Blockchain-Based Distributed Network Security Architecture with Smart Contract Vulnerability Detection Using Improved Tree CNN

Xiaoyan Huo

Abstract


In the era of big data, information security and privacy protection have become important issues facing today's society. This study proposes a distributed network security architecture based on blockchain to enhance the security of information privacy protection. The proposed architecture consists of three primary levels: equipment layer, network service layer, and application layer. It also integrates smart contracts. In addition, this study also proposes a vulnerability detection method based on improved tree convolutional neural networks. The incorporation of a "continuous binary tree" approach effectively addresses the limitation inherent to conventional tree convolution, wherein the number of nodes is fixed. This refinement enables a more effective capture of the hierarchical structure and semantic nuances inherent to smart contract code. The experiment used multiple datasets, each containing multiple IoT attack types and smart contract vulnerability code snippets. These datasets were evaluated based on a set of criteria, including but not limited to accuracy, recall, F1 scores, gas costs, and execution delays. Experiments have shown that the proposed method performs well in accuracy, precision, recall, and F1 scores compared to existing state-of-the-art methods, with an accuracy range of 89.62% to 98.36%, significantly better than Oyente (about 75%) and Securify (about 85%). Specifically, the proposed method achieved 96.14% accuracy in detecting reentrant attacks, compared to 78% for Oyente and 82% for Securify. The findings indicate that the architectural design exerts a substantial influence on enhancing network security performance, thereby ensuring the stability of the system by effectively mitigating the variability in response time.


Full Text:

PDF

References


References

Cui S, Wang H. Blockchain-based data sharing algorithm in distributed network data storage. Journal of Computational Methods in Sciences and Engineering, 2024, 24(1): 427-444.

Firdaus M, Larasati H T, Rhee K H. A Blockchain-Assisted Distributed Edge Intelligence for Privacy-Preserving Vehicular Networks. Computers, Materials & Continua, 2023, 76(3): 2959-2978.

Zhang T, Yang J, Jin K, Jing T. Local power consumption method of distributed photovoltaic generation in rural distribution network based on blockchain. IET Generation, Transmission & Distribution, 2023, 17(6): 1409-1418.

El Ghazouani M, Ikidid A, Zaouiat C A, Aziz L, Lachgar M, Er-Rajy L. A Blockchain-based Method Ensuring Integrity of Shared Data in a Distributed-Control Intersection Network. International Journal of Advanced Computer Science and Applications, 2023, 14(10): 489-497.

Fkaier S, Khalgui M, Frey G, et al. Secure distributed power trading protocol for networked microgrids based on blockchain and elliptic curve cryptography. IET Smart Grid, 2023, 6(2): 175-189.

Sharmila B, Kalavathi Devi T. Theil-Sen Regressive Miyaguchi–Preneel-based Cryptographic Hash Blockchain for Secure Data Transmission Using Remote Sensing Data in IoT. IETE Journal of Research, 2024, 70(1): 116-129.

Haque S M U, Sofi S A, Sholla S. A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system. Multimedia Tools and Applications, 2024, 83(36): 84299-84329.

Rangappa J D, Manu A P, Kariyappa S, Chinnababu S K, Lokesh G H, Flammini F. A Lightweight Blockchain to Secure Data Communication in IoT Network on Healthcare System. International Journal of Safety & Security Engineering, 2023, 13(6): 1015-1024.

Kumar R, Kumar P, Aloqaily M. Deep-learning-based blockchain for secure zero touch networks. IEEE Communications Magazine, 2022, 61(2): 96-102.

Hua Z, Yao Y, Song M, Zheng Y, Zhang Y, Wang C. Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service. IEEE Transactions on Services Computing, 2024, 17(3): 821-835.

Xie J, Zhang Z, Atapattu S, Ye Y, Zhang H. Optimal secure channel access in distributed cooperative networks with untrusted relay. IEEE Wireless Communications Letters, 2023, 12(6): 1091-1095.

Liu Q, Ye M, Chen F. Secure distributed estimation over multitask networks against multiple attacks. IEEE Transactions on Aerospace and Electronic Systems, 2022, 59(3): 2480-2493.

Luo Y, Li Q, Mao H K. Distributed information-theoretical secure protocols for quantum key distribution networks against malicious nodes. Journal of Optical Communications and Networking, 2024, 16(10): 956-968.

Thangam S, Chakkaravarthy S S. An Edge Enabled Region-oriented DAG-based Distributed Ledger System for Secure V2X Communication. KSII Transactions on Internet and Information Systems, 2024, 18(8): 2253-2280.

Mahdi Z, Abdalhussien N, Mahmood N, Zaki R. Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms. Computers, Materials & Continua, 2024, 80(8): 2139-2159

Sharma R K, Pippal R S. Blockchain based Efficient and Secure Peer-to-Peer Distributed IoT Network for Non-Trusting Device-to-Device Communication. Informatica, 2023, 47(4): 515-522.

Lyu Z, Cheng C, Lv H, Song H. Blockchain Based Intelligent Resource Management in Distributed Digital Twins Cloud. IEEE Network, 2023, 38(4): 143-150.

Wu W, Yu L, Yang L, Zhang Y, Wang P. Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network. Computers, Materials & Continua, 2024, 80(7): 587-603.

Singh U, Sharma S K, Shukla M, Jha P. Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm. International Journal of Information Security, 2024, 23(3): 1667-1677.

Miglani A, Kumar N. A blockchain based matching game for content sharing in content-centric vehicle-to-grid network scenarios. IEEE Transactions on Intelligent Transportation Systems, 2023, 25(5): 4032-4048.




DOI: https://doi.org/10.31449/inf.v49i17.8050

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.