[1] NASIR M H, ARSHAD J, KHAN M M, et al. Scalable blockchains—a systematic review[J]. Future Generation Computer Systems, 2022, 126(1): 136-162.
[2] QASSE I A, TALIB M A, NASIR Q M. Inter blockchain communication: a survey[C]//Proceedings of the ArabWIC 6th Annual International Conference Research Trac, Rabat Morocco, March 7-9, 2019. New York: ACM Press, 2019: 1-6.
[3] 王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究[J]. 计算机科学与探索, 2022, 16(6): 1214-1242.
WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(6): 1214-1242.
[4] BRITANNICA. P2P[EB/OL]. [2023-05-06]. https://www.britannica.com/technology/P2P.
[5] Federal Trade Commission. Peer-to-Peer file sharing: a guide for business[EB/OL]. [2023-05-07]. https://www.ftc.gov/business-guidance/resources/peer-peer-file-sharing-guide-business.
[6] BERNS A. Network scaffolding for efficient stabilization of the chord overlay network[J]. arXiv:2109.14126,2021.
[7] STOICA I, MORRIS R, KARGER D, et al. Chord: a scalable peer-to-peer lookup protocol for Internet applications[J]. ACM SIGCOMM Computer Communication Review, 2001, 31(4): 149-160.
[8] MAYMOUNKOV P, MAZIERES D. Kademlia: a peer-to-peer information system based on the XOR metric[C]//Proceedings of the First International Workshop (IPTPS 2002), Cambridge, March 7-8, 2002. Berlin, Heidelberg: Springer, 2002: 53-65.
[9] STEINER M, EN-NAJJARY T, BIERSACK E W. A global view of kad[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, October 24-26, 2007. New York: ACM Press, 2007: 117-122.
[10] ASSANZADEH-NAZARABADI Y, TAHERI-BOSHROOYEH S, OTOUM S, et al. DHT-based communications survey: architectures and use cases[J]. arXiv:2109.10787,2021.
[11] XU Z, TANG C, ZHANG Z. Building topology-aware overlays using global soft-state[C]//Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, May 19-22, 2003. Piscataway: IEEE, 2003: 500-508.
[12] KUSHWAHA R, KULKARNI S, SINGH Y N. Generalized distance metric for different DHT routing algorithms in peer-to-peer networks[J]. arXiv:2303.13965,2023.
[13] 邱彤庆, 陈贵海. 一种令P2P覆盖网络拓扑相关的通用方法[J]. 软件学报, 2007, 18(2): 381-390.
QIU T Q, CHEN G H. A generic approach to making P2P overlay network topology-aware[J]. Journal of Software, 2007, 18(2): 381-390.
[14] JIANG S, GUO L, ZHANG X D, et al. LightFlood: minimizing redundant messages and maximizing scope of peer-to-peer search[J]. IEEE Transactions on Parallel and Distributed Systems, 2008, 19(5): 601-614.
[15] JACOBS T, PANDURANGAN G. Stochastic analysis of a churn-tolerant structured peer-to-peer scheme[J]. Peer to Peer Networking & Applications, 2013, 6: 1-14.
[16] STUTZBACH D, REJAIE R. Understanding churn in peer-to-peer networks[C]//Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, Rio de Janeriro, Brazi, October 25-27, 2006. New York: ACM Press, 2006: 189-202.
[17] TANG W Z, KIFFER L, FANTI G, et al. Strategic latency reduction in blockchain peer-to-peer networks[J]. arXiv:2205.06837,2022.
[18] REN Y Y, ZENG Z W, WANG T, et al. A trust-based minimum cost and quality aware data collection scheme in P2P network[J]. Peer-to-Peer Networking and Applications, 2020, 13: 2300-2323.
[19] HOU W J, JIANG Y X, LEI W X, et al. A P2P network based edge computing smart grid model for efficient resources coordination[J]. Peer-to-Peer Networking and Applications, 2020, 13: 1026-1037.
[20] FRAHAT R T, MONOWAR M M, BUHARI S M. Secure and scalable trust management model for IoT P2P network[C]//Proceedings of the 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, May 01-03, 2019. Piscataway: IEEE, 2019: 1-6.
[21] KLEPPMANN M. Distributed systems[EB/OL]. [2023-05-03]. https://www.cl.cam.ac.uk/teaching/2021/ConcDisSys/dist-sys-slides.pdf.
[22] The bitcoin network[EB/OL]. [2023-05-03]. https://learn.saylor.org/mod/book/view.php?id=36307&chapterid=18897.
[23] BUNZ B, KIFFER L, LUU L, et al. FlyClient: super-light clients for cryptocurrencies[C]//Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, May 18-21, 2020. Piscataway: IEEE, 2020: 928-946.
[24] EYAL I. The miner’s dilemma[J]. arXiv:1411.7099,2014.
[25] LUU L, VELNER Y, TEUTSCH J, et al. SMARTPOOL: practical decentralized pooled mining[C]//Proceedings of the 26th USENIX Security Symposium, Vancouver, August 16-18, 2017. Berkeley: USENIX Association, 2017: 1409-1426.
[26] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. (2018-06-10)[2023-06-13]. https://bitcoin.org/bitcoin.pdf.
[27] Decentralized identity[EB/OL].[2023-06-15]. https://ethereum.org/en/decentralized-identity/.
[28] ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger Fabric: a distributed operating system for permissioned blockchains[J]. arXiv:1801.10228,2018.
[29] ANTONOPOULOS A M. Mastering bitcoin: programming the open blockchain[M]. CA: O'Reilly Media, Inc, 2017.
[30] DEMERS A, GREENE D, HOUSER C, et al. Epidemic algorithms for replicated database maintenance[J]. ACM SIGOPS Operating Systems Review, 1988, 22(1): 8-32.
[31] LAKSHMAN A, MALIK P. Cassandra: a decentralized structured storage system[J]. ACM SIGOPS Operating Systems Review, 2010, 44(2): 35-40.
[32] GitHub. Leveldb[EB/OL]. [2023-06-20]. https://github.com/google/leveldb.
[33] LIOYD W. Distributed Hash tables & chord[EB/OL]. [2023-06-26]. https://www.cs.princeton.edu/courses/archive/fall22/cos418/docs/L9-dht-chord.pdf.
[34] SAHIN O D, AGRAWAL D, ABBADI E. Techniques for efficient routing and load balancing in content-addressable networks[C]//Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, Konstanz, December 31-September 02, 2005. Piscataway: IEEE, 2005: 67-74.
[35] DUONG H T. A Survey of three DHT systems: CAN, pastry, and chord[ENB/OL]. [2026-06-26]. https://www.sci.utah.edu/~duong/papers/chord.pdf.
[36] GAO Y, SHI J Q, WANG X B, et al. Topology measurement and analysis on ethereum P2P network[C]//Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Barcelona, June 29-July 03, 2019. Piscataway: IEEE, 2019: 1-6.
[37] KIFFER L, SALMAN A, LEVIN D, et al. Under the hood of the ethereum gossip protocol[C]//Proceedings of the Financial Cryptography and Data Security, Virtual Event, March 1-5, 2021. Berlin, Heidelberg: Springer, 2021: 437-456.
[38] PUNATHUMKANDI S, SUNDARAM V M, PRABHAVATHY. A deep dive into hyperledger[EB/OL]. [2023-06-27]. https://www.researchgate.net/publication/347825518_
A_deep_dive_into_Hyperledger.
[39] Hyperledger Iroha[EB/OL]. (2022-10-15)[2023-06-27]. https://wiki.hyperledger. org/display/iroha.
[40] CACHIN C. Architecture of the hyperledger Blockchain fabric[EB/OL]. (2016-01-01)[2023-06-16]. https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf.
[41] Spf13. Viper[EB/OL]. [2023-06-22]. https://github.com/spf13/viper.
[42] WASHBOURNE L. A survey of P2P network security[J]. arXiv:1504.01358,2015.
[43] WANG T T, ZHAO C H, YANG Q, et al. Ethna: analyzing the underlying peer-to-peer network of ethereum blockchain[J]. IEEE Transactions on Network Science and Engineering, 2021, 3(1): 2131-2146.
[44] SUN X, TORRES R, RAO S. Preventing DDoS attacks on internet servers exploiting P2P systems[J]. Computer Networks, 2010, 54(15): 2756-2774.
[45] 诸葛程晨, 王群, 刘家银, 等. 零信任网络综述[J]. 计算机工程与应用, 2022, 58(22): 12-29.
ZHUGE C C, WNAG Q, LIU J Y, et al. Survey of zero trust network[J]. Computer Engineering and Applications, 2022, 58(22): 12-29.
[46] 胡甜媛, 李泽成, 李必信, 等. 智能合约的合约安全和隐私安全研究综述[J]. 计算机学报, 2021, 44(12): 2485-2514.
HU T Y, LI Z C, LI B X, et al. Contractual security and privacy security of smart contract: a system mapping study[J]. Chinese Journal of Computers, 2021, 44(12): 2485-2514.
[47] 赵季红, 蔡田杰, 曲桦, 等. SDN中应用网络分区的控制器部署策略[J]. 计算机工程, 2019, 45(1): 73-77.
ZHAO J H, CAI T J, QU H, et al. Controller deployment strategy for applying network partition in SDN[J]. Computer Engineering, 2019, 45(1): 73-77.
[48] KUPERBERG M. Towards an analysis of network partitioning prevention for distributed ledgers and blockchains[C]//Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Oxford, August 03-06, 2020. Piscataway: IEEE, 2020: 94-99.
[49] 王群, 李馥娟, 倪雪莉, 等. 区块链隐私保护机制研究[J]. 计算机工程, 2023, 49(4): 1-13.
WANG Q, LI F J, NI X L, et al. Research on blockchain privacy protection mechanism[J]. Computer Engineering, 2023, 49(4): 1-13.
[50] 张思亮, 凌捷, 陈家辉. 可追踪的区块链账本隐私保护方案[J]. 计算机工程与应用, 2020, 56(23): 31-37.
ZHANG S L, LING J, CHEN J H. Traceable blockchain ledger privacy protection scheme[J]. Computer Engineering and Applications, 2020, 56(23): 31-37.
[51] BERNABE J B, CANOVAS J L, HERNANDEZ-RAMOS J L, et al. Privacy-preserving solutions for blockchain: review and challenges[J]. IEEE Access, 2019, 7: 164908-164940.
[52] LI P, WEI F, ZHENG Y, et al. Privacy preservation in permissionless blockchain: a survey[J]. Digital Communications and Networks, 2021, 7(3): 295-307.
[53] NAFTALY H, MINSK Y. Discriminating defense against DDoS attacks; a novel approach[J]. arXiv:2201.12439,2022.
[54] TAPSELL J, AKRAM R N, MARKANTONAKIS K. An evaluation of the security of the Bitcoin Peer-to-Peer Network[J]. arXiv:1805.10259,2018.
[55] GUNTURN R. Survey of sybil attacks in social networks[J]. arXiv:1504.05522,2015.
[56] 魏松杰, 吕伟龙, 李莎莎. 区块链公链应用的典型安全问题综述[J]. 软件学报, 2022, 33(1): 324-355.
WEI S J, LYU W L, LI S S. Overview on typical security problems in public blockchain applications[J]. Journal of Software, 2022, 33(1): 324-355.
[57] LOPEZ-FUENTES F A, EUGUI-DE-ALBA I, ORTIZ-RUIZ O M. Evaluating P2P networks against eclipse attacks[J]. Procedia Technology, 2012, 3(2): 61-68.
[58] EYAL I, SIRER E G. Majority is not enough: bitcoin mining is vulnerable[J]. Communications of the ACM, 2018, 61(7): 95-102.
[59] SELIMI M, KABBINALE A R, ALI A, et al. towards blockchain-enabled wireless mesh networks[J]. arXiv:1804.00561,2018. |