Detailed Description
The following detailed description of the embodiments of the present invention will be given in order to provide those skilled in the art with a more complete, accurate and thorough understanding of the inventive concept and technical solutions of the present invention.
The method comprises the following steps of constructing a dynamic evolution game model based on a channel network, wherein three basic elements of game analysis need to be considered: participants, policy space, and revenue matrix.
The participants of the game are respectively composed of two different node sets: one is a node set composed of type I nodes, and benefits can be obtained by forwarding a transaction; the other is a set of nodes consisting of type II nodes that can gain revenue by launching an attack or forwarding a transaction.
For the type I node, three strategies of cooperation, non-cooperation and defense are available, and the strategy space of the type I node is recorded as:
S1∈{1,2,3} (1)
wherein, 1 represents that the type I node adopts a cooperation strategy, and the node adopting the cooperation strategy transmits the agreement to the transaction; 2, adopting a misaction strategy, and refusing to forward the transaction by adopting the misaction strategy; 3, adopting a defense strategy; the nodes adopting the defense strategy will defend against malicious uncooperative and offensive actions implemented by type II nodes.
For type II nodes, there are three strategies of cooperation, attack and non-cooperation, and the strategy space of type I nodes of type II nodes is recorded as:
S2∈{1,2,3} (2)
wherein, 1 represents that the II type node adopts a cooperation strategy, and the node adopting the cooperation strategy transmits the agreement to the transaction; 2, adopting an attack strategy, and implementing malicious uncooperative and attack behaviors on the type I node by the node adopting the attack strategy to obtain a profit; and 3 denotes taking the uncooperative strategy. Nodes adopting the non-operating strategy refuse to forward the transaction.
According to the characteristics of the channel network, the income parameters of the type I node and the type II node are defined as follows: r (reward): the income obtained by the two parties in one game can be the income obtained by the node successfully forwarding one transaction; cD(Cost of decay): the cost required by the type I node for adopting the defense strategy can be the consumption of funds; rA(Reward of attack): the gain obtained by the successful attack activity of the II type node can be the gain of funds, and the R is assumed>RA;CA(Cost of attack): the cost required by the type II node for attack activity can be the fund consumed in attack, the related legal sanctions when the type II node is found and the like; cR(Cost of relay): represents the cost required by the node to conduct a transaction, and can be the consumption of funds; l (loss): representing type I nodesLoss when under attack; p (Proavailability): the success rate of attack success of an attack party is shown under the condition that the I-type node adopts a defense strategy; in the yield parameters of both type I and type II nodes, R>CD>CA,R>CR>CA。
The premise of the evolutionary game is that each participant in the game is rationalized in the decision phase, i.e., the participant makes a strategy selection in pursuit of maximum profit. The selfish or proficient nature of the game participants in a limited sense maximizes the benefits of the gaming pool. That is, if only selfish behavior or only interested behavior is not the optimal strategy for maximizing profit among a participant group or different participant groups, the maximization of group profit can be achieved only when selfish is achieved in some aspects and interested behavior is achieved in some aspects, that is, selfish behavior and interested behavior reach a certain proportion, which is also called the optimal strategy. The premise assumption of this patent is therefore that each node is required to make policy selections with the goal of maximizing the expected revenue given the respective policy space. Under the condition that the nodes of the two parties of the game do not know the strategies of each other, the income analysis of the two parties of the game is divided into the following three main conditions according to the II-type node strategy.
When the II-type node adopts a cooperation strategy and the I-type node adopts a cooperation, non-cooperation and defense strategy, the game combination strategy between the I-type node and the II-type node comprises the following steps: three cases (cooperative ), (uncooperative, cooperative) and (defensive, cooperative). The profit analysis of the two parties to the game is shown in table 4.1.
TABLE 4.1 revenue analysis of both parties in a game when a type II node takes a cooperation strategy
(collaboration ): the two parties agree to carry out the transaction, and the profits of the parties are the profits obtained by the game or the profits R of the transaction successfully forwarded by the node minus the cost C required by forwarding the transactionR. The final benefit of the type I node is R-CRThe final yield of the type II node is R-CR(ii) a (uncooperative, cooperative): the I-type nodes are not cooperated, the I-type nodes have no loss or gain, and the final gain is 0. The type II node can not successfully complete the forwarding operation because the type I node does not cooperate with the type I node to forward the transaction, so the successful benefit of forwarding is not obtained, and only the fund C consumed by one transaction is carried outR. The final yield of the type II node is recorded as-CR(ii) a (defense, collaboration): the type I node performs transaction due to the adoption of defense measures, and the two parties cooperate. The profits of all parties are profits obtained by the game or profits R successfully forwarded, and only the cost of the consumed funds is different. I-type node cost C consumed by deploying defensive measuresDAnd the final profit of the type I node is recorded as R-CD. Type II node consumes capital C for performing one transactionR. The final profit of the type II node is recorded as R-CR。
When the type II node adopts a cooperation strategy and the type I node respectively adopts cooperation, non-cooperation and defense strategies, the type I node respectively obtains R-C R0 and R-CD(ii) a The type II node gains are R-CR、-CR、R-CR. Because it is assumed that R>CD>CA,R>CR>CASo that R-CR>0,R-CD>0, the maximum income of both parties is larger than 0, and the income maximization requirement is met.
And secondly, when the II type node adopts an attack strategy, the income analysis of both game parties is shown in the table 4.2.
TABLE 4.2 revenue analysis of both parties in the game when the type II node takes the attack strategy
(collaboration, attack): the type I node cannot successfully complete the transaction forwarding operation because the selected cooperation strategy is successfully attacked by the type II node. The type I node has no successfully forwarded profit, only has the loss L when being attacked, and the final profit is-L. The II type node obtains the income R due to successful attackAFurthermore, a certain cost C is required for forwarding the transactionRThus the final benefit is RA-CR。
(uncooperative, aggressive): the type I node cannot successfully complete the transaction forwarding operation because it is not collaborated and successfully attacked by the type II node. The type I node has no success forwarding profit, only has the loss L when being attacked, and the final profit is-L. Attack of type II nodes is not successful for uncooperative type I nodes, and yield R of attack success cannot be obtainedAAnd the attack activity requires a certain cost CAThus, the final yield of the type II node and the type I node is-CA。
(defense, attack): the I type node adopts a defense strategy, so that the II type node only has P success rate attack success. Under the condition that the attack is successful, the I-type node obtains the profit R of successful forwarding, but the defense cost C is needed for deploying the defense measuresDAnd the I type node has loss L when the II type node is successfully attacked, the I type node has loss capital of P multiplied by L under the condition that the attack success rate is P, and therefore the final yield is R-CD-P × L. Attack of type II nodes is unsuccessful on type I nodes adopting defense strategies and can not obtain the successful gain R of attackAAnd the attack activity requires a certain cost CAThus the final yield of the type II node is-CA。
When the type II node adopts an attack strategy and the type I node respectively adopts a cooperation strategy, a non-cooperation strategy and a defense strategy, the income of the type I node is respectively-L, -L and R-CD-P × L. According to the maximum income requirement, the defense strategy adopted by the type I node is effective, and the R-C is requiredD-PxL ≧ 0, i.e.:
R≥CD+P×L (3)
and thirdly, when the II type node adopts the non-cooperative strategy, the income analysis of both sides of the game is shown in the table 4.3.
TABLE 4.3 revenue analysis of both parties in a game when a type II node takes a misbehaving policy
(cooperative, uncooperative): type I nodes are not cooperative with type II nodesAnd forwarding cannot be smoothly completed. Type I nodes do not forward successful proceeds, only the funds C consumed to make a transactionRThus, the final yield is-CR. The II type nodes are not cooperated, so that no loss or gain is generated, and the final gain of the II type nodes is 0; (uncooperative ): the two parties do not agree to carry out transaction forwarding, and the income of the two parties is 0; (defense, uncooperative): although the type I node adopts a defense strategy, the type II node does not cooperate, the type I node does not have the benefit of successful forwarding, and only the cost C required by deploying defense measuresDThus, the final yield is-CD. The type II nodes are not cooperative, so that no loss or no profit is caused, and the final profit of the type II nodes is 0.
When the II type node adopts the non-cooperative strategy and the I type node respectively adopts the cooperative, non-cooperative and defense strategies, the income of the I type node is-CR、0、-CD(ii) a Type II node earnings were 0,0 and 0. The maximum benefit of table 4.3 is 0.
As can be seen from tables 4.1 to 4.3, since there are three policy spaces for the type I node and the type II node, in order to balance the interest relationship between the type I node and the type II node, a 3 × 3 revenue matrix is respectively constructed for both game parties, and the revenue matrix of the type I node is denoted as a ═ aij]3×3The type II node profit matrix is denoted as B ═ Bij]3×3Where i is equal to {1,2,3}, j is equal to {1,2,3}, aijRepresenting the gain obtained by a type I node when the type I node adopting the I strategy plays games with a type II node adopting the j strategy, bijRepresenting the earnings obtained by the type II nodes when the type I node adopting the I policy is playing the game with the type II node adopting the j policy.
According to the game two-party income analysis table 4.1, table 4.2 and table 4.3, the income matrixes of the type I node and the type II node are respectively marked as A and B, and can be respectively obtained as follows:
in the channel network, a condition for keeping all nodes in a dynamic equilibrium state should be found; otherwise, if the network is unstable, the normal operation and safety of the network are affected. Therefore, the aim of creating the channel network dynamic evolution game model is to find conditions for keeping dynamic stability and balance.
An Evolution Stable Strategy (ESS) and a replication dynamic state are the most core concepts of the evolution game theory, wherein the ESS indicates a stable state of the evolution game, and the replication dynamic state indicates a convergence process for achieving the stable state. ESS is only a local stability strategy and does not constitute a sufficient condition for judging the stability of evolution in a random environment. In order to better describe the dynamic evolution process, the static concept and the dynamic process in the Evolutionary game theory are unified, and the static concept and the dynamic process in the Evolutionary game theory are unified by utilizing the concept of Evolutionary Equilibrium (Evolutionary Equilibrium). Replicating the dynamic equations may ensure that the ESS is balanced for evolution. The general form of the replication dynamic equation is as follows:
in the formula (6), PEFor the expected benefit of the strategy, PAIs the overall average gain in the policy space corresponding to the policy. z is a radical ofkThe proportion of the strategy k selected for the node is:
zk=Nk/M (7)
in the formula (7), NkAnd selecting the number of nodes of the strategy k in the strategy space, wherein M is the total number of the nodes in the strategy space. N is not less than 0k≤M。NkWhen 0, it means that there is no node selection policy k. N is a radical ofkWhen M, it means that all nodes select policy k.
The type I node and the type II node in the channel network respectively have respective strategy spaces. Note N
iNumber of nodes selecting policy I in policy space for type I nodeAnd i ∈ {1,2,3},
for the total number of nodes in the type I node policy space,
and is
The proportion of adopting cooperative, uncooperative and defensive strategies by the I-type node is x
1,x
2,x
3:
In the formula (8), it is known
Recording the proportion distribution set of the strategy of the I-type node at a certain moment as X:
X={xi|i∈{1,2,3}} (9)
note N
jSelecting the number of nodes of the strategy j in the strategy space of the II type node and j is equal to {1,2,3},
for the total number of nodes in the type II node policy space,
and is
Noting that the proportion of adopting cooperative, attacking and uncooperative strategies by the II type nodes is y
1,y
2,y
3:
In the formula (10), y is 0. ltoreq. y
jLess than or equal to 1 and
recording that the proportion distribution set of the strategy of the II type node at a certain moment is Y:
Y={yj|j∈{1,2,3}} (11)
according to the replication dynamic theory of the evolutionary game, the replication dynamic equations of the type I node and the type II node can be obtained as follows: the expected yield of the type I node selection strategy I is given by equations (4), (9), (10):
aijfor the matrix elements of the type I node profit matrix a, the average profit of the type I node is obtained from equations (8), (9), (12):
the replication dynamic equation for type I nodes is:
the specific form of the replication dynamic equation obtained by substituting equations (12) and (13) into equation (14) is shown in equation (15):
(2) type II nodal replication dynamic equation
The expected yield of the type II node selection strategy j is given by equations (5), (8), (11):
bijfor the matrix elements of the type II node profit matrix B, the average profit of the type II nodes is given by equations (10), (11), (16):
the replication dynamics equation for type II nodes is shown in equation (18):
by substituting formulae (16) and (17) for formula (18):
from the expressions (15) and (19), x is calculated1,x2,x3,y1,y2,y3Duplicate dynamic equations.
To be provided with
Representing the rate of change of participant proportion with time when the type I node adopts a strategy I, wherein I belongs to S
1. X is calculated from the revenue matrix of equation (4) and equation (15)
1,x
2,x
3The replication dynamic equation is:
to be provided with
Representing the rate of change of participant proportion with time when the type II node adopts a strategy j, wherein j belongs to S
2. Y is calculated from the revenue matrix of equation (5) and equation (19)
1,y
2,y
3The replication dynamic equation is:
replicating the dynamic equations ensures that an ESS with local dynamic stability exhibits a relationship and convergence process between the selection process of equilibrium and dynamics. But because the replication dynamics are non-linear, it is difficult to find a unique solution. Therefore, the evolutionary game shifts from solving the equilibrium to analyzing the stability of the equilibrium, which is important for prolonging the life cycle of the network.
According to the theory of the evolutionary game, the channel network replication dynamic systems of the type I nodes and the type II nodes are formed by the formulas (20) to (25), so that any point (X, Y) on the solution curves of the channel network replication dynamic systems of the type I nodes and the type II nodes corresponds to a mixed strategy ((X, Y) of the evolutionary game)1,x2,x3),(y1,y2,y3)). For the dynamically evolving game model, the possible equilibrium points can be calculated by equations (20) - (25) ((x)1,x2,x3),(y1,y2,y3) Values) are shown in table 5.1:
TABLE 5.1 dynamic evolutionary Game model equilibrium points
Is proved to be in CD>CRUnder the condition, the balance point ((1,0,0), (1,0,0)) is the only ESS, which means that all type I and type II nodes are willing to select a cooperation strategy at this point, as shown in theorem 1. Theorem 1: the only requirement of the ESS for which the equalization points ((1,0,0), (1,0,0)) are channel network replication dynamic system equations (20) - (25) is CD>CR。
(1) Proof of Presence
The requirements for the ESS in which the points ((1,0,0), (1,0,0)) are channel system equations (20) to (25) are Trace J <0 and Det J >0[27 ]. Wherein the Matrix J is a Jacobian Matrix (Jacobian Matrix) of the evolutionary game, Trace J is defined as the sum of elements on the main diagonal of the Matrix J, and Det J is defined as the determinant of the Matrix J. Jacobian matrix notation
Equations (20) to (25) are substituted for equation (26), and a jacobian matrix corresponding to the channel system is obtained. Substituting the points ((1,0,0), (1,0,0)) into the system jacobian matrix J yields:
the traces of matrix J are: trace J ═ 5CR-CD-5R+RA,
The determinant of the matrix J is: det J ═ CR-R)4(R-RA)(CD-CR),
∵R>RA,
If CD>CR,
∴Trace J=5CR-CD-5R+RA
<5CR-CR-5R+RA
=4CR-5R+RA
<4CR-5R+R
=4(CR-R)<0,
∵R>RA,
If CD>CR,
∴Det J>0,
Note that: when C is presentD=CRWhen Det J is 0, Det J in the ESS requirement is not satisfied>0, is required. Therefore CD≠CR。
Therefore, when CD>CRAt this time, the point ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic system.
(2) Proof of uniqueness
The possible equalization points calculated by equations (20) to (25) are shown in Table 5.1 for a total of 9. To prove the uniqueness of the dots ((1,0,0), (1,0,0)), the uniqueness of the dots ((1,0,0), (1,0,0)) can be explained by only proving that 8 dots other than the dots ((1,0,0), (1,0,0)) are not ESS according to the reverse thinking.
Is administered with BenD>CRWhen the temperature of the water is higher than the set temperature,
1) for points ((1,0,0), (0,1,0)), ((1,0,0), (0,0,1)), ((0,1,0), (1,0,0)), ((0,1,0), ((0,1,0)), ((0,1,0), (0,0,1)), ((0,0,1), (0,0,1)), Det J ═ 0, the requirements for ESS, i.e., Trace J <0 and Det J >0, are not met,
the above 6 equalization points are not ESS;
2) for the points ((0,0,1), (1,0,0)),
Trace J=3CD+2CR-CA-5R,
Det J=(CR-R)2(CR-R)2(R-CR+CA)(CR-CD) Wherein, in the step (A),
∵R>CR,CD>CR,
∴R-CR+CA>0,CR-CD<0, then Det J<0, Trace J, which is a sufficient condition for not satisfying the ESS<0 and Det J>0,
Points ((0,0,1), (1,0,0)) are not ESS;
3) for the points ((0,0,1), (0,1,0)),
Trace J=3CD-CR+3CA-2L-2R+3P×L,
Det J=CA 2(CD–L–R+P×L)2(CD+P×L-R)(R-CR+CA) Wherein, in the step (A),
∵R≥CD+ P × L is shown in formula (3), and R>CR,
∴CD+P×L–R<0,R-CR+CA>0, then Det J is less than or equal to 0, and does not satisfy the requirement of ESS, namely Trace J<0 and Det J>0,
Points ((0,0,1,0,1,0)) are not ESS;
therefore, when CD>CRAt this time, the points ((1,0,0), (1,0,0)) are ESS unique to the channel network replication dynamic system.
The above proof of existence and uniqueness proves that the sufficient condition of the ESS with the point ((1,0,0), (1,0,0)) being the only of the channel network replication dynamic system equations (20) to (25) is CD>CR. To make CD>CRThis means that the cost of executing a transaction by a node is reduced or the cost of deploying a defense strategy by a type I node is increased, so that the cost of executing a transaction is greater than the cost of deploying a defense strategy by a type I node. Therefore, the I-type node can reasonably select whether to deploy the defense strategy or not according to the defense cost of different defense strategies, thereby effectively reducing the overhead and prolonging the life cycle of the node in the whole channel network.
Is proved to be in CD<CRUnder the conditions, the equalization point ((0,0,1), (1,0,0)) is the only ESS. This point indicates that all type I nodes are willing to choose a defense strategy and all type II nodes are willing to choose a cooperation strategy, as shown in theorem 2.
Theorem 2: ((0,0,1), (1,0,0)) is C is the only ESS of the channel network replication dynamic systemD<CRAfter the evolution game is finished, all the type I nodes select a defense strategy, and all the type II nodes select a cooperation strategy.
(1) Proof of Presence
The points ((0,0,1), (1,0,0)) are the sufficiency conditions for the channel system ESS, Trace J <0 and Det J > 0. The Jacobian matrix corresponding to the channel system can be obtained by substituting equations (20) to (25) for equation (26). Substituting the points ((0,0,1), (1,0,0)) into the system jacobian matrix J yields:
the traces of matrix J are: trace J ═ 3CD+2CR-CA-5R,
The determinant of the matrix J is: det J ═ CD-R)2(CR-R)2(CR-CD)(R-CR+CA),
∵R>RA,R>CR,
If CD<CR,
∴Trace J=3CD+2CR-CA-5R
<3CR+2CR-CA-5R
=5CR-5R-CA
=5(CR-R)-CA
<0,
Has another radical (R)>CR,CA>0,∴R-CR+CA>0,Det J>0,
Note that: when C is presentD=CRWhen Det J is 0, Det J in the ESS requirement is not satisfied>0, is required. Therefore CD≠CR。
Therefore, when CD<CRAt this time, the point ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic system.
(2) Proof of uniqueness
The possible equalization points calculated by equations (20) to (25) are shown in Table 5.1 for a total of 9. To prove the uniqueness of the dots ((0,0,1), (1,0,0)), the uniqueness of the dots ((0,0,1), (1,0,0)) can be explained by only proving that 8 dots other than the dots ((0,0,1), (1,0,0)) are not ESS according to the reverse thinking.
Is administered with BenD<CRWhen the temperature of the water is higher than the set temperature,
1) for points ((1,0,0), (0,1,0)), ((1,0,0), (0,0,1)), ((0,1,0), (1,0,0)), ((0,1,0), (0,1,0)), ((0,1,0), (0,0,1)), ((0,0,1), (0,0,1)), Det J ═ 0, the requirements for ESS, i.e., Trace J <0 and Det J >0, are not met,
the above 6 equalization points are not ESS;
2) for the points ((1,0,0), (1,0,0)),
Trace J=5CR-CD-5R+RA,
Det J=(CR-R)4(R-RA)(CD-CR) Wherein, in the step (A),
∵R>CA,CD>CR,
det J <0, which does not satisfy the requirements of ESS, i.e., Trace J <0 and Det J >0,
points ((1,0,0), (1,0,0)) are not ESS;
3) for the points ((0,0,1), (0,1,0)),
Trace J=3CD-CR+3CA-2L-2R+3P×L,
Det J=CA 2(CD–L–R+P×L)2(CD+P×L-R)(R-CR+CA) Wherein, in the step (A),
∵R≥CD+ P × L is shown in formula (3), and R>CR,
∴CD+P×L–R<0,R-CR+CA>0, then Det J is less than or equal to 0, and does not satisfy the requirement of ESS, namely Trace J<0 and Det J>0,
Points ((0,0,1), (0,1,0)) are not ESS;
therefore, when CD<CRAt this time, the points ((0,0,1), (1,0,0)) are ESS unique to the channel network replication dynamic system.
The above proof of existence and uniqueness proves that the sufficient condition of the ESS that the point ((0,0,1), (1,0,0)) is the only one of the channel network replication dynamic system equations (20) to (25) is CD<CR. To make CD<CRThis means that the cost of a node to perform a transaction is increased or the cost of a type I node to deploy a defense strategy is decreased such that the cost of performing a forward transaction is less than the cost of a type I node to deploy a defense strategy. Thereby a type I sectionThe points can reasonably select and deploy different defense strategies according to the defense costs of the different defense strategies, so that the overhead is effectively reduced, and the life cycle of the points in the channel network is longer.
According to theorem 1 and theorem 2, when the cost required by deploying the defense strategy by the type I node is larger than the cost required by the node to perform one-time forwarding transaction, all the type I nodes in the channel network adopt the cooperation strategy and all the type II nodes adopt the cooperation strategy after the evolution game is finished. However, when the cost required by the type I node to deploy the defense strategy is less than the cost required by the node to perform one-time forwarding transaction, after the evolutionary game is finished, all the type I nodes in the channel network adopt the defense strategy and all the type II nodes adopt the cooperation strategy.
In the current channel transaction process of the block chain, the nodes of both parties of the transaction need to cooperate, if one party of the nodes does not want to cooperate, the channel is closed, the nodes of both parties need to be switched to the block chain to realize transaction operation, and long time is spent for completing transaction verification. Therefore, when a transaction is performed in the channel network, the steady state of the channel network needs to be ensured to ensure that the transaction is completed smoothly. The method is characterized in that node transaction in a channel network is modeled into a dynamic evolution game model based on a replication dynamic mechanism with limited rationality and a biological evolution process, the dynamic evolution game model designs a channel network dynamic defense mechanism based on an evolution game, a defense strategy is added to a strategy space of a type I node by the mechanism, the cost and success rate of attack of a type II node under the condition of deploying the defense strategy are considered, and the defense mechanism can help the type I node to resist the attack behavior of the type II node with a certain probability. The nodes of the model have the finite evolutionary learning capacity, and can dynamically adjust respective strategies according to different attack strategies of attackers to achieve effective defense.
Because of the randomness of the uncooperative behavior of the nodes in the real scene, in order to verify the performance advantage of the applied channel network in the real scene, a simulation framework is developed to simulate a lightning network and a dynamic evolution game channel network with an attack and defense strategy, and the result shows that the channel network with a dynamic defense mechanism has a better transaction transmission success rate and a lower time delay, and the simulation process is specifically as follows:
(1) the experimental environment is as follows: 1) computer configuration: the Windows8 sixty-four-bit operating system comprises an Intel Core i5 processor, a CPU2.80GHz and an 8G memory; 2) and (3) environment configuration: and (4) adopting an MTLAB2018b tool to simulate the game process and result of the dynamic evolution game model.
(2) Experimental parameters: because the measurement standards of parameters such as node transaction income, cost and the like are different, all research parameters are subjected to standardization processing, and the values are within [0,1 ]. The specific experimental parameter design is shown in table 6.1:
TABLE 6.1 Experimental parameters Table
In Table 6.1, to test the effect of different defense costs on the speed of the system to ESS, when CD>CRWhen R is more than or equal to C according to formula (3)D+P×L,CDValues of 0.42, 0.44 and 0.46 respectively to test the effect of different defense costs on the system's speed to ESS, otherwise CDThe value is 0.46. When C is presentD<CRWhen R is more than or equal to C according to formula (3)D+P×L,CDThe values are respectively 0.1, 0.2 and 0.3 to test the influence of different defense costs on the speed of the system to reach the ESS, and C is used in other casesDThe value is 0.3; in addition, R, R in Table 6.1A、CR、CAIs taken to satisfy R>RA,R>CD>CA,R>CR>CAThe requirements of (1).
The nodes in the evolutionary game are limited, the loss after the attack is the same as the loss after the successful game is carried out and the transaction income is completed, and therefore L is 1; in order to test the influence of different attack success rates of II-type nodes on the speed of the system reaching the ESS, the requirement that R is more than or equal to C in the formula (3)DUnder the condition of + P multiplied by L, the values are respectively 0.1, 0.2 and 0.4, and the values are 0.5 in other cases.
(3) Description of other parameters
1) Simulation time (Time (s))
And (4) the simulation time required by the evolutionary game to reach the evolutionary equilibrium, namely the time required by the channel network replication dynamic system to converge to the ESS point.
2) Proportion of strategy selected by Node (Node ratio (%))
On the solution curve of the I-type node and II-type node channel network replication dynamic system, the simulation point (X, Y) corresponds to a combination strategy of the evolutionary game ((X)1,x2,x3),(y1,y2,y3) I.e. the proportional distribution of the strategies adopted by the type I and type II nodes. See equations (8) and (10) for the calculation. In the initial state of the evolution game, according to 7 different combination strategies in the table 6.2, the type I node and the type II node select respective strategies to carry out a game experiment. The settings of the specific combination strategy are shown in table 6.2:
TABLE 6.2 proportion parameter Table for node selected policy
(4) Performance analysis index
1) Stability: the stability of the balance between the type I node and the type II node depends on the comparison of the profit values of the strategy selection of the type I node and the type II node in the evolutionary game, and the individuals in the two parties in the population can still change continuously when the ESS is reached, namely the process that the interior of the two parties changes continuously and the population is not changed.
2) Convergence property: whether the system can reach the ESS and the amount of time required to reach the ESS are indicated by time(s). I.e., the shorter the required time, the better the convergence.
Under the dynamic replication, the achievement of the ESS is evolution equilibrium, and the nodes and channels in the channel network are still constantly changing when the evolution equilibrium is achieved. In order to research the influence process and the influence result of the continuous change in the channel network on the whole channel network, a simulation model is established according to the formulas (20) to (25). According to differentFor experimental purposes, a combination strategy (X, Y) ═ X1,x2,x3),(y1,y2,y3) X) is an initial value of1,x2,x3,y1,y2,y3The game process is reflected on the simulation image as x1,x2,x3,y1,y2,y3The ratio Node ratio (%) of the policy selected by the respective corresponding Node, i.e., the image ordinate. And observing the game process according to the change of the strategy proportion, and analyzing the stability of the channel network dynamic evolution game model. When C is presentD>CRThe result of the game of the dynamically evolving model of the model is a (cooperation ) combination strategy.
The analysis of the system evolution stability whether a defense strategy is adopted or not in the initial state of the I-type node is specifically as follows:
(1)C D take 0.46. When strategy 1 is selected for evolutionary game, the channel network game process is shown in figure 2, and figure 2 isC D >C R When the I-type nodes do not adopt the defense strategy, the model evolves a stable state analysis graph; as can be seen from fig. 2, when no defense strategy is adopted for the type I node in the channel network, the type II node selects an attack strategy to maximize its own benefit, the type I node always selects a cooperation strategy, and after several games, the type II node also selects a cooperation strategy to reduce its own loss through evolutionary learning, and the network finally converges to a stable state where both parties cooperate.
(2)CDTake 0.46. When the strategy 2 is selected for the evolution game, the channel network game process is shown in figure 3, and figure 3 is CD>CRAnd when the I-type node part adopts the defense strategy, the system evolves the analysis chart of the stable state, as can be known from fig. 3, when some I-type nodes in the channel network take the defense measure, the I-type nodes adopt the defense strategy, and the II-type nodes are subjected to evolution learning for a period of time, observe that the I-type nodes adopt the defense strategy, and select the cooperation strategy for maximizing the benefits of the nodes. Of type I nodes over timeAnd (3) evolutionary learning, after the II-type nodes adopt cooperation strategies, abandoning the defense strategies to select the cooperation strategies for the maximum benefit of the nodes, and finally converging the network to a stable state in which the nodes cooperate. Is described in CD>CRAnd meanwhile, whether the I-type node takes defense measures or not has no influence on the game evolution strategy of the network replication dynamic system.
The influence of the initial ratio on the convergence of the system is specifically explored as follows:
in order to research the influence of the initial proportion of cooperative strategies deployed by the type I node and the type II node on the system convergence, the stability analysis of a dynamic system replicated by theoretical 1 and 6.2.1 node channel networks shows that the combined strategy (cooperation and cooperation) is an ESS of the system. On the basis, whether the two game parties can still maintain a stable state and influence on model convergence is further considered for different initial proportions of the channel network node selection cooperation strategy. CDTaking 0.46, fig. 4(a) is a graph of the influence of the initial proportion on the system convergence when the strategy 3 is adopted, fig. 4(b) is a graph of the influence of the initial proportion on the system convergence when the strategy 4 is adopted, fig. 4(c) is a graph of the influence of the initial proportion on the system convergence when the strategy 5 is adopted, and as can be seen from fig. 4(a) and fig. 4(b), the higher the initial proportion of the type I node adopting the cooperation strategy is, the faster the model convergence is; as can be seen from fig. 4(b) and 4(c), the higher the initial proportion of the type II nodes that adopt the cooperation strategy, the faster the convergence of the model.
The influence of cost on the convergence of the system is specifically explored as follows:
in order to research the influence of the cost of the type I node deployment defense strategy on the system convergence, the cost C of the type I node deployment defense strategy is changed according to the ESS stability analysisDThe values of the parameters were subjected to simulation analysis. When C is presentD>CRIn order to simplify the simulation graph, only the evolution process that the type I node adopts the cooperation strategy and the type II node adopts the cooperation strategy is displayed in the simulation graph. When strategies 2 and C are adopted in the evolutionary game processD>C R1/3 the cost of deploying defense strategies for type I nodes is 0.42, 0.44 and 0.46 respectivelyThe effect of cost on the speed of the system to ESS is shown in FIG. 5, from FIG. 5, it can be seen that when C isD>CRIn time, under the condition of three different defense cost games, the cost of deploying the defense strategy by the nodes has obvious influence on the system convergence. As the defense cost increases, the speed at which the type I node reaches the stable cooperation state increases, the speed at which the type II node reaches the stable cooperation state does not change, and the speed at which the system as a whole reaches the ESS increases, that is, the system convergence improves. In the game process, part of the type I nodes adopt a defense strategy, and the type II nodes observe that the type I nodes adopt the defense strategy and adopt a cooperation strategy for maximizing the benefits of the type II nodes; and at the moment, the type I node observes that the type II node adopts a cooperation strategy, and in order to maximize the benefit of the type I node, the defense strategy is abandoned and the cooperation strategy is adopted. Through the evolutionary game, the system will eventually converge to a stable state of the ESS. In this state, the type I node and the type II node both adopt a cooperation strategy and can obtain maximized benefits, and no matter one node or a plurality of nodes have no motivation to deviate from the maximized benefits. Therefore, the higher the cost of deploying the defense strategy by the type I node, the faster the system can reach the ESS, i.e., the better the system convergence.
The influence of the attack success rate on the system convergence is specifically explored as follows:
in order to study the influence of different attack success rates of II-type nodes on system convergence, simulation analysis is performed by changing the value of the attack success rate P parameter of the II-type nodes according to ESS stability analysis. CDTake 0.46. When strategies 2 and C are adopted in the evolutionary game processD>CRWhen the success rates of type II node attacks of 1/3 are 0.1, 0.2, and 0.4, respectively, the influence of the attack success rate on the system convergence is shown in fig. 6, and it is clear from fig. 6 that C is the success rate of the attackD>CRIn time, under the condition of three different attack success rate games, the attack success rate of the type II node has influence on the system convergence. With the increase of the success rate of the attack, the speed of the type I node reaching the stable cooperation state is increased, the speed of the type II node reaching the stable cooperation state is unchanged, and the speed of the whole system reaching the ESS is increased, namely the convergence of the system is improved. The game process is analyzed in section 6.2.3, and finally, the type I node is "enableSelf-benefit maximization would forego defense strategies and instead take cooperative strategies. In case the defense cost is larger than the transaction cost, the higher the attack success rate, the faster the system reaches the ESS, i.e. the better the system convergence.
Based on the replication dynamic system modeled by the equations (20) to (25), a mixing strategy (X, Y) ((X) is given according to different experimental purposes1,x2,x3),(y1,y2,y3) X) is an initial value of1,x2,x3,y1,y2,y3Substituting and copying the dynamic system expression, wherein the game process is reflected on the simulation image as x1,x2,x3,y1,y2,y3The ratio Node ratio (%) of the policy selected by the respective corresponding Node, i.e., the image ordinate. And observing the game process according to the change of the strategy proportion, and analyzing the stability of the channel network dynamic evolution game model. When C is presentD<CRMeanwhile, the game result of the dynamic evolution model of the system is a combined strategy (defense and cooperation).
System evolution stability analysis for judging whether defense strategy is adopted or not in initial state of I-type node
(1)CDTake 0.3. When strategy 1 is selected for the evolutionary game, the channel network game process is shown in FIG. 7, and FIG. 7 is CD<CRAnd when the I-type nodes do not adopt the defense strategy, the model evolves to a steady state analysis diagram, as can be seen from fig. 7, when the I-type nodes in the channel network do not adopt the defense strategy, the II-type nodes select the attack strategy in order to maximize their own benefits, and after a period of game, the I-type nodes always select the cooperation strategy, and the II-type nodes further select the cooperation strategy through evolution learning to reduce their own loss, and the network finally converges to the state where both parties cooperate.
(2)CDTake 0.3. When the strategy 2 is selected for the evolution game, the channel network game process is shown in figure 8, and figure 8 is CD<CRAnd when the I-type node part adopts the defense strategy, the model evolves a steady state analysis chart, which can be known from the chart 8, when there is part in the channel networkWhen the type I nodes take defense measures, the type II nodes evolve and learn for a period of time, the fact that the type I nodes take defense strategies is observed, cooperation strategies are selected for maximizing benefits of the type I nodes, and the network finally converges to a stable combination strategy of (defense and cooperation). Is described in CD<CRAnd meanwhile, whether the I-type node takes defense measures or not has influence on the game evolution strategy of the network replication dynamic system. In combination with the above analysis, whether it is CD>CROr is CD<CRThe following conclusions can be drawn: whether the I-type node takes defense measures or not has influence on the game evolution strategy of the network replication dynamic system.
The influence of the initial proportion of the strategy on the convergence of the system is specifically explored as follows:
in order to research the influence of the initial proportion of the defense strategy and the cooperation strategy respectively deployed by the type I node and the type II node on the convergence of the system, the stability analysis of a theory 2 and a node channel network replication dynamic system is used for obtaining that the combination strategy (defense and cooperation) is an ESS of a model. On the basis, whether the two game parties can still maintain a stable state and influence on the model to reach the ESS speed is further considered for different initial proportions of the channel network type I node selection defense strategy and the type II node selection cooperation strategy. CDTake 0.3. FIG. 9(a) is the effect of initial scale on model convergence when strategy 3 is used, FIG. 9(b) is the effect of initial scale on model convergence when strategy 6 is used, FIG. 9(c) is the effect of initial scale on model convergence when strategy 7 is used, and it can be seen from FIGS. 9(a) and 9(b) that system convergence is faster as the initial scale of the defense strategy is taken by the type I node is higher; as can be seen from fig. 9(b) and 9(c), the higher the initial proportion of the type II nodes that adopt the cooperation strategy, the faster the system converges. Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: the convergence of the model is influenced by the initial proportion of the two game parties, and the higher the initial proportion is, the better the convergence of the model is.
The influence of cost on the convergence of the system is specifically explored as follows:
deploying defenses for studying type I nodesThe influence of the cost of the strategy on the system convergence changes the C of the type I node deployment defense strategy according to the stability analysis of the ESSDThe values of the parameters are used for simulation analysis. When C is presentD<CRIn order to simplify the simulation graph, only the evolution process that the type I node adopts the defense strategy and the type II node adopts the cooperation strategy is displayed in the simulation graph. When strategies 2 and C are adopted in the evolutionary game processD<CRWhen the costs of the type I node deployment defense strategies of 1/3 are 0.1, 0.2 and 0.3, respectively, the influence of the costs on the system convergence is shown in fig. 10, and it can be seen from fig. 10 that when C isD<CRIn time, under three different defense cost game conditions, the cost of deploying the defense strategy by the nodes has an influence on the system convergence. With the increase of the defense cost, the speed of the type I node reaching the stable defense state is slightly reduced, the speed of the type II node reaching the stable cooperation state is reduced, and the speed of the system as a whole reaching the ESS is reduced, that is, the system convergence is reduced. Through the evolutionary game, the system converges to a stable state of the ESS. In this state, both type I nodes adopt a defense strategy, both type II nodes adopt a cooperation strategy, and both nodes can obtain maximized benefits, regardless of whether one or more nodes have no motivation to deviate from the maximized benefits. Therefore, the lower the cost of the type I node deployment strategy, the faster the system can reach the ESS, i.e., the better the system convergence.
Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: under the condition of different defense cost games, the cost of deploying defense strategies by the type I nodes has influence on the convergence of the system.
The influence of the attack success rate on the system convergence is specifically explored as follows:
in order to study the influence of different attack success rates of II-type nodes on system convergence, simulation analysis is performed by changing the value of the attack success rate P parameter of the II-type nodes according to ESS stability analysis. CDTake 0.3. When strategies 2 and C are adopted in the evolutionary game processD<C R1/3 type II node attackThe effect of attack success rate on the system speed to ESS at power of 0.1, 0.2 and 0.4, respectively, is shown in FIG. 11, where it can be seen from FIG. 11 that when C isD<CRIn time, under the condition of three different attack success rate games, the attack success rate of the type II node has influence on the system convergence. With the increase of the success rate of the attack, the speed of the type I node reaching the stable cooperation state is reduced, the speed of the type II node reaching the stable cooperation state is unchanged, and the speed of the system reaching the ESS as a whole is reduced, that is, the convergence of the system is reduced. In case the defense cost is less than the transaction cost, the lower the attack success rate, the faster the system reaches the ESS, i.e. the better the system convergence.
Based on the above analysis, it was found that either C or C is presentD>CROr is CD<CRThe following conclusions can be drawn: under the game condition of three different attack success rates of the type II nodes, the attack success rate of the type II nodes has influence on the system convergence.
From theorem 1, when C isD>CRThe equalization point ((1,0,0), (1,0,0)) is an ESS of the channel network replication dynamic system. From theorem 2, when C isD<CRThe equalization point ((0,0,1), (1,0,0)) is an ESS of the channel network replication dynamic system. Based on these two ESS under different conditions, the stability and convergence analysis of the channel network is performed, and the conclusion is as follows:
1) and (3) stability analysis: after the channel network passes through an evolutionary game, the II type node with the attack behavior gives up the attack and adopts a cooperation strategy; and the type I node adopts a cooperation strategy (when C isD>CRWhen) or defense strategies (when CD<CRIn time), the channel network has better stability and convergence, and the network performance is improved. 2) Influence of initial ratio on system convergence: the initial proportion of each strategy (cooperation strategy or defense strategy) adopted by the node has an influence on the system convergence, i.e. the higher the initial proportion is, the better the system convergence is. 3) Cost impact on system convergence: when the cost required by the I-type node for deploying the defense strategy is larger than the cost required by the node for carrying out one-time forwarding transaction, the higher the cost for the node to adopt the defense strategy is, the higher the system convergence isGood; when the cost required by deploying the defense strategy by the type I node is less than the cost required by the node for carrying out one-time forwarding transaction, the lower the cost for adopting the defense strategy by the node is, the better the system convergence is. 4) Impact of attack success rate on system convergence: when the cost required by deploying the defense strategy by the I-type node is more than the cost required by carrying out one-time forwarding transaction by the node, the higher the attack success rate is, the higher the system convergence is; when the cost required by deploying the defense strategy by the I-type node is less than the cost required by the node to carry out one-time forwarding transaction, the lower the attack success rate is, the better the system convergence is.
Due to the randomness of the uncooperative behavior of the nodes in the real scene, the performance advantage of the channel network of the patent in the real scene, particularly in the case of the uncooperative behavior of the nodes, needs to be further verified. To this end, a simulation framework was developed to simulate Lightning networks and evolving game channel networks with defense strategies. The specific network configuration is as follows:
(1) network topology: generating a random undirected topological graph consisting of 1000 nodes; wherein, 100 II type nodes are randomly extracted from 1000 nodes, and the whole simulation time is 40000 seconds;
(2) routing protocol: the routing protocol mainly comprises 2 types: based on the maximum flow algorithm and based on the Landmark algorithm. Based on a maximum flow algorithm, requiring nodes to store a channel map of the whole network, and finding a feasible payment path of a target point by using a classic maximum flow algorithm, such as Push-Relay and the like; the Landmark-based algorithm mainly comprises a Flare scheme, a Landmark Routing scheme and the like. In the current 2-class schemes, the storage overhead and the running cost based on the maximum flow scheme are too high, and in the scheme based on the Landmark, although the node is not required to store the whole network graph, the success rate of the path searching depends on the mode and the size of the selected beacon point set, and whether the searched path is the optimal path or not cannot be ensured, and more importantly, a solution for bearing malicious behaviors is not provided. For each transaction request, a Flooding (Flooding) mechanism is adopted by using an Epidemic routing protocol, and the message is transmitted to the neighbor nodes as long as the opportunity exists, namely all the nodes transmit the message to all the neighbor nodes. The buffer area of the nodes in the model is set to be large enough, the Epidemic routing protocol can ensure the fairness of the node routing information in the dynamic evolution game model of the channel network, the probability of each node being selected is high, the influence of the nodes with low utilization rate on the network performance is reduced, and the experimental analysis is as follows.
(1) Transaction success rate (abbreviated as T)R)
The transaction average transmission success rate is the number of transaction messages successfully sent to the target node and the total number of transaction messages: t isR=RM/TMWherein R isMNumber of transaction messages successfully sent to target node, TMIs the total transaction message quantity.
Fig. 12 shows the influence of the uncooperative behavior of the node on the transaction success rate, and fig. 12 reflects the influence of the uncooperative behavior of the node on the transaction average transmission rate under different channel network configurations when the policy 2 and the attack success rate P are 0.5. In Lightning networks, the uncooperative behavior causes the trade mean transmission success rate to decrease due to the presence of type II nodes in the network and the lack of security measures in the network. For the evolutionary game channel network with a defense strategy, the I-type node can resist different attack behaviors at a certain probability, so that the network reaches a stable cooperation state, and the average transaction transmission rate in the network is increased.
(2) Average message transmission delay (abbreviated as T)D)
TDThe average time from the generation of the transaction request message for the root node (transaction requester) to the reception of the message by the target node, i.e. the difference between the transaction completion time and the transaction initiation time: t isD=TC-TSWherein, TCFor transaction completion time, TSIs the transaction start time. Fig. 13 shows the influence of the uncooperative behavior of the node on the average message transmission delay, and fig. 13 reflects the influence of the uncooperative behavior of the node on the average transaction transmission delay under different channel network configurations when the policy 2 and the attack success rate P are 0.5. In a channel network, there will always be transactions including type II nodes, in which case the routing of the transactions will result in longer transactionsDelaying; for the evolutionary game channel network with the defense strategy, the network can reach a stable cooperation state through a defense mechanism and an evolutionary game process, and therefore the influence of uncooperative nodes on transaction time delay is relieved.
The invention has been described above with reference to the accompanying drawings, it is obvious that the invention is not limited to the specific implementation in the above-described manner, and it is within the scope of the invention to apply the inventive concept and solution to other applications without substantial modification.