Routing implementation method and device for peer-to-peer network, equipment and medium

A technology of peer-to-peer network and implementation method, which is applied in the direction of data exchange network, digital transmission system, electrical components, etc., which can solve the problems of reduced message sending, increased message sending, and broadcast sending of messages, etc., so as to improve stability and increase the difficulty of doing evil , the effect of reducing the impact

Active Publication Date: 2019-10-11
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are many security threats in the P2P network, such as Eclipse attack, which means that the attacker adds enough false nodes to the set of neighbor nodes of some nodes by occupying the routing table of the node, so that these nodes need to send When sending messages outside, there is a high probability that they are sending to false neighbor nodes. Invalid message sending increases and valid message sending decreases. In extreme cases, these nodes are "isolated" from the normal peer-to-peer network
[0004] If the above-mentioned P2P network attack exists in the P2P network adopted by the blockchain, the isolated nodes will not be able to broadcast and send messages normally, which will affect the normal operation of the centralized blockchain network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Routing implementation method and device for peer-to-peer network, equipment and medium
  • Routing implementation method and device for peer-to-peer network, equipment and medium
  • Routing implementation method and device for peer-to-peer network, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of a peer-to-peer network routing implementation method provided by Embodiment 1 of the present invention. This embodiment is applicable to the technical solution of message routing by setting multiple routing tables in the peer-to-peer network, and this technical solution is especially applicable In a weakly centralized peer-to-peer network, such as a blockchain network with specific identity nodes. The so-called weak centralization means that each node in the peer-to-peer network has different priority communication requirements in message communication due to differences in functional identities. The method can be executed by a peer-to-peer network routing implementation device, which is implemented by software and / or hardware, and is specifically configured in a computer device carrying a P2P network node.

[0027] Such as figure 1 A peer-to-peer network routing implementation method is shown, which is executed by a peer-to-peer network...

Embodiment 2

[0058] figure 2 It is a flowchart of a peer-to-peer network routing implementation method in Embodiment 2 of the present invention, and this embodiment of the present invention is embodied on the basis of the technical solutions of the foregoing embodiments.

[0059] Wherein, the routing implementation method of the peer-to-peer network provided in this embodiment also includes:

[0060] Obtain the identity of the new node when receiving the access message of the new node;

[0061] According to the identity of the new node, the routing table whose priority is equal to or lower than the identity of the new node is transmitted to the new node; wherein, the priority of the basic routing table is the lowest priority.

[0062] Such as figure 2 A routing implementation method for a peer-to-peer network is shown, which specifically includes the following operations:

[0063] S210. Determine at least one set-identity routing table through the upper layer of the node, wherein at l...

Embodiment 3

[0078] image 3 It is a flowchart of a peer-to-peer network routing implementation method in Embodiment 3 of the present invention, and this embodiment of the present invention is embodied on the basis of the technical solutions of the foregoing embodiments.

[0079] Among them, the blockchain system data is deployed in each node of the peer-to-peer network, that is, the peer-to-peer network node in this embodiment is a blockchain node, and then, at least one set identity routing table will be determined through the upper layer of the node, specifically for:

[0080] Through the blockchain function layer deployed by the nodes, determine the node that realizes the set identity of the corresponding function, and as the set function identity node, add the routing information of the set function identity node to the set identity routing table, among which, set The functional identity node has the authority to realize the function in the blockchain, and the non-set functional iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a routing implementation method and device for a peer-to-peer network, equipment and a medium. The method comprises the steps of determining at least one setidentity routing table through a node upper layer, wherein at least one node in the set identity routing table meets a set identity condition; deploying the set identity routing table in a routing layer of the node, the routing layer being further deployed in a basic routing table; and when a message sending demand is generated, sending the message in the peer-to-peer network based on the set identity routing table and the basic routing table. According to the routing implementation method for the peer-to-peer network, the influence of the network attack on the normal operation of the networkis reduced, the disgusting difficulty of the network attack is enhanced, and the stability of the system is further improved.

Description

technical field [0001] The embodiments of the present invention relate to routing communication technology, and in particular, to a routing implementation method, device, device and medium of a peer-to-peer network. Background technique [0002] P2P (Peer To Peer, peer-to-peer network) network communication is used in mainstream open source blockchain systems. The nodes in the P2P network discover the routing information of the neighbor nodes through the routing protocol and form a routing table. When a message needs to be sent, the destination node is selected and sent based on the routing table. For the blockchain network, nodes need to broadcast messages to the blockchain network, so they also need to send broadcast messages based on the routing information of neighboring nodes in the routing table. [0003] However, there are many security threats in the P2P network, such as Eclipse attack, which means that the attacker adds enough false nodes to the set of neighbor no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/741H04L45/74
CPCH04L67/104H04L67/1042H04L45/54
Inventor 王玉操张苗孙君意郑旗
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products