Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious node isolation method and system, computing power verification terminal and p2p network

A malicious node and isolation system technology, applied in the Internet field, can solve the problems of deviation from the decentralization of P2P network, the inability to guarantee the trustworthiness of central nodes, and the inability to guarantee the identification of malicious nodes.

Active Publication Date: 2021-10-26
上海树图区块链研究院
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires at least one central node trusted by each blockchain node to obtain the workload proof data of each blockchain node, and perform operations such as workload threshold calculation, comparison, and isolation, which has actually deviated from the decentralization of the P2P network At the same time, under the premise that the trustworthiness of the central node cannot be guaranteed, there is no guarantee that the real malicious node can be identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious node isolation method and system, computing power verification terminal and p2p network
  • Malicious node isolation method and system, computing power verification terminal and p2p network
  • Malicious node isolation method and system, computing power verification terminal and p2p network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0034] P2P network (peer-to-peer network), that is, peer-to-peer computer network, is a distributed application architecture that distributes tasks and workloads among peers (Peer). net or network form. There is no central node (or central server) in the network structure of the entire P2P network. In the P2P network environment, each terminal (node) can not only act as a requester for network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for isolating malicious nodes, comprising: a credit score generation step, initializing the credit score of the neighbor nodes of the current node; a random character string sending step, the current node sends a random character string to the neighbor node; target value acquisition step, the neighbor node searches for the target value according to the random character string, and sends the obtained target value to the current node; the target value verification step, the current node verifies the target value, and updates the target value according to the verified target value The credit score; judging and isolating step, judging the malicious node of the neighbor node through the credit score, and isolating the neighbor node judged as the malicious node. The present invention evaluates the credibility of neighboring nodes by introducing proof of work, and increases the cost of forging a large number of malicious nodes in an unlicensed P2P network to prevent solar eclipse attacks.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a method and a system for isolating malicious nodes in a P2P network. Background technique [0002] In 1994, Marsh first systematically discussed the formalization of trust. Starting from the concept of trust, he divided the content and degree of trust, and proposed a mathematical model of trust measurement from the subjectivity of trust. Subsequently, scholars such as Adul-Rahman proposed a trust evaluation model based on distributed feedback information for the evaluation of trust in the Internet community. After that, around how to describe the trust of nodes more reasonably and accurately, many scholars put forward many trust management models in various forms for different application modes in the P2P environment from their own perspectives. Summarizing these trust models can be divided into two categories, that is, trust models that rely on third parties ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L12/24
CPCH04L9/3236H04L41/0659H04L63/1416H04L63/1441H04L67/1048
Inventor 尚书
Owner 上海树图区块链研究院
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More