浏览全部资源
扫码关注微信
1. 昆明理工大学信息工程与自动化学院,云南 昆明 650500
2. 昆明理工大学云南省计算机应用技术重点实验室,云南 昆明 650500
3. 西南林业大学大数据与智能工程学院,云南 昆明 650224
[ "付晓东(1975- ),男,云南镇雄人,博士,昆明理工大学教授,主要研究方向为服务计算、智能决策、可信计算等" ]
[ "漆鑫鑫(1998- ),男,湖北黄石人,昆明理工大学硕士生,主要研究方向为服务计算、区块链等" ]
[ "刘骊(1979- ),女,重庆人,博士,昆明理工大学教授,主要研究方向为服务计算、计算机视觉、视频图像处理等" ]
[ "彭玮(1980- ),女,湖南娄底人,博士,昆明理工大学教授,主要研究方向为生物信息学、数据挖掘、机器学习等" ]
[ "丁家满(1974- ),男,江西于都人,博士,昆明理工大学教授,主要研究方向为数据挖掘、云计算、软件工程等" ]
[ "代飞(1982- ),男,四川乐山人,博士,西南林业大学教授,主要研究方向为服务计算、人工智能、软件工程等" ]
网络出版日期:2022-12,
纸质出版日期:2022-12-25
移动端阅览
付晓东, 漆鑫鑫, 刘骊, 等. 基于权力指数的DPoS共谋攻击检测与预防[J]. 通信学报, 2022,43(12):123-133.
Xiaodong FU, Xinxin QI, Li LIU, et al. Detecting and preventing collusion attack in DPoS based on power index[J]. Journal on communications, 2022, 43(12): 123-133.
付晓东, 漆鑫鑫, 刘骊, 等. 基于权力指数的DPoS共谋攻击检测与预防[J]. 通信学报, 2022,43(12):123-133. DOI: 10.11959/j.issn.1000-436x.2022233.
Xiaodong FU, Xinxin QI, Li LIU, et al. Detecting and preventing collusion attack in DPoS based on power index[J]. Journal on communications, 2022, 43(12): 123-133. DOI: 10.11959/j.issn.1000-436x.2022233.
针对DPoS共识机制存在恶意节点通过共谋操纵选举,导致DPoS共识过程中区块链安全性无法保证的问题,提出基于权力指数的DPoS共谋攻击检测与预防方法。首先,借鉴博弈理论中权力指数的思想,构建DPoS的加权投票博弈模型,以分析恶意节点的行为动机。然后,通过异常的权力指数变化幅度进行攻击检测,在预防DPoS 共谋攻击的过程中,加入 Softsign 激活函数抑制恶意节点的权力指数。最后,理论分析与实验验证了所提方法检测和预防DPoS共谋攻击的有效性。
Since malicious nodes may manipulate voting elections through collusion attacks in consensus mechanism of DPoS
the security of block chain can not be guaranteed in the consensus process of DPoS.To deal with the problem
a method for detecting and preventing collusion attack in DPoS based on power index was proposed.Firstly
a weighted voting game model of DPoS was constructed based on the idea of power index in game theory
and the behavioral motivation of the malicious node could be analyzed.Then
the attacks were detected based on changing range of abnormal power index.During the process of preventing collusion attacks in DPoS
the Softsign activation function was adapted to suppress the power index of malicious nodes.Lastly
the effectiveness of the proposed method to detect and prevent collusion attacks in DPoS was verified through theoretical analysis and experiments.
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [R ] . 2008 .
KHAN S N , LOUKIL F , GHEDIRA-GUEGAN C , , et al . Blockchain smart contracts:applications,challenges,and future trends [J ] . Peer-to-Peer Networking and Applications , 2021 , 14 ( 5 ): 2901 - 2925 .
LIU D X , NI J B , HUANG C , et al . Secure and efficient distributed network provenance for IoT:a blockchain-based approach [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 8 ): 7564 - 7574 .
FU X , WANG H M , SHI P C . A survey of Blockchain consensus algorithms:mechanism,design and applications [J ] . Science China Information Sciences , 2020 , 64 ( 2 ): 1 - 15 .
JANG J , LEE H N . Profitable double-spending attacks [J ] . Applied Sciences , 2020 , 10 ( 23 ): 8477 .
NICOLAS K , WANG Y , GIAKOS G C . Comprehensive overview of selfish mining and double spending attack countermeasures [C ] // Proceedings of 2019 IEEE 40th Sarnoff Symposium . Piscataway:IEEE Press , 2019 : 1 - 6 .
夏清 , 窦文生 , 郭凯文 , 等 . 区块链共识协议综述 [J ] . 软件学报 , 2021 , 32 ( 2 ): 277 - 299 .
XIA Q , DOU W S , GUO K W , et al . Survey on blockchain consensus protocol [J ] . Journal of Software , 2021 , 32 ( 2 ): 277 - 299 .
曾诗钦 , 霍如 , 黄韬 , 等 . 区块链技术研究综述:原理、进展与应用 [J ] . 通信学报 , 2020 , 41 ( 1 ): 134 - 151 .
ZENG S Q , HUO R , HUANG T , et al . Survey of blockchain:principle,progress and application [J ] . Journal on Communications , 2020 , 41 ( 1 ): 134 - 151 .
刘怡然 , 柯俊明 , 蒋瀚 , 等 . 基于沙普利值计算的区块链中 PoS 共识机制的改进 [J ] . 计算机研究与发展 , 2018 , 55 ( 10 ): 2208 - 2218 .
LIU Y R , KE J M , JIANG H , et al . Improvement of the PoS consensus mechanism in blockchain based on shapley value [J ] . Journal of Computer Research and Development , 2018 , 55 ( 10 ): 2208 - 2218 .
LARIMER D . Delegated proof-of-stake (DPoS) [R ] . 2014 .
VRIES A D , et al . Bitcoin's growing energy problem [J ] . Joule , 2018 , 2 ( 5 ): 801 - 805 .
KING S , NADAL S . PPCoin:peer-to-peer crypto-currency with proof-of-stake [EB ] .(2012-08-19)[2022-07-29 ] .
YE C C , LI G Q , CAI H M , et al . Analysis of security in blockchain:case study in 51%-attack detecting [C ] // Proceedings of 2018 5th International Conference on Dependable Systems and Their Applications (DSA) . Piscataway:IEEE Press , 2018 : 15 - 24 .
SHANAEV S , SHURAEVA A , VASENIN M , et al . Cryptocurrency value and 51% attacks:evidence from event studies [J ] . SSRN Electronic Journal , 2018 :doi.org/10.3905/jai.2019.1.081.
NICOLAS H . It will cost you nothing to ‘kill’ a proof-of-stake crypto-currency [J ] . SSRN Electronic Journal , 2014 :doi.org/10.2139/ssrn.2393940.
WOOD G . Ethereum:a secure decentralised generalised transaction ledger [J ] . Ethereum Project Yellow Paper , 2014 , 151 : 1 - 32 .
JIANG B , CHEN Y F , WANG D , et al . WANA:symbolic execution of wasm bytecode for extensible smart contract vulnerability detection [C ] // Proceedings of 2021 IEEE 21st International Conference on Software Quality,Reliability and Security . Piscataway:IEEE Press , 2021 : 926 - 937 .
ARAUJO F . A maximum independent set approach for collusion detection in voting pools [J ] . Journal of Parallel and Distributed Computing , 2011 , 71 ( 10 ): 1356 - 1366 .
PELEG B , SUDHÖLTER P , . Introduction to the theory of cooperative games [M ] . Berlin : Springer Science & Business Media , 2007 .
LUCAS WF , BRAMS S J , LUCAS W F , et al . Measuring power in weighted voting systems [M ] . Berlin : Springer , 1983 .
YANG X L , CHEN Y , CHEN X H . Effective scheme against 51% attack on proof-of-work blockchain with history weighted information [C ] // Proceedings of 2019 IEEE International Conference on Blockchain (Blockchain) . Piscataway:IEEE Press , 2019 : 261 - 265 .
ALMALLOHI I A I , ALOTAIBI A S M , ALGHAFEES R , et al . Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains [C ] // Proceedings of the 3rd International Conference on High Performance Compilation,Computing and Communications . New York:ACM Press , 2019 : 118 - 122 .
WANG L , ZHU Q H , LI B Z . Extensive game analysis and improvement strategy of DPOS consensus mechanism [J ] . The Journal of China Universities of Posts and Telecommunications , 2021 ( 5 ): 27 - 35 , 101 .
田国华 , 胡云瀚 , 陈晓峰 . 区块链系统攻击与防御技术研究进展 [J ] . 软件学报 , 2021 , 32 ( 5 ): 1495 - 1525 .
TIAN G H , HU Y H , CHEN X F . Research progress on attack and defense techniques in block-chain system [J ] . Journal of Software , 2021 , 32 ( 5 ): 1495 - 1525 .
魏松杰 , 吕伟龙 , 李莎莎 . 区块链公链应用的典型安全问题综述 [J ] . 软件学报 , 2022 , 33 ( 1 ): 324 - 355 .
WEI S J , LÜ W L , LI S S . Overview on typical security problems in public blockchain applications [J ] . Journal of Software , 2022 , 33 ( 1 ): 324 - 355 .
LUO Y H , CHEN Y Q , CHEN Q , et al . A new election algorithm for DPos consensus mechanism in blockchain [C ] // Proceedings of 2018 7th International Conference on Digital Home (ICDH) . Piscataway:IEEE Press , 2018 : 116 - 120 .
YAO Y J , TIAN F , ZHANG C . The research of an improved blockchain consensus mechanism [C ] // Proceedings of 2020 2nd International Conference on Applied Machine Learning (ICAML) . Piscataway:IEEE Press , 2020 : 305 - 310 .
WANG L J , XU P H , SU W , et al . Research on improvement of blockchain DPOS consensus mechanism based on HK clustering [C ] // Proceedings of 2021 China Automation Congress (CAC) . Piscataway:IEEE Press , 2021 : 1167 - 1172 .
AZIZ H , BACHRACH Y , ELKIND E , et al . False-name manipulations in weighted voting games [J ] . Journal of Artificial Intelligence Research , 2011 , 40 : 57 - 93 .
HART S . Game theory [M ] . London : Palgrave Macmillan , 1989 .
BANZHAF III , JOHN F . Weighted voting doesn’t work:a mathematical analysis [J ] . Rutgers Law Review , 1965 , 19 : 317 - 343 .
SAAD W , HAN Z , DEBBAH M , et al . Coalitional game theory for communication networks [J ] . IEEE Signal Processing Magazine , 2009 , 26 ( 5 ): 77 - 97 .
KUMAR P , KUMAR A A , SAHAYAKINGSLY C , et al . Analysis of intrusion detection in cyber attacks using DEEP learning neural networks [J ] . Peer-to-Peer Networking and Applications , 2021 , 14 ( 4 ): 2565 - 2584 .
TURNOVEC F . Trends in multicriteria decision making [M ] . Berlin : Springer , 1998 .
CHEN W L , GUO X F , CHEN Z G , et al . Phishing scam detection on ethereum:towards financial security for blockchain ecosystem [C ] // Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence . California:International Joint Conferences on Artificial Intelligence Organization , 2020 : 4506 - 4512 .
LIN D , WU J J , YUAN Q , et al . Modeling and understanding ethereum transaction records via a complex network approach [J ] . IEEE Transactions on Circuits and Systems II:Express Briefs , 2020 , 67 ( 11 ): 2737 - 2741 .
WEI Y X , LIANG L , ZHOU B , et al . A modified blockchain DPoS consensus algorithm based on anomaly detection and reward-punishment [C ] // Proceedings of 2021 13th International Conference on Communication Software and Networks (ICCSN) . Piscataway:IEEE Press , 2021 : 283 - 288 .
0
浏览量
435
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构