control system security: an inference-based intrusion detection system. In: Cybersecurity for Industry 4.0, pp. 195–223. Springer, New York (2017)
31.
Zurück zum Zitat Dhillon, H.S., Huang, H., Viswanathan, H.: Wide-area wireless communication challenges for the Internet of Things. IEEE Commun. Mag. 55(2), 168–174 (2017)CrossRef Dhillon, H.S., Huang, H., Viswanathan, H.: Wide-area wireless communication challenges for the Internet of Things. IEEE Commun. Mag. 55(2), 168–174 (2017)CrossRef
32.
Zurück zum Zitat Pramudianto, F., Eisenhauer, M., Kamienski, C.A., Sadok, D. and Souto, E.J.: Connecting the internet of things rapidly through a model driven approach. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 135–140 (2016) Pramudianto, F., Eisenhauer, M., Kamienski, C.A., Sadok, D. and Souto, E.J.: Connecting the internet of things rapidly through a model driven approach. In: IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 135–140 (2016)
33.
Zurück zum Zitat Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 1–16 (2018) Deng, L., Li, D., Yao, X., Cox, D., Wang, H.: Mobile network intrusion detection for IoT system based on transfer learning algorithm. Clust. Comput. 1–16 (2018)
34.
Zurück zum Zitat Li, D., Deng, L., Gupta, B.B., Wang, H., Choi, C.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. (2018) Li, D., Deng, L., Gupta, B.B., Wang, H., Choi, C.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. (2018)
Metadaten
Titel
RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment
verfasst von
Daming Li
Zhiming Cai
Lianbing Deng
Xiang Yao
Harry Haoxiang Wang
Publikationsdatum
30.03.2018
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2516-1

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe