期刊文献+

区块链边缘节点安全架构P-Dledger 被引量:1

P-Dledger:blockchain edge node security architecture
在线阅读 下载PDF
导出
摘要 针对区块链边缘节点的部署环境开放、安全措施薄弱、易受到安全攻击,以及计算和网络资源不足等问题,提出一种基于可信执行环境(TEE)的区块链安全架构P-Dledger。该架构通过构建两阶段的信任链,在满足软件便捷迭代的基础上,确保加载部件的可信;通过实现智能合约可信执行框架以及基于串行外设接口或非门存储器(SPI NOR Flash)的数据可信存储,保证智能合约的可信计算与数据的可信存储;同时,为共识提案赋予单调递增的唯一标识,限制拜占庭节点的行为。实验与分析结果表明:所提架构确保了加载主体、账本数据与执行过程的安全可信;当网络延时大于60 ms或节点数大于8时,P-Dledger比采用拜占庭容错(PBFT)算法的区块链系统的吞吐量更高,且随着网络延时与节点数的增加,P-Dledger性能表现更稳定。 In response to the issues of open deployment environment,weak security measures,vulnerability to security attacks,and insufficient computing and network resources of blockchain edge nodes,a blockchain security architecture based on Trusted Execution Environment(TEE),named P-Dledger,was proposed.In this architecture,by constructing a two-stage trust chain,the trustworthiness of the loaded components was ensured on the basis of meeting requirements for convenient software iteration;by constructing a trustworthy execution framework for smart contracts and a trustworthy data storage based on Serial Peripheral Interface Not OR Flash(SPI NOR Flash),the trustworthy computation of smart contracts and the secure storage of data were guaranteed.Additionally,a monotonically increasing unique identifier was assigned to consensus proposals to restrict the behavior of Byzantine nodes.Experimental and analysis results demonstrate that this architecture ensures the security and trustworthiness of loaded entities,ledger data,and execution processes.When the network latency exceeds 60 ms or the number of nodes is greater than 8,P-Dledger achieves higher throughput than blockchain systems employing Practical Byzantine Fault Tolerance(PBFT)algorithm,and P-Dledger has more stable performance as network latency and the number of nodes increase.
作者 王迪 WANG Di(School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu Sichuan 610054,China;Southwest China Institute of Electronic Technology,Chengdu Sichuan 610036,China)
出处 《计算机应用》 北大核心 2025年第8期2630-2636,共7页 journal of Computer Applications
关键词 区块链 边缘节点 可信执行环境 共识协议 拜占庭故障 blockchain edge node Trusted Execution Environment(TEE) consensus protocol Byzantine fault
  • 相关文献

参考文献13

二级参考文献119

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:243
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:150
  • 3YU Fajiang ZHANG Huanguo.Design and Implementation of a Bootstrap Trust Chain[J].Wuhan University Journal of Natural Sciences,2006,11(6):1449-1452. 被引量:1
  • 4SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:41
  • 5FENG Deng-guo. Trusted computing theory and practice[M]. Beijing: Tsinghua University Press, 2013.
  • 6ASOKAN N, EKBERG J E, KOSTIAINEN K, et al. Mobile trusted computing[J]. Proceedings of the IEEE, 2014, 102(8) 1189-1206.
  • 7YU Chao, YUAN Men-ting. Security Bootstrap based on trusted computing[C]2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing. Washington D C, USA: IEEE Computer Society, 2010: 486-489.
  • 8Trusted Computing Group. TCG mobile trusted module specification, specification version 1,0, revision 6[EB/OL]. [2014-11-26]. http://www.tmstedcomputinggroup.org/files/ resource files/87852F33- ID09-3519-ADOCOF141CC6B 10D/ Revision 6-tcg-mobile-trusted-module- 1 0pdf.
  • 9KAI Tang, XIN Xu, GUO Chun-xia . The secure boot of embedded system based on mobile trusted module[C]//2012 International Conference on Intelligent System Design and Engineering Application. New York, USA: IEEE, 2012: 1131-1134.
  • 10PARNO B, MCCUNE J M, PERRIG A. Bootstrapping trust in commodity computers[C]//2010 IEEE Symposium on Security and Privacy. Oakland, USA: IEEE, 2010: 414-429.

共引文献641

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部