应用科学学报 ›› 2022, Vol. 40 ›› Issue (4): 639-652.doi: 10.3969/j.issn.0255-8297.2022.04.008

• 区块链 • 上一篇    

基于节点权重的DPoS共识算法

田志宏, 赵金东, 李绍凯, 侯延琛, 韩双志, 赵相福   

  1. 烟台大学 计算机与控制工程学院, 山东 烟台 264005
  • 收稿日期:2021-11-15 发布日期:2022-08-03
  • 通信作者: 赵金东,副教授,研究方向为物联网、区块链和人工智能等。E-mail:zhjdong@ytu.edu.cn E-mail:zhjdong@ytu.edu.cn
  • 基金资助:
    国家自然科学基金(No.61972360);山东省自然科学基金(No.ZR2020MF148)资助

DPoS Consensus Algorithm Based on Node Weight

TIAN Zhihong, ZHAO Jindong, LI Shaokai, HOU Yanchen, HAN Shuangzhi, ZHAO Xiangfu   

  1. School of Computer and Control Engineering, Yantai University, Yantai 264005, Shandong, China
  • Received:2021-11-15 Published:2022-08-03

摘要: 针对委托权益证明(delegated proof of stake,DPoS)共识机制中节点作恶以及如何降低恶意节点成为代表节点可能性的问题,结合埃欧塔(IOTA)共识机制在安全性和稳定性方面的优势建立了节点之间的信任关系,提出了一种基于节点权重的DPoS(delegated proofof stake based on node weight,NW-DPoS)共识算法。将节点历史行为信息、自身权重值和在线状态作为计算认可度的因素,选取累积认可度高的节点作为区块生产者;根据节点行为表现并以降低节点累积认可度的方式惩罚有恶意行为的节点。仿真实验和分析表明: NW-DPoS共识算法能够明显降低恶意节点成为代表节点的概率,并且在抵御双花攻击和贿赂攻击方面比DPoS共识机制更可靠,从而提高了系统的安全性。

关键词: 委托权益证明, 埃欧塔, 节点权重, 节点认可度, 双花攻击, 贿赂攻击

Abstract: Aiming at the problems of node attacks in the consensus mechanism of delegated proof of stake (DPoS) and the way to reduce the possibility of malicious nodes becoming representative nodes, an improved consensus algorithm, delegated proof of stake based on node weight (NW-DPoS) is proposed in this paper. NW-DPoS takes the advantages of IOTA consensus in security and stability and establishes trust relationships between nodes. Taking the node historical behavior information, weight value and online status as the factors to calculate recognition degree, NW-DPoS selects a node with high cumulative recognition degree as block producer. And according to the behavior of nodes, the nodes with malicious behavior are punished by reducing their cumulative recognitions. Simulation experiment and analysis show that NW-DPoS consensus algorithm can significantly reduce the probability of malicious nodes becoming representative nodes, and is more reliable than DPoS consensus mechanism in resisting double spend attack and bribery attack, thus improving the security of the system.

Key words: delegated proof of stake (DPoS), IOTA, node weight, node recognition, double spend attack, bribery attack

中图分类号: