《电子技术应用》
您所在的位置:首页 > 通信与网络 > 设计应用 > 基于信誉评分的共识网络重组机制设计
基于信誉评分的共识网络重组机制设计
网络安全与数据治理
郑儿1,陈麓竹1,赵静1,姚旺君1,文新2
1.华北计算机系统工程研究所;2.中国电子信息产业集团有限公司
摘要: 针对共识算法对良性节点占比的依赖,设计了一种基于信誉评分的共识网络重组机制,使得网络能在遭受攻击或发生故障时迅速自我修复和重组,显著提升了抗攻击能力和服务连续性。首先基于信誉机制理论,开发了一个分布式信誉评分系统,实时评估节点信誉,有效处理潜在恶意节点。此外,提出了一种基于信誉评分的共识网络重组机制,通过识别和隔离恶意节点来增强网络的弹性和安全性。该机制设计了网络弹性重组算法,整合了冗余设置、故障诊断和服务节点重新配置功能,确保网络稳定运行和高可靠性。该研究对金融服务、云计算和物联网等广泛使用共识技术的高安全需求领域具有重要应用价值。
中图分类号:TP309文献标识码:ADOI:10.19358/j.issn.2097-1788.2024.06.001
引用格式:郑儿,陈麓竹,赵静,等.基于信誉评分的共识网络重组机制设计[J].网络安全与数据治理,2024,43(6):1-7,15.
Design of a consensus network reorganization mechanism based on credibility score
Zheng Er1,Chen Luzhu1,Zhao Jing1,Yao Wangjun1,Wen Xin2
1.National Computer System Engineering Research Institute of China; 2.China Electronics Corporation
Abstract: In view of the dependence of the consensus algorithm on the proportion of benign nodes, a consensus network reorganization mechanism based on credit score is designed, so that the network can quickly repair and reorganize when it suffers from attack or failure, which significantly improves the antiattack ability and service continuity. In this paper, a distributed credit scoring system based on the theory of credit mechanism is developed to evaluate the node reputation in real time and effectively deal with potential malicious nodes. Furthermore, a consensus network reorganization mechanism based on credibility scoring is proposed to enhance the network resilience and security by identifying and isolating malicious nodes. This mechanism designs the network elastic reorganization algorithm, which integrates the redundant setting, fault diagnosis and service node reconfiguration functions to ensure the stable operation of the network and high reliability. This research has important application value in high security needs areas such as financial services, cloud computing and Internet of Things where consensus technologies are widely used.
Key words : credit mechanism; distributed system; network restructuring

引言

共识算法被广泛运用于各种最新的应用技术中,如区块链、物联网、云计算等,在不需要中心节点的情况下,为这些技术的实现提供了一种确保整个网络中数据的完整性和一致性的手段,是构建大型分布式系统的重要技术方法。共识算法的核心在于共识网络中的节点参与投票过程,通过统计投票多寡决定节点行为,最终达成一致状态转化。

在共识执行过程中,只要维持良性节点的占比不低于限定阈值,就能够保障系统安全[1]。共识算法的设计中没有考虑针对恶意节点的惩罚机制,而实际的分布式网络环境中,节点随时存在受到攻击转为恶意的可能,原有设计缺乏对网络韧性的考量。


本文详细内容请下载:

http://www.chinaaet.com/resource/share/2000006041


作者信息:

郑儿1,陈麓竹1,赵静1,姚旺君1,文新2

(1.华北计算机系统工程研究所,北京100083;2.中国电子信息产业集团有限公司,广东深圳518057)


Magazine.Subscription.jpg

此内容为AET网站原创,未经授权禁止转载。