Journal on Communications ›› 2018, Vol. 39 ›› Issue (8): 185-198.doi: 10.11959/j.issn.1000-436x.2018138
• Papers • Previous Articles
Zuan WANG1,2,3,Youliang TIAN1,2,3(),Qiuxian LI1,2,3,Xinhuan YANG1,2,3
Revised:
2018-07-20
Online:
2018-08-01
Published:
2018-09-13
Supported by:
CLC Number:
Zuan WANG,Youliang TIAN,Qiuxian LI,Xinhuan YANG. Proof of work algorithm based on credit model[J]. Journal on Communications, 2018, 39(8): 185-198.
"
一级指标 | 二级指标 | 指标解释 | 属性值性质 |
coin age | 交易金额乘以其代币存在于钱包中的时间 | 近似正态分布 | |
节点账户的财务能力 | |||
虚拟货币流动比率 | 账户中支出、收入的虚拟货币之和与时间的比值 | 近似正态分布 | |
网络延时时间段 | 将节点网络延时的时间分成各个时间段 | 离散 | |
节点离线次数段 | 将节点离线的次数分成各个次数段 | 离散 | |
节点的性能 | 节点离线时间段 | 将节点离线的时间分成各个时间段 | 离散 |
节点获取搜索空间次数段 | 将节点获取nonce值搜索空间的次数分成各个次数段,即节点算力的等级 | 离散 | |
节点加入网络时间段 | 将节点加入网络的时间分成各个时间段 | 离散 | |
节点提供分叉区块次数段 | 将节点提供分叉区块的次数分成各个次数段 | 离散 | |
节点的诚信水平 | |||
是否提供无效区块 | 略 | 离散 | |
节点上一轮的信用度 | 略 | 近似正态分布 |
"
网络延时时间段 | 节点离线次数段 | 节点离线时间段 | 节点获取搜索空间次数段 | 节点加入网络时间段 | 节点提供分叉区块次数段 | 节点是否提供无效区块 | |||||||
区间/ms | 积分 | 区间 | 积分 | 区间/h | 积分 | 区间 | 积分 | 区间/h | 积分 | 区间 | 积分 | 区间 | 积分 |
(0,30] | 12 | 0 | 12 | (0,0.5] | 11 | (1000,+∞] | 12 | (72,+∞] | 11 | 0,1] | 11 | 是 | 1 |
(30,50] | 8 | (0,2] | 8 | (0.5,2] | 8 | (800,1000] | 8 | (24,72] | 8 | (1,3] | 8 | 否 | 6 |
(50,80] | 6 | (2,5] | 6 | (2,24] | 4 | (400,800] | 6 | (12,24] | 4 | (3,5] | 4 | ||
(80,100] | 4 | (5,8] | 4 | (24,+∞] | 1 | (100,400] | 4 | (0,12] | 1 | (5,8] | 2 | ||
(100,+∞) | 2 | (8,+∞] | 2 | (0,100] | 2 | (8,+∞] | 1 |
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008. |
[2] | MCCONAGHY T , MARQUES R , MüLLER A ,et al. BigchainDB:a scalable blockchain database[R]. White Paper,BigChainDB, 2016. |
[3] | ZYSKIND G , NATHAN O A . Decentralizing privacy:using blockchain to protect personal data[C]// IEEE Security and Privacy Workshops. 2015: 180-184. |
[4] | STOLZ D , WATTENHOFER R . Byzantine agreement with median validity[C]// 19th International Conference on Priniciples of Distributed Systems (OPODIS). 2015. |
[5] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002,20(4): 398-461. |
[6] | CASTRO M , LISKOV B . Practical byzantine fault tolerance[C]// The Third Symposium on Operating Systems Design and Implementation. 1999: 173-186. |
[7] | 范捷, 易乐天, 舒继武 . 拜占庭系统技术研究综述[J]. 软件学报, 2013,24(6): 1346-1360. |
FAN J , YI L T , SHU J W . Research on the technologies of Byzantine system[J]. Journal of Software, 2013,24(6): 1346-1360. | |
[8] | 唐长兵, 杨珍, 郑忠龙 ,等. PoW 共识算法中的博弈困境分析与优化[J]. 自动化学报, 2017,43(9): 1520-1531. |
TANG C B , YANG Z , ZHENG Z L ,et al. Game dilemma analysis and optimization of PoW consensus algorithm[J]. Acta Automatica Sinica, 2017,43(9): 1520-1531. | |
[9] | LAMPORT L . Paxos made simple[J]. ACM Sigact News, 2001,32(4): 18-25. |
[10] | KING S , NADAL S . PPCoin:peer-to-peer crypto-currency with proof-of-stake[J]. 2001. |
[11] | LARIMER D . Delegated proof-of-stake[R]. White Paper, 2014. |
[12] | BENTOV I , LEE C , MIZRAHI A ,et al. Proof of activity:extending bitcoin0s proof of work via proof of stake[J]. ACM Sigmetrics Performance Evaluation Review, 2014,42(3): 34-37. |
[13] | ROSENFELD M . Analysis of bitcoin pooled mining reward systems[J]. Computer Science, 2011. |
[14] | ANDREAS M . Antonopoulos.mastering bitcoin[M]. O’Reilly Media, 2014. |
[15] | DING S F , JIA W K , SU C Y ,et al. An improved BP neural network algorithm based on factor analysis[J]. Journal of Convergence Information Technology, 2010,5(4): 103-108. |
[16] | MA Y X , WANG S G . The application of artificial neural network in the forecasting on incidence of a disease[C]// International Conference on Biomedical Engineering and Informatics. 2010: 1269-1272. |
[17] | JIN W , LI Z J , WEI L S ,et al. The improvements of BP neural network learning algorithm[C]// International Conference on Signal Processing Proceedings. 2002: 1647-1649. |
[18] | BERMAN P , GARAY J A , PERRY K J . Towards optimal distributed consensus[C]// Symposium on Foundations of Computer Science. 1989: 410-415. |
[19] | RAHBARI A N , OJHA U , ZHANG Z ,et al. Incremental welfare consensus algorithm for cooperative distributed generation/demand response in smart grid[J]. IEEE Transactions on Smart Grid, 2017,5(6): 2836-2845. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[4] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[5] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[6] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[7] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[8] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[9] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[10] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[11] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[12] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[13] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[14] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
[15] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|