International Journal of Big Data Intelligent Technology, 2026, 7(1); doi: 10.38007/IJBDIT.2026.0701113.
Ziyi Huang
School of Public Security Information Technology and Intelligence, China Criminal Police University, Shenyang, Liaoning, China
Communication network security not only continuously provides convenience for humans, but also creates security risks due to the open and intelligent nature of the network. The purpose of this article is to use blockchain technology (BCT for short here) to solve the problem of communication network security being invaded, and analyze this for network security on the blockchain through consensus mechanisms. After introducing the methods of consensus mechanisms such as Proof of Work (POW), Proof of Stake (POS), and PBFT (Practical Byzantine Fault Tolerance), this article mainly conducted experimental discussions on the PBFT consensus mechanism. Finally, this article concluded that comparing PBFT with TBFT (Tencent Byzantine Fault Tolerance), the improvement space of TBFT still needs to be improved. After the methods of these consensus mechanisms, experimental analysis was mainly conducted for the PBFT consensus mechanism. The average time for generating experiments was 0.027 ms, and the average time for verifying experiments was 0.002 ms. Finally, it can be concluded that comparing PBFT with TBFT in this article, the improvement space of PBFT still needs to be improved.
Blockchain Technology, Communication Network, Intrusion Detection, Consensus Mechanism
Ziyi Huang. Blockchain Based Communication Network Security Intrusion Detection Data. International Journal of Big Data Intelligent Technology (2026), Vol. 7, Issue 1: 102-113. https://doi.org/10.38007/IJBDIT.2026.0701113.
[1] Belchior R, Vasconcelos A, Guerreiro S. A survey on blockchain interoperability: Past, present, and future trends. ACM Computing Surveys (CSUR), 2021, 54(8): 1-41.
[2] Morkunas V J, Paschen J, Boon E. How blockchain technologies impact your business model. Business Horizons, 2019, 62(3): 295-306.
[3] Chaabouni N, Mosbah M, Zemmari A. Network intrusion detection for IoT security based on learning techniques. IEEE Communications Surveys & Tutorials, 2019, 21(3): 2671-2701.
[4] Wang H, Cao Z, Hong B. A network intrusion detection system based on convolutional neural network. Journal of Intelligent & Fuzzy Systems, 2020, 38(6): 7623-7637.
[5] Sedlmeir J, Buhl H U, Fridgen G. The energy consumption of blockchain technology: Beyond myth. Business & Information Systems Engineering, 2020, 62(6): 599-608.
[6] Taylor P J, Dargahi T, Dehghantanha A. A systematic literature review of blockchain cyber security. Digital Communications and Networks, 2020, 6(2): 147-156.
[7] Bhaskar P, Tiwari C K, Joshi A. Blockchain in education management: present and future applications. Interactive Technology and Smart Education, 2021, 18(1): 1-17.
[8] Haislip J, Lim J H, Pinsker R. The impact of executives’ IT expertise on reported data security breaches. Information Systems Research, 2021, 32(2): 318-334.
[9] Shen M, Tang X, Zhu L. Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities. IEEE Internet of Things Journal, 2019, 6(5): 7702-7712.
[10] Zhang J. Interaction design research based on large data rule mining and blockchain communication technology. Soft Computing, 2020, 24(21): 16593-16604.
[11] Huang J, Kong L, Chen G. Towards secure industrial IoT: Blockchain system with credit-based consensus mechanism. IEEE Transactions on Industrial Informatics, 2019, 15(6): 3680-3689.
[12] Cao B, Zhang Z, Feng D. Performance analysis and comparison of PoW, PoS and DAG based blockchains. Digital Communications and Networks, 2020, 6(4): 480-485.
[13] Gao S, Yu T, Zhu J. T-PBFT: An EigenTrust-based practical Byzantine fault tolerance consensus algorithm. China Communications, 2019, 16(12): 111-123.
[14] Yao H, Mai T, Wang J. Resource trading in blockchain-based industrial Internet of Things. IEEE Transactions on Industrial Informatics, 2019, 15(6): 3602-3609.
[15] Yoo S. A study on consensus algorithm based on Blockchain. The Journal of The Institute of Internet, Broadcasting and Communication, 2019, 19(3): 25-32.