• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

TrustBlock:基于双层区块链的 SDN 网络节点自适应信任评估。

TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.

机构信息

Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China.

出版信息

PLoS One. 2020 Mar 10;15(3):e0228844. doi: 10.1371/journal.pone.0228844. eCollection 2020.

DOI:10.1371/journal.pone.0228844
PMID:32155156
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7064206/
Abstract

The data layer devices in the Software Defined Network (SDN) play an important role in packet forwarding. However, whether the forwarding task can be efficiently completed by the node has not attracted enough attention. A method called TrustBlock is proposed in this paper, which introduces trust as a security attribute in SDN routing planning. Besides, in order to enhance the integrity and controllability of trust evaluation, the double-layer blockchain architecture is established. In the first layer, the behavior data of the node is recorded, and then the trust calculation is performed in the second layer. In the evaluation model, nodes' trust is calculated from three aspects: direct trust, indirect trust and historical trust. Firstly, from the perspective of security, blockchain is used to achieve identity authentication of nodes, after that, from the perspective of reliability, the forwarding status is used to calculate the trust value. Secondly, consensus algorithm is used to filter malicious recommendation trust value and prevent colluding attacks. Finally, the adaptive historical trust weight is designed to prevent the periodic attack. In this paper, the entropy method is used to determine the weight of each evaluation attribute, which can avoid the problem that the subjective judgment method is not adaptable to the weight setting. Simulation results show that the detection rate of the TrustBlock is up to 98.89%, which means this model can effectively identify the abnormal nodes in SDN. Moreover, it is attractive in terms of integrity and controllability.

摘要

软件定义网络(SDN)中的数据层设备在数据包转发中起着重要作用。然而,节点是否能够高效地完成转发任务并没有引起足够的重视。本文提出了一种名为 TrustBlock 的方法,它将信任作为 SDN 路由规划中的一个安全属性引入其中。此外,为了增强信任评估的完整性和可控性,建立了双层区块链架构。在第一层中,记录节点的行为数据,然后在第二层进行信任计算。在评估模型中,从直接信任、间接信任和历史信任三个方面计算节点的信任。首先,从安全角度出发,利用区块链实现节点的身份认证,然后从可靠性角度出发,利用转发状态计算信任值。其次,利用共识算法过滤恶意推荐信任值,防止共谋攻击。最后,设计自适应历史信任权重,防止周期性攻击。本文采用熵值法确定各评价属性的权重,避免了主观判断方法不适应权重设置的问题。仿真结果表明,TrustBlock 的检测率高达 98.89%,表明该模型能够有效识别 SDN 中的异常节点。此外,它在完整性和可控性方面具有吸引力。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/3f74c57bf9ca/pone.0228844.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/052e08712bf0/pone.0228844.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/e282fc7409d8/pone.0228844.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6eccf8594017/pone.0228844.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/0dbd92e65538/pone.0228844.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6fdfd13b6da3/pone.0228844.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/890ad5cddd55/pone.0228844.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/92b649ca63a7/pone.0228844.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/f109d95a356a/pone.0228844.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/cc4946ceec70/pone.0228844.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/b85ee6bdae4e/pone.0228844.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6f3653286cd9/pone.0228844.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/cc8f8b39fa9b/pone.0228844.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/4c0685d024b1/pone.0228844.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/3f74c57bf9ca/pone.0228844.g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/052e08712bf0/pone.0228844.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/e282fc7409d8/pone.0228844.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6eccf8594017/pone.0228844.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/0dbd92e65538/pone.0228844.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6fdfd13b6da3/pone.0228844.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/890ad5cddd55/pone.0228844.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/92b649ca63a7/pone.0228844.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/f109d95a356a/pone.0228844.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/cc4946ceec70/pone.0228844.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/b85ee6bdae4e/pone.0228844.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/6f3653286cd9/pone.0228844.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/cc8f8b39fa9b/pone.0228844.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/4c0685d024b1/pone.0228844.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc62/7064206/3f74c57bf9ca/pone.0228844.g014.jpg

相似文献

1
TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.TrustBlock:基于双层区块链的 SDN 网络节点自适应信任评估。
PLoS One. 2020 Mar 10;15(3):e0228844. doi: 10.1371/journal.pone.0228844. eCollection 2020.
2
Blockchain Based Secure Routing and Trust Management in Wireless Sensor Networks.基于区块链的无线传感器网络安全路由和信任管理。
Sensors (Basel). 2022 Jan 6;22(2):411. doi: 10.3390/s22020411.
3
Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.利用信任在认知无线电网络中建立安全路由模型。
PLoS One. 2015 Sep 30;10(9):e0139326. doi: 10.1371/journal.pone.0139326. eCollection 2015.
4
Retraction: TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.撤回声明:信任块:基于双层区块链的软件定义网络(SDN)网络节点的自适应信任评估
PLoS One. 2025 Apr 9;20(4):e0321609. doi: 10.1371/journal.pone.0321609. eCollection 2025.
5
CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks.CENTERA:一种用于无线传感器网络的基于信任的集中式高效路由协议,具备认证功能。
Sensors (Basel). 2015 Feb 2;15(2):3299-333. doi: 10.3390/s150203299.
6
Zero trust in edge computing environment: a blockchain based practical scheme.边缘计算环境中的零信任:基于区块链的实用方案。
Math Biosci Eng. 2022 Feb 18;19(4):4196-4216. doi: 10.3934/mbe.2022194.
7
GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks.GTR:用于水下无线传感器网络的基于生成对抗网络的可信路由算法
Sensors (Basel). 2024 Jul 27;24(15):4879. doi: 10.3390/s24154879.
8
A data plane security model of segmented routing based on SDP trust enhancement architecture.一种基于SDP信任增强架构的分段路由数据平面安全模型。
Sci Rep. 2022 May 24;12(1):8762. doi: 10.1038/s41598-022-12858-2.
9
A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory.基于节点行为和 D-S 证据理论的无线传感器网络信任评估算法。
Sensors (Basel). 2011;11(2):1345-60. doi: 10.3390/s110201345. Epub 2011 Jan 25.
10
TITAN: Combining a bidirectional forwarding graph and GCN to detect saturation attack targeted at SDN.TITAN:结合双向转发图和 GCN 检测针对 SDN 的饱和攻击。
PLoS One. 2024 Apr 26;19(4):e0299846. doi: 10.1371/journal.pone.0299846. eCollection 2024.

引用本文的文献

1
Retraction: TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain.撤回声明:信任块:基于双层区块链的软件定义网络(SDN)网络节点的自适应信任评估
PLoS One. 2025 Apr 9;20(4):e0321609. doi: 10.1371/journal.pone.0321609. eCollection 2025.
2
A semi-centralized blockchain system with multi-chain for auditing communications of Wide Area Protection System.一种具有多链的半中心化区块链系统,用于审计广域保护系统的通信。
PLoS One. 2021 Jan 22;16(1):e0245560. doi: 10.1371/journal.pone.0245560. eCollection 2021.