Towards Intent-Based Network Management: Intent-Optimized Cross-Shard Transactions and Malicious Node Detection in Blockchain System


Nie J., Li H., Li Y., Zhao J., ERCİŞLİ S., Fang K., ...Daha Fazla

IEEE Internet of Things Journal, 2025 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Basım Tarihi: 2025
  • Doi Numarası: 10.1109/jiot.2025.3601827
  • Dergi Adı: IEEE Internet of Things Journal
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, ABI/INFORM, Compendex, INSPEC
  • Anahtar Kelimeler: Cross-shard Transaction, Intent Based Networking, Malicious Node Detection, Network ManagementCBlockchain shading
  • Atatürk Üniversitesi Adresli: Evet

Özet

The proliferation of IoT devices has limited the efficiency of heterogeneous data communication in distributed environments and increased security risks. Balancing scalability, efficiency and data privacy in IoT transaction systems becomes critical, and intent-based networks enable optimal configuration with minimal intervention. To optimize the network management environment, we propose a three-stage execution scheme for blockchain cross-shard transactions, which combined with a timeout rollback mechanism ensures atomicity and reduces latency. In addition, we design a fragment-based consensus protocol utilizing a verifiable random function, which improves the consensus efficiency through the randomness of committee member selection. In order to enhance system security, we introduce a reputation evaluation mechanism and a malicious node detection method based on normalized entropy. The mechanism dynamically adjusts the reputation value of a node according to its performance in the consensus process, so that high-reputation nodes can play a greater role in the consensus and detect malicious nodes in the network accordingly. By embedding this mechanism into a network management framework based on users’ intention, it can accurately realize users’ expectations for network performance optimization, security enhancement and efficient operation. Experiments show that our scheme not only improves communication efficiency, but also enhances the security of sharded transactions, effectively matching users’ high-level intentions for network scalability, efficiency, and data privacy.