浏览全部资源
扫码关注微信
1. 北京工业大学信息学部,北京 100124
2. 信息保障技术重点实验室,北京 100072
3. 智能感知与自主控制教育部工程研究中心,北京 100124
4. 西安电子科技大学陕西省网络与系统安全重点实验室,陕西 西安 710071
[ "赖英旭(1973− ),女,辽宁抚顺人,博士,北京工业大学教授,主要研究方向为工业控制网络安全和软件定义网络安全等。" ]
[ "薄尊旭(1993− ),男,山东东营人,北京工业大学硕士生,主要研究方向为信息安全、区块链共识算法等。" ]
[ "刘静(1978− ),女,北京人,博士,北京工业大学助理研究员,主要研究方向为工业互联网安全、可信计算等。" ]
网络出版日期:2020-09,
纸质出版日期:2020-09-25
移动端阅览
赖英旭, 薄尊旭, 刘静. 基于改进PBFT算法防御区块链中sybil攻击的研究[J]. 通信学报, 2020,41(9):104-117.
Yingxu LAI, Zunxu BO, Jing LIU. Research on sybil attack in defense blockchain based on improved PBFT algorithm[J]. Journal on communications, 2020, 41(9): 104-117.
赖英旭, 薄尊旭, 刘静. 基于改进PBFT算法防御区块链中sybil攻击的研究[J]. 通信学报, 2020,41(9):104-117. DOI: 10.11959/j.issn.1000-436x.2020170.
Yingxu LAI, Zunxu BO, Jing LIU. Research on sybil attack in defense blockchain based on improved PBFT algorithm[J]. Journal on communications, 2020, 41(9): 104-117. DOI: 10.11959/j.issn.1000-436x.2020170.
针对sybil攻击对区块链技术有极大危害的问题,在联盟链中对PBFT算法进行改进,以防御sybil攻击。首先,借鉴基于权益证明的共识算法思想,通过建立信誉模型,根据各节点共识过程中的行为计算节点的信誉值,并依据信誉值的大小赋予节点不同的话语权;然后,在PBFT算法中加入了pre-commit阶段来减少节点间通信的次数。形式化分析推理和安全性测试表明,改进的PBFT算法不仅可以有效防御区块链中的sybil攻击,而且使区块链系统性能在TPS和区块生成时延方面有明显提高。
Aiming at the problem that sybil attack has great harm to block chain technology
a method to improve the PBFT algorithm in the alliance chain to defend against sybil attacks was proposed.Firstly
using the idea of consensus algorithm based on proof of rights and interests
a reputation model was established
the reputation value of each node accorded to the behavior of each node in the consensus process was calculated
and different discourse rights accorded to the size of the reputation value was given.Then pre-commit phase was added to the PBFT algorithm to reduce the number of communication between nodes.The solution through formal analysis and reasoning and security testing shows that the improved PBFT algorithm can not only effectively defend against sybil attacks in the blockchain
but also make the performance of the blockchain system in terms of TPS and block generation delay.
徐蜜雪 , 苑超 , 王永娟 , 等 . 拟态区块链——区块链安全解决方案 [J ] . 软件学报 , 2019 , 30 ( 6 ): 1681 - 1691 .
XU M X , YUAN C , WANG Y J , et al . Mimic blockchain—solution to the security of blockchain [J ] . Journal of Software , 2019 , 30 ( 6 ): 1681 - 1691 .
DELMOLINO K , ARNETT M , KOSBA A , et al . Step by step towards creating a safe smart contract:lessons and insights from a cryptocurrency lab [C ] // Proceedings of International Conference on Financial Cryptography and Data Security . Berlin:Springer , 2016 : 79 - 94 .
SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin [C ] // International Conference on Financial Cryptography and Data Security . Berlin:Springer , 2016 : 515 - 532 .
ETHAN H , ALISON K , AVIV Z , et al . Eclipse attacks on bitcoin’s peer-to-peer network [C ] // Proceedings of the 24th USENIX Conference on Security Symposium . Berkeley:USENIX Association , 2015 : 129 - 144 .
祝烈煌 , 高峰 , 沈蒙 , 等 . 区块链隐私保护研究综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 10 ): 2170 - 2186 .
ZHU L H , GAO F , SHEN M , et al . Survey on privacy preserving techniques for blockchain technology [J ] . Journal of Computer Research and Development , 2017 , 54 ( 10 ): 2170 - 2186 .
刘怡然 , 柯俊明 , 蒋瀚 , 等 . 基于沙普利值计算的区块链中 PoS 共识机制的改进 [J ] . 计算机研究与发展 , 2018 , 55 ( 10 ): 2208 - 2218 .
LIU Y R , KE J M , JIANG H , et al . Improvement of the PoS consensus mechanism in blockchain based on Shapley value [J ] . Journal of Computer Research and Development , 2018 , 55 ( 10 ): 2208 - 2218 .
DOUCEUR J R , . The sybil attack [C ] // The First International Workshop on Peer-to-Peer Systems . Berlin:Springer , 2002 : 251 - 260 .
AL-QURISHI M , AL-RAKHAMI M , ALAMRI A , et al . sybil defense techniques in online social networks:a survey [J ] . IEEE Access , 2017 , 5 : 1200 - 1219 .
SHI L , YU S , LOU W , et al . sybilShield:an agent-aided social network-based sybil defense among multiple communities [C ] // Proceedings of 32nd IEEE INFOCOM . Piscataway:IEEE Press , 2013 : 1034 - 1042 .
KRISHNAVENI S , KUMAR A V S . A survey on defense mechanism for sybil attacks in large social networks [J ] . International Journal of Advanced Research in Computer Science , 2014 , 24 ( 12 ): 2492 - 2502 .
CAO Q , YANG X . Sybilfence:improving social-graph-based sybil defenses with user negative feedback [J ] . arXiv Preprint,arXiv:1304.3819 , 2013
BOSHMAF Y , LOGOTHETIS D , SIGANOS G , et al . Integro:leveraging victim prediction for robust fake account detection in large scale OSNs [J ] . Computers & Security , 2016 , 61 : 142 - 168 .
GAO P , GONG N Z , KULKARNI S , et al . SybilFrame:a defense-in-depth framework for structure-based sybil detection [J ] . arXiv Preprint,arXiv:1503.02985 , 2015
MISRA S , TAYEEN A S M , XU W . SybilExposer:an effective scheme to detect sybil communities in online social networks [C ] // Proceedings of IEEE International Conference on Communications . Piscataway:IEEE Press , 2016 : 1 - 6 .
GONG N Z , FRANK M , MITTAL P . SybilBelief:a semi-supervised learning approach for structure-based sybil detection [J ] . IEEE Transactions on Information Forensics and Security , 2014 , 9 ( 6 ): 976 - 987 .
CASTRO M , LISKOV B . Practical Byzantine fault tolerance [C ] // 3rd Symposium on Operating Systems Design and Implementation . Berkeley:USENIX Association , 1999 : 173 - 186 .
刘明达 , 陈左宁 , 拾以娟 , 等 . 区块链在数据安全领域的研究进展 [J ] . 计算机学报 , 2020 , 43 ( 1 ): 1 - 28 .
LIU M D , CHEN Z N , SHI Y J , et al . Research progress of blockchain in data security [J ] . Chinese Journal of Computers , 2020 , 43 ( 1 ): 1 - 28 .
王海勇 , 郭凯璇 , 潘启青 . 基于投票机制的拜占庭容错共识算法 [J ] . 计算机应用 , 2019 , 39 ( 6 ): 1766 - 1771 .
WANG H Y , GUO K X , PAN Q Q . Byzantine fault tolerance consensus algorithm based on voting mechanism [J ] . Journal of ComputerApplications , 2019 , 39 ( 6 ): 1766 - 1771
WANG F Y , CAI S S , LIN T C , et al . Study of blockchains’s consensus mechanism based on credit [J ] . IEEE Access , 2019 , 7 : 10224 - 10231 .
JIANG Y , LIAN Z . High performance and scalable Byzantine fault tolerance [C ] // IEEE 3rd Information Technology,Networking,Electronic and Automation Control Conference . Piscataway:IEEE Press , 2019 : 1195 - 1202 .
MILLER A , XIA Y , CROMAN K , et al . The honey badger of BFT protocols [C ] // Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2016 : 31 - 42 .
ALEX B , DANIEL F . ReCon:sybil-resistant consensus from reputation [J ] . Pervasive and Mobile Computing , 2020 , 61 : 1574 - 1192 .
闵新平 , 李庆忠 , 孔兰菊 , 等 . 许可链多中心动态共识机制 [J ] . 计算机学报 , 2018 , 41 ( 5 ): 1005 - 1020 .
MIN X P , LI Q Z , KONG L J , et al . Permissioned blockchain dynamic consensus mechanism based multi-centers [J ] . Chinese Journal of Computers , 2018 , 41 ( 5 ): 1005 - 1020 .
ZHANG X , LIU J , LI Y , et al . Blockchain based secure package delivery via ridesharing [C ] // 2019 11th International Conference on Wireless Communications and Signal Processing . Piscataway:IEEE Press , 2019 : 1 - 6 .
JANBI N F , RADENKOVIC M . An enhanced Bayesian-based reputation system for P2P file sharing [C ] // Proceedings of 2017 Computing Conference . Piscataway:IEEE Press , 2017 : 1247 - 1252 .
SARAH A , HEBA K , RASHA A , et al . Authenticpeer++:a trust management system for P2P networks [C ] // Proceedings of 11th UKSIM-AMSS European Modelling Symposium on Computer Modeling and Simulation . Piscataway:IEEE Press , 2017 : 191 - 196 .
GUPTA M , JUDGE P , AMMAR M . A reputation system for peer-to-peer networks [C ] // Proceedings of International Workshop on Network & Operating Systems Support for Digital Audio & Video . New York:ACM Press , 2003 : 144 - 152 .
黄建华 , 夏旭 , 李忠诚 , 等 . 基于动态授权的信任度证明机制 [J ] . 软件学报 , 2019 , 30 ( 9 ): 2593 - 2607 .
HUANG J H , XIA X , LI Z C , et al . Proof of trust:a new mechanism of trust degree based on dynamic authorization [J ] . Journal of Software , 2019 , 30 ( 9 ): 2593 - 2607 .
刘庆华 , 周小燕 . 安全协议的形式化分析方法 [J ] . 光盘技术 , 2008 ( 3 ): 32 - 33 .
LIU Q H , ZHOU X Y . The discusses of the formal methods for security protocol verification [J ] . CD Technology , 2008 ( 3 ): 32 - 33 .
项俊龙 , 陈传峰 . 安全协议形式化验证方法综述 [J ] . 信息安全与通信保密 , 2013 ( 5 ): 52 - 54 .
XIANG J L , CHEN C F . Overview on security protocol formal verification methods [J ] . Information Security and Communications Privacy , 2013 ( 5 ): 52 - 54 .
海沫 , 朱建明 . 区块链网络最优传播路径和激励相结合的传播机制 [J ] . 计算机研究与发展 , 2019 , 56 ( 6 ): 1205 - 1218 .
HAI M , ZHU J M . A propagation mechanism combining an optimal propagation path and incentive in blockchain networks [J ] . Journal of Computer Research and Development , 2019 , 56 ( 6 ): 1205 - 1218 .
LIN Z , LI D , HUANG W . Current security management & ethical [J ] . Issues of Information Technology , 2003 , PP : 249 - 266 .
赖英旭 , 刘岩 , 刘静 . 一种网络间可信连接协议 [J ] . 软件学报 , 2019 , 30 ( 12 ): 3730 - 3749 .
LAI Y X , LIU Y , LIU J . Trusted connection protocol between networks [J ] . Journal of Software , 2019 , 30 ( 12 ): 3730 - 3749 .
LUCA V . Automated security protocol analysis with the AVISPA tool [J ] . Electronic Notes in Theoretical Computer Science , 2006 , 155 : 61 - 86 .
0
浏览量
1133
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构