确保多链共识免受区块链网络中多样化矿工行为的攻击

IF 2.7 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Frontiers of Information Technology & Electronic Engineering Pub Date : 2024-05-10 DOI:10.1631/fitee.2200505
Wenbo Zhang, Tao Wang, Chaoyang Zhang, Jingyu Feng
{"title":"确保多链共识免受区块链网络中多样化矿工行为的攻击","authors":"Wenbo Zhang, Tao Wang, Chaoyang Zhang, Jingyu Feng","doi":"10.1631/fitee.2200505","DOIUrl":null,"url":null,"abstract":"<p>As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"154 1","pages":""},"PeriodicalIF":2.7000,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks\",\"authors\":\"Wenbo Zhang, Tao Wang, Chaoyang Zhang, Jingyu Feng\",\"doi\":\"10.1631/fitee.2200505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.</p>\",\"PeriodicalId\":12608,\"journal\":{\"name\":\"Frontiers of Information Technology & Electronic Engineering\",\"volume\":\"154 1\",\"pages\":\"\"},\"PeriodicalIF\":2.7000,\"publicationDate\":\"2024-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Frontiers of Information Technology & Electronic Engineering\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://doi.org/10.1631/fitee.2200505\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers of Information Technology & Electronic Engineering","FirstCategoryId":"5","ListUrlMain":"https://doi.org/10.1631/fitee.2200505","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

由于跨链技术实现了不同区块链(以下简称 "链")之间的互动,多链共识在区块链网络中变得越来越重要。然而,人们更关注单链共识方案。有可信矿工参与的多链共识方案尚未得到考虑,这就为恶意用户在不同链上发起多样化矿工行为(DMB)攻击提供了机会。DMB 攻击者可以在一些链(称为掩码链)上友好地参与共识过程,以提高自己的信任值,而在另一些链(称为杀伤链)上,他们则会对网络实施破坏行为。在本文中,我们提出了一种名为 "不信任证明"(PoDT)的多链共识方案来抵御 DMB 攻击。我们引入了独特信任(DiscTrust)的概念来评估每个用户在不同链上的信任值。用户的可信度分为本地信任值和全局信任值。设计了一种动态行为预测方案来强制执行 DiscTrust,以防止密集 DMB 攻击者通过在杀链上交替创建真实或虚假区块来维持强信任。多链环境下的三种可信矿工选择算法可分别用于选择网络矿工、链矿工和链矿工领导者。仿真结果表明,PoDT 可安全抵御 DMB 攻击,在多链环境中比传统共识方案更有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Securing multi-chain consensus against diverse miner behavior attacks in blockchain networks

As cross-chain technologies enable interactions among different blockchains (hereinafter “chains”), multi-chain consensus is becoming increasingly important in blockchain networks. However, more attention has been paid to single-chain consensus schemes. Multi-chain consensus schemes with trusted miner participation have not been considered, thus offering opportunities for malicious users to launch diverse miner behavior (DMB) attacks on different chains. DMB attackers can be friendly in the consensus process on some chains, called mask chains, to enhance their trust value, while on others, called kill chains, they engage in destructive behaviors on the network. In this paper, we propose a multi-chain consensus scheme named Proof-of-DiscTrust (PoDT) to defend against DMB attacks. The idea of distinctive trust (DiscTrust) is introduced to evaluate the trust value of each user across different chains. The trustworthiness of a user is split into local and global trust values. A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain. Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners, chain miners, and chain miner leaders, separately. Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Frontiers of Information Technology & Electronic Engineering
Frontiers of Information Technology & Electronic Engineering COMPUTER SCIENCE, INFORMATION SYSTEMSCOMPU-COMPUTER SCIENCE, SOFTWARE ENGINEERING
CiteScore
6.00
自引率
10.00%
发文量
1372
期刊介绍: Frontiers of Information Technology & Electronic Engineering (ISSN 2095-9184, monthly), formerly known as Journal of Zhejiang University SCIENCE C (Computers & Electronics) (2010-2014), is an international peer-reviewed journal launched by Chinese Academy of Engineering (CAE) and Zhejiang University, co-published by Springer & Zhejiang University Press. FITEE is aimed to publish the latest implementation of applications, principles, and algorithms in the broad area of Electrical and Electronic Engineering, including but not limited to Computer Science, Information Sciences, Control, Automation, Telecommunications. There are different types of articles for your choice, including research articles, review articles, science letters, perspective, new technical notes and methods, etc.
期刊最新文献
A novel overlapping minimization SMOTE algorithm for imbalanced classification A review on the developments and space applications of mid- and long-wavelength infrared detection technologies Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example Flocking fragmentation formulation for a multi-robot system under multi-hop and lossy ad hoc networks Event-triggered distributed cross-dimensional formation control for heterogeneous multi-agent systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1