Breakthroughs in Blockchain Technology: Functional Neural Networks Security Model for Permissionless Proof-of-Stake Blockchains against Benign Nodes

Authors

  • Tamara Al-khalifah Engineering of Computer Techniques Department, University of Kut, Kut, Iraq Author

DOI:

https://doi.org/10.59675/E411

Abstract

Permissionless Proof-of-Stake (PoS) blockchain networks must demonstrate security and dependability as blockchain technology evolves. This research analyzes the ongoing need for a way to identify and eradicate rogue nodes inside such networks, also to advocate for the real-time rogue node’s identification in PoS blockchain networks by the application of neural network methodologies, particularly random neural networks. Experimental results indicate the ability of the developed model in differentiating legitimate blockchain nodes from malicious ones. The dataset in this paper is divided into two groups- malicious (Permissionless Proof-Of-Stake Blockchains) and non-malicious; this dataset is crucial for anyone interested in blockchain. The dataset includes details of the creation and validation of the PoS blocks. The paper aims to detect malicious nodes, analyze node behavior, and enhance security on PoS permissionless blockchains through data visualization. This paper shows the performance and process of the random neural network to refine and learn and then recognize the permissionless blockchain (malicious nodes) from the dataset of Proof-of-Stake Blockchain. We selected 100 records from the original dataset to examine them with our proposal. After analyzing the results, we found clearly how the proposal algorithm works properly with the proposed dataset to achieve fine accuracy and efficiency in the work to distinguish benign nodes from malicious (permission-less blockchain) nodes. This is the result of refining and learning the dataset using the random neural network for 340 instances, coming from the neural learning of 100 instances and 21 variables: [15 features: BlockHeight, UnixTimestamp, TxnFee (ETH), Block Generation Rate, TxnFee (Binary), Status (Tags), Stake Reward, Txnsize, Coin Days, Coin Age, Coin Stake, Stake Distribution Rate, Block Density, Block Score, Coin Day Weight) + 5 meta (node label, neural network, neural network0, neural network1, fold, selected) + no missing value), by two attributes: (node label, block score), two classes(0 non-malicious nodes,1 malicious nodes).

References

Anthony NT, Shafik M, Atlam HF. An effective MLP model for detecting malicious nodes in PoS permissionless blockchains. MATEC Web Conf. 2024; 401:10003. doi:10.1051/matecconf/202440110003.

Han HC, Huang DC. The blockchain neural network superior to deep learning for improving the trust of supply chain. Comput Model Eng Sci. 2025;143(3):3921–3941. doi:10.32604/cmes.2025.065627.

Apiecionek Ł, Karbowski P. Fuzzy neural network for detecting anomalies in blockchain transactions. Electronics. 2024;13(23). doi:10.3390/electronics13234646.

Serrano W. The BlockChain neural network: neuron as a service. In: Proc Int Jt Conf Neural Networks (IJCNN). 2020. doi:10.1109/IJCNN48605.2020.9207267.

Abdo JB, Zeadally S. Neural network-based blockchain decision scheme. Inf Secur J. 2021;30(3):173–187. doi:10.1080/19393555.2020.1831658.

Taylor OE. Deep learning-based detection of malicious nodes in PoS permissionless blockchains. Int J Comput Sci Manag Technol. 2025;11. doi: 10.56201/ijcsmt.vol.11.no7.2025.pg25.38.

Mohamed TS, Aydin S, Alkhayyat A, Malik RQ. Kalman and Cauchy clustering for anomaly detection-based authentication of IoMTs using extreme learning machine. 2022:1–14. doi:10.1049/cmu2.12467.

Sapkota S, Hu Y, Gill A, Hussain FK. DeepChainIoT: exploring the mutual enhancement of blockchain and deep neural networks (DNN) in the Internet of Things (IoT). Preprints. 2025:0–34. doi:10.20944/preprints202507.0645.v1.

Mansour RF. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Sci Rep. 2022;12(1):1–14. doi:10.1038/s41598-022-17043-z.

Hisham S, Makhtar M, Aziz AA. A comprehensive review of significant learning for anomalous transaction detection using a machine learning method in a decentralized blockchain network. Int J Adv Technol Eng Explor. 2022;9(95):1366–1396. doi:10.19101/IJATEE.2021.876322.

Agarwal R, Barve S, Shukla SK. Detecting malicious accounts in permissionless blockchains using temporal graph properties. Appl Netw Sci. 2021;6(1). doi:10.1007/s41109-020-00338-3.

Wang J. A proof of contribution in blockchain using game theoretical deep learning model. arXiv. 2024:1–11. doi:10.48550/arXiv.2409.07460.

Ghaleb FA, Ali W, Al-Rimy BAS, Malebary SJ. Intelligent proof-of-trustworthiness-based secure safety message dissemination scheme for vehicular ad hoc networks using blockchain and deep learning techniques. Mathematics. 2023;11(7). doi:10.3390/math11071704.

Zhu H, Guo Y, Zhang L. An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme. J Inf Secur Appl. 2021;61:102952. doi:10.1016/j.jisa.2021.102952.

Golosova J, Romanovs A. The advantages and disadvantages of the blockchain technology. In: Proc IEEE 6th Workshop Adv Inf Electron Electr Eng (AIEEE). 2018. doi:10.1109/AIEEE.2018.8592253.

Centre for Finance, Technology and Entrepreneurship (CFTE). What is blockchain and how does it work? CFTE Blog [Internet]. Available from: https://blog.cfte.education/what-is-blockchain/

Kuznetsov O, Rusnak A, Yezhov A, Kuznetsova K, Kanonik D, Domin O. Merkle trees in blockchain: a study of collision probability and security implications. Internet Things. 2024;26:101193.

de Ocáriz Borde HS. An overview of trees in blockchain technology: merkle trees and merkle patricia tries. Cambridge (UK): University of Cambridge; 2022.

Sakhipov A, Yermaganbetova M. An educational portal with elements of blockchain technology in higher education institutions of Kazakhstan: opportunities and benefits. Glob J Eng Educ. 2022;24(2):149–154.

Sakhipov A, Baidildinov T, Yermaganbetova M, Ualiyev N. Design of an educational platform for professional development of teachers with elements of blockchain technology. Int J Adv Comput Sci Appl. 2023;14(7).

Ameyaw PD, de Vries WT. Blockchain technology adaptation for land administration services: the importance of socio-cultural elements. Land Use Policy. 2023; 125:106485.

Manu MR, Musthafa N, Balamurugan B, Chauhan R. Blockchain components and concept. In: Blockchain technology and applications. Auerbach Publications; 2020. p. 21–50.

Xu J, Wang C, Jia X. A survey of blockchain consensus protocols. ACM Comput Surv. 2023;55(13s):1–35.

Oyinloye DP, Teh JS, Jamil N, Alawida M. Blockchain consensus: an overview of alternative protocols. Symmetry (Basel). 2021;13(8):1363.

Gangwal A, Gangavalli HR, Thirupathi A. A survey of layer-two blockchain protocols. J Netw Comput Appl. 2023; 209:103539.

Beser NB, Saund S, Lambert P. Neural network consensus using blockchain. Google Patents; 2019.

Saad SMS, Radzi RZRM, Othman SH. Comparative analysis of the blockchain consensus algorithm between proof of stake and delegated proof of stake. In: Proc Int Conf Data Sci Appl (ICoDSA). 2021. p. 175–180. doi:10.1109/ICoDSA53588.2021.9617549.

Shifferaw Y, Lemma S. Limitations of proof of stake algorithm in blockchain: a review. Zede J. 2021;39(1):81–95. Available from: https://www.ajol.info/index.php/zj/article/view/216947

Ali AAMA, Hazar MJ, Mabrouk M, Zrigui M. Proposal of a modified hash algorithm to increase blockchain security. Procedia Comput Sci. 2023; 225:3265–3275. doi: 10.1016/j.procs.2023.10.320.

Andreina S, Bohli J, Li W, Karame GO, Marson GA. PoTS — a secure proof of TEE-stake for permissionless blockchains. IEEE Trans Serv Comput. 2022;15(4). doi:10.1109/TSC.2020.3038950.

Alrowaily MA, Alghamdi M, Alkhazi I, Hassanat AB, Arbab MMS, Liu CZ. Modeling and analysis of proof-based strategies for distributed consensus in blockchain-based peer-to-peer networks. Sustainability. 2023;15(2):1478.

Baig SM, Javed MU, Almogren A, Javaid N, Jamil M. A blockchain and stacked machine learning approach for malicious nodes’ detection in Internet of Things. 2021:1–24.

Saad M, Qin Z, Ren K, Nyang D, Mohaisen D. e-PoS: making proof-of-stake decentralized and fair. IEEE Trans Parallel Distrib Syst. 2021;32(8):1961–1973.

Lee S, Kim JH. Opportunistic block validation for IoT blockchain networks. IEEE Internet Things J. 2023;11(1):666–676.

Leeding KAW. Formal modelling of proof-of-stake blockchain protocols [thesis]. Surrey (UK): University of Surrey; 2024.

Sanda O. Proof-of-stake blockchain dataset. Kaggle; 2022. https://doi.org/10.34740/kaggle/ds/2512864.

Japkowicz N, Shah M. Performance evaluation in machine learning. In: El Naqa I, Li R, Murphy MJ, editors. Machine learning in radiation oncology: theory and applications. Cham: Springer; 2015. p. 41–56. doi:10.1007/978-3-319-18305-3_4.

Published

2026-02-17

Issue

Section

Articles

How to Cite

Al-khalifah, T. (2026). Breakthroughs in Blockchain Technology: Functional Neural Networks Security Model for Permissionless Proof-of-Stake Blockchains against Benign Nodes. Academic International Journal of Engineering Science, 4(01), 01-23. https://doi.org/10.59675/E411