CN104010003B - Permeation method for improving Sybil node importance rapidly - Google Patents

Permeation method for improving Sybil node importance rapidly Download PDF

Info

Publication number
CN104010003B
CN104010003B CN201410271658.6A CN201410271658A CN104010003B CN 104010003 B CN104010003 B CN 104010003B CN 201410271658 A CN201410271658 A CN 201410271658A CN 104010003 B CN104010003 B CN 104010003B
Authority
CN
China
Prior art keywords
node
nodeid
activenodes
sybil
live
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410271658.6A
Other languages
Chinese (zh)
Other versions
CN104010003A (en
Inventor
刘波
王怀民
王天佐
鲁强
肖哲锋
马晓龙
张天
于洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201410271658.6A priority Critical patent/CN104010003B/en
Publication of CN104010003A publication Critical patent/CN104010003A/en
Application granted granted Critical
Publication of CN104010003B publication Critical patent/CN104010003B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a permeation method for improving Sybil node importance rapidly, and aims to provide a method which can rapidly improve indegree of Sybil nodes in a Kademlia network and the Sybil node importance. According to the technical scheme, permeated nodes are divided into multiple groups according to distance, nodes in each group are ranked according to the activity degree, and active node precedence and remote node precedence are achieved; the Sybil node allows more other nodes to have access to itself with the help of a node with a high activity degree by being the neighbor of the node with the high activity degree, and therefore more opportunities for improving the indegree are obtained; the Sybil node is recommended to the other nodes frequently by a remote node by being the neighbor of the remote node, and more opportunities for improving the indegree are obtained. The whole permeation method is implemented again every other permeation period. By the adoption of the permeation method, the Sybil node importance is improved rapidly, and the influences of the Kademlia network on the Sybil node importance are overcome effectively.

Description

Permeating method for fast lifting sybil node importance
Technical field
The present invention relates to a kind of permeating method of sybil node, it is a kind of fast lifting sybil node in kademlia net The method of importance in network.
Background technology
The former finger of sybil node has the single entity node of multiple identities, at present generally by the dummy node in network all Referred to as sybil node.For the sybil node in kademlia network, its importance is mainly reflected in become how many sections The neighbor node of point, i.e. the in-degree size of this sybil node.The quick importance improving sybil node, contributes to utilizing Sybil node is more, active situation that is more efficiently knowing great deal of nodes in network, thus in quick discovery and containment network Rogue activity provide technical support.
Kademlia agreement is a kind of typical dht (distributed hash table, distributed Hash table) agreement, extensively General for building extensive, pure distributed p2p (peer to peer) network, such as electric donkey, bittorrent etc..Kademlia gives Each node distributes a unique, random mark, i.e. nodeid, distributes a similar mark for each object, that is, Objectid (is also called key).These id are usually used sha-1 this hash function to generate, and the distance between id adopts Measured with XOR.
In kademlia network, each object is stored in nodeid closest on the k node of its objectid.k General value is 20.
The routing table of each kademlia node is made up of l (l is equal to the number of bits of node identification) individual chained list, each chain Table is referred to as one " k-bucket ", arrives the XOR distance of oneself in interval [2 for recording in networki,2i+1) (i is k-bucket Sequence number, 0≤i < l) in neighbor node information, every information is with tlv triple < ip address, udp port numbers, nodeid > Form represents and stores.Kademlia agreement specifies, k-bucket length is with k as the upper limit.Whenever kademlia node receives From the message of other nodes, it just according to the < ip address in this message sending node to oneself XOR distance and message, Udp port numbers, updating the record in k-bucket, this is referred to as piggybacking (piggybacking) to nodeid > information.L K-bucket forms the routing table of a kademlia node, and therefore routing table is also referred to as " k-buckets ".In one routing table L k-bucket is distinguished by continuous sequence number i.
Kademlia agreement is by a kind of four rpc (remote process call, remote procedure call are orders) group Become, its title is ping, store, find_node, find_value respectively, and their work is as follows:
Ping: whether online for detecting a node;
Store: one node of instruction stores a < key, value > couple, in order to the data acquisition in future.Key is Object hashed value, i.e. objectid, value are real data object (or its index);
Find_node: with id as parameter, the recipient of find_node rpc is with < ip address, udp port numbers, nodeid The form of > returns his the known k node nearest from target id;
Find_value: with key as parameter, find the corresponding value of key.
P2p web crawlers refers to the software system for obtaining each nodal information and its topological structure in p2p network.This Plant software system and iteratively send particular message to the known node in p2p network, obtain new node;Repeat to new Node send particular message it is possible to obtain the topological structure of whole network and each nodal information.P2p web crawlers can For obtaining nodal information and the topological structure of kademlia network.
At present it is not yet found that for p2p network, being intended to improve the sybil node permeating method of sybil node importance Other open achievements in research.
Content of the invention
The technical problem to be solved in the present invention is: is difficult to quickly, fully penetrate into for current sybil node In kademlia network, enter other node route lists, and then the problem of the larger importance of generation as much as possible, propose a kind of Make the method that sybil node high-effective penetrating enters kademlia network.The method can fast lifting sybil node exist In-degree in kademlia network, thus the importance of fast lifting sybil node.
For solving above-mentioned technical problem, technical scheme is as follows:
In order that sybil node can overcome the impact that kademlia dynamic is brought during lifting importance, Whole permeating method is implemented once again every some hours (as 6 hours).Implement every time to be referred to as an infiltration cycle, and use t Which infiltration cycle record is currently.In order to quickly and efficiently lift importance, this method will be oozed always according to distance Node is divided into multiple marshallings (representing group number with g) thoroughly, and according to active degree, marshalling interior nodes is ranked up, and realizes active section Point is preferential and remote node is preferential.Become the neighbours of high liveness node, sybil node just can be by this high liveness section Point allows more other node visits to it, thus obtaining the more chances improving in-degree.Become the neighbours of remote node, Sybil node just more frequently can be recommended other nodes by this remote node, thus obtaining the more multimachine improving in-degree Meeting.
Concrete technical scheme is:
The first step, arranges infiltration cycle count value t=1, and packet numbering g=l, l identify (i.e. for kademlia network node Nodeid number of bits), live-vertex list activenodes (0) of initial time is sky (null), activenodes T () is live-vertex list during t-th infiltration cycle, the element in list is live-vertex information, and item number is t-th infiltration Live-vertex number n in cyclet, each list item includes tetra- domains of ip, udpport, nodeid, active, and ip represents active section The ip address of point, udpport refers to the udp port numbers of live-vertex, and nodeid is the node identification of live-vertex, and active represents The active degree value of live-vertex, can be dynamically updated.
Second step, is obtained using p2p web crawlers (such as increase income emule client-side program, nutch, crawler4j etc.) Ip, udpport, nodeid information of kademlia t-th infiltration cycle live-vertex list activenodes (t) of network.
3rd step, calculates the active value of each live-vertex in activenodes (t) successively it is assumed that activenodes Arbitrary list item q (0≤q≤n in (t)t- 1) corresponding ip, udpport, nodeid information is ipq、udpportq、nodeidq, Then circular is as follows:
3.1) make q=0;
3.2) for the list item q in activenodes (t), if containing list item < ip in activenodes (t-1)q, udpportq,nodeidq, active_old >, then the list item q in activenodes (t) is < ipq,udpportq, nodeidq, active_old+1 >;If not containing this list item in activenodes (t-1), that is, node identification is nodeidq Live-vertex be for the first time to occur in live-vertex list, then the list item q in activenodes (t) is < ipq, udpportq,nodeidq, 1 >;
3.3) q=q+1;
3.4) judge whether q is equal to nt, if equal to, then turn the 4th step, otherwise, turn 3.2).
4th step, by n in activenodes (t)tThe nodeid value of the individual node nodeid value with sybil node successively Carry out XOR, obtain ntIndividual XOR distance, and according to the XOR distance value obtaining to the n in activenodes (t)tIndividual list item enters Row marshalling, by XOR distance [2j,2j+1) in the range of node compile as jth (0≤j≤l-1) group, then the number organized into groups is l (because marshalling rule is similar with the k-bucket differentiating method of kademlia node route list, the number of marshalling is equal to k- To the traversal organized into groups, the number l) of bucket, by showing that every group of nodes are designated as σt(0≤σt≤nt).
5th step, organizes into groups to l, resets the σ of each group according to active value descendingtIndividual list item, obtains l descending and resets Marshalling afterwards.
6th step, g=g-1.
7th step, from the beginning of the first node of g group, sybil node sends ping to all nodes of this group successively and detects life Order.According to the incidentally more New Policy of kademlia network, it is saturated after node receives ping order, by sybil node Nodeid value and the nodeid value of itself carry out XOR, and determine the k-bucket of sybil node according to this XOR value, if this Have vacant position in k-bucket, just sybil node is saved in this k-bucket as neighbor node, thus improving sybil section The in-degree of point.
8th step, if g=0, executes the 9th step;Otherwise, turn the 6th step.
9th step, setting timer is m hour.This is for interval m hour, and m typically takes 6;
Tenth step, intermittently 5 seconds.
11st step, judges whether to receive exit instruction: is to turn the 14th step;Otherwise turn the 12nd step.
12nd step, judges whether that timer terminates: is to turn the 13rd step;No, turn the tenth step.
13rd step, t=t+1, turn second step.
14th step, terminates.
Following technique effect can be reached using the present invention:
By fourth, fifth and seven setting in step, preferentially remote node and high liveness node are permeated, permissible Greatly improve sybil node via these nodes enter more other node route lists chance, such that it is able to fast lifting its In-degree.By the setting in the nine, the ten, 13 steps, periodically permeated, can effectively be overcome kademlia network dynamic Property to sybil node importance impact it is ensured that sybil node can have higher in-degree all the time.Quick raising sybil node Importance, contribute to using sybil node is more, active situation that is more efficiently knowing great deal of nodes in network, thus being Rogue activity in quick discovery and containment network provides technical support.
Brief description
Fig. 1 is the general flow chart of the present invention.
Specific embodiment
Fig. 1 is the general flow chart of the present invention:
The first step, arranges infiltration cycle count value t=1, packet numbering g=l, the live-vertex list of initial time Activenodes (0) is null.
Second step, obtains the t-th infiltration cycle live-vertex list of kademlia network using p2p web crawlers Ip, udpport, nodeid information of activenodes (t).
3rd step, calculates n in activenodes (t) successivelytThe active value of individual live-vertex is it is assumed that activenodes Arbitrary list item q (0≤q≤n in (t)t- 1) corresponding ip, udpport, nodeid information is ipq、udpportq、nodeidq.
4th step, by n in activenodes (t)tThe nodeid value of the individual node nodeid value with sybil node successively Carry out XOR, and according to the XOR distance value obtaining to the n in activenodes (t)tIndividual list item is organized into groups, by XOR away from From [2j,2j+1) in the range of node compile as jth (0≤j≤l-1) group, then the number organized into groups is l, by the traversal to marshalling Show that every group of nodes are designated as σt(0≤σt≤nt).
5th step, organizes into groups to l, resets the σ of each group according to active value descendingtIndividual list item.
6th step, g=g-1.
7th step, from the beginning of the first node of g group, sybil node sends ping to all nodes of this group successively and detects life Order.According to the incidentally more New Policy of kademlia network, being saturated after node receives ping order, if according to it It is free in the k-bucket of node that the nodeid value of nodeid value sybil node carries out being saturated of the distance determination that XOR obtains Sybil node is just saved in this k-bucket, thus improving the in-degree of sybil node by position as neighbor node.
8th step, if g=0, executes the 9th step;Otherwise, turn the 6th step.
9th step, setting timer is m hour.This is for interval m hour, and m typically takes 6;
Tenth step, intermittently 5 seconds.
11st step, judges whether to receive exit instruction: is to turn the 14th step;Otherwise turn the 12nd step.
12nd step, judges whether that timer terminates: is to turn the 13rd step;No, turn the tenth step.
13rd step, t=t+1, turn second step.
14th step, terminates.

Claims (2)

1. a kind of permeating method for fast lifting sybil node importance is it is characterised in that comprise the following steps:
The first step, arranges infiltration cycle count value t=1, and packet numbering g=l, l identify nodeid for kademlia network node Number of bits, live-vertex list activenodes (0) of initial time is sky, and activenodes (t) is t-th infiltration Live-vertex list during the cycle, the element in list is live-vertex information, and item number is the active section in t-th infiltration cycle Points nt, each list item includes tetra- domains of ip, udp port, nodeid, active, and ip represents the ip address of live-vertex, udp Port refers to the udp port numbers of live-vertex, and nodeid is the node identification of live-vertex, and active represents the active of live-vertex Degree value;
Second step, obtains the t-th infiltration cycle live-vertex list of kademlia network using p2p web crawlers Ip, udp port, nodeid information of activenodes (t);
3rd step, calculates the active value of each live-vertex in activenodes (t) successively, and circular is as follows:
3.1) make q=0;
3.2) for the list item q in activenodes (t), if containing list item < ip in activenodes (t-1)q,udp portq,nodeidq, active_old >, ipq、udp portq、nodeidqIt is respectively list item q pair in activenodes (t) Ip, udp port, nodeid information answered, then the list item in activenodes (t) is < ipq,udp portq,nodeidq, Active_old+1 >;If not containing this list item in activenodes (t-1), that is, node identification is nodeidqActive section Point is to occur in live-vertex list for the first time, then the list item q in activenodes (t) is < ipq,udpportq, nodeidq, 1 >;
3.3) q=q+1;
3.4) judge whether q is equal to nt, if equal to, then turn the 4th step, otherwise, turn 3.2);
4th step, by n in activenodes (t)tThe nodeid value of individual node carries out different successively with the nodeid value of sybil node Or, obtaining ntIndividual XOR distance, and according to the XOR distance value obtaining to the n in activenodes (t)tIndividual list item is compiled Group, by XOR distance [2j,2j+1) in the range of node compile as jth group, then the number organized into groups is l, by the traversal to marshalling Show that every group of nodes are designated as σt, 0≤j≤l-1,0≤σt≤nt
5th step, organizes into groups to l, resets the σ of each group according to active value descendingtIndividual list item, after obtaining l descending rearrangement Marshalling;
6th step, g=g-1;
7th step, from the beginning of the first node of g group, sybil node sends ping probe command to all nodes of this group successively;Root According to the incidentally more New Policy of kademlia network, be saturated after node receives ping order, by the nodeid value of sybil node with The nodeid value of itself carries out XOR, and determines the k-bucket of sybil node according to this XOR value, if in this k-bucket Have vacant position, then sybil node is saved in this k-bucket as neighbor node;The routing table of each kademlia node by L chained list composition, each chained list is referred to as one " k-bucket ", arrives the XOR distance of oneself in interval for recording in network [2i,2i+1) in neighbor node information, every information is with tlv triple < ip address, udp port numbers, nodeid > form table Show and store, i is the sequence number of k-bucket, 0≤i < l;
8th step, if g=0, executes the 9th step;Otherwise, turn the 6th step;
9th step, setting timer is m hour;
Tenth step, intermittently 5 seconds;
11st step, judges whether to receive exit instruction: is to turn the 14th step;Otherwise turn the 12nd step;
12nd step, judges whether that timer terminates: is to turn the 13rd step;No, turn the tenth step;
13rd step, t=t+1, turn second step;
14th step, terminates.
2. as claimed in claim 1 a kind of permeating method for fast lifting sybil node importance it is characterised in that institute State m and take 6.
CN201410271658.6A 2014-06-18 2014-06-18 Permeation method for improving Sybil node importance rapidly Active CN104010003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410271658.6A CN104010003B (en) 2014-06-18 2014-06-18 Permeation method for improving Sybil node importance rapidly

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410271658.6A CN104010003B (en) 2014-06-18 2014-06-18 Permeation method for improving Sybil node importance rapidly

Publications (2)

Publication Number Publication Date
CN104010003A CN104010003A (en) 2014-08-27
CN104010003B true CN104010003B (en) 2017-02-01

Family

ID=51370497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410271658.6A Active CN104010003B (en) 2014-06-18 2014-06-18 Permeation method for improving Sybil node importance rapidly

Country Status (1)

Country Link
CN (1) CN104010003B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378426B (en) * 2014-11-14 2018-06-12 中国电子科技集团公司第二十九研究所 A kind of load-balancing method for real time information dissemination system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145929A (en) * 2007-08-09 2008-03-19 复旦大学 A P2P stream media VoD system for IPV6 environment
CN103067521A (en) * 2013-01-08 2013-04-24 中国科学院声学研究所 Distributed-type nodes and distributed-type system in a crawler cluster

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145929A (en) * 2007-08-09 2008-03-19 复旦大学 A P2P stream media VoD system for IPV6 environment
CN103067521A (en) * 2013-01-08 2013-04-24 中国科学院声学研究所 Distributed-type nodes and distributed-type system in a crawler cluster

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《一种针对P2P网络优化的Kademlia路由算法》;杨丞,张刚林,刘光灿,王路露;《微电子学与计算机》;20090930;第26卷(第9期);全文 *
基于kademlia协议的高生存性P2P僵尸网络;朱俊虎,李鹤帅,王清贤,邱菡;《计算机应用》;20130501;第33卷(第5期);全文 *

Also Published As

Publication number Publication date
CN104010003A (en) 2014-08-27

Similar Documents

Publication Publication Date Title
US20060029007A1 (en) Ad hoc network topology discovery
Cancela et al. Polynomial-time topological reductions that preserve the diameter constrained reliability of a communication network
CN102164369A (en) Method for broadcast authentication of wireless sensor network based on automaton and game of life
CN104010003B (en) Permeation method for improving Sybil node importance rapidly
CN103813372B (en) A kind of wireless sensor network management method based on IPv6
CN107179954A (en) A kind of distributed community network method for secret protection of holding node accessibility
Drees et al. Churn-and dos-resistant overlay networks based on network reconfiguration
CN104038547B (en) Method for effectively resolving multi-Sybil node penetration conflict in P2P network
CN101741867B (en) Method for capturing node information in BitTorrent network
CN104579805A (en) A novel network traffic identifying method
RU2016124953A (en) METHOD FOR MASKING THE STRUCTURE OF A COMMUNICATION NETWORK
Zhou et al. An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge
Alam A survey on blockchain and internet of things
Huang et al. A backbone-aware topology formation (BATF) scheme for ZigBee wireless sensor networks
Aneeth et al. Energy-efficient communication in wireless sensor network for precision farming
Jabbar et al. Modeling the message alternative routes in a large scale wireless sensor network
JP5857791B2 (en) Communication device
CN106332214B (en) Data directional transmission method and system
Kurhinen et al. Modelling mobile encounter networks
Nicol et al. Simulation analysis of virtual geographic routing
Al-Nabhan et al. Distributed algorithm for connected dominating set construction in sensor networks
CN104994557A (en) Clustering algorithm based on dynamic grids and data fusion
Wang et al. On the characteristics of the worm infection family tree
Patra et al. Modified rumor routing for wireless sensor networks
Emimajuliet et al. Defending Collaborative Attacks in MANETs Using Modified Cooperative Bait Detection Scheme

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant