Computer Standards & Interfaces最新文献

筛选
英文 中文
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy BLPCA-ledger:基于 Hyperledger Indy 的联盟区块链轻量级全体会议共识协议
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-28 DOI: 10.1016/j.csi.2024.103876
Faisal Mehmood , Abdullah Ayub Khan , Han Wang , Shahid Karim , Umara Khalid , Feng Zhao
{"title":"BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy","authors":"Faisal Mehmood ,&nbsp;Abdullah Ayub Khan ,&nbsp;Han Wang ,&nbsp;Shahid Karim ,&nbsp;Umara Khalid ,&nbsp;Feng Zhao","doi":"10.1016/j.csi.2024.103876","DOIUrl":"10.1016/j.csi.2024.103876","url":null,"abstract":"<div><p>An examination of different distributed real-time applications operating on the blockchain platform is conducted. These applications can be broadly classified into three types: permissionless public, permissioned private, and consortium chains. In order for a decentralized network to function independently, consensus mechanisms are needed to facilitate the delivery of transactions and keep track of them in a ledger. But the fundamental idea behind Blockchain technology is the use of several consensus protocols, like Proof of Stake, Proof of Elapsed Time, etc., which requires greater processing power. In order to arrange transactions, it increases the demand for buying more computing units. Furthermore, present consortia blockchain consensus mechanisms lack a policy to collect socio-economic financial levies, including monies for charitable donations, education, and social activities. To collect socio-economic taxes, this study suggests a lightweight Plenum consensus algorithm called \"BLPCA\" for consortium blockchains built on Hyperledger Indy. The Byzantine Fault Tolerance concept combined with optimization is used in the suggested BLPCA systems to manage large-scale decentralized traffic of socioeconomic hierarchy. Because there are no transaction costs, BLPCA encourages government analysts to review funds using fewer resources. By including a multithreading heterogeneous technique, the BLPCA can effectively handle multi-transaction needs and execute this protocol in an industrial setting that operates in real-time. It is observed from the simulations that even in the worst-case network scenario—such as a fork—the suggested consortium blockchain does not crash a single transaction. In order to guarantee node scalability, a high propagation speed is determined. Furthermore, the BLPCA shows an excellent average time while constructing socioeconomic transaction blocks.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence 保护物联网:通过卓越的信任管理提升物联网路由安全性
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-24 DOI: 10.1016/j.csi.2024.103873
Anup W. Burange , Vaishali M. Deshmukh , Yugandhara A. Thakare , Nitin Arvind Shelke
{"title":"Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence","authors":"Anup W. Burange ,&nbsp;Vaishali M. Deshmukh ,&nbsp;Yugandhara A. Thakare ,&nbsp;Nitin Arvind Shelke","doi":"10.1016/j.csi.2024.103873","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103873","url":null,"abstract":"<div><p>This study presents an innovative IoT routing security model that integrates trust management to bolster network reliability, improve resilience against routing attacks, and isolate malicious activities. The model, emphasizing node behavior, reputation, and past performance, offers a nuanced approach to network security. Through comprehensive comparisons between dynamic and static models in IoT routing, the impact on crucial performance parameters, including throughput, packet delivery ratio, control traffic overhead, and energy consumption, is quantified. Simulations showcase the model's effectiveness in securing IoT communication, achieving an impressive 98 % accuracy in detecting and mitigating attacks. Comparative analysis against prior studies underscores its exceptional performance, particularly in identifying and classifying attack types such as wormhole, Sybil, and rank, alongside normal traffic. This trust-based IoT routing security model represents a substantial advancement in securing dynamic IoT environments, standing out as a valuable contribution. Noteworthy is its low average power consumption, contributing to its exceptional lightweight nature.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright 基于数字版权区块链的安全轻量级数据管理方案
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-17 DOI: 10.1016/j.csi.2024.103875
Chuxin Zhuang , Qingyun Dai , Yue Zhang
{"title":"A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright","authors":"Chuxin Zhuang ,&nbsp;Qingyun Dai ,&nbsp;Yue Zhang","doi":"10.1016/j.csi.2024.103875","DOIUrl":"10.1016/j.csi.2024.103875","url":null,"abstract":"<div><p>Traditional Digital Copyright (DC) management system faces a single point of failure, and has no strict traceability. Meanwhile, the current blockchain-based DC schemes take less consideration to the authenticity of DC information stored on the blockchain. Additionally, the full node storage overhead and computation overhead of information retrieval and traceability increase significantly with the number of blocks. Therefore, in this paper, we propose a secure and lightweight data management scheme based on the redactable blockchain for DC. Users generate their public and private keys, which provide a legitimate signature. Then, we propose a transaction control mechanism based on ECDSA, which means that the storage of DC information can only be accomplished by providing a legitimate and verifiable signature, including registration and transaction information. Furthermore, we adopt blockchain to record DC information and the chameleon hash algorithm to modify DC information stored on the blockchain when making DC transactions, while keeping the block headers unchanged. System analysis and experimental results confirm that our scheme can address a single point of failure and ensure the authenticity of the information. Meanwhile, our scheme effectively reduces full node storage overhead, and computation overhead of information retrieval and traceability.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141052198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks AHA-BV:带批量验证的卫星-地面集成网络接入和切换验证协议
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103870
Junyan Guo , Liyuan Chang , Yue Song , Shuang Yao , Zhi Zheng , Yihang Hao , Shixuan Zhu , Wei Guo , Ming Zhao
{"title":"AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks","authors":"Junyan Guo ,&nbsp;Liyuan Chang ,&nbsp;Yue Song ,&nbsp;Shuang Yao ,&nbsp;Zhi Zheng ,&nbsp;Yihang Hao ,&nbsp;Shixuan Zhu ,&nbsp;Wei Guo ,&nbsp;Ming Zhao","doi":"10.1016/j.csi.2024.103870","DOIUrl":"10.1016/j.csi.2024.103870","url":null,"abstract":"<div><p>At present, the rapid development of satellite capabilities has prompted the proposal of satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the globalization process, and realizes global data sharing and on-demand use. However, due to the high openness of satellite-to-ground links in STIN, users are vulnerable to attacks such as eavesdropping, replay, tampering, and impersonation when requesting access to satellite nodes and obtaining subscription services. To ensure the security and reliability, many authentication protocols have been proposed, but there are still some shortcomings, such as high authentication overhead, vulnerability to certain attacks. In addition, for inter-satellite handovers caused by the highly dynamic topology of satellites, the computational overhead of existing handover authentication mechanisms is too high to be applied to frequent inter-satellite handover scenarios in STIN. To address the above issues, in this paper, we propose a new access and handover authentication protocol with batch verification for STIN, namely the AHA-BV protocol. The AHA-BV protocol not only realizes mutual authentication and key negotiation between users and satellite access points without the participation of the network control center, but also ensures the conditional anonymity of users during the access authentication phase. Furthermore, the lightweight batch verification mechanism reduces the risk of computing bottlenecks when resource-constrained satellites receive a large number of access authentication requests. Not only that, the AHA-BV protocol can also achieve sustained trust in subscription services from STIN with low computational overhead during the inter-satellite handover authentication phase. Formal and heuristic security analysis show that the AHA-BV protocol can meet the security requirements of STIN. Performance analysis indicates that the AHA-BV protocol has low authentication overhead while ensuring security, and is more suitable for users under satellite dynamic topology to access and obtain subscription services from STIN.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics 利用梯度增强树和泛光灯控制器特性检测和缓解软件定义网络(SDN)中的安全异常现象
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103871
Tohid Jafarian , Ali Ghaffari , Ali Seyfollahi , Bahman Arasteh
{"title":"Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics","authors":"Tohid Jafarian ,&nbsp;Ali Ghaffari ,&nbsp;Ali Seyfollahi ,&nbsp;Bahman Arasteh","doi":"10.1016/j.csi.2024.103871","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103871","url":null,"abstract":"<div><p>Cutting-edge and innovative software solutions are provided to address network security, network virtualization, and other network-related challenges in highly congested SDN-powered networks. However, these networks are susceptible to the same security issues as traditional networks. For instance, SDNs are significantly vulnerable to distributed denial of service (DDoS) attacks. Previous studies have suggested various anomaly detection techniques based on machine learning, statistical analysis, or entropy measurement to combat DDoS attacks and other security threats in SDN networks. However, these techniques face challenges such as collecting sufficient and relevant flow data, extracting and selecting the most informative features, and choosing the best model for identifying and preventing anomalies. This paper introduces a new and advanced multi-stage modular approach for anomaly detection and mitigation in SDN networks. The approach consists of four modules: data collection, feature selection, anomaly classification, and anomaly response. The approach utilizes the NetFlow standard to gather data and generate a dataset, employs the Information Gain Ratio (IGR) to select the most valuable features, uses gradient-boosted trees (GBT), and leverages Representational State Transfer Application Programming Interfaces (REST API) and Static Entry Pusher within the floodlight controller to construct an exceptionally efficient structure for detecting and mitigating anomalies in SDN design. We conducted experiments on a synthetic dataset containing 15 types of anomalies, such as DDoS attacks, port scans, worms, etc. We compared our model with four existing techniques: SVM, KNN, DT, and RF. Experimental results demonstrate that our model outperforms the existing techniques in terms of enhancing Accuracy (AC) and Detection Rate (DR) while simultaneously reducing Classification Error (CE) and False Alarm Rate (FAR) to 98.80 %, 97.44 %, 1.2 %, and 0.38 %, respectively.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141067236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage 基于密文策略的高效属性加密与云存储的协同访问
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-16 DOI: 10.1016/j.csi.2024.103872
Ximing Li, Hao Wang, Sha Ma
{"title":"An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage","authors":"Ximing Li,&nbsp;Hao Wang,&nbsp;Sha Ma","doi":"10.1016/j.csi.2024.103872","DOIUrl":"10.1016/j.csi.2024.103872","url":null,"abstract":"<div><p>The encryption of user data is crucial when employing cloud storage services to guarantee the security of these data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a powerful encryption technique that offers flexible and fine-grained access control capabilities. Further, the multi-user collaborative access ABE scheme additionally supports users to acquire access authorization through collaborative works. However, the existing multi-user collaborative access ABE schemes do not consider the different weights of collaboration users. Therefore, using these schemes for weighted multi-user collaborative access results in either redundant attributes or unsuccessful construction of the access control structure. For this, we proposes the special attribute policy (SAP) problem about weighted multi-user collaborative access, and presents an efficient ciphertext-policy weighted attribute-based encryption with collaborative access scheme (CP-WABE-CA), which can provide efficient collaborative access control for multiple users with different weights. In detail, this scheme utilizes a novel weighted access tree to prevent attribute repetition, thereby eliminating redundant attributes and addressing the issue of constructing access control structures. We prove our scheme is resistant against chosen plaintext attack. The experimental results demonstrate that our scheme has significant computational efficiency advantages compared to related works, without increasing storage or communication overhead. Therefore, the CP-WABE-CA scheme can provide an efficient flexible weighted collaborative access control mechanisms for cloud storage.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141033740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TASIS: A typology of architectural strategies for interoperability in software-intensive systems TASIS:软件密集型系统互操作性架构战略类型学
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-05-15 DOI: 10.1016/j.csi.2024.103874
Pedro Henrique Dias Valle , Vitor Rodrigues Tonon , Lina Garcés , Solange Oliveira Rezende , Elisa Yumi Nakagawa
{"title":"TASIS: A typology of architectural strategies for interoperability in software-intensive systems","authors":"Pedro Henrique Dias Valle ,&nbsp;Vitor Rodrigues Tonon ,&nbsp;Lina Garcés ,&nbsp;Solange Oliveira Rezende ,&nbsp;Elisa Yumi Nakagawa","doi":"10.1016/j.csi.2024.103874","DOIUrl":"10.1016/j.csi.2024.103874","url":null,"abstract":"<div><p>Complex and large software-intensive systems are increasingly present in several application domains, including Industry 4.0, connected health, smart cities, and smart agriculture, to mention a few. These systems are commonly composed of diverse other systems often developed by different organizations using various technologies and, as a consequence, interoperability among these systems becomes difficult. Many architectural strategies for interoperability have already been proposed; however, selecting adequate strategies is challenging. Additionally, it lacks an overview of such strategies. This work presents TASIS, a typology of architectural strategies for the interoperability of software-intensive systems. We also validated it with 33 practitioners from different countries with an extensive experience in integration projects. This work also offers 12 industry-based association rules that suggest how to combine those strategies to mitigate issues at different interoperability levels. As a result, our typology can serve as a starting point to further aggregate new strategies and, ultimately, supports software architects in designing interoperability-driven architectural solutions.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141058337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving multi-party logistic regression in cloud computing 云计算中的隐私保护多方逻辑回归
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-04-10 DOI: 10.1016/j.csi.2024.103857
Huiyong Wang , Tianming Chen , Yong Ding , Yujue Wang , Changsong Yang
{"title":"Privacy-preserving multi-party logistic regression in cloud computing","authors":"Huiyong Wang ,&nbsp;Tianming Chen ,&nbsp;Yong Ding ,&nbsp;Yujue Wang ,&nbsp;Changsong Yang","doi":"10.1016/j.csi.2024.103857","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103857","url":null,"abstract":"<div><p>In recent years, machine learning techniques have been widely deployed in various fields. However, machine learning faces problems like high computation overhead, low training accuracy, and poor security due to data silos, privacy issues and communication limitations, especially in the environment of cloud computing. Logistic regression (LR) is a popular machine learning method used for prediction, while current LR algorithms suffer from high computation cost and communication burden due to interactions between users and cloud servers. In this paper, we propose a Privacy-Preserving Multi-party Logistic Regression (PPMLR) algorithm, which achieves privacy-preserving and non-interactive gradient descent regression training in machine learning. PPMLR uses the Distributed two Trapdoors Public-Key Cryptosystem (DT-PKC) as a main building block, which satisfies additive homomorphic encryption. Specifically, users go off-line after encrypting local private data, then the service provider (<span><math><mi>SP</mi></math></span>) trains the global logistic regression model by interacting with the cloud server (<span><math><mi>CS</mi></math></span>), so that the confidentiality and privacy of user’s private data can be guaranteed during the training process. We prove by detailed security proof that PPMLR guarantees data and model privacy. Finally, we conduct experiments on two popular medical datasets from the UCI machine learning repository. The experimental results show that PPMLR can conduct privacy-preserving training efficiently. Comparison with the stat-of-the-art Privacy-Preserving Logistic Regression Algorithm (PPLRA) shows that the model training time is reduced by about 4 times.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140606943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments 西班牙语 MEACorpus 2023:用于从自然环境中分析西班牙语情绪的多模态语音-文本语料库
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-04-02 DOI: 10.1016/j.csi.2024.103856
Ronghao Pan , José Antonio García-Díaz , Miguel Ángel Rodríguez-García , Rafel Valencia-García
{"title":"Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments","authors":"Ronghao Pan ,&nbsp;José Antonio García-Díaz ,&nbsp;Miguel Ángel Rodríguez-García ,&nbsp;Rafel Valencia-García","doi":"10.1016/j.csi.2024.103856","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103856","url":null,"abstract":"<div><p>In human–computer interaction, emotion recognition provides a deeper understanding of the user’s emotions, enabling empathetic and effective responses based on the user’s emotional state. While deep learning models have improved emotion recognition solutions, it is still an active area of research. One important limitation is that most emotion recognition systems use only text as input, ignoring features such as voice intonation. Another limitation is the limited number of datasets available for multimodal emotion recognition. In addition, most published datasets contain emotions that are simulated by professionals and produce limited results in real-world scenarios. In other languages, such as Spanish, hardly any datasets are available. Therefore, our contributions to emotion recognition are as follows. First, we compile and annotate a new corpus for multimodal emotion recognition in Spanish (Spanish MEACorpus 2023), which contains 13.16 h of speech divided into 5129 segments labeled by considering Ekman’s six basic emotions. The dataset is extracted from YouTube videos in natural environments. Second, we explore several deep learning models for emotion recognition using text- and audio-based features. Third, we evaluate different multimodal techniques to build a multimodal recognition system that improves the results of unimodal models, achieving a Macro F1-score of 87.745%, using late fusion with concatenation strategy approach.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000254/pdfft?md5=7643b0276c958f1d28a134277313e4d1&pid=1-s2.0-S0920548924000254-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140535466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus 光有声誉还不够:确保拜占庭共识中的强秩序公平性
IF 5 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-03-21 DOI: 10.1016/j.csi.2024.103855
Jianhong Li , Qi Chen , Jin Li , Zihan Jiang , Guoyu Yang , Teng Huang , Hongyang Yan , Duncan S. Wong
{"title":"Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus","authors":"Jianhong Li ,&nbsp;Qi Chen ,&nbsp;Jin Li ,&nbsp;Zihan Jiang ,&nbsp;Guoyu Yang ,&nbsp;Teng Huang ,&nbsp;Hongyang Yan ,&nbsp;Duncan S. Wong","doi":"10.1016/j.csi.2024.103855","DOIUrl":"https://doi.org/10.1016/j.csi.2024.103855","url":null,"abstract":"<div><p>With the development of blockchain technology, Byzantine Fault Tolerance (BFT) is becoming an important research topic. The rPBFT consensus algorithm was introduced to address a range of shortcomings in the PBFT consensus algorithm, including high communication complexity, limited scalability, and a significant decline in performance when the system reaches approximately 100 nodes. Although rPBFT has been widely applied in the FISCO consortium chain, existing methods fail to ensure fairness in the power distribution among consensus member nodes and fine-grained node classification in rPBFT consensus. This work proposes a rPBFT consensus mechanism based on reputation value evaluation and supervision of consensus members. By implementing hierarchical management of nodes based on their reputation values, malicious nodes are eliminated, and supervision of consensus members is realized. The simulation experiment simulates the decision process of a variety of different nodes and consensus member jury with different proportions of 60%, 80% and 100% judges. The results show that the proposed scheme can dynamically update the node reputation value and classify various nodes. On the premise that the jury judges cast no less than 50% of the verdict votes, the malicious nodes in the consensus members can also be eliminated from the group of consensus member nodes. The scheme proposed in this paper effectively improves the fault tolerance of the rPBFT consensus mechanism, maintains the stability of the consortium chain network and ensures the security of the system.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":null,"pages":null},"PeriodicalIF":5.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140190904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信