期刊文献+
共找到195篇文章
< 1 2 10 >
每页显示 20 50 100
Application of Machine Learning for Online Reputation Systems 被引量:3
1
作者 Ahmad Alqwadri Mohammad Azzeh Fadi Almasalha 《International Journal of Automation and computing》 EI CSCD 2021年第3期492-502,共11页
Users on the Internet usually require venues to provide better purchasing recommendations.This can be provided by a reputation system that processes ratings to provide recommendations.The rating aggregation process is... Users on the Internet usually require venues to provide better purchasing recommendations.This can be provided by a reputation system that processes ratings to provide recommendations.The rating aggregation process is a main part of reputation systems to produce global opinions about the product quality.Naive methods that are frequently used do not consider consumer profiles in their calculations and cannot discover unfair ratings and trends emerging in new ratings.Other sophisticated rating aggregation methods that use a weighted average technique focus on one or a few aspects of consumers′profile data.This paper proposes a new reputation system using machine learning to predict reliability of consumers from their profile.In particular,we construct a new consumer profile dataset by extracting a set of factors that have a great impact on consumer reliability,which serve as an input to machine learning algorithms.The predicted weight is then integrated with a weighted average method to compute product reputation score.The proposed model has been evaluated over three Movie Lens benchmarking datasets,using 10-folds cross validation.Furthermore,the performance of the proposed model has been compared to previous published rating aggregation models.The obtained results were promising which suggest that the proposed approach could be a potential solution for reputation systems.The results of the comparison demonstrated the accuracy of our models.Finally,the proposed approach can be integrated with online recommendation systems to provide better purchasing recommendations and facilitate user experience on online shopping markets. 展开更多
关键词 reputation system rating aggregation machine learning consumer reliability user trust
原文传递
SemTrust: A Semantic Reputation System in P2P-Based Semantic Web 被引量:1
2
作者 WANG Wei ZENG Guosun YUAN Lulai 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1137-1140,共4页
A reputation mechanism is introduced in P2P- based Semantic Web to solve the problem of lacking trust. It enables Semantic Web to utilize reputation information based on semantic similarity of peers in the network. Th... A reputation mechanism is introduced in P2P- based Semantic Web to solve the problem of lacking trust. It enables Semantic Web to utilize reputation information based on semantic similarity of peers in the network. This approach is evaluated in a simulation of a content sharing system and the experiments show that the system with reputation mechanism outperforms the system without it. 展开更多
关键词 semantic Web reputation system semantic similarity trustworthiness
在线阅读 下载PDF
EARep:A Fully Distributed Exchange-Based Anonymity P2P Reputation System
3
作者 WEI Yunzhao HE Yanxiang HAO Liming 《Wuhan University Journal of Natural Sciences》 CAS 2009年第4期309-316,共8页
A fully distributed exchange-based anonymity P2P reputation system--EARep was proposed. EARep can provide all the peer's anonymity in a fully distributed structured manner. In EARep, each peer's anonymity is achieve... A fully distributed exchange-based anonymity P2P reputation system--EARep was proposed. EARep can provide all the peer's anonymity in a fully distributed structured manner. In EARep, each peer's anonymity is achieved by changing pseudonyms. Analysis and simulation results showed that compared with DARep, which is an existing representative scheme, our system has two main features. First, EARep increased anonymity degree (measured by linkage probability) and was much more scalable than DARep. Specifically, with the same message overhead, EARep reduced the linkage probability by more than 50% compared with DARep. Alternatively, to achieve the same anonymity degree, the message overhead in EARep was less than 25% of that in DARep. Second, the service selection success , tio of EARep was greater than 90% even when the percentage of malicious peers was up to 70%, which makes our system robust to malicious behaviors of peers. 展开更多
关键词 PEER-TO-PEER reputation system ANONYMITY linkage probability
原文传递
Low Cost and Reliable Anonymity Protocols in P2P Reputation Systems
4
作者 彭浩 陆松年 +1 位作者 赵丹丹 张爱新 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第2期207-212,共6页
In peer-to-peer (P2P) reputation systems,each peer's trustworthiness is evaluated based on its pseudonym's rating values given by other peers. Since it is assumed that each peer has a long lived pseudonym,all ... In peer-to-peer (P2P) reputation systems,each peer's trustworthiness is evaluated based on its pseudonym's rating values given by other peers. Since it is assumed that each peer has a long lived pseudonym,all the transactions conducted by the same peer may be linked by its pseudonym. Therefore,one of the fundamental challenges in P2P reputation systems is to protect peers' identity privacy. In this paper,we present two independent anonymity protocols to achieve all the peers' anonymity by changing pseudonym with the help of a trusted third party (TTP) server. Compared with RuP (Reputation using Pseudonym),an existing representative scheme,our protocols reduce the server's cost in two different ways. First,we propose a protocol using blind signature scheme as in RuP. The protocol improves the blind signature scheme and assessment of macro-node values,and reduces the server's cost by half in terms of encryption and decryption operations and message overhead. Second,we propose another protocol,group-confusion protocol,to further reduce the server's cost. 展开更多
关键词 peer-to-peer (P2P) reputation system ANONYMITY pseudonym blind signature
原文传递
A Formal Reputation System for Trusting Wireless Sensor Network 被引量:1
5
作者 XIAO Deqin FENG Jianzhao ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期173-179,共7页
In this paper,a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks(FRS-TWSN).Following this approach,key concepts related to reputation are formal described ... In this paper,a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks(FRS-TWSN).Following this approach,key concepts related to reputation are formal described step by step for wireless sensor networks where sensor nodes maintain reputation for other sensors and use it to evaluate their trustworthiness.By proving some properties of beta reputation system,the beta distribution is founded to fit well to describe reputation system.Also,a case system is developed within this framework for reputation representation,updates and integration.Simulation results show this scheme not only can keep stable reputation but also can prevent the system from some attacks as bad mouthing and reputation cheating. 展开更多
关键词 wireless sensor networks formal method reputation Beta distribution
在线阅读 下载PDF
A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks 被引量:5
6
作者 郭霖珂 张驰 +1 位作者 方玉光 林风 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第3期578-597,共20页
Online social networks (OSNs) have revolutionarily changed the way people connect with each other. One of the main factors that help achieve this success is reputation systems that enable OSN users to mutually estab... Online social networks (OSNs) have revolutionarily changed the way people connect with each other. One of the main factors that help achieve this success is reputation systems that enable OSN users to mutually establish trust relationships based on their past experience. Current approaches for the reputation management cannot achieve the fine granularity and verifiability for each individual user, in the sense that the reputation values on such OSNs are coarse and lack of credibility. In this paper, we propose a fine granularity attribute-based reputation system which enables users to rate each other's attributes instead of identities. Our scheme first verifies each OSN user's attributes, and further allows OSN users to vote on the posted attribute-associated messages to derive the reputation value. The attribute verification process provides the authenticity of the reputation value without revealing the actual value to entities who do not have the vote privilege. To predict a stranger's behavior, we propose a reputation retrieval protocol for querying the reputation value on a specific attribute. To the best of our knowledge, we are the first to define a fine-grained reputation value based on users' verified attributes in OSNs with privacy preservation. We provide the security analysis along with the simulation results to verify the privacy preservation and feasibility. The implementation of the proposed scheme on current OSNs is also discussed. 展开更多
关键词 reputation PRIVACY ATTRIBUTE AUTHENTICATION
原文传递
Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation 被引量:1
7
作者 Yuzheng Yang Zhe Tu +1 位作者 Ying Liu Huachun Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第12期3163-3184,共22页
Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manage... Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manageability of authorization through the token.However,traditional access control policies lack the ability to dynamically adjust based on user access behavior.Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility.As a result,this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control.The TBAC system divides the access control process into three stages:policy upload,token request,and resource request.The user reputation evaluation module evaluates the user’s token reputation and resource reputation for the token request and resource request stages of the TBAC system.The proposed system is implemented using the Hyperledger Fabric blockchain.The TBAC system is evaluated to prove that it has high processing performance.The user reputation evaluation model is proved to be more conservative and sensitive by comparative study with other methods.In addition,the security analysis shows that the TBAC system has a certain anti-attack ability and can maintain stable operation under the Distributed Denial of Service(DDoS)attack environment. 展开更多
关键词 Access control reputation evaluation feedback blockchain
在线阅读 下载PDF
Blockchain-Based Decentralized Reputation Management System for Internet of Everything in 6G-Enabled Cybertwin Architecture 被引量:2
8
作者 Meimin Wang Zhili Zhou Chun Ding 《Journal of New Media》 2021年第4期137-150,共14页
Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of indust... Internet of Everything(IoE)has emerged as a promising paradigm for the purpose of connecting and exchanging data among physical objects and humans over the Internet,and it can be widely applied in the fields of industry,transportation,commerce,and education.Recently,the emergence of 6G-enabled cybertwin network architecture provides the technical and theoretical foundation for the realization of IoE paradigm.However,the IoE has three open issues in the 6G-enabled cybertwin architecture,i.e.,data authenticity,data storage and node reliability.To address these issues,we propose a blockchain-based decentralized reputation management system(BC-DRMS)for IoE in 6G-enabled Cybertwin architecture.In the proposed BC-DRMS,the traffic data collected from end nodes is stored on the blockchain and the decentralized file system,i.e.,InterPlanetary File System(IPFS),to resist data tampering,and then the data is further processed by the edge clouds and core clouds to provide services to users.Also,a multi-level reputation evaluation scheme is designed to compute the reputation scores of IoE nodes to prevent malicious node attacks.The experiment results and analysis demonstrate that,compared to the traditional centralized reputation management systems(CRMS),the proposed BC-DRMS cannot only address the issues of data authenticity and storage,but also provides high reliability for IoE in 6G-enabled cybertwin architecture. 展开更多
关键词 6G blockchain cybertwin network reputation management system Internet of Everything
在线阅读 下载PDF
Reputation evaluation method for open multi-agent systems
9
作者 金福生 董明斌 +1 位作者 牛振东 张全新 《Journal of Beijing Institute of Technology》 EI CAS 2013年第1期75-80,共6页
A reputation evaluation method based on multi-dimensional information representation and correlative algorithm is proposed for open multi-agent systems. First, a vector model is estab- lished to represent the reputati... A reputation evaluation method based on multi-dimensional information representation and correlative algorithm is proposed for open multi-agent systems. First, a vector model is estab- lished to represent the reputation related information. Second, a vector based reputation model "TRUST" is put forward to evaluate the reputation of agents. Finally, a correlative algorithm for se- lecting the most appropriate service provider is proposed. Simulation results indicate that the method can quickly and accurately to achieve the aim of adaptive immunity to reputation fraud and improving the average gain that service consumer agents obtained. 展开更多
关键词 reputation reputation fraud VECTOR correlation algorithm
在线阅读 下载PDF
On the Modeling of Honest Players in Reputation Systems
10
作者 张晴 卫伟 于挺 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第5期808-819,共12页
Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on the assumption that an entity's futur... Reputation mechanisms are a key technique to trust assessment in large-scale decentralized systems. The effectiveness of reputation-based trust management fundamentally relies on the assumption that an entity's future behavior may be predicted based on its past behavior. Though many reputation-based trust schemes have been proposed, they can often be easily manipulated and exploited, since an attacker may adapt its behavior, and make the above assumption invalid. In other words, existing trust schemes are in general only effective when applied to honest players who usually act with certain consistency instead of adversaries who can behave arbitrarily. In this paper, we investigate the modeling of honest entities in decentralized systems. We build a statistical model for the transaction histories of honest players. This statistical model serves as a profiling tool to identify suspicious entities. It is combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with the statistical model. This approach limits the manipulation capability of adversaries, and thus can significantly improve the quality of reputation-based trust assessment. 展开更多
关键词 reputation TRUST user behavior modeling collusion-resilient behavior testing
原文传递
A Load Service System with Reputation Proof in P2P Networks
11
作者 Ming-Chang Huang 《Journal of Computer and Communications》 2015年第4期30-39,共10页
In this paper, a new system design for load services in computer networks with a new reputation system is constructed. The use of the reputation system is to address the free-rider problem. Database systems are used b... In this paper, a new system design for load services in computer networks with a new reputation system is constructed. The use of the reputation system is to address the free-rider problem. Database systems are used by directory agents to save information provided by load-server agents. Protocols are built for how a host finds available servers for load service or load transfer, especially when a host moves to a new region. Detailed procedures include how a directory agent builds its database, how a load-server agent provides services, and how a load-client agent receives its desired services. The system uses the fuzzy logic control method to transfer loads for load balancing, instead of the method of a fixed threshold level. For an ad-hoc (wireless) computer network framework, this new system structure is aimed to provide efficient ways for hosts to communicate with one another and to access resources in the system. This will also help the users of networks locate resources in a most effective and secure manner. 展开更多
关键词 LOAD Service Peer-to-Peer Network DIRECTORY AGENT Load-Server AGENT Load-Client AGENT reputation system
在线阅读 下载PDF
An Overlap Sharding Blockchain:Reputation Voting Enabling Security and Efficiency for Dynamic AP Management in 6G UCAN 被引量:1
12
作者 Wang Jupen Hu Bo +2 位作者 Chen Shanzhi Zhang Yiting Wang Yilei 《China Communications》 2025年第7期208-219,共12页
Blockchain-based user-centric access network(UCAN)fails in dynamic access point(AP)management,as it lacks an incentive mechanism to promote virtuous behavior.Furthermore,the low throughput of the blockchain has been a... Blockchain-based user-centric access network(UCAN)fails in dynamic access point(AP)management,as it lacks an incentive mechanism to promote virtuous behavior.Furthermore,the low throughput of the blockchain has been a bottleneck to the widespread adoption of UCAN in 6G.In this paper,we propose Overlap Shard,a blockchain framework based on a novel reputation voting(RV)scheme,to dynamically manage the APs in UCAN.AP nodes in UCAN are distributed across multiple shards based on the RV scheme.That is,nodes with good reputation(virtuous behavior)are likely to be selected in the overlap shard.The RV mechanism ensures the security of UCAN because most APs adopt virtuous behaviors.Furthermore,to improve the efficiency of the Overlap Shard,we reduce cross-shard transactions by introducing core nodes.Specifically,a few nodes are overlapped in different shards,which can directly process the transactions in two shards instead of crossshard transactions.This greatly increases the speed of transactions between shards and thus the throughput of the overlap shard.The experiments show that the throughput of the overlap shard is about 2.5 times that of the non-sharded blockchain. 展开更多
关键词 blockchain reputation voting scheme sharding 6G
在线阅读 下载PDF
A Task Offloading Method for Vehicular Edge Computing Based on Reputation Assessment
13
作者 Jun Li Yawei Dong +2 位作者 Liang Ni Guopeng Feng Fangfang Shan 《Computers, Materials & Continua》 2025年第5期3537-3552,共16页
With the development of vehicle networks and the construction of roadside units,Vehicular Ad Hoc Networks(VANETs)are increasingly promoting cooperative computing patterns among vehicles.Vehicular edge computing(VEC)of... With the development of vehicle networks and the construction of roadside units,Vehicular Ad Hoc Networks(VANETs)are increasingly promoting cooperative computing patterns among vehicles.Vehicular edge computing(VEC)offers an effective solution to mitigate resource constraints by enabling task offloading to edge cloud infrastructure,thereby reducing the computational burden on connected vehicles.However,this sharing-based and distributed computing paradigm necessitates ensuring the credibility and reliability of various computation nodes.Existing vehicular edge computing platforms have not adequately considered themisbehavior of vehicles.We propose a practical task offloading algorithm based on reputation assessment to address the task offloading problem in vehicular edge computing under an unreliable environment.This approach integrates deep reinforcement learning and reputation management to address task offloading challenges.Simulation experiments conducted using Veins demonstrate the feasibility and effectiveness of the proposed method. 展开更多
关键词 Vehicular edge computing task offloading reputation assessment
在线阅读 下载PDF
The Reputation Model of Multi-Stage Dynamic Game
14
作者 侯光明 金军 甘仞初 《Journal of Beijing Institute of Technology》 EI CAS 1999年第1期2-7,共6页
Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theor... Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theory on principal agent problem in information economics and the method of game theory to study the implicit restriction mechanism for hidden action. Results and Conclusion It is proved that there exists implicit restriction mechanism for the multi stage principal agent relationship, some conditions for effective restriction are derived, the design methods of implicit restriction mechanism are presented. 展开更多
关键词 INCENTIVE RESTRICTION hidden action implicit restriction mechanism reputation model probability of discovery
在线阅读 下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
15
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
在线阅读 下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
16
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
在线阅读 下载PDF
Data trustworthiness and user reputation as indicators of VGI quality 被引量:5
17
作者 Paolo Fogliaroni Fausto D’Antonio Eliseo Clementini 《Geo-Spatial Information Science》 SCIE CSCD 2018年第3期213-233,共21页
Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the ... Volunteered geographic information(VGI)has entered a phase where there are both a substantial amount of crowdsourced information available and a big interest in using it by organizations.But the issue of deciding the quality of VGI without resorting to a comparison with authoritative data remains an open challenge.This article first formulates the problem of quality assessment of VGI data.Then presents a model to measure trustworthiness of information and reputation of contributors by analyzing geometric,qualitative,and semantic aspects of edits over time.An implementation of the model is running on a small data-set for a preliminary empirical validation.The results indicate that the computed trustworthiness provides a valid approximation of VGI quality. 展开更多
关键词 Volunteered geographic information data quality trustworthiness reputation
原文传递
Reputation-Based Hierarchically Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks 被引量:3
18
作者 CHEN Huifang XIE Lei NI Xiong 《China Communications》 SCIE CSCD 2014年第1期12-25,共14页
Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overh... Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overhead as well as maintaining a certain level of sens- ing performance. However, in existing hierar- chically cooperative spectrum sensing algo- rithms, the robustness problem of the system is seldom considered. In this paper, we pro- pose a reputation-based hierarchically coop- erative spectrum sensing scheme in Cognitive Radio Networks (CRNs). Before spectrum sensing, clusters are grouped based on the location correlation coefficients of Secondary Users (SUs). In the proposed scheme, there are two levels of cooperation, the first one is performed within a cluster and the second one is carried out among clusters. With the reputa- tion mechanism and modified MAJORITY rule in the second level cooperation, the pro- posed scheme can not only relieve the influ- ence of the shadowing, but also eliminate the impact of the PU emulation attack on a rela- tively large scale. Simulation results show that, in the scenarios with deep-shadowing or mul- tiple attacked SUs, our proposed scheme ach- ieves a better tradeoff between the system robustness and the energy saving compared with those conventionally cooperative sensing schemes. 展开更多
关键词 cognitive radio networks coop- erative spectrum sensing cluster location cor- relation reputation
在线阅读 下载PDF
A Dynamic Reputation–based Consensus Mechanism for Blockchain 被引量:3
19
作者 Xiaofang Qiu Zhi Qin +4 位作者 Wunan Wan Jinquan Zhang Jinliang Guo Shibin Zhang Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2022年第11期2577-2589,共13页
In recent years,Blockchain is gaining prominence as a hot topic in academic research.However,the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance.Although Proof-of-A... In recent years,Blockchain is gaining prominence as a hot topic in academic research.However,the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance.Although Proof-of-Authority(PoA)consensus mechanism,as a lightweight consensus mechanism,is more efficient than traditional Proof-of-Work(PoW)and Proof-of-Stake(PoS),it suffers from the problem of centralization.To this end,on account of analyzing the shortcomings of existing consensus mechanisms,this paper proposes a dynamic reputation-based consensus mechanism for blockchain.This scheme allows nodes with reputation value higher than a threshold apply to become a monitoring node,which can monitor the behavior of validators in case that validators with excessive power cause harm to the blockchain network.At the same time,the reputation evaluation algorithm is also introduced to select nodes with high reputation to become validators in the network,thus increasing the cost of malicious behavior.In each consensus cycle,validators and monitoring nodes are dynamically updated according to the reputation value.Through security analysis,it is demonstrated that the scheme can resist the attacks of malicious nodes in the blockchain network.By simulation experiments and analysis of the scheme,the result verifies that the mechanism can effectively improve the fault tolerance of the consensus mechanism,reduce the time of consensus to guarantee the security of the system. 展开更多
关键词 Blockchain consensus mechanism proof-of-authority reputation evaluation
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部