• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Feng, Xiaoqin (Feng, Xiaoqin.) [1] | Ma, Jianfeng (Ma, Jianfeng.) [2] | Miao, Yinbin (Miao, Yinbin.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [5]

Indexed by:

EI

Abstract:

Blockchain allows for secure management of a shared ledger by agreement protocols, where transactions are validated over network without central authorities. Although the agreement protocol has been thoroughly conducted of propagation and consensus researches, mobility of nodes in unstructured overlay networks has not received much attention. Besides, current dynamic propagation schemes waste travel hops and are low of delivery ratio. In this article, we propose a social characteristic-based propagation-efficient protocol NefSBFT to agree on system state plus consensus mechanisms in public blockchains. We devise a propagation technique (travel hops of at least 1/3 savings, delivery ratio above 0.93, etc.) for message multicasting when exploiting real nodes' social characteristics of intermittent connectivity and frequent partitions. This propagation technique is executed in the improved FastBFT to achieve transaction ordering and block verification, thus, no controllable mobility is required during the whole system's execution. NefSBFT achieves fast propagation, small message complexity and few resource consumption of travel hops and running nodes for complete protocol execution. We analyze NefSBFT's security against DDOS attack of non-primary failure. The experiments show the performance tradeoff under different parameters, compare the propagation efficiency with Erlay and Flooding, and clarify NefSBFT's impact on the whole system performance through comparison. © 2004-2012 IEEE.

Keyword:

Blockchain Denial-of-service attack Efficiency Internet protocols Multicasting Network security Overlay networks

Community:

  • [ 1 ] [Feng, Xiaoqin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 2 ] [Feng, Xiaoqin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 3 ] [Ma, Jianfeng]Xidian University, School of Cyber Engineering, Shaanxi Key Laboratory of Network and System Security, Xi'an; 710071, China
  • [ 4 ] [Miao, Yinbin]Xidian University, School of Cyber Engineering, Xi'an; 710071, China
  • [ 5 ] [Miao, Yinbin]Guilin University of Electronic Technology, Guangxi Key Laboratory of Trusted Software, Guilin; 541004, China
  • [ 6 ] [Liu, Ximeng]Fuzhou University, College of Computer and Big Data, Key Laboratory of Information Security of Network Systems, Fuzhou; 350108, China
  • [ 7 ] [Choo, Kim-Kwang Raymond]The University of Texas at San Antonio, Department of Information Systems and Cyber Security, San Antonio; TX; 78249, United States

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Dependable and Secure Computing

ISSN: 1545-5971

Year: 2022

Issue: 6

Volume: 19

Page: 3621-3639

7 . 3

JCR@2022

7 . 0 0 0

JCR@2023

ESI HC Threshold:61

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:730/11517373
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1