Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method for block interception attacks in block chains based on mining behaviors

A blockchain and behavioral technology, applied in the blockchain field, can solve problems such as inability to effectively reduce malicious miners, inability to effectively detect malicious miners, and inability to detect and eliminate malicious miners in a timely manner

Pending Publication Date: 2021-02-05
ZHEJIANG SHUREN COLLEGE ZHEJIANG SHUREN UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the credit rating mechanism of this type of method does not comprehensively analyze the mining behavior of miners, so it is impossible to detect and eliminate malicious miners in time
[0004] To sum up, for the block interception attack in the blockchain, the current algorithm simply improves the income distribution scheme, mining protocol and credit mechanism to avoid the occurrence of block interception attack, but it cannot effectively detect malicious miners, cannot effectively Reduce the income of malicious miners for block interception attacks and the division of credit rating mechanism is too simple and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for block interception attacks in block chains based on mining behaviors
  • Protection method for block interception attacks in block chains based on mining behaviors
  • Protection method for block interception attacks in block chains based on mining behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] This embodiment discloses a protection method for block interception attacks in blockchain based on mining behavior, such as figure 1 As shown, it mainly includes the following steps:

[0088] Step 1): parameter initialization;

[0089] Initialize the number of miners N w and the number of mining pools N c , and initialize the following parameters: the number of errors, the number of offline times, the delay time and the threshold of the offline time Active time discrimination threshold ψ, performance score update factor The number of cluster centers K, the maximum number of iterations T max , the current number of iterations step=0 and other parameters;

[0090] Step 2): The mine pool manager preprocesses the data reported by the miners;

[0091] The mine pool manager uses the box plot detection algorithm to clean and normalize the data reported by the miners. If an error value is found, it will be replaced by the average value of the normal value. Among them,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a protection method for block interception attacks in block chains based on mining behaviors, which comprises the following steps of: preprocessing miner data by adopting a box type diagram detection method, and proposing a reward and punishment mechanism and a credit value model comprising workload proof rewards and block mining failure punishment in combination with mining behaviors of miners; comprehensively evaluating the contribution degree of the miners and arousing enthusiasms of the miners to participate in mining; in order to comprehensively evaluate the credit rating of nodes, based on a Gaussian mixture model, considering the average sample posterior probability and sample similarity of each cluster and adopting a miner credit rating division algorithm for balancing the posterior probability and similarity to obtain the distribution situation of malicious miners in a mine pool in the first time; and giving reasonable income distribution weights; andfinally, representing formulas such as attack mine pool selection, effective computing power, mining cost and income through a mathematical formula, establishing an income model of each miner under the block interception attack, and distributing the income of the mine pool in combination with the credit rating of the miners.

Description

Technical field: [0001] The invention relates to the technical field of block chains, in particular to a protection method for block interception attacks in block chains based on mining behavior. Background technique: [0002] Since the release of Bitcoin in 2008, blockchain technology, which does not rely on central institutions, has developed rapidly and has begun to be applied to fields such as finance, the Internet of Things, and intelligent transportation. Among them, the blockchain application mainly realizes block consensus among different participants (miners) through a consensus algorithm based on proof of work (PoW). In the PoW consensus algorithm, miners complete block construction by solving hash-based probability calculation puzzles, thereby earning new currency or transaction fees. The greater the computing power of a miner, the greater the possibility of obtaining coin rewards and block bookkeeping rights. Considering factors such as computing power limitati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06K9/62
CPCH04L63/1408H04L63/1416H04L67/10H04L9/50G06F18/23
Inventor 陈友荣陈浩刘半藤孙萍吕晓雯任条娟王章权
Owner ZHEJIANG SHUREN COLLEGE ZHEJIANG SHUREN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products