Journal on Communications ›› 2022, Vol. 43 ›› Issue (12): 123-133.doi: 10.11959/j.issn.1000-436x.2022233
• Papers • Previous Articles Next Articles
Xiaodong FU1,2, Xinxin QI1, Li LIU1, Wei PENG1, Jiaman DING1, Fei DAI3
Revised:
2022-10-30
Online:
2022-12-25
Published:
2022-12-01
Supported by:
CLC Number:
Xiaodong FU, Xinxin QI, Li LIU, Wei PENG, Jiaman DING, Fei DAI. Detecting and preventing collusion attack in DPoS based on power index[J]. Journal on Communications, 2022, 43(12): 123-133.
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2008. |
[2] | KHAN S N , LOUKIL F , GHEDIRA-GUEGAN C , ,et al. Blockchain smart contracts:applications,challenges,and future trends[J]. Peer-to-Peer Networking and Applications, 2021,14(5): 2901-2925. |
[3] | LIU D X , NI J B , HUANG C ,et al. Secure and efficient distributed network provenance for IoT:a blockchain-based approach[J]. IEEE Internet of Things Journal, 2020,7(8): 7564-7574. |
[4] | FU X , WANG H M , SHI P C . A survey of Blockchain consensus algorithms:mechanism,design and applications[J]. Science China Information Sciences, 2020,64(2): 1-15. |
[5] | JANG J , LEE H N . Profitable double-spending attacks[J]. Applied Sciences, 2020,10(23): 8477. |
[6] | NICOLAS K , WANG Y , GIAKOS G C . Comprehensive overview of selfish mining and double spending attack countermeasures[C]// Proceedings of 2019 IEEE 40th Sarnoff Symposium. Piscataway:IEEE Press, 2019: 1-6. |
[7] | 夏清, 窦文生, 郭凯文 ,等. 区块链共识协议综述[J]. 软件学报, 2021,32(2): 277-299. |
XIA Q , DOU W S , GUO K W ,et al. Survey on blockchain consensus protocol[J]. Journal of Software, 2021,32(2): 277-299. | |
[8] | 曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151. |
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151. | |
[9] | 刘怡然, 柯俊明, 蒋瀚 ,等. 基于沙普利值计算的区块链中 PoS 共识机制的改进[J]. 计算机研究与发展, 2018,55(10): 2208-2218. |
LIU Y R , KE J M , JIANG H ,et al. Improvement of the PoS consensus mechanism in blockchain based on shapley value[J]. Journal of Computer Research and Development, 2018,55(10): 2208-2218. | |
[10] | LARIMER D . Delegated proof-of-stake (DPoS)[R]. 2014. |
[11] | VRIES A D ,et al. Bitcoin's growing energy problem[J]. Joule, 2018,2(5): 801-805. |
[12] | KING S , NADAL S . PPCoin:peer-to-peer crypto-currency with proof-of-stake[EB].(2012-08-19)[2022-07-29]. |
[13] | YE C C , LI G Q , CAI H M ,et al. Analysis of security in blockchain:case study in 51%-attack detecting[C]// Proceedings of 2018 5th International Conference on Dependable Systems and Their Applications (DSA). Piscataway:IEEE Press, 2018: 15-24. |
[14] | SHANAEV S , SHURAEVA A , VASENIN M ,et al. Cryptocurrency value and 51% attacks:evidence from event studies[J]. SSRN Electronic Journal, 2018:doi.org/10.3905/jai.2019.1.081. |
[15] | NICOLAS H . It will cost you nothing to ‘kill’ a proof-of-stake crypto-currency[J]. SSRN Electronic Journal, 2014:doi.org/10.2139/ssrn.2393940. |
[16] | WOOD G . Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014,151: 1-32. |
[17] | JIANG B , CHEN Y F , WANG D ,et al. WANA:symbolic execution of wasm bytecode for extensible smart contract vulnerability detection[C]// Proceedings of 2021 IEEE 21st International Conference on Software Quality,Reliability and Security. Piscataway:IEEE Press, 2021: 926-937. |
[18] | ARAUJO F . A maximum independent set approach for collusion detection in voting pools[J]. Journal of Parallel and Distributed Computing, 2011,71(10): 1356-1366. |
[19] | PELEG B , SUDH?LTER P , . Introduction to the theory of cooperative games[M]. Berlin: Springer Science & Business Media, 2007. |
[20] | LUCAS WF , BRAMS S J , LUCAS W F ,et al. Measuring power in weighted voting systems[M]. Berlin: Springer, 1983. |
[21] | YANG X L , CHEN Y , CHEN X H . Effective scheme against 51% attack on proof-of-work blockchain with history weighted information[C]// Proceedings of 2019 IEEE International Conference on Blockchain (Blockchain). Piscataway:IEEE Press, 2019: 261-265. |
[22] | ALMALLOHI I A I , ALOTAIBI A S M , ALGHAFEES R ,et al. Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains[C]// Proceedings of the 3rd International Conference on High Performance Compilation,Computing and Communications. New York:ACM Press, 2019: 118-122. |
[23] | WANG L , ZHU Q H , LI B Z . Extensive game analysis and improvement strategy of DPOS consensus mechanism[J]. The Journal of China Universities of Posts and Telecommunications, 2021(5): 27-35,101. |
[24] | 田国华, 胡云瀚, 陈晓峰 . 区块链系统攻击与防御技术研究进展[J]. 软件学报, 2021,32(5): 1495-1525. |
TIAN G H , HU Y H , CHEN X F . Research progress on attack and defense techniques in block-chain system[J]. Journal of Software, 2021,32(5): 1495-1525. | |
[25] | 魏松杰, 吕伟龙, 李莎莎 . 区块链公链应用的典型安全问题综述[J]. 软件学报, 2022,33(1): 324-355. |
WEI S J , Lü W L , LI S S . Overview on typical security problems in public blockchain applications[J]. Journal of Software, 2022,33(1): 324-355. | |
[26] | LUO Y H , CHEN Y Q , CHEN Q ,et al. A new election algorithm for DPos consensus mechanism in blockchain[C]// Proceedings of 2018 7th International Conference on Digital Home (ICDH). Piscataway:IEEE Press, 2018: 116-120. |
[27] | YAO Y J , TIAN F , ZHANG C . The research of an improved blockchain consensus mechanism[C]// Proceedings of 2020 2nd International Conference on Applied Machine Learning (ICAML). Piscataway:IEEE Press, 2020: 305-310. |
[28] | WANG L J , XU P H , SU W ,et al. Research on improvement of blockchain DPOS consensus mechanism based on HK clustering[C]// Proceedings of 2021 China Automation Congress (CAC). Piscataway:IEEE Press, 2021: 1167-1172. |
[29] | AZIZ H , BACHRACH Y , ELKIND E ,et al. False-name manipulations in weighted voting games[J]. Journal of Artificial Intelligence Research, 2011,40: 57-93. |
[30] | HART S . Game theory[M]. London: Palgrave Macmillan, 1989. |
[31] | BANZHAF III , JOHN F . Weighted voting doesn’t work:a mathematical analysis[J]. Rutgers Law Review, 1965,19: 317-343. |
[32] | SAAD W , HAN Z , DEBBAH M ,et al. Coalitional game theory for communication networks[J]. IEEE Signal Processing Magazine, 2009,26(5): 77-97. |
[33] | KUMAR P , KUMAR A A , SAHAYAKINGSLY C ,et al. Analysis of intrusion detection in cyber attacks using DEEP learning neural networks[J]. Peer-to-Peer Networking and Applications, 2021,14(4): 2565-2584. |
[34] | TURNOVEC F . Trends in multicriteria decision making[M]. Berlin: Springer, 1998. |
[35] | CHEN W L , GUO X F , CHEN Z G ,et al. Phishing scam detection on ethereum:towards financial security for blockchain ecosystem[C]// Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence. California:International Joint Conferences on Artificial Intelligence Organization, 2020: 4506-4512. |
[36] | LIN D , WU J J , YUAN Q ,et al. Modeling and understanding ethereum transaction records via a complex network approach[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2020,67(11): 2737-2741. |
[37] | WEI Y X , LIANG L , ZHOU B ,et al. A modified blockchain DPoS consensus algorithm based on anomaly detection and reward-punishment[C]// Proceedings of 2021 13th International Conference on Communication Software and Networks (ICCSN). Piscataway:IEEE Press, 2021: 283-288. |
[1] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[2] | Xuejiao LIU, Qiang ZHONG, Yingjie XIA. Efficient authentication scheme for cross-trust domain of IoV based on double-layer shard blockchain [J]. Journal on Communications, 2023, 44(5): 213-223. |
[3] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[4] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[5] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[6] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[7] | Pujie JING, Liangmin WANG, Xuewen DONG, Yushu ZHANG, Qian WANG, Sohail Muhammad. CHA: cross-chain based hierarchical architecture for practicable blockchain regulatory [J]. Journal on Communications, 2023, 44(3): 93-104. |
[8] | Xuejiao LIU, Tiancong CAO, Yingjie XIA. Research on efficient and secure cross-domain data sharing of IoV under blockchain architecture [J]. Journal on Communications, 2023, 44(3): 186-197. |
[9] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[10] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[11] | Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG. Cooperation-based location authentication scheme for crowdsensing applications [J]. Journal on Communications, 2022, 43(9): 121-133. |
[12] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[13] | Leixiao LI, Jinze DU, Hao LIN, Haoyu GAO, Yanyan YANG, Jing GAO. Research progress of blockchain network covert channel [J]. Journal on Communications, 2022, 43(9): 209-223. |
[14] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[15] | Lizhi XIONG, Rong ZHU, Zhangjie FU. Covert communication method of blockchain network based on transaction construction and forwarding mechanism [J]. Journal on Communications, 2022, 43(8): 176-187. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|