检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]School of Computer Science and Technology,Zhoukou Normal University,Zhoukou,466001,China
出 处:《Computers, Materials & Continua》2023年第11期2505-2527,共23页计算机、材料和连续体(英文)
基 金:supported by Henan University Science and Technology Innovation Talent Support Program(23HASTIT029);the National Natural Science Foundation of China(61902447);Tianjin Natural Science Foundation Key Project(22JCZDJC00600);Research Project of Humanities and Social Sciences in Universities of Henan Province(2024-ZDJH-061);Key Scientific Research Projects of Colleges and Universities in Henan Province(23A520054);Henan Science and Technology Research Project(232102210124).
摘 要:Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications.
关 键 词:Consortium chain BYZANTINE CONSENSUS generation mechanism Internet of Things consensus vulnerability
分 类 号:TP399[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.226.15