CN116208358A - Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model - Google Patents

Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model Download PDF

Info

Publication number
CN116208358A
CN116208358A CN202211437047.5A CN202211437047A CN116208358A CN 116208358 A CN116208358 A CN 116208358A CN 202211437047 A CN202211437047 A CN 202211437047A CN 116208358 A CN116208358 A CN 116208358A
Authority
CN
China
Prior art keywords
node
consensus
message
scale
reputation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211437047.5A
Other languages
Chinese (zh)
Inventor
陈玉玲
陈鹏宇
李涛
黄思远
胡建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou University
Original Assignee
Guizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou University filed Critical Guizhou University
Priority to CN202211437047.5A priority Critical patent/CN116208358A/en
Publication of CN116208358A publication Critical patent/CN116208358A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer And Data Communications (AREA)

Abstract

The PBFT is used as a consensus algorithm for achieving information consistency in a blockchain, and is more suitable for being applied to a alliance chain with partial decentralization and anti-Bayesian node characteristics. However, the performance of the existing federated chain consensus algorithm PBFT is significantly reduced as the regional node size increases, greatly limiting the development of large-scale federated chains. In view of the above, a reputation evaluation model-based sliced PBFT consensus algorithm is presented herein. The method comprises the steps of dividing a large-scale node cluster into high-efficiency small-scale node clusters by using a slicing technology, and realizing overall consensus by using local consensus. And secondly, giving different reputation grades to the nodes through a reputation evaluation model, selecting a high reputation evaluation node to preferentially select a main node, firstly providing a gray area concept, and improving the stability of a consensus scheme through integrating the node types. Finally, simulation experiment results show that the invention has the advantage of high performance and provides higher consensus stability under a large-scale node environment.

Description

Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model
Technical Field
The invention belongs to the field of block chains, and relates to a practical Bayesian fault tolerance technology.
Background
In a blockchain, a consensus mechanism is used as a core part of the blockchain. How to ensure the consistency of data among a plurality of nodes is a problem that needs to be considered by a consensus mechanism, and the performance of a consensus system is obviously improved by an excellent consensus mechanism. The main characteristic of the Bayesian fault-tolerant algorithm is that the transmission of messages on unreliable channels can reach consensus within a certain fault-tolerant range. PBFT is widely used in federated chain applications, but PBFT also has a problem of dramatic performance degradation in the case of large-scale consensus networks, which greatly limits the development and landing of federated chain applications. After the PBFT consensus model structure is changed from a single layer to a double layer, the communication overhead for realizing consensus can be greatly reduced, and the communication efficiency is improved. On the basis, the invention introduces a reputation evaluation model and provides a concept of a gray area, and possible Bayesian nodes are placed in the gray area through the output result of the reputation evaluation model, so that the influence of the Bayesian nodes on the consensus model is reduced, and the stability of the consensus model is improved.
Disclosure of Invention
The invention aims to provide a large-scale PBFT (physical random access memory) improvement technology based on a reputation evaluation model, and the invention introduces a double-layer consensus model in order to improve the consensus efficiency of PBFT in a large-scale consensus network. In order to improve the stability of the model, the invention provides a concept of gray area, introduces a reputation evaluation model, inputs the consensus behavior of the node into the reputation evaluation model, preliminarily judges whether the node is a Bayesian node according to the output result of the consensus model to the node, and improves the stability of the consensus model by using the possible Bayesian node scheme gray area. The invention adopts the following technical scheme:
step one: the bottom layer area in the double-layer consensus model achieves consensus;
step two: the bottom layer area uploads the message to the top layer area according to the consensus sequence, and consensus is achieved in the top layer area;
step three: inputting the node consensus behavior into a reputation evaluation model, and outputting reputation evaluation scores of the nodes by the reputation evaluation model;
step four: the possible bayer pattern nodes are placed in gray areas according to the output reputation scores.
Drawings
FIG. 1 depicts in detail a specific consensus model structure of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that only some, but not all embodiments of the invention are described below.
The invention provides a large-scale PBFT (physical property added-quality improvement) technology based on a reputation evaluation model, which comprises the following specific steps:
step one: underlying region consensus phase
1) The underlying region agrees with requests from clients:
step 1 (Request) client c issues a Request message m to the underlying region. After receiving sr of the secondary node in the bottom layer area, the secondary node will
Figure SMS_1
The message is signed and packed by the private key of the message and then is sent to the master node in the current area, m represents the request message sent by c, and ts represents the timestamp when the client sends the request message.
The current area master node is receiving
Figure SMS_2
After the message, it is necessary to determine the +.>
Figure SMS_3
If the private key signature in the message is correct, the Pre-preparation phase is entered if so, and if so, the message is discarded.
Step 2 (Pre-preparation) the master node p receives the transmission from the slave node
Figure SMS_4
Message, generating +.A. signed by self private key>
Figure SMS_5
A message and broadcast in the current region, while recording the request into the local log, v representing the view number,m represents the message content, d represents the message digest of the message content, n is the current view that the master node assigns to after receiving the message is unique and within the range H, H]The number in the server is mainly used for sequencing all client requests.
Here, the Pre-preparation message reduces the communication resources occupied by the Pre-preparation message by placing the m content of the message itself outside the Pre-preparation message. The Pre-prepare message serves as an evidence to determine that the request is given a sequence number n in View v, so that it can be traced back in View-Change.
The secondary node in the current area receives the primary node
Figure SMS_6
The message requires the following checks:
whether the signature is correct in the Request and Pre-prepare messages.
Whether the current view number is v.
The node never receives messages m in view v with sequence number n but digest d not identical.
Whether the message digest of m is consistent with d in the message.
Judging whether n is within the interval H, H.
If all the requirements are met, passing verification, entering a preparation stage, and if any of the requirements are not met, discarding the message.
Step 3 (preparation) the current region secondary node i receives
Figure SMS_7
After the message and after verification passes, enter the preparation phase, multicast one at all other secondary nodes of the current area
Figure SMS_8
Messages, and adds both messages to the log of i.
The primary node and the secondary node receive
Figure SMS_9
After the message, the following verification is performed:
whether the message signature is correct.
Whether n is in [ H, H ].
D is the sum of
Figure SMS_10
D in the message is the same.
If the verification is not passed, the message is discarded directly. If the verification is passed, the message is accepted. The current node I writes the prepared (m, v, n, I, ts) into the message log, receives the message from 2f different nodes
Figure SMS_11
Figure SMS_12
Message-consistent +.>
Figure SMS_13
After the message, the Verify phase is entered.
Step 4 (Verify) when the Verify phase is entered, node i sends a bar to the current region master node p after the prepended (m, v, n, i, ts) is correct
Figure SMS_14
Accepting +.>
Figure SMS_15
After the message and insert it into log:
whether the message signature is correct.
Whether the current node has received n under the same view v.
Calculate the information digest of m, if d can agree with it.
Judging whether n is between H, H.
The prepended (m, v, n, i, ts) in any f+1 node set is true, ensuring that verified (m, v, n, ts) is true. The prepred (m, v, n, i, ts) is true and the master node p accepts 2f+1 AND including itself
Figure SMS_16
M, v, n in the message are identical +.>
Figure SMS_17
A message. Confirm that verified-local (m, v, n, i, ts) is true. After the two conditions are met, if the region is the bottom layer region, the sub stage is entered, and if the region is the top layer region, the Reply stage is entered.
Step 5 (sub) entering sub phase, the current region master node bp sequentially transmits according to the order of n
Figure SMS_18
The top-level region continues to execute the consensus mechanism for the top-level region.
Step two: top layer region consensus phase
2) The top layer region is uploaded according to the bottom layer region to carry out top layer region consensus through the bottom layer consensus information:
step 1 (Request) client c issues a Request message m to the underlying region. After receiving sr of the secondary node in the bottom layer area, the secondary node will
Figure SMS_19
The message is signed and packed by the private key of the message and then is sent to the master node in the current area, m represents the request message sent by c, and ts represents the timestamp when the client sends the request message.
The current area master node is receiving
Figure SMS_20
After the message, it is necessary to determine the +.>
Figure SMS_21
If the private key signature in the message is correct, the Pre-preparation phase is entered if so, and if so, the message is discarded.
Step 2 (Pre-preparation) the master node p receives the transmission from the slave node
Figure SMS_22
Message, generating +.A. signed by self private key>
Figure SMS_23
The message is broadcast in the current area, and the request is recorded in the local log, v represents the view number, m represents the message content, d represents the information abstract of the message content, n is the unique and range [ H, H ] of the current view allocated by the master node after receiving the message]The number in the server is mainly used for sequencing all client requests.
Here, the Pre-preparation message reduces the communication resources occupied by the Pre-preparation message by placing the m content of the message itself outside the Pre-preparation message. The Pre-prepare message serves as an evidence to determine that the request is given a sequence number n in View v, so that it can be traced back in View-Change.
The secondary node in the current area receives the primary node
Figure SMS_24
The message requires the following checks:
whether the signature is correct in the Request and Pre-prepare messages.
Whether the current view number is v.
The node never receives messages m in view v with sequence number n but digest d not identical.
Whether the message digest of m is consistent with d in the message.
Judging whether n is within the interval H, H.
If all the requirements are met, passing verification, entering a preparation stage, and if any of the requirements are not met, discarding the message.
Step 3 (preparation) the current region secondary node i receives
Figure SMS_25
After the message and after verification passes, enter the preparation phase, multicast one at all other secondary nodes of the current area
Figure SMS_26
Messages, and adds both messages to the log of i.
The primary node and the secondary node receive
Figure SMS_27
After the message, the following verification is performed:
whether the message signature is correct.
Whether n is in [ H, H ].
D is the sum of
Figure SMS_28
D in the message is the same.
If the verification is not passed, the message is discarded directly. If the verification is passed, the message is accepted. The current node i writes the prepared (m, v, n, i, ts) into the message log, receives the and from 2f different nodes
Figure SMS_29
Figure SMS_30
Message-consistent +.>
Figure SMS_31
After the message, the Verify phase is entered.
Step 4 (Verify) when the Verify phase is entered, node i sends a bar to the current region master node p after the prepended (m, v, n, i, ts) is correct
Figure SMS_32
Accepting +.>
Figure SMS_33
After the message and insert it into log:
whether the message signature is correct.
Whether the current node has received n under the same view v.
Calculate the information digest of m, if d can agree with it.
Judging whether n is between H, H.
The prepended (m, v, n, i, ts) in any f+1 node set is true, ensuring that verified (m, s, n, ts) is true. The prepred (m, v, n, i, ts) is true and the master node p accepts 2f+1 AND including itself
Figure SMS_34
M, v, n in the message are identical +.>
Figure SMS_35
A message. Confirm that verified-local (m, v, n, i, ts) is true. After the two conditions are met, if the region is the bottom layer region, the sub stage is entered, and if the region is the top layer region, the Reply stage is entered.
Step 5 (Reply) (top-level region) entering the Reply phase, indicating that the top-level region has reached consensus. Transmitting
Figure SMS_36
For client c, c receives f+1 different signatures<reply,v,d,k,ts> Sig A message representing that the top-level region has reached consensus.
Step three: reputation update stage
The reputation evaluation model comprehensively evaluates the consensus behaviors of all nodes in the consensus process according to the participation consensus frequency of all nodes, the regional node scale, the historical influence degree and the reward and punishment factor:
3) The reputation value of each node is one hundred initially, and the reputation value is updated according to the behaviors of each participant:
definition of 1 node participation consensus frequency: the participation frequency of the node is evaluated according to the participation frequency of the node i in a period of time, and the node i is used for
Figure SMS_37
To express: />
Figure SMS_38
Wherein n is the number of times a node participates in consensus, and alpha and beta are used as adjustable parameters to control
Figure SMS_39
Duty cycle in the reputation evaluation model. It can be seen that the more times n that nodes participate in consensus, the more i nodes are participating in consensus frequencyThe higher the score in terms.
Definition 2 area node size: the regional node scale is evaluated in terms of the number of regional nodes, and the more important the region is, the more the number of nodes is, and therefore the higher the proportion of the region should be relative to the score or the deduction.
Figure SMS_40
Wherein mu 123
Definition 3 historical influence level: the degree of history effect is an assessment of the historical behavior of the node. Historical influence degree τ of node i i The calculation is as follows:
Figure SMS_41
in the method, in the process of the invention,
Figure SMS_42
used for representing the consensus situation of the i node in the N round of consensus, m represents the number of rounds of the last round, and +.>
Figure SMS_43
Represents the attenuation factor:
Figure SMS_44
as the consensus advances, the older data has less impact and only the data of the nearest k-cycles can be used for reference, k being an adjustable decay factor-cycle number parameter.
Figure SMS_45
Where λ is used to distinguish the reputation evaluation model results of the primary and secondary nodes, the behavior score of the primary node in the reputation evaluation model score for a successful or failed consensus should be higher for the primary node because the primary node has a more important role in the consensus process.
Definition of 4 reward and punishment factors: reputation evaluation is carried out on the aspect of the round of consensus behavior of the nodes by using reward and punishment factors, and the reputation value of the i node of the nth round rewards and punishment factors
Figure SMS_46
Expressed as:
Figure SMS_47
in the method, in the process of the invention,
Figure SMS_48
representing the reputation value of the node at the n-1 th round of the i node, λ represents an adjustable punishment factor parameter, where g (x) is a normal distribution function, expressed as: />
Figure SMS_49
The normal distribution function is used for successfully achieving consensus that the nodes with high reputation values have lower rewards than the nodes with low reputation values. Meanwhile, the punishment strength of failure consensus of the nodes with high reputation value is larger than that of the nodes with low reputation value. This approach encourages nodes to successfully participate in consensus while avoiding PoS-like harmless attacks.
Reputation value of node i on nth round
Figure SMS_50
Expressed as:
Figure SMS_51
wherein, eta, theta,
Figure SMS_52
lambda is an adjustable parameter of each factor, and can adjust the proportion of each influencing factor in the node reputation evaluation model
Step four: gray region switching stage
4) And inputting reputation evaluation scores obtained by the reputation evaluation model according to the consensus behaviors of the nodes, and replacing the nodes with scores lower than a threshold value and the nodes with the highest reputation evaluation scores in the gray area.

Claims (1)

1. A large-scale PBFT improvement technology based on a reputation evaluation model comprises the following specific steps:
step one: the bottom layer area in the double-layer consensus model achieves consensus;
step two: the bottom layer area uploads the message to the top layer area according to the consensus sequence, and consensus is achieved in the top layer area;
step three: inputting the node consensus behavior into a reputation evaluation model, and outputting reputation evaluation scores of the nodes by the reputation evaluation model;
step four: the possible bayer pattern nodes are placed in gray areas according to the output reputation scores.
CN202211437047.5A 2022-11-16 2022-11-16 Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model Pending CN116208358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211437047.5A CN116208358A (en) 2022-11-16 2022-11-16 Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211437047.5A CN116208358A (en) 2022-11-16 2022-11-16 Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model

Publications (1)

Publication Number Publication Date
CN116208358A true CN116208358A (en) 2023-06-02

Family

ID=86510202

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211437047.5A Pending CN116208358A (en) 2022-11-16 2022-11-16 Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model

Country Status (1)

Country Link
CN (1) CN116208358A (en)

Similar Documents

Publication Publication Date Title
CN112039964B (en) Node reputation consensus method based on block chain
CN110796547A (en) Improved practical Byzantine fault-tolerant system based on alliance block chain
CN113132401B (en) Block chain-based data processing method and device
CN112788137A (en) Alliance chain consensus method based on RAFT algorithm
CN112468255B (en) Block link point time synchronization method based on network consensus and VRF algorithm
CN111082943A (en) Efficient block chain consensus method
CN111935207A (en) Block chain system consensus method based on improved C4.5 algorithm
CN114003584A (en) Byzantine fault-tolerant consensus method based on evolutionary game
CN116015672B (en) PBFT consensus mechanism based on reputation model
CN111130790A (en) Block co-recognition method based on block chain node network
CN115277722B (en) DR-PBFT (digital binary-representation-binary-representation) improvement method based on reputation value model
CN113014635A (en) Node type division method and device of block chain system and block chain system
CN111414420A (en) Improved PBFT block chain consensus method
CN111798234B (en) Lightweight block chain system and construction method
Xu et al. Wireless distributed consensus for connected autonomous systems
CN112020018B (en) Block chain accounting group generation method, consensus method and block chain system
CN114938292A (en) Node reliability-based multi-level optimization PBFT consensus method
CN117745433B (en) Energy block chain link point consensus method based on improved PBFT consensus mechanism
CN117439998A (en) Alliance chain consensus protocol optimization method oriented to Internet of things
CN114449476A (en) Block link point consensus method for safety communication in Internet of vehicles
CN114448997A (en) Equipment quality information management node consensus method based on PBFT
CN113992398A (en) Improved PBFT consensus algorithm
CN116208358A (en) Large-scale PBFT (physical Bifiduciary Point) improvement technology based on reputation evaluation model
CN115883578A (en) 5G power network node trust management method based on block chain technology
CN113746859B (en) High-network-performance and high-security VaPBFT block chain consensus method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination