物联网中安全和可扩展的信任管理:基于分层区块链的方法

IF 4.9 3区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE
Elham Meybodian , Seyedakbar Mostafavi , Tooska Dargahi , Vahid Ranjbar Bafghi
{"title":"物联网中安全和可扩展的信任管理:基于分层区块链的方法","authors":"Elham Meybodian ,&nbsp;Seyedakbar Mostafavi ,&nbsp;Tooska Dargahi ,&nbsp;Vahid Ranjbar Bafghi","doi":"10.1016/j.compeleceng.2025.110631","DOIUrl":null,"url":null,"abstract":"<div><div>The diverse and resource-constrained nature of Internet of Things (IoT) devices make them vulnerable against various security attacks. Effective trust management within the IoT ecosystem is crucial for reliable data collection and sharing, as well as the detection of malicious nodes. Centralized trust management methods are inefficient due to several challenges, including single point of attack/failure, unauthorized manipulation of trust data, resource limitations of smart devices, and scalability issues. Blockchain technology provides a suitable solution for trust management due to its decentralization, transparency, and immutability features. However, deploying blockchain for IoT devices is not simple due to the low performance and high computational costs of consensus algorithms, limited resources of smart devices, and the large volume of transactions created by nodes. In this paper, a hierarchical trust management approach based on blockchain is proposed. The proposed approach evaluates each node’s reputation and organizational trust at both intra-organizational and inter-organizational levels. At the internal level, a lightweight blockchain is used to evaluate and store the trust score of the nodes. At the inter-organizational level, interactions between organizations and their trust level are recorded in the public blockchain. Two methods are proposed, i.e. probing-based and evidence-based, for evaluating the reputation of each node and the trust level of each organization. The evaluation results show that with a maximum of 35% malicious nodes within an organization, the proposed method can correctly identify the malicious and honest nodes. The recall and specificity measures obtained are both greater than 0.9. Additionally, organizations with more than 35% of malicious nodes are blacklisted and suspended.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"127 ","pages":"Article 110631"},"PeriodicalIF":4.9000,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure and scalable trust management in IoT: A hierarchical blockchain-based approach\",\"authors\":\"Elham Meybodian ,&nbsp;Seyedakbar Mostafavi ,&nbsp;Tooska Dargahi ,&nbsp;Vahid Ranjbar Bafghi\",\"doi\":\"10.1016/j.compeleceng.2025.110631\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The diverse and resource-constrained nature of Internet of Things (IoT) devices make them vulnerable against various security attacks. Effective trust management within the IoT ecosystem is crucial for reliable data collection and sharing, as well as the detection of malicious nodes. Centralized trust management methods are inefficient due to several challenges, including single point of attack/failure, unauthorized manipulation of trust data, resource limitations of smart devices, and scalability issues. Blockchain technology provides a suitable solution for trust management due to its decentralization, transparency, and immutability features. However, deploying blockchain for IoT devices is not simple due to the low performance and high computational costs of consensus algorithms, limited resources of smart devices, and the large volume of transactions created by nodes. In this paper, a hierarchical trust management approach based on blockchain is proposed. The proposed approach evaluates each node’s reputation and organizational trust at both intra-organizational and inter-organizational levels. At the internal level, a lightweight blockchain is used to evaluate and store the trust score of the nodes. At the inter-organizational level, interactions between organizations and their trust level are recorded in the public blockchain. Two methods are proposed, i.e. probing-based and evidence-based, for evaluating the reputation of each node and the trust level of each organization. The evaluation results show that with a maximum of 35% malicious nodes within an organization, the proposed method can correctly identify the malicious and honest nodes. The recall and specificity measures obtained are both greater than 0.9. Additionally, organizations with more than 35% of malicious nodes are blacklisted and suspended.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"127 \",\"pages\":\"Article 110631\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2025-08-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625005749\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625005749","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)设备的多样性和资源有限性使其容易受到各种安全攻击。物联网生态系统中有效的信任管理对于可靠的数据收集和共享以及恶意节点的检测至关重要。集中式信任管理方法由于以下几个挑战而效率低下,包括单点攻击/故障、未经授权的信任数据操作、智能设备的资源限制和可伸缩性问题。区块链技术以其去中心化、透明性和不变性等特点,为信任管理提供了合适的解决方案。然而,由于共识算法的低性能和高计算成本,智能设备的资源有限,以及节点产生的大量交易,在物联网设备上部署区块链并不简单。本文提出了一种基于区块链的分层信任管理方法。该方法在组织内部和组织间两个层面评估每个节点的声誉和组织信任。在内部级别,使用轻量级区块链来评估和存储节点的信任分数。在组织间级别,组织之间的交互及其信任级别记录在公共bb0中。提出了基于探测和基于证据的两种方法来评估每个节点的声誉和每个组织的信任水平。评估结果表明,在组织内恶意节点不超过35%的情况下,该方法可以正确识别出恶意节点和诚实节点。获得的召回率和特异性测量值均大于0.9。此外,拥有超过35%恶意节点的组织将被列入黑名单并被暂停。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Secure and scalable trust management in IoT: A hierarchical blockchain-based approach
The diverse and resource-constrained nature of Internet of Things (IoT) devices make them vulnerable against various security attacks. Effective trust management within the IoT ecosystem is crucial for reliable data collection and sharing, as well as the detection of malicious nodes. Centralized trust management methods are inefficient due to several challenges, including single point of attack/failure, unauthorized manipulation of trust data, resource limitations of smart devices, and scalability issues. Blockchain technology provides a suitable solution for trust management due to its decentralization, transparency, and immutability features. However, deploying blockchain for IoT devices is not simple due to the low performance and high computational costs of consensus algorithms, limited resources of smart devices, and the large volume of transactions created by nodes. In this paper, a hierarchical trust management approach based on blockchain is proposed. The proposed approach evaluates each node’s reputation and organizational trust at both intra-organizational and inter-organizational levels. At the internal level, a lightweight blockchain is used to evaluate and store the trust score of the nodes. At the inter-organizational level, interactions between organizations and their trust level are recorded in the public blockchain. Two methods are proposed, i.e. probing-based and evidence-based, for evaluating the reputation of each node and the trust level of each organization. The evaluation results show that with a maximum of 35% malicious nodes within an organization, the proposed method can correctly identify the malicious and honest nodes. The recall and specificity measures obtained are both greater than 0.9. Additionally, organizations with more than 35% of malicious nodes are blacklisted and suspended.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Electrical Engineering
Computers & Electrical Engineering 工程技术-工程:电子与电气
CiteScore
9.20
自引率
7.00%
发文量
661
审稿时长
47 days
期刊介绍: The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency. Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信