• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

FAWPA:一种基于区块链矿工行为的 FAW 攻击保护算法。

FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners.

机构信息

College of Information Science and Technology, Zhejiang Shuren University, Hangzhou 310015, China.

School of Computer and Artificial Intelligence, Changzhou University, Changzhou 213164, China.

出版信息

Sensors (Basel). 2022 Jul 4;22(13):5032. doi: 10.3390/s22135032.

DOI:10.3390/s22135032
PMID:35808527
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9269683/
Abstract

Blockchain has become one of the key techniques for the security of the industrial internet. However, the blockchain is vulnerable to FAW (Fork after Withholding) attacks. To protect the industrial internet from FAW attacks, this paper proposes a novel FAW attack protection algorithm (FAWPA) based on the behavior of blockchain miners. Firstly, FAWPA performs miner data preprocessing based on the behavior of the miners. Then, FAWPA proposes a behavioral reward and punishment mechanism and a credit scoring model to obtain cumulative credit value with the processed data. Moreover, we propose a miner's credit classification mechanism based on fuzzy C-means (FCM), which combines the improved Aquila optimizer (AO) with strong solving ability. That is, FAWPA combines the miner's accumulated credit value and multiple attack features as the basis for classification, and optimizes cluster center selection by simulating Aquila's predation behavior. It can improve the solution update mechanism in different optimization stages. FAWPA can realize the rapid classification of miners' credit levels by improving the speed of identifying malicious miners. To evaluate the protective effect of the target mining pool, FAWPA finally establishes a mining pool and miner revenue model under FAW attack. The simulation results show that FAWPA can thoroughly and efficiently detect malicious miners in the target mining pool. FAWPA also improves the recall rate and precision rate of malicious miner detection, and it improves the cumulative revenue of the target mining pool. The proposed algorithm performs better than ND, RSCM, AWRS, and ICRDS.

摘要

区块链已成为工业互联网安全的关键技术之一。然而,区块链容易受到 FAW( withholding 后分叉)攻击。为了保护工业互联网免受 FAW 攻击,本文提出了一种基于区块链矿工行为的新型 FAW 攻击保护算法(FAWPA)。首先,FAWPA 基于矿工的行为对矿工数据进行预处理。然后,FAWPA 提出了一种行为奖励和惩罚机制以及信用评分模型,利用处理后的数据获得累积信用值。此外,我们提出了一种基于模糊 C 均值(FCM)的矿工信用分类机制,该机制结合了具有强大求解能力的改进 Aquila 优化器(AO)。也就是说,FAWPA 将矿工的累积信用值和多个攻击特征结合起来作为分类的基础,并通过模拟 Aquila 的捕食行为来优化聚类中心的选择。它可以改善不同优化阶段的解更新机制。FAWPA 通过提高识别恶意矿工的速度,可以快速对矿工的信用等级进行分类。为了评估目标挖矿池的保护效果,FAWPA 最后在 FAW 攻击下建立了一个挖矿池和矿工收益模型。仿真结果表明,FAWPA 可以彻底有效地检测目标挖矿池中的恶意矿工。FAWPA 还提高了恶意矿工检测的召回率和准确率,并提高了目标挖矿池的累积收益。所提出的算法在 ND、RSCM、AWRS 和 ICRDS 上表现更好。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/cc7bbd1644c7/sensors-22-05032-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/3a5ca8969ecd/sensors-22-05032-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/5270e059c4c2/sensors-22-05032-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/0d124917ed1f/sensors-22-05032-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/3318d80f420a/sensors-22-05032-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/94fbe64d3044/sensors-22-05032-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/ada5f482e6a0/sensors-22-05032-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/4b3e5017bdde/sensors-22-05032-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/f6cae48d7ad3/sensors-22-05032-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/cc7bbd1644c7/sensors-22-05032-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/3a5ca8969ecd/sensors-22-05032-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/5270e059c4c2/sensors-22-05032-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/0d124917ed1f/sensors-22-05032-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/3318d80f420a/sensors-22-05032-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/94fbe64d3044/sensors-22-05032-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/ada5f482e6a0/sensors-22-05032-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/4b3e5017bdde/sensors-22-05032-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/f6cae48d7ad3/sensors-22-05032-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2a4b/9269683/cc7bbd1644c7/sensors-22-05032-g009.jpg

相似文献

1
FAWPA: A FAW Attack Protection Algorithm Based on the Behavior of Blockchain Miners.FAWPA:一种基于区块链矿工行为的 FAW 攻击保护算法。
Sensors (Basel). 2022 Jul 4;22(13):5032. doi: 10.3390/s22135032.
2
A Novel Data-Driven Evaluation Framework for Fork after Withholding Attack in Blockchain Systems.区块链系统中基于数据驱动的暂存攻击后分叉评估新框架
Sensors (Basel). 2022 Nov 24;22(23):9125. doi: 10.3390/s22239125.
3
Cooperative Mining in Blockchain Networks With Zero-Determinant Strategies.基于零行列式策略的区块链网络协同挖矿
IEEE Trans Cybern. 2020 Oct;50(10):4544-4549. doi: 10.1109/TCYB.2019.2915253. Epub 2019 May 22.
4
Statistical detection of selfish mining in proof-of-work blockchain systems.工作量证明区块链系统中自私挖矿的统计检测。
Sci Rep. 2024 Mar 15;14(1):6251. doi: 10.1038/s41598-024-55348-3.
5
The Threat of Disruptive Jamming to Blockchain-Based Decentralized Federated Learning in Wireless Networks.无线网络中破坏性干扰对基于区块链的去中心化联邦学习的威胁
Sensors (Basel). 2024 Jan 15;24(2):535. doi: 10.3390/s24020535.
6
BACS: blockchain and AutoML-based technology for efficient credit scoring classification.BACS:基于区块链和自动机器学习的高效信用评分分类技术。
Ann Oper Res. 2022 Jan 24:1-21. doi: 10.1007/s10479-022-04531-8.
7
P-PBFT: An improved blockchain algorithm to support large-scale pharmaceutical traceability.P-PBFT:一种改进的区块链算法,用于支持大规模药品追溯。
Comput Biol Med. 2023 Mar;154:106590. doi: 10.1016/j.compbiomed.2023.106590. Epub 2023 Jan 29.
8
Blockchain Based Authentication and Cluster Head Selection Using DDR-LEACH in Internet of Sensor Things.基于区块链的认证和使用 DDR-LEACH 的传感器事物互联网中的簇头选择。
Sensors (Basel). 2022 Mar 2;22(5):1972. doi: 10.3390/s22051972.
9
Energy Efficient Consensus Approach of Blockchain for IoT Networks with Edge Computing.用于具有边缘计算的物联网网络的区块链节能共识方法。
Sensors (Basel). 2022 May 13;22(10):3733. doi: 10.3390/s22103733.
10
Research on trust mechanism of supply chain finance under Industrial Internet embedded with blockchain.基于区块链嵌入工业互联网的供应链金融信任机制研究。
PLoS One. 2024 Jun 24;19(6):e0299011. doi: 10.1371/journal.pone.0299011. eCollection 2024.

引用本文的文献

1
K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks.多维数据的 K-匿名隐私保护算法,防止倾斜和相似性攻击。
Sensors (Basel). 2023 Jan 31;23(3):1554. doi: 10.3390/s23031554.

本文引用的文献

1
A Cheap Feature Selection Approach for the K-Means Algorithm.一种 K-Means 算法的廉价特征选择方法。
IEEE Trans Neural Netw Learn Syst. 2021 May;32(5):2195-2208. doi: 10.1109/TNNLS.2020.3002576. Epub 2021 May 3.