Method for defending Sybil attacks in block chain based on improved PBFT algorithm

A blockchain and algorithm technology, applied in the transmission system, electrical components, etc., can solve the problems of lack of consideration of participating nodes having different speaking rights, and the limited role of Sybil nodes, so as to achieve the effect of defending against Sybil attacks and reducing the number of communications

Inactive Publication Date: 2019-11-22
BEIJING UNIV OF TECH
View PDF6 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has a limited role in identifying Sybil nodes, and lacks the consideration of participating nodes having different voices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defending Sybil attacks in block chain based on improved PBFT algorithm
  • Method for defending Sybil attacks in block chain based on improved PBFT algorithm
  • Method for defending Sybil attacks in block chain based on improved PBFT algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0035] figure 1 It is the work flow chart of the original PBFT algorithm, in which the core three stages of the consensus algorithm are the Pre-prepare stage (pre-preparation stage), the Prepare stage (preparation stage), and the Commit stage (commit stage).

[0036] figure 1 The C in it stands for the client, 0, 1, 2, and 3 represent the number of the node, among which 0 is the master node, and the crossed 3 means that it may be a faulty node or a problem node. The behavior shown here is that there is no request for other nodes. response. The whole process is as follows:

[0037] Step 11, REQUEST phase: client c sends a self-signed request to master node 0. o The specific operation of the request, t the timestamp appended by the client when requesting, c the client identifier, REQUEST contains the message content m, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for defending Sybil attacks in a block chain based on an improved PBFT algorithm. According to the method, a PBFT algorithm is improved, an original view change mechanism in the algorithm is deleted, a main node Sp is randomly selected through the credible state of a consensus node, and meanwhile, a Pre-Commit stage is added in a consensus protocol to reduce the communication frequency between nodes; secondly, a reputation model is established to count comprehensive information of each consensus node to calculate a reputation value of the node, and due to the fact that the reputation values of the nodes are different, owned speaking rights are different, and the nodes achieve consensus through voting so as to defend Sybil attacks in the blockchain. According to the method, the frequency of communication between the nodes is reduced, the voting weight of the consensus node corresponds to the owned reputation value by referring to the consensus thought based on share certification in the public chain, and different speaking rights are allocated to the nodes according to the reputation value of the consensus node, so that Sybil attacks in the blockchain can be effectively defended.

Description

technical field [0001] The invention belongs to the field of block chain system security, in particular to a method capable of effectively defending against Sybil attacks in the block chain. Background technique [0002] Since the advent of the electronic encrypted currency "Bitcoin" in 2008, after several years of development, many electronic encrypted currencies such as Ethereum and Ripple have grown exponentially, and have obviously become a hot topic in today's society. As the underlying supporting technology of electronic cryptocurrency, the blockchain has gradually entered the public's field of vision and received widespread attention. The blockchain is also applied in various scenarios such as finance, Internet of Things, and trade management, which puts forward higher requirements for the security of the blockchain. Safety is the first condition. Today's security issues such as smart contract code loopholes, selfish mining, and Eclipse attacks have brought harm to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/101H04L63/1441H04L67/1095H04L67/1097
Inventor 赖英旭薄尊旭刘静
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products