区块链

基于节点权重的DPoS共识算法

展开
  • 烟台大学 计算机与控制工程学院, 山东 烟台 264005

收稿日期: 2021-11-15

  网络出版日期: 2022-08-03

基金资助

国家自然科学基金(No.61972360);山东省自然科学基金(No.ZR2020MF148)资助

DPoS Consensus Algorithm Based on Node Weight

Expand
  • School of Computer and Control Engineering, Yantai University, Yantai 264005, Shandong, China

Received date: 2021-11-15

  Online published: 2022-08-03

摘要

针对委托权益证明(delegated proof of stake,DPoS)共识机制中节点作恶以及如何降低恶意节点成为代表节点可能性的问题,结合埃欧塔(IOTA)共识机制在安全性和稳定性方面的优势建立了节点之间的信任关系,提出了一种基于节点权重的DPoS(delegated proofof stake based on node weight,NW-DPoS)共识算法。将节点历史行为信息、自身权重值和在线状态作为计算认可度的因素,选取累积认可度高的节点作为区块生产者;根据节点行为表现并以降低节点累积认可度的方式惩罚有恶意行为的节点。仿真实验和分析表明: NW-DPoS共识算法能够明显降低恶意节点成为代表节点的概率,并且在抵御双花攻击和贿赂攻击方面比DPoS共识机制更可靠,从而提高了系统的安全性。

本文引用格式

田志宏, 赵金东, 李绍凯, 侯延琛, 韩双志, 赵相福 . 基于节点权重的DPoS共识算法[J]. 应用科学学报, 2022 , 40(4) : 639 -652 . DOI: 10.3969/j.issn.0255-8297.2022.04.008

Abstract

Aiming at the problems of node attacks in the consensus mechanism of delegated proof of stake (DPoS) and the way to reduce the possibility of malicious nodes becoming representative nodes, an improved consensus algorithm, delegated proof of stake based on node weight (NW-DPoS) is proposed in this paper. NW-DPoS takes the advantages of IOTA consensus in security and stability and establishes trust relationships between nodes. Taking the node historical behavior information, weight value and online status as the factors to calculate recognition degree, NW-DPoS selects a node with high cumulative recognition degree as block producer. And according to the behavior of nodes, the nodes with malicious behavior are punished by reducing their cumulative recognitions. Simulation experiment and analysis show that NW-DPoS consensus algorithm can significantly reduce the probability of malicious nodes becoming representative nodes, and is more reliable than DPoS consensus mechanism in resisting double spend attack and bribery attack, thus improving the security of the system.

参考文献

[1] Nakamoto S.Bitcoin:a peer-to-peer electronic cash system[R/OL].(2008-10-31)[2020-09-12].https://www.debr.io/article/21260-bitcoin-a-peer-to-peer-electronic-cash-system.
[2] King S, Nadal S.PPCoin:peer-to-peer crypto-currency with proof-of-stake[R/OL].(2012-08-19)[2021-05-10].https://www.peercoin.net/whitepapers/peercoin-paper.pdf.
[3] 袁勇,倪晓春,曾帅,等.区块链共识算法的发展现状与展望[J].自动化学报, 2018, 44(11):2011-2022.Yuan Y, Ni X C, Zeng S, et al.Blockchain consensus algorithms:the state of the art and future trends[J].Acta Automatica Sinica, 2018, 44(11):2011-2022.(in Chinese)
[4] Cheng Y, Hu X, Zhang J.An improved scheme of proof-of-stake consensus mechanism[C]//Proccedings of 20194th International Conference on Mechanical, Control and Computer Engineering, Hohhot, 2019:826-8263.
[5] 田国华,胡云瀚,陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报, 2021, 32(5):1495-1525.Tian G H, Hu Y H, Chen X F.Research progress on attack and defense techniques in block-chain system[J].Journal of Software, 2021, 32(5):1495-1525.(in Chinese)
[6] Li X Q, Jiang P, Chen T, et al.A survey on the security of blockchain systems[J].Future Generation Computer Systems, 2020, 107:841-853.
[7] Liu L, Yang J, Meng W.Detecting malicious nodes via gradient descent and support vector machine in Internet of things[J].Computers&Electrical Engineering, 2019, 77:339-353.
[8] 黄嘉成,许新华,王世纯.委托权益证明共识机制的改进方案[J].计算机应用, 2019(7):2162-2167.Huang J C, Xu X H, Wang S C.Improved scheme of delegated proof of stake consensus mechanism[J].Journal of Computer Applications, 2019(7):2162-2167.(in Chinese)
[9] 杨坤桥,王煜翔,郭兵,等.委托股权证明共识机制的改进研究[J].计算机工程与应用, 2021, 57(24):107-114.Yang K Q, Wang Y X, Guo B, et al.Improvement and research of delegated proof of stake consensus mechanism[J].Computer Engineering and Applications, 2021, 57(24):107-114.(in Chinese)
[10] Block.one.EOS.IO technical white paper[R/OL].(2017-06-26)[2021-03-16].https://cdn.bitturk.com/whitepaper/eos.pdf.
[11] Chen S, Xie M, Liu J, et al.Improvement of the DPoS consensus mechanism in blockchain based on PLTS[C]//20217th IEEE Intl Conference on Big Data Security on Cloud, IEEE Intl Conference on High Performance and Smart Computing, and IEEE Intl Conference on Intelligent Data and Security, New York, 2021:32-37.
[12] Popov S.The tangle[EB/OL].(2018-04-30)[2020-09-12].http://www.descryptions.com/Iota.pdf.
[13] Kang J, Xiong Z, Niyato D, et al.Toward secure blockchain-enabled Internet of vehicles:optimizing consensus management using reputation and contract theory[J].IEEE Transactions on Vehicular Techonlogy, 2019, 68(3):2906-2920.
[14] 陈梦蓉,林英,兰微,等.基于"奖励制度"的DPoS共识机制改进[J].计算机科学, 2020, 47(2):269-275.Chen M R, Lin Y, Lan W, et al.Improvement of DPoS consensus mechanism based on positive incentive[J].Computer Science, 2020, 47(2):269-275.(in Chinese)
[15] Pinzón C, Rocha C.Double-spend attack models with time advantange for bitcoin[J].Electronic Notes in Theoretical Computer Science, 2016, 329:79-103.
[16] Jang J, Lee H N.Profitable double-spending attacks[J].Applied Sciences, 2020, 10(23):8477.
[17] Chen L, Xu L, Xu S, et al.Protecting election from bribery:new approach and computational complexity characterization[C]//Proceedings of the 17th International Conference on Autonomous Agents and Multi-agent Systems, Stockholm, 2018:1894-1896.
[18] 高政风,郑继来,汤舒扬,等.基于DAG的分布式账本共识机制研究[J].软件学报, 2020, 31(4):1124-1142.Gao Z F, Zheng J L, Tang S Y, et al.State-of-the-art survey of consensus mechanisms on DAG-based distributed ledger[J].Journal of Software, 2020, 31(4):1124-1142.(in Chinese)
[19] Bamakan S M H, Motavali A, Bondarti A B.A survey of blockchain consensus algorithms performance evaluation criteria[J].Expert Systems with Applications, 2020, 154:113385.
[20] 顾军华,陈博,王锐,等.结合重要节点信任传播的社会化推荐算法[J].计算机工程与应用, 2021, 57(17):190-195.Gu J H, Chen B, Wang R, et al.Social recommendation combined with important nodes trust propagation[J].Computer Engineering and Applications, 2021, 57(17):190-195.(in Chinese)
[21] 高迎,谭学程.DPoS共识机制的改进方案[J].计算机应用研究, 2020, 37(10):3086-3090.Gao Y, Tan X C.Improvement of DPoS consensus mechanism[J].Application Research of Computers, 2020, 37(10):3086-3090.(in Chinese)
[22] 黄建华,夏旭,李忠诚,等.基于动态授权的信任度证明机制[J].软件学报, 2019, 30(9):2593-2607.Huang J H, Xia X, Li Z C, et al.Proof of trust:mechanism of trust degree based on dynamic authorization[J] Journal of Software, 2019, 30(9):2593-2607.(in Chinese)
[23] Wen Y, Lu F, Liu Y, et al.Attacks and countermeasures on blockchains:a survey from layering perspective[J].Computer Networks, 2021, 191:107978.
文章导航

/