当前位置:主页 > 管理论文 > 信息管理论文 >

区块链共识协议的信誉激励方案

发布时间:2021-11-13 15:07
  区块链技术已成为解决多方协作信任问题的一种新方法。通过共识机制,用户可以在不需要中央控制的情况下达成共识来完成某样协作型任务。然而,将区块链技术应用于现实应用面临一定的困难,例如如何平衡在隐私安全性以及共识效率问题。共识机制是区块链的技术基础,也是区块链结构中最重要的部分,通过节点分布式达成共识状态,实现去中心化的分布式记账功能。当前,用于物联网区块链系统的比较流行的共识协议是PoX系列共识协议,包括PoW,PoS等,但由于物联网本身是一个开放系统,各种设备允许接入到物联网上,其中,一些恶意设备、不诚实设备的接入,以合法网络身份发起一些针对物联网系统的不良行为,例如双花攻击、欺骗攻击等,能破坏物联网的区块链协议的正常运行,有可能会导致整个物联网网络系统运行效率低下、错误决策等。本论文主要针对解决基于信誉的节点参与共识过程中经常会遇到的技术难题:(1)如何有效合理的建立系统公平性问题,由于建立账户不需要成本,节点可以创建多个账户来参与共识,每个账户维护着一个信誉度,这种做法可以提高出块几率且无需增加成本,严重影响了系统的公平性。(2)如何有效避免用户为了逃避系统惩罚弃用旧账户改用新账户,... 

【文章来源】:哈尔滨工业大学黑龙江省 211工程院校 985工程院校

【文章页数】:66 页

【学位级别】:硕士

【文章目录】:
摘要
ABSTRACT
Acknowledgement
NOMENCLATURE
Chapter 1 Introduction
    1.1 Research Background
        1.1.1 Technology breakthrough
    1.2 Blockchain Protocol
    1.3 Motivation
Chapter 2 Related Work
    2.1 Application Status of Blockchain in Io T
        2.1.1 Popular Consensus Protocols
    2.2 Analysis of Po X Protocols
        2.2.1 Proof of Activity Protocols
        2.2.2 Proof of Elapsed Time Protocols
    2.3 Current Po X Consensus in Io T
    2.4 Reputation Mechanism for Decentralized System
        2.4.1 Feedback Management Systems
        2.4.2 Reputation Mechanisms
    2.5 Chaining Mechanism
        2.5.1 Hash Functions
        2.5.2 Digital Signature
        2.5.3 Linking Blocks
        2.5.4 Order of appearance
Chapter 3 Reputation Incentive Scheme
    3.1 Proof of Reputation X
    3.2 Reputation Module
        3.2.1 Definitions
    3.3 Identity based Method
        3.3.1 Identity Registration with Smart Contract
        3.3.2 Steps to register an account
        3.3.3 Steps to logout an account
    3.4 Process
        3.4.1 Reputation Construction
        3.4.2 Blockchain Start-up
    3.5 Competition Cycle
    3.6 Incentive Mechanism
        3.6.1 Reward Functionality
        3.6.2 Penalty Funcitonality
    3.7 Rule of Updating Protocol Parameters
Chapter 4 Experiment and Evaluation
    4.1 Hypotheses and Configuration
    4.2 Ideal Reputation Growth
    4.3 Reputation Growth and Stability of the Algorithm
        4.3.1 Normal Reputation Growth
        4.3.2 Normal Reputation Growth with Reward Decay
        4.3.3 Stability
    4.4 Reputation Decay
    4.5 Computing Power Dependence Comparison
        4.5.1 Equally Powered Nodes Comparison
    4.6 Time Complexity Analysis
    4.7 Protocol Security Analysis
        4.7.1 Sybil Attack
        4.7.2 Fault Tolerance Attack
    4.8 Comparison with two other major protocols
Conclusions
References
Author’s Publications



本文编号:3493234

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/sjfx/3493234.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户4b702***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com