CN110113148A - A kind of software definition opportunistic network node identities verification method based on block chain - Google Patents

A kind of software definition opportunistic network node identities verification method based on block chain Download PDF

Info

Publication number
CN110113148A
CN110113148A CN201910347895.9A CN201910347895A CN110113148A CN 110113148 A CN110113148 A CN 110113148A CN 201910347895 A CN201910347895 A CN 201910347895A CN 110113148 A CN110113148 A CN 110113148A
Authority
CN
China
Prior art keywords
message
node
formula
grading
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910347895.9A
Other languages
Chinese (zh)
Other versions
CN110113148B (en
Inventor
颜昕
马千里
柳星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN201910347895.9A priority Critical patent/CN110113148B/en
Publication of CN110113148A publication Critical patent/CN110113148A/en
Application granted granted Critical
Publication of CN110113148B publication Critical patent/CN110113148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of software definition opportunistic network node identities verification method based on block chain, first grades to received each message by mobile node, and the message grading of generation is sent to corresponding region authenticated unit;Then the message grading by region authenticated unit to the mobile node received for same message polymerize, generate the trust value offset of each message, and form trust value offset block, it is proved again using associated working amount and the common recognition mechanism of equity proof selects target area authenticated unit, the trust value offset block formed is uploaded to pre-generated publicly accessible trust block chain.Using proof of work mechanism in block chain and " miner's election " mechanism, propose the solution for software definition opportunistic network interior joint Authentication Questions, it can be under the premise of not changing network structure primary characteristic, internet security greatly is optimized, provides guarantee for the normal internal communication of software definition opportunistic network.

Description

A kind of software definition opportunistic network node identities verification method based on block chain
Technical field
The present invention relates to field of computer technology, and in particular to a kind of software definition opportunistic network node based on block chain Auth method.
Background technique
As a kind of novel network structure, software definition opportunistic network has opportunistic network and software defined network Double grading.Firstly, it is a kind of network structure of movable self-organization as opportunistic network, with tolerable structure clash Feature, this is the important difference with traditional network.Self-organizing, network topology constantly change between non-stop layer node, mobile node Limited with the storage capacity and the energy of mobile node is the most distinct characteristic of opportunistic network.It is different comprising several in opportunistic network Node, these all nodes have certain communication range, and have certain characteristics of motion, the movement of different nodes The attributes such as model, communication range may be different.These constantly mobile nodes constitute the basis of opportunistic network communication, section Communications status can be kept in point moving process, constitutes the communication link of dynamic change.The node of opportunistic network is able to carry out message Forwarding, when two nodes in the communication radius of other side due to that can not interact directly, then other nodes will be relied on Mobile, carrying forwards to assist the two nodes to carry out indirect communication, this communication for just resulting in opportunistic network has randomness And time delay.Secondly, as software defined network (SDN, Software Defined Network), it is by the closed net of tradition The decoupling of network system is data plane, control plane and applies plane, by can logically realize in control plane programming The centralized management of network environment, open and programmability is the most important feature of SDN.Currently, SDN technology is in data center The fields such as network, network virtualization, cloud computing and WLAN are used widely, this to realize network structure collection in logic The middle thought separated with data forwarding that controls causes depth to be paid close attention in academia.SDN technology is by the control plane of the network equipment It is independent from complicated embedded topological structure, whole network topology is carried out by the central controller of software-driven Deployment is controlled instead of traditional system embedment formula with opening, convenient and fast PLC technology plane, greatlies simplify user network The workflow of management provides good network programmability.
At least there is following technology in implementing the present invention, it may, the method for finding the prior art in present inventor Problem:
Unique structure makes software definition opportunistic network have the feature of some protrusions, and such as: network topology dynamic is more Change, the communication strategy of forwarded hop-by-hop, network more fragility itself etc..Authentication center and storage base since there is no centralization It stands, compared to traditional fixed cable network, software definition opportunistic network is easier pseudo- by listening in information, node identities It makes, the security threats such as data tampering and distributed denial of service attack.On the other hand, software definition opportunistic network interior joint from Body safety is also very fragile.Node will also have both the function of router while autonomous and forwarding message, inside Memory space it is also extremely limited, once being trapped, the important informations such as key, message in node can all be leaked, crack, quilt The node of capture pretends normal node to destroy the normal function of network it is also possible to be steered and rejoin network.
It follows that the presence of software definition opportunistic network is subject to node identities forgery and leads to uneasiness in the prior art Full technical problem.
Summary of the invention
In view of this, the present invention provides a kind of software definition opportunistic network node identities authentication based on block chain Method is subject to node identities forgery to solve or at least partly solve software definition opportunistic network presence in the prior art And lead to unsafe technical problem.
First aspect present invention provides a kind of software definition opportunistic network node identities verification method based on block chain, Include:
Mobile node grades to received each message according to preset condition, and the grading of the message of generation is sent to pair The region authenticated unit answered, wherein the confidence level that message is graded to indicate message;
Message grading of each region authenticated unit to the mobile node received for same message polymerize, and generates The trust value offset of each message, and form trust value offset block, wherein trust value offset to message can Reliability is integrated, and is graded according to the message that each mobile node generates, and reverse push exports the confidence level of each mobile node;
It is proved using associated working amount and the common recognition mechanism of equity proof selects one from the authenticated unit of each region A target area authenticated unit, the trust value offset block formed are uploaded to pre-generated publicly accessible trust Block chain.
In one embodiment, mobile node grades to received each message according to preset condition, comprising:
Mobile node divides received all message in groups, is expressed as M={ M1,M2,...,Mj... }, MjCorresponding one Message j in a message groups M;
It is calculated using confidence level of the formula (1-1) to single message in the group of division:
In formula (1-1),For M in the message groups M that is sent by node kjConfidence level,For message sending node k with Message MjBetween distance, b and γ are two default regulation parameters, are respectively used to the lower bound and gradual change speed of control message confidence level Rate, if node k does not have evaluable message,
Or
It combines formula (1-2) to calculate the confidence level of single message in the group of division using formula (1-1), is disappeared The confidence level set of all message in breath group M
In formula (1-2), RkIndicate that the current trust value of message sending node, Ref are the current trust value of receiving node Set, α1And α2The respectively weight of the two factor;
Receiving node is based on Bayesian inference and confidence level setCalculate all in message groups M disappear The polymerization confidence level of breath.
In one embodiment, receiving node is based on Bayesian inference and confidence level setIt calculates The polymerization confidence level of all message in outbound message group M, comprising:
Shown in derivation process such as formula (1-3):
Wherein,The corresponding complementary event of expression event e, in formulaP (e/C) table Show the prior probability of event e, for value range between 0 to 1, i.e. P (e/C) ∈ [0,1], P (e) indicate that event e occurs general Rate,The complementary event of expression event eThe probability of generation,It is respectively event e and complementary time with P (ck/e)The prior probability of generation presets believability threshold TH, and as P (e/C) > TH, event e generates positive grading, the i.e. event Belong to certainty, conversely, generating negative grading, if P (e/C) is equal with TH, event e will not produce the node for sending the message Raw prestige fluctuation.
In one embodiment, the calculation of trust value offset are as follows: gathered by the calculation method of formula (1-4) All gradings for being directed to a certain message are closed, its trust value offset is obtained:
In formula (1-2),Indicate the trust value offset for the node k that current region authenticated unit obtains, m and n difference The quantity for indicating front grading and negatively grading, θ1And θ2The weight of respectively m and n, θ1And θ2Value determined by formula (1-5),
In formula (1-5), F () is sensitivity coefficient, for controlling influence of the grading to whole result of a small number of nodes Degree, F () are calculated by formula (1-6),
In formula (1-6), Δ A/A is the variation ratio of evaluation index, i.e., what single malice grading generated whole grading Changing ratio, Δ F/F are the change rate of non-determined factor, i.e., certain any grading is to whole contributive rate.
In one embodiment, a mesh is selected from the authenticated unit of each region based on proof of work mechanism Region authenticated unit is marked, the trust value offset block formed is uploaded to pre-generated publicly accessible trust block Chain specifically includes:
It is chosen by way of formula (1-7):
Hash(IDLA,time,PreHash,nonce)≤Si (1-7)
In formula (1-7), IDLAIndicate the number of current region authenticated unit LA, time indicates timestamp, PreHash table Show previous block cryptographic Hash, mono- numerical value generated at random of nonce, SiIndicate the Hash threshold value of LAi, SiIn form for n company The binary sequence that continuous 0 starts, the degree-of-difficulty factor of proof of work and the number of n are positively correlated;
All areas authenticated unit calculates cryptographic Hash after nonce value of more correcting one's mistakes, according to SHA-256 hash algorithm, Meet the qualification for then having the wheel and uploading offset block of formula (1-8) condition;
Si=2Nm-Nz-1 (1-8)
Formula (1-8) defines character string SiExpression-form, wherein int () indicate return bracket in be worth integer portion Point, NmFor the digit of the resulting cryptographic Hash of SHA-256 hash algorithm, NmEqual to 256, NzIndicate hexadecimal string SiHead end Continuous 0 number;
The sum of absolute value by comparing trust value offsets all in the authenticated unit of each region come select upload mesh Mark region authenticated unit:
O in formula (1-9)iFor LAiCurrent trust value side-play amount set,Indicate the section that current region authenticated unit obtains The trust value offset of point k, FmaxTo limit FiThe upper bound.
In one embodiment, trust value offset block includes block stem and block body.
In one embodiment, the method also includes:
Using the consistent scheme of Distributed Coordination all mobile nodes and region authenticated unit are reached common understanding.
Said one or multiple technical solutions in the embodiment of the present application at least have following one or more technology effects Fruit:
A kind of software definition opportunistic network node identities verification method based on block chain provided by the invention, first by moving Dynamic node grades to received each message according to preset condition, and the message grading of generation is sent to corresponding region and is recognized Unit is demonstrate,proved, then message grading of each region authenticated unit to the mobile node received for same message polymerize, The trust value offset of each message is generated, and forms trust value offset block, wherein trust value offset is to message Confidence level integrated;Method again based on proof of work mechanism selects a mesh from the authenticated unit of each region Region authenticated unit is marked, the trust value offset block formed is uploaded to pre-generated publicly accessible trust block Chain.
Block chain technology is applied to by the present invention for the safety issue in software definition opportunistic network in the prior art The verifying of software definition opportunistic network interior joint identity, can be in the decentralization trusted without any single-point using block chain technology In environment, by combining distributed account book technology and its exclusive common recognition mechanism, promote each node compliance in network Common recognition.By the exclusive common recognition mechanism of analysis block chain, such as common proof of work mechanism (PoW, Proof of Work) Realization process, and " miner's election " mechanism of interface block chain, propose for software definition opportunistic network interior joint authentication Solution to the problem can greatly optimize internet security under the premise of not changing network structure primary characteristic, be soft Part defines the normal internal communication of opportunistic network and provides guarantee.It solves software definition opportunistic network in the prior art and there is appearance Node identities are subject to forge and lead to unsafe technical problem.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 is the process of the software definition opportunistic network node identities verification method based on block chain in the embodiment of the present invention Figure;
Fig. 2 is the schematic diagram for the security framework that the method for the embodiment of the present invention is applied;
Fig. 3 is the schematic diagram of Hash threshold value in the embodiment of the present invention;
Fig. 4 is block form schematic diagram in the embodiment of the present invention;
Fig. 5 is block chain form schematic diagram in the embodiment of the present invention;
When Fig. 6 is that all gradings in the embodiment of the present invention for a certain message are polymerize, mistake comparation and assessment example disappears with falseness The function relation figure of breath ratio;
Fig. 7 (a) is the schematic diagram using the node verification precision based on Epidemic routing algorithm;
Fig. 7 (b) is the schematic diagram using the node verification precision of Prophet routing algorithm;
Fig. 7 (c) is the schematic diagram using the node verification precision of Maxprop routing algorithm;
Fig. 8 is that the function of the sum of the absolute value that block time-consuming T and trust value offset are generated in embodiment of the present invention Fi closes System's figure;
Fig. 9 is message grading and the time-consuming contrast schematic diagram of " block " transmission in the embodiment of the present invention.
Specific embodiment
It is an object of the invention to exist to be subject to node identities puppet for software definition opportunistic network in the prior art It makes and leads to unsafe technical problem, provide a kind of software definition opportunistic network node identities authentication based on block chain Method.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Embodiment one
Present inventor by largely practice discovery, in existing software definition opportunistic network there are safeties to ask Topic, it is contemplated that the features such as decentralization of block chain, network be healthy and strong, safe and reliable, flexibility is very suitable for soft now for solving Part defines the heart defect in opportunistic network technology.The feature of block chain technology maximum is to go what is trusted without any single-point In centralization environment, by combining distributed account book technology and its exclusive common recognition mechanism, each node in network is promoted to reach Consistency common recognition, block chain is substantially the chain structure database an of decentralization, is closed using traditional cryptography as pointer Join each " block ".The present invention common recognition mechanism exclusive by analysis block chain, such as common proof of work mechanism (PoW, Proof of Work), equity prove mechanism (PoS, Proof of Stake), practical Byzantine failure tolerance (PBFT, Practical Byzantine Fault Tolerance) mechanism realization process, and " miner's election " mechanism of interface block chain proposes needle To the solution of software definition opportunistic network interior joint Authentication Questions, in the premise for not changing network structure primary characteristic Under, internet security is greatly optimized, provides guarantee for the normal internal communication of software definition opportunistic network.
A kind of software definition opportunistic network node identities verification method based on block chain is present embodiments provided, is referred to Fig. 1, this method comprises:
Step S1: mobile node grades to received each message according to preset condition, and the message of generation is graded It is sent to corresponding region authenticated unit, wherein the confidence level that message is graded to indicate message.
Specifically, mobile node includes message sending node and message recipient node, and mobile node can be to other nodes Message is sent, while can also receive the message of other nodes transmission, so message sending node and message recipient node are opposite For.
Fig. 2 is the security framework based on block chain technology of method provided by the invention application, which mainly includes moving Dynamic node and region authenticated unit LA.Meeting in random movement can be passed through between each node in communication context certain Carrying out information exchange, LA is only used for supplemental communication and ensures the effect of safety, so, this is connect between being still node by movement It touches to communicate as leading network structure, i.e. software definition opportunistic network.
Message recipient node can judge that calculating message to received message grades according to itself, and preset condition may include pre- If adjustment parameter and for message sending node between message at a distance from etc..When the numerical value of grading can just be born, positive grading indicates to work as Front nodal point is it is thought that a more believable message, and negative grading then indicates a fabulous message.In view of software Define the memory capacity limitation of opportunistic network interior joint, after a period of time often, all gradings that each node can be run up to It is uploaded to it apart from nearest static infrastructure: in the authenticated unit LA of region.
Step S2: message grading of each region authenticated unit to the mobile node received for same message gathers It closes, generates the trust value offset of each message, and form trust value offset block, wherein trust value offset is to right The confidence level of message is integrated, and is graded according to the message that each mobile node generates, and reverse push exports each mobile node Confidence level.
Specifically, since not mobile node may be different to the message grading of same message, in order to message can Reliability optimizes, then needs region authenticated unit to polymerize the received message grading for same message, thus raw At the trust value offset of each message.
Specifically, the trust value of each node can be obtained by calculating the sum of all offsets, in this, as node body The foundation of part verifying.By trust value offset, the message that can be generated according to each mobile node is graded to judge each shifting The communication behavior of dynamic node, i.e., sincere degree when being communicated between node, for example, led between each mobile node When letter, if some node is transmitted to other nodes for message that it is received is intact, current communication is exactly primary Sincere reliable behavior;, whereas if the message that it is received forward again after distorting by this node, then it is not one The communication of secondary sincerity.In the present invention, the confidence level of mobile node can be derived according to the confidence level of message.
The common recognition mechanism that step S3: being proved using associated working amount and equity proves, from the authenticated unit of each region, choosing A target area authenticated unit is taken out, the trust value offset block formed is uploaded to pre-generated publicly accessible Trust block chain.
Specifically, the common recognition mechanism proved with equity is proved the invention proposes associated working amount to safeguard trust block Chain.In order to safeguard node identities verification result, calculated result is packaged by the LA of each region generates " block " (i.e. trust value offset Measure block), and " miner's election " mechanism of analog block chain competes " block " upload authority, it will by target area authenticated unit " block " is uploaded to publicly accessible trust block chain, proves by using associated working and stake proof is consensus Mechanism, the total value of offset is bigger in block, and corresponding LA is easier to find solution for proof of work function.So far, entirely All nodes and LA in network environment cooperate jointly safeguards a reliable and consistent trust block chain.
In the present solution, the effect of fixed region authenticated unit LA is as follows:
(1) the message grading for storing all nodes in its compass of competency compensates for single in software definition opportunistic network The memory capacity of node limits;
(2) on the basis of based on the grading of each message, polymerization generates the degree of belief offset of single message, is packaged into trust value Offset " block " has shared the calculating pressure of mobile node;
(3) " miner " election is participated in, the upload power of competition " block ", " block " is uploaded to publicly accessible by the LA that wins Trust block chain, the confidence level of each node is inquired for all devices, the authentication and maintenance of node are realized with this.
The verifying of software definition opportunistic network node identities and maintenance process based on block chain technology can be divided into three steps: 1) message grading is calculated;2) trust value offset is calculated;3) generation and upload of trust value offset block.
In one embodiment, mobile node grades to received each message according to preset condition, comprising:
Mobile node divides received all message in groups, is expressed as M={ M1,M2,...,Mj... }, MjCorresponding one Message j in a message groups M;
It is calculated using confidence level of the formula (1-1) to single message in the group of division:
In formula (1-1),For M in the message groups M that is sent by node kjConfidence level,For message sending node k with Message MjBetween distance, b and γ are two default regulation parameters, are respectively used to the lower bound and gradual change speed of control message confidence level Rate, if node k does not have evaluable message,
Or
It combines formula (1-2) to calculate the confidence level of single message in the group of division using formula (1-1), is disappeared The confidence level set of all message in breath group M
In formula (1-2), RkIndicate that the current trust value of message sending node, Ref are the current trust value of receiving node Set, α1And α2The respectively weight of the two factor;
Receiving node is based on Bayesian inference and confidence level setCalculate all in message groups M disappear The polymerization confidence level of breath.
Specifically, during the grading of message refers to two node communications, the credibility of the information content is exchanged, number of grading The value the high, indicates that the confidence level of the message is higher.The single grading of certain message is generated on the node for receiving the secondary message 's.
In the specific implementation process, all message in same group and do not have same confidence level, when original state, Therefore the confidence level of certain single message can be obtained by formula (1-1), if node k does not have evaluable message,Except this it Outside, the Node Credit height for sending current message also will affect the confidence level of the message, and recipient node to neighbouring LA by sending out It requests, the current prestige of query messages sending node, and is polymerize with distance factor out, be just easy to get more believable knot Fruit, as shown in formula (1-2).
That is to say, can calculate only with formula (1-1) the confidence level of message, formula (1-1) can also be combined (1-2) calculates the confidence level of single message.When used in combination, but the usage scenario of the two is different.Work as safety When frame is in original state, since other message generated gradings can only pass through formula as reference at this time not yet The estimation of (1-1) Lai Jinhang confidence level.With the continuous service of frame, confidence level is constantly calculated and is accumulated, so that subsequent meter There are the data that can be used for reference, at this point, passing through the more accurate confidence level estimation of formula (1-2) Lai Jinhang.
By formula (1-2), message recipient node can calculate the confidence level set of all message in message groups MIt is then based on the confidence level set C of the above-mentioned a certain message groups M obtained, recipient node can utilize Bayes Reasoning process calculates the polymerization confidence levels of all message in message groups M.
Wherein, receiving node is based on Bayesian inference and confidence level setIt calculates in message groups M The polymerization confidence level of all message, comprising:
Shown in derivation process such as formula (1-3):
Wherein,The corresponding complementary event of expression event e, in formulaP (e/C) table Show the prior probability of event e, for value range between 0 to 1, i.e. P (e/C) ∈ [0,1], P (e) indicate that event e occurs general Rate,The complementary event of expression event eThe probability of generation,With P (ck/ e) it is respectively event e and complementary timeThe prior probability of generation presets believability threshold TH, and as P (e/C) > TH, event e generates positive grading, the i.e. event Belong to certainty, conversely, generating negative grading, if P (e/C) is equal with TH, event e will not produce the node for sending the message Raw prestige fluctuation.
Specifically, as in network node and LA can not learn ratio shared by any time malicious node in network, Therefore the confidence level polymerization that traditional statistics outline method carries out message is not available it.The reverse probability that " Bayesian inference " proposes is pre- Survey method is that the present invention provides theory supports, i.e., the probability occurred according to the current limited anti-judge's part of observed result, and Continuous correction result precision in subsequent observation.Shown in specific derivation method such as formula (1-3).The numerical value of P (e/C) determines event The genuine and believable degree of e also just determines that message e generates the quality of credible grading, presets confidence level threshold by statistical experiment Value TH, as P (e/C) > TH, event e generates positive grading, i.e. the event category certainty, conversely, negative grading is generated, if P (e/C) equal with TH, then event e will not generate prestige fluctuation to the node for sending the message.
In one embodiment, the calculation of trust value offset are as follows: gathered by the calculation method of formula (1-4) All gradings for being directed to a certain message are closed, its trust value offset is obtained:
In formula (1-4),Indicate the trust value offset for the node k that current region authenticated unit obtains, m and n difference The quantity for indicating front grading and negatively grading, θ1And θ2The weight of respectively m and n, θ1And θ2Value determined by formula (1-5),
In formula (1-5), F () is sensitivity coefficient, for controlling influence of the grading to whole result of a small number of nodes Degree, F () are calculated by formula (1-6),
In formula (1-6), Δ A/A is the variation ratio of evaluation index, i.e., what single malice grading generated whole grading Changing ratio, Δ F/F are the change rate of non-determined factor, i.e., certain any grading is to whole contributive rate.
Specifically, on the basis of generating the grading of each message single, each mobile node periodically calculates this node Resulting all gradings are uploaded to neighbouring LA, since malicious node can generate mistake grading deliberately to interfere whole network environment Information exchange, and different node may generate different gradings to same message, so LA is often collected into for a certain Several conflicts of message are graded.For example, thering is x node to give positive grading some message m, and there is y node to give Negative grading, the present invention are polymerize all gradings for a certain message by calculation method shown in formula (1-4), obtain it Trust value offset.Fig. 6 is referred to, when being polymerize for all gradings in the embodiment of the present invention for a certain message, mistake is commented The function relation figure of ratio and spoofing ratio.
Δ A/A is the variation ratio of evaluation index, i.e., the changing ratio that single malice grading generates whole grading, Δ F/ F is the change rate of non-determined factor, i.e., certain any grading is to whole contributive rate.It should be noted that the present invention is each section Point, which generates the reliable premise for trusting grading, to be carried out under the hypothesis that attacker is unable to control most of node, i.e., most of The generally acknowledged grading of node is more likely then correct and objective, it is therefore desirable to weaken minority by setting sensitivity coefficient The influence of group.Absolute value | F () | bigger, then a small number of malice gradings can generate bigger shadow to the credibility of the overall evaluation It rings, so, it should F is controlled in lower value.
In one embodiment, the method based on proof of work mechanism is selected from the authenticated unit of each region One target area authenticated unit, the trust value offset block formed are uploaded to pre-generated publicly accessible letter Appoint block chain, specifically include:
It is chosen by way of formula (1-7):
Hash(IDLA,time,PreHash,nonce)≤Si (1-7)
In formula (1-7), IDLAIndicate the number of current region authenticated unit LA, time indicates timestamp, PreHash table Show previous block cryptographic Hash, mono- numerical value generated at random of nonce, SiIndicate the Hash threshold value of LAi, SiIn form for n company The binary sequence that continuous 0 starts, the degree-of-difficulty factor of proof of work and the number of n are positively correlated;
All areas authenticated unit calculates cryptographic Hash after nonce value of more correcting one's mistakes, according to SHA-256 hash algorithm, Meet the qualification for then having the wheel and uploading offset block of formula (1-8) condition;
Si=2Nm-Nz-1 (1-8)
Formula (1-8) defines character string SiExpression-form, wherein int () indicate return bracket in be worth integer portion Point, NmFor the digit of the resulting cryptographic Hash of SHA-256 hash algorithm, NmEqual to 256, NzIndicate hexadecimal string SiHead end Continuous 0 number;
The sum of absolute value by comparing trust value offsets all in the authenticated unit of each region come select upload mesh Mark region authenticated unit:
O in formula (1-9)iFor LAiCurrent trust value side-play amount set,Indicate the section that current region authenticated unit obtains The trust value offset of point k, FmaxTo limit FiThe upper bound.
Specifically, due to not having to concentrate fixed administrative center, respective trust value offset is generated in all LA After " block ", needs to select one " miner " and be uploaded in trust value offset block chain.It is being mostly based on block In the system of chain technology, miner's selection scheme based on proof of work mechanism is often used, such as bit coin known to us. During all LA election contest " digging mine " qualification, each LA constantly changes the value of nonce, and nonce value is compiled with current LA Number, previous block cryptographic Hash and timestamp etc. be used as parameter, participate in Hash operation jointly, " miner " election that the present invention takes Shown in method such as following formula (1-7).Then cryptographic Hash is further calculated according to SHA-256 hash algorithm, and is chosen according to formula (1-8) Qualified LA out.Wherein, the form of Hash threshold value is as shown in Figure 3.
Software definition opportunistic network is that one kind is moved freely by node, is met at random to carry out the special net of message transmission Network structure, it is logical to be formed with the route pattern of " storage-carrying-forwarding " independent of the complete routing between mobile node Believe chance and hop-by-hop communication.But this communication mode also brings new problem.Software definition opportunistic network does not need building There is fixed reliable transmission channel between two nodes of vertical communication, do not require network that there is connectivity, node it is random The mobile unstability etc. for also resulting in communication.In secure context, software definition opportunistic network interior joint sparsity is higher, causes Malicious node can arbitrarily be added in current network environment, and malicious node meeting malicious dissemination deceptive information, secondly and malice saves Point can capture normal node to mislead it and carry out normal message propagation, so that the authenticity of message can not protect in whole network Card.
It is reliably connected end to end secondly, software definition opportunistic network can not be established, therefore can not be using online to concentration Formula authentication center carries out real time communication, and any node identities and the reliability of message of identifying can only all pass through traditional cryptography solution Certainly, it has greater limitations.In addition, the mode that software definition opportunistic network interior joint carries information is held in terms of secret protection It is easily maliciously intercepted or is distorted, the integrality of data and the fault-tolerance of equipment are all by very big threat.
Block chain can be considered a kind of tool that can solve safety issue in software definition opportunistic network.In discrete networks In, block chain can safeguard the database that all members unanimously accept, even if node can not be real with centralized authentication center Shi Tongxin can also guarantee the safe and reliable of data in block.The list structure that block chain is ordered into, in addition to number in each " block " According to outer, timestamp, reference of precursor block etc. is also stored, and every time modification, update the common license that will obtain all members, All members are in the status of complete equity in block chain, and keep identical block chain copy.The core of block chain is " to dig The selection strategy of mine " power devises herein by the common election mechanism of block chain is imitated and a kind of has combined proof of work Mechanism and equity prove trust offset " block " update scheme that mechanism combines, and data store organisation has good appearance Mistake, under no enough calculation power supports, any malicious node can not all distort the record in chain.
It is had the advantage that using the safety of block chain technical optimization opportunistic network
1) decentralization: under block chain structure, data cooperate maintenance by each distributed node, and each node is protected A block chain copy is stayed, Single Point of Faliure is effectively prevent, the scalability of whole system is also improved;
2) anti-tamper: the storage organization based on chained list makes malicious node in attempting to tamper with chain when data, needs simultaneously Entire chained list is rebuild, so that crime cost is exponentially increased;
3) data consistency: in block chain structure, database is safeguarded jointly by all nodes, the operation only reached common understanding It can just be allowed to, the inquiry request that any node issues all returns to obtain identical result;
4) it updates timeliness: proving the more new strategy of mechanism based on equity, so that the operation of more new block chain can be maximum every time The variation for changing reflection node confidence, ensures that the update timeliness of data in chain;
5) fault-tolerance: " miner " election strategy based on proof of work mechanism, so that failing or being captured in part of nodes In the case where obtaining, as long as there is enough calculation power to support, it still is able to the normal operation of guarantee system.
In summary it analyzes, node identities verifying and the data in software definition opportunistic network is solved with block chain technology Secure storage problem has good feasibility.
In order to enable the result for updating offset block chain every time embodies the large change of trust value, the present invention passes through ratio In more each LA the sum of absolute value of all trust value offsets come select upload LA block, specific calculation be formula (1- 9), in order to avoid FiIt is excessive and cause some LA continuously by selection upload scene, use FmaxTo limit FiThe upper bound, once offset Amount block is successfully uploaded, and LAi will remove current offset duration set O immediatelyi, realize the fair relatively between each LA.
So far, by imitate block chain in " miner " election mode, the trust offset block that epicycle should be uploaded with And execute the LA that upload acts and be selected, then, which is packaged into specific format for offset block, that is, it is inclined to form trust value Shifting amount block.
Wherein, trust value offset block includes block stem and block body.
Specifically, offset block used in the embodiment of the present invention includes block stem and block body two parts, and Fig. 4 shows The format of block is gone out.
Wherein, block stem Header verifies the legitimate verification of the block for LA, includes following field:
1) Block ID: block id, the unique identification as the block;
2) LA ID: it is responsible for uploading the id of the block;
3) Generation time: timestamp, the execution time of mark upload movement;
4) Prev Hash: the reference to previous block cryptographic Hash;
5) Nonce: the random number of Hash operation is participated in.
Block body Body then stores a side-play amount set, and the confidence values of arbitrary node k are by current offset in network In block chain, cumulative gained is carried out by all offsets that node k is generated, trusts threshold when the resulting numerical value that adds up is more than or equal to When value TH, then predicate node k is a believable normal node, conversely, predicate node k is one incredible if being less than TH Malicious node.After being uploaded to offset block chain via LAi, all nodes and LA can common query, maintenance distribution Offset set of records ends.
In order to guarantee the consistency of all mobile node identity results, the method also includes:
Using the consistent scheme of Distributed Coordination all mobile nodes and region authenticated unit are reached common understanding.
Specifically, by being analyzed above it is found that the great randomness of the generation of Nonce value, sometimes results in multiple LA and calculate The equal this small probability event of resulting workload occurs, and system can't give up other extra blocks and only upload one at this time It is a, if the LA for being responsible for upload block receives these blocks and all Nonce values all pass through validation checking, it will appear trust The case where being worth offset block chain bifurcated.In order to which under conditions of decentralization, all nodes in network environment are safeguarded jointly A public consistent offset block chain needs to reach all nodes and LA altogether Know.After bifurcated occurs in main chain, block can be added to after one of branch by the LA that each round is campaigned for out, be demonstrate,proved by workload Bright mechanism is it is found that after several wheels, and more workloads of the maximum branch's accumulation of length, this branch will be by as real Main chain becomes the common recognition of all nodes of whole network, other branches then will not extend and be dropped again.In addition, in being lost All blocks abandoned in branch will be collected, and attempt to be re-added on main chain, ensure that the one of all node identities results Cause property.
In order to illustrate more clearly of the beneficial effect of method provided by the invention, said below by a specific example It is bright.
All nodes are to be based on RWP (Random Waypoint) model in the rectangular community 600m × 600m in this experiment Mobile, node total number is 300, and the communication radius of each node is 10m, and the average movement speed of node is 10m/s, maximum speed Degree is 15m/s, minimum speed 5m/s.The mean residence time of each node is 15s, and the minimum and maximum residence time is respectively 20s and 10s.In order to enable entire map to include by the union of all LA communication contexts, the communication half of each LA of experimental setup Diameter is 100m, and quantity is 25.Data collection interval is 60s, time-to-live TTL (the Time To of each data packet Live it) is set as 600s, which is only applicable to mobile node, and is not suitable for LA, i.e., when certain in a mobile node A message or grading were not uploaded to LA in 600 seconds, and the data of these time-out will be dropped.Total duration is simulated in experiment 3600s。
Due to the software definition opportunistic network node identities proof scheme expectation proposed by the present invention based on block chain technology Interaction as more as possible between node, so tri- kinds of routing algorithms difference of this experimental selection Epidemic, Prophet, Maxprop Experiment, and experiment effect is described by comparing.In first 60s after experiment starts, due to LA all in this period It does not carry out nodal information rating collection also, therefore temporarily calculates extremely subsequent process, only each node without carrying out offset in LA Between communication and grading generate, after 60s, node communication, life all can be gradually carried out in every segment data acquisition interval from test Grading is uploaded, LA calculates offset and competes " block " upload authority etc. operation to LA at message grading, node.Test other phases It is as shown in table 1 below to close parameter value.Experimental result is as shown in figure 6 above~9.Wherein, Fig. 6 is when being polymerize, mistake comparation and assessment example with The function relation figure of spoofing ratio;Fig. 7 (a), 7 (b) and 7 (c) are respectively to be obtained using three kinds of different routing algorithms Node identities verify precision.Fig. 8 is the letter of the sum of the absolute value that block time-consuming T and trust value offset are generated in the present embodiment Fi Number relational graph;Fig. 9 is message grading and the time-consuming contrast schematic diagram of " block " transmission in the embodiment of the present invention.
1 experiment parameter table of table
On the whole, node identities checking research of the present invention by block chain Technology application in software definition opportunistic network In, in an experiment by analysis grading and node identities verify precision, block generate time loss and communication-cost obtain with Draw a conclusion:
1) discrimination precision of the node identities proof scheme proposed by the present invention based on block chain technology is calculated in three kinds of routings 90% or so can at least be reached under method, when malicious node ratio is lower, discrimination precision is then higher.
2) suitable cryptographic Hash M is selected in the present invention program, under the premise of calculation power needed for capable of guaranteeing block generation is enough, Block generates time-consuming and remains at reduced levels.
3) the node identities maintenance strategy proposed by the present invention based on block chain structure, grading and trust value offset block Communication time-consuming be kept at 120ms and 250ms hereinafter, using tolerable lower transmission delay as cost, guarantee node body The reliability of part maintenance.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (7)

1. a kind of software definition opportunistic network node identities verification method based on block chain characterized by comprising
Mobile node grades to received each message according to preset condition, the message grading of generation is sent to corresponding Region authenticated unit, wherein the confidence level that message is graded to indicate message;
Message grading of each region authenticated unit to the mobile node received for same message polymerize, and generates each The trust value offset of message, and form trust value offset block, wherein trust value offset is to the confidence level to message It is integrated, and is graded according to the message that each mobile node generates, reverse push exports the confidence level of each mobile node;
It is proved using associated working amount and the common recognition mechanism of equity proof selects a mesh from the authenticated unit of each region Region authenticated unit is marked, the trust value offset block formed is uploaded to pre-generated publicly accessible trust block Chain.
2. the method as described in claim 1, which is characterized in that mobile node according to preset condition to received each message into Row grading, comprising:
Mobile node divides received all message in groups, is expressed as M={ M1,M2,...,Mj... }, MjA corresponding message Message j in group M;
It is calculated using confidence level of the formula (1-1) to single message in the group of division:
In formula (1-1),For M in the message groups M that is sent by node kjConfidence level,For message sending node k and message Mj Between distance, b and γ are two default regulation parameters, the lower bound and fade rates of control message confidence level are respectively used to, if section Point k does not have evaluable message, then
Or
It combines formula (1-2) to calculate the confidence level of single message in the group of division using formula (1-1), obtains message groups The confidence level set of all message in M
In formula (1-2), RkIndicate that the current trust value of message sending node, Ref are the current trust value set of receiving node, α1And α2The respectively weight of the two factor;
Receiving node is based on Bayesian inference and confidence level setCalculate all message in message groups M It polymerize confidence level.
3. method according to claim 2, which is characterized in that receiving node is based on Bayesian inference and confidence level setCalculate the polymerization confidence level of all message in message groups M, comprising:
Shown in derivation process such as formula (1-3):
Wherein,The corresponding complementary event of expression event e, in formulaP (e/C) indicates thing The prior probability of part e, for value range between 0 to 1, i.e. P (e/C) ∈ [0,1], P (e) indicate the probability that event e occurs,The complementary event of expression event eThe probability of generation,With P (ck/ e) it is respectively event e and complementary timeHair Raw prior probability presets believability threshold TH, and as P (e/C) > TH, event e generates positive grading, i.e., the event category can Letter event, conversely, generating negative grading, if P (e/C) is equal with TH, event e will not generate letter to the node for sending the message Reputation fluctuation.
4. the method as described in claim 1, which is characterized in that the calculation of trust value offset are as follows: pass through formula (1-4) Calculation method polymerize all gradings for a certain message, obtain its trust value offset:
In formula (1-4),Indicate the trust value offset for the node k that current region authenticated unit obtains, m and n are respectively indicated Quantity front grading and negatively graded, θ1And θ2The weight of respectively m and n, θ1And θ2Value determined by formula (1-5),
In formula (1-5), F () is sensitivity coefficient, for controlling influence degree of the grading to whole result of a small number of nodes, F () is calculated by formula (1-6),
In formula (1-6), Δ A/A is the variation ratio of evaluation index, i.e., the variation that single malice grading generates whole grading Ratio, Δ F/F are the change rate of non-determined factor, i.e., certain any grading is to whole contributive rate.
5. the method as described in claim 1, which is characterized in that proof of work mechanism is based on, from each region authenticated unit In, select a target area authenticated unit, the trust value offset block formed be uploaded to it is pre-generated can be public The trust block chain accessed altogether, specifically includes:
It is chosen by way of formula (1-7):
Hash(IDLA,time,PreHash,nonce)≤Si (1-7)
In formula (1-7), IDLAIndicate the number of current region authenticated unit LA, time indicates timestamp, before PreHash expression One block cryptographic Hash, mono- numerical value generated at random of nonce, SiIndicate the Hash threshold value of LAi, SiIt is in form continuous with n 0 binary sequence started, the degree-of-difficulty factor of proof of work and the number of n are positively correlated;
All areas authenticated unit calculates cryptographic Hash after nonce value of more correcting one's mistakes, according to SHA-256 hash algorithm, meets The qualification for then having the wheel and uploading offset block of formula (1-8) condition;
Si=2Nm-Nz-1 (1-8)
Formula (1-8) defines character string SiExpression-form, wherein int () indicate return bracket in be worth integer part, Nm For the digit of the resulting cryptographic Hash of SHA-256 hash algorithm, NmEqual to 256, NzIndicate hexadecimal string SiHead end continuous 0 Number;
The sum of absolute value by comparing trust value offsets all in the authenticated unit of each region come select upload target area Domain authenticated unit:
O in formula (1-9)iFor LAiCurrent trust value side-play amount set,Indicate the node k's that current region authenticated unit obtains Trust value offset, FmaxTo limit FiThe upper bound.
6. the method as described in claim 1, which is characterized in that trust value offset block includes block stem and block body.
7. the method as described in claim 1, which is characterized in that the method also includes:
Using the consistent scheme of Distributed Coordination all mobile nodes and region authenticated unit are reached common understanding.
CN201910347895.9A 2019-04-28 2019-04-28 Software defined opportunistic network node identity verification method based on block chain Active CN110113148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910347895.9A CN110113148B (en) 2019-04-28 2019-04-28 Software defined opportunistic network node identity verification method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910347895.9A CN110113148B (en) 2019-04-28 2019-04-28 Software defined opportunistic network node identity verification method based on block chain

Publications (2)

Publication Number Publication Date
CN110113148A true CN110113148A (en) 2019-08-09
CN110113148B CN110113148B (en) 2020-06-23

Family

ID=67487139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910347895.9A Active CN110113148B (en) 2019-04-28 2019-04-28 Software defined opportunistic network node identity verification method based on block chain

Country Status (1)

Country Link
CN (1) CN110113148B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955721A (en) * 2019-10-23 2020-04-03 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN111431696A (en) * 2020-03-26 2020-07-17 深圳市欧欣泰科技有限公司 Identity-based block chain sealing mechanism
CN111431695A (en) * 2020-03-24 2020-07-17 武汉理工大学 Software defined tactical network node credit management method based on block chain
CN111770103A (en) * 2020-06-30 2020-10-13 中国科学技术大学 Network node security attribute evaluation method based on block chain consensus result feedback
CN113159743A (en) * 2021-02-02 2021-07-23 上海大学 Vehicle crowd sensing excitation system and method based on block chain and edge calculation

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107222478A (en) * 2017-05-27 2017-09-29 暨南大学 Software defined network key-course security mechanism construction method based on block chain
CN107579998A (en) * 2017-10-17 2018-01-12 光载无限(北京)科技有限公司 Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract
WO2018077049A1 (en) * 2016-10-27 2018-05-03 Huawei Technologies Co., Ltd. Distributed data store-equipped evolved packet core apparatus and method
CN108173827A (en) * 2017-12-22 2018-06-15 南京邮电大学 Distributed SDN control planes safety certifying method based on block chain thinking
US20180294955A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof
CN108847925A (en) * 2018-06-20 2018-11-20 深圳大学 A kind of fragment block chain generation method based on tree
US20180343126A1 (en) * 2017-05-24 2018-11-29 NXM Labs Inc. System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner
CN109246137A (en) * 2018-10-23 2019-01-18 北京航空航天大学 The safety protecting method and device of naval warfare data based on block chain
CN109639837A (en) * 2019-01-31 2019-04-16 东南大学 Block chain DPoS common recognition method based on faith mechanism
CN109634959A (en) * 2018-11-30 2019-04-16 北京瑞卓喜投科技发展有限公司 A kind of block index method and block index device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018077049A1 (en) * 2016-10-27 2018-05-03 Huawei Technologies Co., Ltd. Distributed data store-equipped evolved packet core apparatus and method
US20180294955A1 (en) * 2017-04-05 2018-10-11 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof
US20180343126A1 (en) * 2017-05-24 2018-11-29 NXM Labs Inc. System and method for utilizing connected devices to enable secure and anonymous electronic interaction in a decentralized manner
CN107222478A (en) * 2017-05-27 2017-09-29 暨南大学 Software defined network key-course security mechanism construction method based on block chain
CN107579998A (en) * 2017-10-17 2018-01-12 光载无限(北京)科技有限公司 Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract
CN108173827A (en) * 2017-12-22 2018-06-15 南京邮电大学 Distributed SDN control planes safety certifying method based on block chain thinking
CN108847925A (en) * 2018-06-20 2018-11-20 深圳大学 A kind of fragment block chain generation method based on tree
CN109246137A (en) * 2018-10-23 2019-01-18 北京航空航天大学 The safety protecting method and device of naval warfare data based on block chain
CN109634959A (en) * 2018-11-30 2019-04-16 北京瑞卓喜投科技发展有限公司 A kind of block index method and block index device
CN109639837A (en) * 2019-01-31 2019-04-16 东南大学 Block chain DPoS common recognition method based on faith mechanism

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘明达,拾以娟,陈左宁: ""基于区块链的分布式可信网络连接架构"", 《软件学报》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955721A (en) * 2019-10-23 2020-04-03 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN110955721B (en) * 2019-10-23 2022-12-06 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN111431695A (en) * 2020-03-24 2020-07-17 武汉理工大学 Software defined tactical network node credit management method based on block chain
CN111431696A (en) * 2020-03-26 2020-07-17 深圳市欧欣泰科技有限公司 Identity-based block chain sealing mechanism
CN111431696B (en) * 2020-03-26 2023-10-17 深圳市欧欣泰科技有限公司 Block chain seal mechanism based on identity
CN111770103A (en) * 2020-06-30 2020-10-13 中国科学技术大学 Network node security attribute evaluation method based on block chain consensus result feedback
CN113159743A (en) * 2021-02-02 2021-07-23 上海大学 Vehicle crowd sensing excitation system and method based on block chain and edge calculation

Also Published As

Publication number Publication date
CN110113148B (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN110113148A (en) A kind of software definition opportunistic network node identities verification method based on block chain
Shu et al. Collaborative intrusion detection for VANETs: A deep learning-based distributed SDN approach
CN109922162B (en) Flat building equipment Internet of things monitoring system and method based on block chain
Tan et al. Blockchain-based key management for heterogeneous flying ad hoc network
CN110113328A (en) A kind of software definition opportunistic network DDoS defence method based on block chain
CN109246137A (en) The safety protecting method and device of naval warfare data based on block chain
CN109462587A (en) Block chain is layered common recognition method, block chain network system and block chain node
CN109919771B (en) Industrial internet transaction device applying hierarchical block chain technology
CN108494581A (en) The controller distributed information log generation method and device of SDN network
CN110377002A (en) A kind of adaptive interior CAN bus method of controlling security and system
CN111752246A (en) Unmanned aerial vehicle bee colony cooperative work platform based on block chain and artificial intelligence drive
Kang et al. Securing data sharing from the sky: Integrating blockchains into drones in 5G and beyond
Pan et al. Blockchain and AI empowered trust-information-centric network for beyond 5G
CN111431695A (en) Software defined tactical network node credit management method based on block chain
Mahmood et al. Trust on wheels: Towards secure and resource efficient IoV networks
Ogundoyin et al. An efficient authentication scheme with strong privacy preservation for fog-assisted vehicular ad hoc networks based on blockchain and neuro-fuzzy
Al-Duwairi et al. BotDigger: a fuzzy inference system for botnet detection
CN112260836A (en) Method for improving block chain throughput based on fragmentation technology
He et al. ROAchain: Securing route origin authorization with blockchain for inter-domain routing
CN110324331A (en) Power system security stability contorting terminal identity authentication method based on block chain
CN107835077B (en) Mutual trust cluster collaborative verification method for anonymous authentication of vehicle-mounted network
CN109450685A (en) A kind of common recognition method and node based on local links' node off-line
CN117097489A (en) Lightweight double-factor agriculture Internet of things equipment continuous authentication method and system
Jiang et al. LBlockchainE: A lightweight blockchain for edge IoT-enabled maritime transportation systems
Zhang et al. A parallel consensus mechanism using PBFT based on DAG-lattice structure in the internet of vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant