Research Article

Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain

Table 1

Mapping of identified limitations with proposed solutions and validations.

Limitations identifiedSolutions proposedValidations done

L1: PoW utilizes high computational power [10].S.1: PoA is used that utilizes low computational power.V.1: transaction cost, as shown in Figure 6

L2: presence of MN in the network [29]S.2, S.3: GA-SVM and GA-DT are used for the detection of MNs.V.2, V.3: accuracy, precision, PDR, PMR, PdR, and PMiR, as shown in Figures 3(a) and 3(b), 4(a) and 4(b), and 5(a) and 5(b)
L3: grayhole attack is possible on routing nodes [7].

L4: long paths deplete nodes’ energy [14].S.4: the Dijkstra algorithm is used to find the shortest path.V.4: distance from source to destination is calculated, as shown in Figure 5.

L5: registration consumes more gas due to hybrid blockchain [14].S.5: lightweight registration and authentication mechanismsV.5: transaction cost, as shown Figure 6