Journal on Communications ›› 2020, Vol. 41 ›› Issue (9): 104-117.doi: 10.11959/j.issn.1000-436x.2020170
Special Issue: 区块链
• Papers • Previous Articles Next Articles
Yingxu LAI1,2,3,Zunxu BO1,Jing LIU1,4
Revised:
2020-07-10
Online:
2020-09-25
Published:
2020-10-12
Supported by:
CLC Number:
Yingxu LAI,Zunxu BO,Jing LIU. Research on sybil attack in defense blockchain based on improved PBFT algorithm[J]. Journal on Communications, 2020, 41(9): 104-117.
"
基本角色 | 定义 |
c | role_ c(c,N0,N1,N2,N3:agent,Kc,Kn0,Kn1,Kn2,Kn3:public_key,SND,RCV:channel(dy)) |
N0 | role_N0(N0,N1,N2,N3:agent,Kc,Kn0,Kn1,Kn2,Kn3:public_key,CNIL0:text,SND,RCV:channel(dy)) |
N1 | role_N1(N0,N1,N2,N3:agent,Kc,Kn0,Kn1,Kn2,Kn3:public_key,CNIL1:text,SND,RCV:channel(dy)) |
N2 | role_N2(N0,N1,N2,N3:agent,Kc,Kn0,Kn1,Kn2,Kn3:public_key,CNIL2:text,SND,RCV:channel(dy)) |
N3 | role_N3(N0,N1,N2,N3:agent,Kc,Kn0,Kn1,Kn2,Kn3:public_key,CNIL3:text,SND,RCV:channel(dy)) |
[17] | LIU M D , CHEN Z N , SHI Y J ,et al. Research progress of blockchain in data security[J]. Chinese Journal of Computers, 2020,43(1): 1-28. |
[18] | 王海勇, 郭凯璇, 潘启青 . 基于投票机制的拜占庭容错共识算法[J]. 计算机应用, 2019,39(6): 1766-1771. |
WANG H Y , GUO K X , PAN Q Q . Byzantine fault tolerance consensus algorithm based on voting mechanism[J]. Journal of ComputerApplications, 2019,39(6): 1766-1771 | |
[19] | WANG F Y , CAI S S , LIN T C ,et al. Study of blockchains’s consensus mechanism based on credit[J]. IEEE Access, 2019,7: 10224-10231. |
[20] | JIANG Y , LIAN Z . High performance and scalable Byzantine fault tolerance[C]// IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference. Piscataway:IEEE Press, 2019: 1195-1202. |
[21] | MILLER A , XIA Y , CROMAN K ,et al. The honey badger of BFT protocols[C]// Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2016: 31-42. |
[22] | ALEX B , DANIEL F . ReCon:sybil-resistant consensus from reputation[J]. Pervasive and Mobile Computing, 2020,61: 1574-1192. |
[23] | 闵新平, 李庆忠, 孔兰菊 ,等. 许可链多中心动态共识机制[J]. 计算机学报, 2018,41(5): 1005-1020. |
MIN X P , LI Q Z , KONG L J ,et al. Permissioned blockchain dynamic consensus mechanism based multi-centers[J]. Chinese Journal of Computers, 2018,41(5): 1005-1020. | |
[24] | ZHANG X , LIU J , LI Y ,et al. Blockchain based secure package delivery via ridesharing[C]// 2019 11th International Conference on Wireless Communications and Signal Processing. Piscataway:IEEE Press, 2019: 1-6. |
[25] | JANBI N F , RADENKOVIC M . An enhanced Bayesian-based reputation system for P2P file sharing[C]// Proceedings of 2017 Computing Conference. Piscataway:IEEE Press, 2017: 1247-1252. |
[26] | SARAH A , HEBA K , RASHA A ,et al. Authenticpeer++:a trust management system for P2P networks[C]// Proceedings of 11th UKSIM-AMSS European Modelling Symposium on Computer Modeling and Simulation. Piscataway:IEEE Press, 2017: 191-196. |
[27] | GUPTA M , JUDGE P , AMMAR M . A reputation system for peer-to-peer networks[C]// Proceedings of International Workshop on Network & Operating Systems Support for Digital Audio & Video. New York:ACM Press, 2003: 144-152. |
[28] | 黄建华, 夏旭, 李忠诚 ,等. 基于动态授权的信任度证明机制[J]. 软件学报, 2019,30(9): 2593-2607. |
HUANG J H , XIA X , LI Z C ,et al. Proof of trust:a new mechanism of trust degree based on dynamic authorization[J]. Journal of Software, 2019,30(9): 2593-2607. | |
[29] | 刘庆华, 周小燕 . 安全协议的形式化分析方法[J]. 光盘技术, 2008(3): 32-33. |
LIU Q H , ZHOU X Y . The discusses of the formal methods for security protocol verification[J]. CD Technology, 2008(3): 32-33. | |
[30] | 项俊龙, 陈传峰 . 安全协议形式化验证方法综述[J]. 信息安全与通信保密, 2013(5): 52-54. |
[1] | 徐蜜雪, 苑超, 王永娟 ,等. 拟态区块链——区块链安全解决方案[J]. 软件学报, 2019,30(6): 1681-1691. |
XU M X , YUAN C , WANG Y J ,et al. Mimic blockchain—solution to the security of blockchain[J]. Journal of Software, 2019,30(6): 1681-1691. | |
[30] | XIANG J L , CHEN C F . Overview on security protocol formal verification methods[J]. Information Security and Communications Privacy, 2013(5): 52-54. |
[31] | 海沫, 朱建明 . 区块链网络最优传播路径和激励相结合的传播机制[J]. 计算机研究与发展, 2019,56(6): 1205-1218. |
HAI M , ZHU J M . A propagation mechanism combining an optimal propagation path and incentive in blockchain networks[J]. Journal of Computer Research and Development, 2019,56(6): 1205-1218. | |
[32] | LIN Z , LI D , HUANG W . Current security management & ethical[J]. Issues of Information Technology, 2003,PP: 249-266. |
[33] | 赖英旭, 刘岩, 刘静 . 一种网络间可信连接协议[J]. 软件学报, 2019,30(12): 3730-3749. |
LAI Y X , LIU Y , LIU J . Trusted connection protocol between networks[J]. Journal of Software, 2019,30(12): 3730-3749. | |
[2] | DELMOLINO K , ARNETT M , KOSBA A ,et al. Step by step towards creating a safe smart contract:lessons and insights from a cryptocurrency lab[C]// Proceedings of International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2016: 79-94. |
[3] | SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin[C]// International Conference on Financial Cryptography and Data Security. Berlin:Springer, 2016: 515-532. |
[4] | ETHAN H , ALISON K , AVIV Z ,et al. Eclipse attacks on bitcoin’s peer-to-peer network[C]// Proceedings of the 24th USENIX Conference on Security Symposium. Berkeley:USENIX Association, 2015: 129-144. |
[5] | 祝烈煌, 高峰, 沈蒙 ,等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017,54(10): 2170-2186. |
ZHU L H , GAO F , SHEN M ,et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017,54(10): 2170-2186. | |
[6] | 刘怡然, 柯俊明, 蒋瀚 ,等. 基于沙普利值计算的区块链中 PoS 共识机制的改进[J]. 计算机研究与发展, 2018,55(10): 2208-2218. |
LIU Y R , KE J M , JIANG H ,et al. Improvement of the PoS consensus mechanism in blockchain based on Shapley value[J]. Journal of Computer Research and Development, 2018,55(10): 2208-2218. | |
[7] | DOUCEUR J R , . The sybil attack[C]// The First International Workshop on Peer-to-Peer Systems. Berlin:Springer, 2002: 251-260. |
[8] | AL-QURISHI M , AL-RAKHAMI M , ALAMRI A ,et al. sybil defense techniques in online social networks:a survey[J]. IEEE Access, 2017,5: 1200-1219. |
[9] | SHI L , YU S , LOU W ,et al. sybilShield:an agent-aided social network-based sybil defense among multiple communities[C]// Proceedings of 32nd IEEE INFOCOM. Piscataway:IEEE Press, 2013: 1034-1042. |
[10] | KRISHNAVENI S , KUMAR A V S . A survey on defense mechanism for sybil attacks in large social networks[J]. International Journal of Advanced Research in Computer Science, 2014,24(12): 2492-2502. |
[11] | CAO Q , YANG X . Sybilfence:improving social-graph-based sybil defenses with user negative feedback[J]. arXiv Preprint,arXiv:1304.3819, 2013 |
[12] | BOSHMAF Y , LOGOTHETIS D , SIGANOS G ,et al. Integro:leveraging victim prediction for robust fake account detection in large scale OSNs[J]. Computers & Security, 2016,61: 142-168. |
[13] | GAO P , GONG N Z , KULKARNI S ,et al. SybilFrame:a defense-in-depth framework for structure-based sybil detection[J]. arXiv Preprint,arXiv:1503.02985, 2015 |
[14] | MISRA S , TAYEEN A S M , XU W . SybilExposer:an effective scheme to detect sybil communities in online social networks[C]// Proceedings of IEEE International Conference on Communications. Piscataway:IEEE Press, 2016: 1-6. |
[15] | GONG N Z , FRANK M , MITTAL P . SybilBelief:a semi-supervised learning approach for structure-based sybil detection[J]. IEEE Transactions on Information Forensics and Security, 2014,9(6): 976-987. |
[16] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance[C]// 3rd Symposium on Operating Systems Design and Implementation. Berkeley:USENIX Association, 1999: 173-186. |
[17] | 刘明达, 陈左宁, 拾以娟 ,等. 区块链在数据安全领域的研究进展[J]. 计算机学报, 2020,43(1): 1-28. |
[34] | LUCA V . Automated security protocol analysis with the AVISPA tool[J]. Electronic Notes in Theoretical Computer Science, 2006,155: 61-86. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[4] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[5] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[6] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[7] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[8] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[9] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[10] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[11] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[12] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[13] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[14] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
[15] | Ruizhong DU, Tianhe ZHANG, Pengliang SHI. Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing [J]. Journal on Communications, 2022, 43(6): 168-178. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|