Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network node security attribute evaluation method based on blockchain consensus result feedback

A security attribute and network node technology, which is applied in the field of network node security attribute evaluation based on blockchain consensus result feedback, can solve the problems of subjectivity, different ability to obtain evaluation data, and different data recognition, so as to enhance credibility , to achieve the effect of secure communication

Active Publication Date: 2020-10-13
UNIV OF SCI & TECH OF CHINA
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the process of evaluating the security attributes of the trust model, the source of the evaluation data is not uniform, so that different nodes have different abilities to obtain evaluation data, and different nodes have different recognition of the data, resulting in low accuracy and subjective calculation results. difficult to use as a reference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network node security attribute evaluation method based on blockchain consensus result feedback
  • Network node security attribute evaluation method based on blockchain consensus result feedback
  • Network node security attribute evaluation method based on blockchain consensus result feedback

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0048] Such as figure 2 As shown, the node needs to verify the security attributes of the next-hop node drone before transmitting data. Only when the security attributes of the next-hop node of the transmission are higher than the security attribute threshold, the content hop-by-hop transmission is started, which is based on The hop-by-hop transmission method transmits data between network nodes. Before forwarding, the node stores the received data in the memory, and then periodically checks the security attribute value of the next hop node. When it detects that the security attribute value of the next hop node is updated above the threshold, the stored data is forwarded, otherwise Send temporarily. When the node receives the data sent by the previous hop routing node, it immediately sends confirmation information to the next hop routing node. The last hop routing node deletes the stored data corresponding to the confirmation message after receiving the confirmation message s...

example 2

[0050] In the drone swarm, the drone node needs to take on the two roles of task execution and data communication at the same time. Among them, task execution means that the nodes in the network judge who will perform the task through a certain mechanism. Data communication means the drone node. Data packets can be transmitted to each other. Due to constraints such as low computing power, small storage space, and less spare energy in the drone swarm, it is difficult to deploy complex security defense function modules in the nodes. Moreover, the wireless channel of the UAV network is open, and the information in the network may be transmitted to any node, and the attacker can eavesdrop on the wireless channel to obtain the information in the network. When the UAV network is under attack, malicious nodes can be identified through the security attribute evaluation mechanism.

[0051] Such as image 3 As shown, in a drone swarm with a built-in blockchain, a number of drone nodes wil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network node security attribute evaluation method based on blockchain consensus result feedback, which enhances the credibility between network nodes by combining a consensusmechanism of a blockchain, and has the characteristics of tamper resistance, traceability, decentration and the like. By establishing a security attribute evaluation mechanism based on a trust mechanism, security attribute evaluation is carried out to judge the security of each network node, and secure communication between the nodes is realized.

Description

Technical field [0001] The invention relates to the technical fields of trust mechanisms and blockchains, in particular to a method for evaluating the security attributes of network nodes based on feedback of blockchain consensus results. Background technique [0002] In recent years, network security incidents have occurred frequently. There are some selfish nodes in the network. They stop data packet forwarding in order to save their various resources. There may also be some malicious nodes that misroute, tamper with control information, and destroy routing information. And so on, leading to network breakdown or even paralysis. Traditional network security mechanisms mainly target malicious programs such as viruses in network systems, tampering with private information, providing malicious services, and providing false information. Malicious parties can still adopt strategies to continue activities such as fraud, cheating, and account attacks. The trust mechanism is A breakthr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/27G06F21/64
CPCH04L63/20H04L63/0876G06F16/27G06F21/64
Inventor 姜晓枫彭雨荷曹琬廑陈双武何华森杨坚
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products